Severity High Analysis Summary APT28 is one of Russia’s longest-running APTs and its operations date back to at least 2007. The group supports Russia in their […]
Severity High Analysis Summary can-affiliated religious institutions in the United States and Europe. Asian countries, such as Taiwan, Hong Kong, Mongolia, Tibet, and Myanmar, were the […]
Severity Medium Analysis Summary CVE-2022-4376 CVSS:3.1 GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to map a […]
Severity Medium Analysis Summary FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, […]
Severity Medium Analysis Summary CVE-2023-2468 CVSS:6.5 Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in PictureInPicture. By persuading a […]
Severity High Analysis Summary CVE-2023-2131 INEA ME RTU could allow a remote attacker to execute arbitrary code on the system, caused by OS command injection. By […]
Severity High Analysis Summary CVE-2023-32007 Apache Spark could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in the […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]