Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]
Severity High Analysis Summary CVE-2023-25601 Apache DolphinScheduler could allow a remote attacker to bypass security restrictions, caused by improper authentication validation by the python-gateway function. By […]
Severity High Analysis Summary CVE-2023-20873 VMware Tanzu Spring Boot could allow a remote attacker to bypass security restrictions, caused by a flaw with wildcard pattern matching […]
Severity High Analysis Summary CVE-2023-28046 CVSS:8.2 Dell Display Manager could allow a local authenticated attacker to execute arbitrary code on the system, caused by an arbitrary […]
Severity High Analysis Summary GandCrab – a ransomware-as-a-service variant – was discovered in early 2018. At least five versions of GandCrab have been created since its […]
Severity High Analysis Summary Panda stealer is a malicious program, a new variant of CollectorStealer, designed to collect and exfiltrate sensitive and personal data from infected […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary A new type of malware called EvilExtractor is being marketed for sale to other threat actors as an “all-in-one” stealer malware. The […]