Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary CVE-2023-28069 Dell Streaming Data Platform could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker […]
Severity High Analysis Summary MAKOP ransomware was first observed in 2020 and it is said that this ransomware belongs to Phobos ransomware as its techniques are […]
Severity High Analysis Summary CVE-2023-28400 CVSS:9.9 mySCADA myPRO allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a command injection flaw […]
Severity Medium Analysis Summary CVE-2023-23685 CVSS:6.5 WordPress Portfolio Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated […]
Severity High Analysis Summary CVE-2023-20117 CVSS:7.2 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow a remote authenticated attacker to execute arbitrary […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2023-25940 CVSS:6.7 Dell EMC PowerScale OneFS could allow a local authenticated attacker to bypass security restrictions, caused by improper link resolution before […]
Severity High Analysis Summary CVE-2023-1823 CVSS:6.5 Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in FedCM. By persuading a […]