Severity Medium Analysis Summary Quasar virus is a Remote Access Trojan (RAT) that is often abused by cybercriminals to take remote control over users’ computers for […]
Severity Medium Analysis Summary FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, […]
Severity High Analysis Summary The Glupteba botnet has been recently discovered to utilize an undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature which helps it to […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary The resurgence of Bumblebee malware in the cybercriminal landscape on February 8, 2024, marks its return after a four-month hiatus. This sophisticated […]
Severity Medium Analysis Summary CVE-2024-24739 CVSS: 6.3 SAP Bank Account Management could allow a remote authenticated attacker to gain elevated privileges on the system, caused by […]
Severity High Analysis Summary CVE-2024-22093 CVSS:8.7 F5 BIG-IP could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw when […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity Medium Analysis Summary CVE-2024-23798 CVSS: 7.8 Siemens Tecnomatix Plant Simulation is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. By persuading a […]