Severity High Analysis Summary CVE-2023-23477 IBM WebSphere Application Server traditional could allow a remote attacker to execute arbitrary code on the system with a specially crafted […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary MustangPanda, aka Bronze President and TA416, has been active since at least 2012. This threat actor targeted government agencies, think tanks, NGOs, […]
Severity High Analysis Summary Gafgyt is a type of malware that is used to conduct Distributed Denial of Service (DDoS) attacks. These attacks involve overwhelming a […]
Severity Medium Analysis Summary CVE-2023-22501 Atlassian Jira Service Management Server and Data Center could allow a remote attacker to bypass security restrictions, caused by improper authentication […]
Severity High Analysis Summary CVE-2023-23692 Dell PowerProtect Data Domain appliance could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a […]