Severity High Analysis Summary CVE-2023-0124 CVSS:7.8 Delta Electronics DOPSoft could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write […]
Severity Medium Analysis Summary ModiLoader – aka DBatLoader or NatsoLoader – was initially identified in June 2020. It is a two-stage loader that has been seen […]
Severity Medium Analysis Summary Aurora Stealer is a type of information-stealing malware that targets sensitive information from infected computers. The activities aurora stealer performs are as […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary The Oski stealer is a type of malicious software that was originally discovered in November 2019. This successful data-harvesting tool is spreading […]
Severity High Analysis Summary TZW ransomware is a type of malware that employs various tactics and techniques to infect systems and encrypt files for ransom. Here […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity Medium Analysis Summary CVE-2022-4041 CVSS:5.9 Hitachi Storage Plug-in for VMware vCenter could allow a remote authenticated attacker to gain elevated privileges on the system, caused […]