Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary Analysis Summary Confucius APT (Advanced Persistent Threat) is a cyber espionage group that has been active since at least 2013.The group’s main […]
Severity High Analysis Summary Chaos is a customizable ransomware builder that emerged on June 9 2021 (in underground forums) by falsely marketing itself as the .NET […]
Severity Medium Analysis Summary CVE-2023-24830 CVSS:7.5 Apache IoTDB could allow a remote attacker to bypass security restrictions, caused by an improper authentication flaw in iotdb-web-workbench. By […]
Severity Medium Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user […]
Severity High Analysis Summary CVE-2022-27596 QNAP running QTS and running QTS could allow a remote attacker to execute arbitrary code on the system. By sending a […]
Severity High Analysis Summary BlindEagle is an Advanced Persistent Threat (APT) group that has been active since at least 2018 and is believed to be operating […]
Severity High Analysis Summary Emotet has recently found in increased cyber activities after a short period of dormancy. Fresher IoCs are being retrieved everyday. Emotet is […]
Severity Medium Analysis Summary TrickBot – a windows-based banking trojan – makes its first appearance in 2016. It targets sensitive data and serves as a distribution […]