Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary CVE-2024-2627 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Canvas. […]
Severity High Analysis Summary CVE-2024-2616 CVSS:6.5 Mozilla Firefox ESR and Thunderbird are vulnerable to a denial of service, caused by an error related to out-of-memory conditions […]
Severity High Analysis Summary Digital Document Publishing (DDP) sites are being attacked and exploited by threat actors for phishing attacks, credential harvesting, and session token theft. […]
Severity High Analysis Summary Cybersecurity experts have found a new attack surface for threat actors to gain unauthorized access to sensitive information, as Open AI ChatGPT […]
Severity Medium Analysis Summary CVE-2024-2432 CVSS:4.5 Palo Alto Networks GlobalProtect app on Windows could allow a local authenticated attacker to gain elevated privileges on the system, […]
Severity High Analysis Summary The Middle East and Africa (MEA) region is experiencing a significant surge in ransomware attacks, driven primarily by the ransomware-as-a-service (RaaS) model. […]
Severity Low Analysis Summary CVE-2024-0173 CVSS:3.8 Dell PowerEdge and Precision Rack could allow a local authenticated attacker to obtain sensitive information, caused by an improper parameter […]
Severity High Analysis Summary CVE-2024-26165 CVSS:8.8 Microsoft Visual Studio Code local allow a remote authenticated attacker to gain elevated privileges on the system. By sending a […]