Severity Medium Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user […]
Severity Medium Analysis Summary Guloader is currently being distributed via spam email campaigns with archived attachments that contain the malware. The majority of malware downloaded by […]
Severity High Analysis Summary CVE-2022-25926 Node.js window-control module could allow a local attacker to execute arbitrary commands on the system, caused by improper input validation by […]
Severity Medium Analysis Summary CVE-2022-41336 Fortinet FortiPortal is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the columnindex parameter. A remote authenticated […]
Severity Medium Analysis Summary CVE-2022-45857 Fortinet FortiManager could allow a remote authenticated attacker to bypass security restrictions, caused by an incorrect user management flaw in the […]
Severity High Analysis Summary KONNI is a remote access tool that North Korean cyber attackers have been using since at least 2014. The North Korean hacker […]
Severity High Analysis Summary APT-17 group aka BITTER APT group has been recently active and targeting sectors in South Asia for information theft and espionage. This […]
Severity Medium Analysis Summary CVE-2022-39164 IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX […]
Severity Medium Analysis Summary CVE-2022-43844 CVSS:2.2 IBM Robotic Process Automation for Cloud Pak 20.12 through 21.0.3 is vulnerable to broken access control. A user is not […]