Severity Medium Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user […]
Severity Medium Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity High Analysis Summary Darkylock is a ransomware that encrypts the files of the infected system and appends “.darky” extension to all the encrypted files leaving […]
Severity Medium Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity High Analysis Summary CVE-2022-3709 Sophos firewall is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Webadmin import group wizard. A […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma (aka CrySIS) malware that first appeared at the beginning of 2019. It spreads into several […]
Severity High Analysis Summary CVE-2022-45347 Apache ShardingSphere-Proxy could allow a remote attacker to bypass security restrictions, caused by the failure to cleanup the database session completely […]