Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity Medium Analysis Summary MustangPanda, aka Bronze President and TA416, has been active since at least 2012. This threat actor targeted government agencies, think tanks, NGOs, […]
Severity Medium Analysis Summary DangerousPassword is a Chinese APT group that targets cryptocurrency companies. Found in 2018, the threat group uses decoy files with topics like […]
Severity High Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity High Analysis Summary Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the […]
Severity Medium Analysis Summary CVE-2022-31696 CVSS:7.5 VMware ESXi could allow a local authenticated attacker to bypass security restrictions, caused by a memory corruption flaw in the […]
Severity High Analysis Summary CVE-2022-42475 Fortinet FortiOS is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the SSL-VPN. By sending a specially […]