Severity High Analysis Summary CVE-2024-0029 CVSS:8.4 Google Android could allow a local attacker to gain elevated privileges on the system, caused by a flaw in the […]
Severity High Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity High Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary The threat actor Patchwork employed romance scam tactics to target victims in Pakistan and India, infecting their Android devices with the VajraSpy […]
Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
Severity High Analysis Summary CVE-2023-50326 IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force […]
Severity High Analysis Summary CVE-2024-0253 ManageEngine ADAudit Plus is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to the Dashboard’s Graphical […]
Severity High Analysis Summary CVE-2024-1085 Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by use-after-free flaw in the […]