Severity High Analysis Summary The Donot APT – aka APT-C-35 – is a cybercriminal group that mainly targets countries in South Asia, more specifically Pakistan. It […]
Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary CVE-2022-43867 IBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. Impact Command Execution […]
Severity Medium Analysis Summary CVE-2022-34361 IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Black Basta is a new ransomware that encrypts data stored on clients’ hard drives. It has been active since April 2022 and […]
Severity High Analysis Summary KONNI is a remote access tool that North Korean cyber attackers have been using since at least 2014. The North Korean hacker […]
Severity High Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]