Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Confucius APT group, an Indian state-sponsored APT group, first started operations in 2013. The group’s main target is Pakistani and other South […]
Severity High Analysis Summary CVE-2022-4262 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion flaw in […]
Severity High Analysis Summary GandCrab – a ransomware-as-a-service variant – was discovered in early 2018. At least five versions of GandCrab have been created since its […]
Severity Medium Analysis Summary CVE-2022-4201 CVSS:3.5GitLab is vulnerable to server-side request forgery, caused by a flaw in the Web Terminal advertise_address. By sending a specially-crafted request, […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity High Analysis Summary Experts at the German cybersecurity firm identified the Java-based StrRAT malware in June 2020. This malware uses plugins to grant the attacker […]
Severity Medium Analysis Summary CVE-2022-43900 CVSS:5.3IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker […]
Severity Medium Analysis Summary CVE-2022-41296 IBM Db2U 3.5, 4.0, and 4.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and […]