Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and […]
Severity High Analysis Summary WannaCry is also called WCry or WanaCrptor ransomware malware was discovered in May 2017, it infected networks running Microsoft Windows as part […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary CVE-2022-25164 CVSS:8.6 Mitsubishi Electric Corporation GX Works3 and MX OPC UA Module Configurator-R could allow a remote attacker to obtain sensitive information, […]
Severity High Analysis Summary Hidden Cobra aka Lazarus APT, AppleWorm, APT C-26, Group-77, Guardians of Peace, Official 91, Red Dot, Term.Hermit, or Zinc, is one of […]
Severity High Analysis Summary Meterpreter – a trojan-type program – enables attackers to take control of affected machines remotely. This malware injects itself into compromised processes […]
Severity High Analysis Summary CVE-2021-4135 Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the GPU component. By persuading a […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]