Severity High Analysis Summary CVE-2022-40746 IBM i Access Family 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.0 could allow a local authenticated attacker to execute arbitrary code […]
Severity High Analysis Summary Email-based phishing campaign targeting individuals in the Middle East spiked by 100 percent in October in the lead-up to the World Cup […]
Severity High Analysis Summary MustangPanda, aka Bronze President and TA416, has been active since at least 2012. This threat actor targeted government agencies, think tanks, NGOs, […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary In the past few years Orcus was known as Schnorchel, is a Remote Access Trojan with some odd activity. This RAT enables […]
Severity High Analysis Summary Chaos is a customizable ransomware builder that emerged on June 9 2021 (in underground forums) by falsely marketing itself as the .NET […]
Severity High Analysis Summary Emissary Panda – AKA APT27, BRONZE UNION, Iron Tiger, LuckyMouse, TG-3390, and Threat Group-3390 – has been active for more than a […]
Severity High Analysis Summary CVE-2022-43635 CVSS:6.5 The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from […]
Severity High Analysis Summary CVE-2022-44650 CVSS:7The specific flaw exists within the Unauthorized Change Prevention Service. A crafted request can trigger a write past the end of […]