Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the.NET framework. Since its initial appearance in 2014, this has been deployed […]
Severity High Analysis Summary APT-17 group aka BITTER APT group has been recently active and targeting sectors in South Asia for information theft and espionage. This […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary CVE-2022-41107 Microsoft Office could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Graphics […]
Severity Low Analysis Summary CVE-2022-42494 All in One SEO Pro plugin for WordPress is vulnerable to server-side request forgery. A remote authenticated attacker could exploit this […]
Severity High Analysis Summary CVE-2021-40539 Zoho ManageEngine ADSelfService Plus could allow a remote attacker to execute arbitrary code on the system, caused by a REST API […]
Severity High Analysis Summary As of November 2022, Hive ransomware operators have successfully extorted $100 million in ransom payments from over 1,300 companies across the world, reported the […]
Severity High Analysis Summary Kimsuky is a North Korean nation-state actor that has been active since 2012. It primarily targets South Korean government agencies and conducts […]