Severity High Analysis Summary Donot APT group has been actively dropping malicious samples and targeting Government users to exfiltrate data. The hackers’ targets include countries in […]
Severity High Analysis Summary CVE-2022-35256 Node.js is vulnerable to HTTP request smuggling, caused by the failure to correctly handle header fields that are not terminated with […]
Severity High Analysis Summary The APT29 nation-state actor with ties to Russia was discovered using Credential Roaming, a ‘lesser-known’ Windows feature, after conducting a successful phishing attack on […]
Severity High Analysis Summary CVE-2022-41061 Microsoft Word could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to open a […]
Severity High Analysis Summary Heodo is a malicious program that is a variant of Emotet. Emotet was first identified in 2014. This malware is mostly disseminated through spam emails […]
Severity High Analysis Summary CVE-2022-41203 SAP BusinessObjects BI Platform could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe […]
Severity Medium Analysis Summary CVE-2022-41212 CVSS:4.9 SAP NetWeaver Application Server ABAP and ABAP Platform could allow a remote authenticated attacker to traverse directories on the system, […]
Severity Medium Analysis Summary CVE-2022-41259 SAP SQL Anywhere is vulnerable to a denial of service, caused by improper input validation. By sending specially-crafted queries, a remote […]
Severity High Analysis Summary Chaos is a customizable ransomware builder that emerged on June 9 2021 (in underground forums) by falsely marketing itself as the .NET […]