Severity High Analysis Summary Mirai is one of the first major botnets to target linux based vulnerable networking devices. It was discovered in August 2016 and […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary The REvil (also known as Sodinokibi) is a Ransomware-as-a-Service (RaaS). The first attack of REvil in middle of April 2019, and attracted huge attention […]
Severity High Analysis Summary Chaos is a customizable ransomware builder that emerged on June 9 2021 (in underground forums) by falsely marketing itself as the .NET […]
Severity High Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity Medium Analysis Summary Guloader is currently being distributed via spam email campaigns with archived attachments that contain the malware. The majority of malware downloaded by […]
Severity High Analysis Summary A zero-day vulnerability in Microsoft Office is being actively exploited in the wild, and while there isn’t currently a patch, the software […]
Severity Medium Analysis Summary CVE-2022-41294 CVSS:6.5IBM Robotic Process Automation 21.0.0, 21.0.1, 21.0.2, 21.0.3, and 21.0.4 is vulnerable to cross origin resource sharing using the bot api. […]