Severity High Analysis Summary Researchers’ latest findings reveal the emergence of a significant player in the cybercrime landscape named VexTrio, believed to be the largest malicious […]
Severity Medium Analysis Summary CVE-2024-20305 CVSS:4.8 Cisco Unity Connection is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the web-based management interface. […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity High Analysis Summary CVE-2023-49657 Apache Superset is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Dashboard Title and Chart Title. […]
Severity High Analysis Summary CVE-2023-42915 Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary A newly discovered ransomware operation dubbed “Kasseika” has been seen deploying Bring Your Own Vulnerable Driver (BYOVD) attacks to encrypt files after […]