Severity High Analysis Summary Mirai is one of the first major botnets to target linux based vulnerable networking devices. It was discovered in August 2016 and […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity High Analysis Summary WannaCry is also called WCry or WanaCrptor ransomware malware, this ransomware can encrypt all your data files and demands a payment to […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2022-39251 CVSS:8.6Matrix Javascript SDK could allow a remote attacker to bypass security restrictions, caused by Olm/Megolm protocol confusion. By sending a specially-crafted […]
Severity High Analysis Summary A zero-day vulnerability in Microsoft Office is being actively exploited in the wild, and while there isn’t currently a patch, the software […]
Severity High Analysis Summary CVE-2022-40486 TP-Link Archer AX10 could allow a remote attacker to execute arbitrary code on the system. By using a specially-crafted backup file, […]
Severity High Analysis Summary The REvil (also known as Sodinokibi) is a Ransomware-as-a-Service (RaaS). The first attack of REvil in middle of April 2019, and attracted huge attention […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]