Severity High Analysis Summary CVE-2022-30525 Multiple Zyxel devices could allow a remote attacker to execute arbitrary commands on the system, caused by a flaw in the […]
Severity High Analysis Summary CVE-2022-35405 Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus could allow a remote attacker to execute arbitrary code on the […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary CVE-2022-3318 CVSS:8.8Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in ChromeOS Notifications. […]
Severity Medium Analysis Summary CVE-2021-27862 CVSS:4.7Multiple Cisco Products could allow a remote attacker to bypass security restrictions, caused by improper validation of SNAP/LLC Ethernet frames. By […]
Severity Medium Analysis Summary CVE-2022-20728 CVSS:4.7 Cisco Access Points could allow a remote attacker to bypass security restrictions, caused by a logic error on the AP. […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity High Analysis Summary APT28 is one of Russia’s longest-running APTs and its operations date back to at least 2007. The group supports Russia in their […]