Severity High Analysis Summary KONNI is a remote access tool that North Korean cyber attackers have been using since at least 2014. The North Korean hacker […]
Severity High Analysis Summary Mirai is one of the first major botnets to target linux based vulnerable networking devices. It was discovered in August 2016 and […]
Severity High Analysis Summary The REvil (also known as Sodinokibi) is a Ransomware-as-a-Service (RaaS). The first attack of REvil in middle of April 2019, and attracted huge attention […]
Severity Medium Analysis Summary CVE-2022-35721 IBM Jazz for Service Management 1.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code […]
Severity High Analysis Summary CVE-2022-34348 IBM Sterling Partner Engagement Manager 6.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A […]
Severity High Analysis Summary DCRat – a Russian backdoor, was initially introduced in 2018, but rebuilt and relaunched a year later. The DCRat backdoor appears to […]
Severity Medium Analysis Summary CVE-2022-22423 IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769) could allow a local user to […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]