Severity High Analysis Summary CVE-2022-40962 CVSS:8.8Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by memory safety bugs within the […]
Severity High Analysis Summary CVE-2022-34917 Apache Kafka is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted request, a remote […]
Severity High Analysis Summary Gamaredon is a Russia-backed advanced persistent threat (APT) that has been operating since at least 2013. The main goal of this APT […]
Severity Medium Analysis Summary CVE-2022-40768 Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by the lack of a memset for the […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary A new Mirai variant is making the rounds called mirai_pteamirai. This botnet is one of the significant botnets targeting exposed networking devices […]
Severity High Analysis Summary CVE-2022-37972 Microsoft Endpoint Configuration Manager could allow a remote attacker to conduct spoofing attacks. Impact Unauthorized Access Indicators Of Compromise CVE CVE-2022-37969 […]