Severity High Analysis Summary UNC3886, a sophisticated Chinese cyber espionage group, has been linked to the exploitation of a critical VMware vCenter Server flaw as a […]
Severity Medium Analysis Summary CVE-2024-23214 CVSS:8.8 Apple macOS Sonoma could allow a remote attacker to execute arbitrary code on the system, caused by multiple memory corruption […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity High Analysis Summary CVE-2024-0230 CVSS:2 Apple Magic Keyboard is vulnerable to a machine-in-the-middle attack, caused by a session management issue. By sniffing the network traffic, […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary CVE-2024-43816 CVSS:7.8 Delta Electronics Delta Industrial Automation DOPSoft is vulnerable to a buffer overflow, caused by improper bounds checking when parsing the […]
Severity High Analysis Summary APT28 is one of Russia’s longest-running APTs and its operations date back to at least 2007. The group supports Russia in its […]
Severity High Analysis Summary RecordBreaker is a type of malware that is designed to steal personal information from infected computers. This can include sensitive information such […]
Severity High Analysis Summary Cybersecurity analysts have recently discovered a new method named iShutdown that helps in identifying and exposing signs of spyware reliably on Apple […]