Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary According to Google, some former members of the Conti cybercrime gang who are now associated with the threat group UAC-0098 aimed their […]
Severity High Analysis Summary In the year 2018, the threat actor WIRTE APT Subgroup was discovered for the first time. Spear-phishing emails are used to encourage […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed […]
Severity High Analysis Summary Hive is one of the quickest evolving ransomware families which was first observed in June 2021 and likely operates as an affiliate-based […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main […]
Severity Medium Analysis Summary CVE-2022-27491 CVSS:6.8 Fortinet FortiOS is vulnerable to a denial of service, caused by a improper verification of source of a communication channel. […]
Severity Medium Analysis Summary CVE-2022-30298 CVSS:7 Fortinet FortiSOAR could allow a local authenticated attacker to gain elevated privileges on the system, caused by an improper privilege […]