Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2022-3071 Google ChromeOS could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Ash. By […]
Severity Medium Analysis Summary CVE-2022-20923 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow a remote attacker to bypass security restrictions, caused by improper […]
Severity Medium Analysis Summary CVE-2022-20863 Cisco Webex App could allow a remote attacker to bypass security restrictions, caused by improper handling of character rendering. By sending […]
Severity High Analysis Summary CVE-2022-20696 Cisco SD-WAN vManage Software could allow a remote attacker to bypass security restrictions, caused by the lack of protection mechanisms in […]
Severity High Analysis Summary DCRat – a Russian backdoor, was initially introduced in 2018, but rebuilt and relaunched a year later. The DCRat backdoor appears to […]
Severity High Analysis Summary CVE-2022-34883 CVSS:7.2 Hitachi RAID Manager Storage Replication Adapter could allow a remote authenticated attacker to execute arbitrary commands on the system, caused […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]