Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity High Analysis Summary An advanced cyber campaign targeting at least 116 organizations in 45 countries has compromised 70, and it is believed to be the […]
Severity High Analysis Summary The state of Alabama has been targeted by a Russian-backed hacktivist named Anonymous Sudan, which resulted in a massive network disruption. Days […]
Severity Medium Analysis Summary CVE-2023-47699 CVSS:6.1 IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript […]
Severity High Analysis Summary A new data leakage exploit that targets present-day CPU architectures supporting speculative execution has been found by a team of researchers. It […]
Severity Medium Analysis Summary CVE-2024-26124 CVSS:5.4 Adobe Experience Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could […]
Severity High Analysis Summary CVE-2024-21411 Microsoft Skype for Consumer could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to […]