Severity Medium Analysis Summary FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma (aka CrySIS) malware that first appeared at the beginning of 2019. It spreads into several […]
Severity High Analysis Summary Dharma ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. It […]
Severity High Analysis Summary The notorious threat actor known as TA866 has returned to the cyber landscape after a nine-month absence with a new large-volume phishing […]
Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary CVE-2024-0639 Linux Kernel is vulnerable to a denial of service, caused by a deadlock flaw in the sctp_auto_asconf_init function in net/sctp/socket.c. By […]
Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary CVE-2024-22428 Dell iDRAC Service Module could allow a local authenticated attacker to gain elevated privileges on the system, caused by an incorrect […]
Severity High Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]