Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity High Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user information to […]
Severity High Analysis Summary CVE-2022-36804 Atlassian Bitbucket Server and Data Center could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by […]
Severity High Analysis Summary CVE-2022-2915 SonicWall SMA100 appliance is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By sending a specially-crafted request, a […]
Severity High Analysis Summary CVE-2022-31773 IBM DataPower Gateway V10CD, 10.0.1, and 2018.4.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious […]
Severity Medium Analysis Summary CVE-2022-35714 IBM Maximo Asset Management 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has beendeployed in […]
Severity High Analysis Summary Kimsuky is a North Korean nation-state actor that has been active since 2012. It primarily targets South Korean government agencies and conducts […]