Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary CVE-2022-22728 Apache libapreq2 is vulnerable to a denial of service, caused by a buffer overflow while processing multipart form uploads. By sending […]
Severity High Analysis Summary CVE-2021-25642 Apache Hadoop could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw when ZKConfigurationStore […]
Severity Medium Analysis Summary CVE-2022-20865 CVSS:6.7 Cisco FXOS Software could allow a local authenticated attacker to execute arbitrary commands on the system, caused by improper input […]
Severity High Analysis Summary Donot APT group has been actively dropping malicious samples and targeting Government users to exfiltrate data. The hackers’ targets include countries in […]
Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity Medium Analysis Summary AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized […]
Severity High Analysis Summary APT29 aka Nobelium and Cozy Bear are the group which were behind the infamous Solar Wind attacks in 2020. APT29 threat group […]
Severity High Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]