Severity High Analysis Summary A new information-stealer campaign dubbed Phemedrone malware exploits a Microsoft Defender SmartScreen flaw to bypass security prompts by Windows when opening URL […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2024-20710 CVSS:5.5 Adobe Substance 3D Stager could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read. By persuading […]
Severity Medium Analysis Summary CVE-2023-2030 CVSS:3.5 GitLab Community Edition and Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw […]
Severity High Analysis Summary CVE-2024-0562 CVSS:7.8 Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by a use-after-free flaw when a disk […]
Severity Medium Analysis Summary CVE-2023-52328 CVSS:6.1 Trend Micro Apex Central is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity High Analysis Summary APT-17, also known as “Bitter APT” or “DeputyDog” is a state-sponsored cyber espionage group that is believed to operate out of China. […]
Severity High Analysis Summary Suspected nation-state threat actors, tracked as UNC5221, have deployed about five different malware families as a part of post-exploitation activities by using […]