Severity High Analysis Summary CVE-2022-25168 Apache Hadoop could allow a local authenticated attacker to execute arbitrary commands on the system, caused by improper input file name […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary A zero-day vulnerability in Microsoft Office is being actively exploited in the wild, and while there isn’t currently a patch, the software […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Web defacement is an attack in which malicious parties infiltrate a web page and replace the content on the page with their […]
Severity High Analysis Summary Semikron, an independent producer of power semiconductor components with headquarters in Germany, was the victim of a ransomware cyberattack. Semikron employs over 3,000 […]
Severity Medium Analysis Summary CVE-2022-20852 CVSS:5.4 Cisco Webex Meetings could allow a remote authenticated attacker to bypass security restrictions, caused by improper validation of user-supplied input. […]
Severity High Analysis Summary CVE-2022-20842 CVSS:9.8Cisco Small Business RV Series Routers could allow a remote attacker to execute arbitrary code on the system, caused by improper […]