Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary CVE-2022-20861 Cisco Nexus Dashboard is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the web UI that […]
Severity High Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity High Analysis Summary Vtflooder is a trojan infection that can infiltrate your system without your awareness and remain undetected for a long time, despite the […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary CVE-2022-2481 CVSS:8.8Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Views. By […]