Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity Medium Analysis Summary The NanoCore remote access Trojan (RAT) was first discovered in 2013 when it was being sold in underground forums. The malware has […]
Severity Medium Analysis Summary CVE-2021-37839 Apache Superset could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially-crafted […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity Medium Analysis Summary CVE-2022-32533 Apache Jetspeed-2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability […]
Severity High Analysis Summary CVE-2022-33980 Apache Commons Configuration could allow a remote attacker to execute arbitrary code on the system, caused by a flaw when using […]
Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity High Analysis Summary ZLoader is also known as Terdot, DELoader, that loads the Zeus malware on victim machines after initial infection. It is a banking […]