Severity High Analysis Summary Hive is one of the quickest evolving ransomware families which was first observed in June 2021 and likely operates as an affiliate-based […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has beendeployed in […]
Severity High Analysis Summary CVE-2022-2230 CVSS:8.1 GitLab is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the project settings page. A remote […]
Severity Medium Analysis Summary Quasar virus is a Remote Access Trojan (RAT) that is often abused by cybercriminals to take remote control over users’ computers for […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity High Analysis Summary CVE-2022-2296 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Chrome […]
Severity Medium Analysis Summary CVE-2022-31770 IBM App Connect Enterprise Certified Container 4.2 could allow a user from the administration console to cause a denial of service […]
Severity High Analysis Summary CVE-2022-34918 Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by a type confusion in nft_set_elem_init. […]