Severity High Analysis Summary CVE-2022-26135 Atlassian is vulnerable to server-side request forgery, caused by a flaw in the Mobile Plugin. By using a specially-crafted argument, an […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main […]
Severity High Analysis Summary APT group Evilnum aka Jointworm has been seen targeting the financial sector with malicious emails. The group first seen in 2018 with […]
Severity High Analysis Summary CVE-2022-2143 CVSS:9.8Advantech iView could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection vulnerability. By […]
Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]
Severity Medium Analysis Summary CVE-2022-34473 CVSS:6.5Mozilla Firefox could allow a remote attacker to bypass security restrictions, caused by the failure to sanitize xlink:href attributes. By persuading […]
Severity Medium Analysis Summary CVE-2022-2226 Mozilla Thunderbird could allow a remote attacker to bypass security restrictions. By performing a replay attack, a remote attacker could exploit […]