Severity High Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]
Severity High Analysis Summary Sidewinder is a suspected Indian threat actor group that has been active since 2012. They have been observed attacking political, military, and […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity High Analysis Summary CVE-2022-27511 Citrix Application Delivery Management could allow a remote attacker to bypass security restrictions, caused by improper access control. By sending a […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity Medium Analysis Summary CVE-2022-20828 Cisco FirePOWER Software for ASA FirePOWER Module could allow a remote authenticated attacker to execute arbitrary commands on the system, caused […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]