Severity High Analysis Summary Cybercriminals are leveraging YouTube videos that feature content related to cracked applications to lure users into downloading an info-stealer malware named Lumma. […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary CVE-2023-51439 CVSS:7.8 Siemens Teamcenter Visualization and JT2Go could allow a remote attacker to execute arbitrary code on the system, caused by a […]
Severity High Analysis Summary The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six heavily exploited flaws to its Known Exploited Vulnerabilities catalog that are […]
Severity High Analysis Summary CVE-2023-49647 Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows could allow a local authenticated attacker […]
Severity Medium Analysis Summary CVE-2024-0333 Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient data validation in Extensions. By persuading a […]
Severity Medium Analysis Summary CVE-2023-44250 Fortinet FortiOS and Fortinet FortiProxy could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an […]
Severity Medium Analysis Summary GCleaner is a type of malware that disguises itself as a legitimate software program called “GCleaner” or “G-Cleaner.” It is typically spread […]
Severity High Analysis Summary Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums […]