Severity High Analysis Summary CVE-2022-30652 CVSS:7.8 Adobe InCopy could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write flaw. […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has beendeployed in […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity High Analysis Summary CVE-2022-33158 Trend Micro VPN Proxy One Pro could allow a local authenticated attacker to gain elevated privileges on the system, caused by […]
Severity Low Analysis Summary CVE-2022-22953 VMware HCX could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to obtain sensitive […]
Severity Medium Analysis Summary CVE-2022-29406 WordPress Team Manager plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated […]
Severity High Analysis Summary The BlackCat, aka ALPHV ransomware group, has developed a new approach to compel victims to pay the ransom. To enhance the pressure, the group […]
Severity Medium Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]
Severity High Analysis Summary Sidewinder is a suspected Indian threat actor group that has been active since 2012. They have been observed attacking political, military, and […]