Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary Karakurt is a financially motivated threat actor group active since at least June 2021, focused on data extortion. It collects the information […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary Vtflooder is a trojan infection that can infiltrate your system without your awareness and remain undetected for a long time, despite the […]
Severity High Analysis Summary A Vietnam-based threat group, APT32 (OceanLotus Group) is active since 2014. It is known for carrying out sophisticated attacks on several private […]
Severity Medium Analysis Summary AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized […]
Severity Medium Analysis Summary CVE-2022-30189 Microsoft Windows could allow a remote attacker to conduct spoofing attacks, caused by a flaw in the Autopilot Device Management and […]
Severity High Analysis Summary CVE-2022-29143 Microsoft SQL Server could allow a remote attacker to execute arbitrary code on the system. By sending a specially-crafted request, an […]