Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity High Analysis Summary CVE-2022-30556 CVSS:5.3Apache HTTP Server could allow a remote attacker to obtain sensitive information, caused by an error in mod_lua with websockets. An […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2022-30075 TP-Link Archer AX50 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in […]
Severity Medium Analysis Summary CVE-2022-1973 Linux Kernel is vulnerable to a denial of service, caused by a double-free flaw in the ntfs3 log_replay function. By sending […]
Severity High Analysis Summary CVE-2022-24296 Mitsubishi Electric products could allow a remote attacker to obtain sensitive information, caused by the use of cryptographically weak algorithm. By […]