Severity High Analysis Summary CVE-2022-26377 Apache HTTP Server is vulnerable to HTTP request smuggling, caused by an inconsistent Interpretation of HTTP Requests vulnerability in mod_proxy_ajp. An […]
Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity High Analysis Summary CVE-2022-29060 Fortinet FortiDDoS could allow a remote attacker to bypass security restrictions, caused by use of a hard-coded cryptographic key in the […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity High Analysis Summary Vidar, which first appeared in late 2018, is a malware family that primarily acts as an information stealer and is frequently seen […]
Severity High Analysis Summary CVE-2021-26084 Atlassian Confluence Server and Center code could allow a remote attacker to execute arbitrary code on the system, caused by a […]
Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]