Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary CVE-2024-20745 Adobe Premiere Pro is vulnerable to a heap-based buffer overflow. By persuading a victim to open a specially crafted document, a […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary CVE-2024-22259 VMware Tanzu Spring Framework could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in UriComponentsBuilder. […]
Severity High Analysis Summary The notorious Russia-attributed threat group called APT28 has been behind several ongoing phishing campaigns that are using lure documents that masquerade as […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity High Analysis Summary The discovery of the “gitgub” campaign reveals a concerning trend in cybercriminal tactics, as cybersecurity researchers unearthed multiple GitHub repositories offering cracked […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]