Severity Medium Analysis Summary CVE-2022-43876 IBM Security Verify Access OIDC Provider 22.09 through 23.03 allows web pages to be stored locally which can be read by […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
Severity Medium Analysis Summary A new cyber espionage campaign is targeting multiple sectors like media, telecommunication, internet service providers (ISP), Kurdish websites, and information technology (IT) […]
Severity Medium Analysis Summary CVE-2023-44959 D-Link DSL-3782 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by improper neutralization of user […]
Severity High Analysis Summary Researchers revealed that Iranian crypto exchange Bit24.cash had accidentally leaked sensitive data of about 230,000 users, including user IDs, credit cards, and […]
Severity High Analysis Summary CVE-2023-32449 Dell PowerStore could provide weaker than expected security, caused by an improper verification of cryptographic signatures. By persuading a victim to […]
Severity Medium Analysis Summary CVE-2023-47140 IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls. Impact Indicators […]