Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2022-1972 Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by an out-of-bound write flaw […]
Severity Medium Analysis Summary CVE-2022-29097 CVSS:4.9 Dell Wyse Management Suite could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation […]
Severity High Analysis Summary CVE-2022-29098 Dell EMC PowerScale OneFS could allow a remote attacker to bypass security restrictions, caused by weak password requirements. An attacker could […]
Severity High Analysis Summary CVE-2022-1680 CVSS:9.9 GitLab Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the the […]
Severity High Analysis Summary A Vietnam-based threat group, APT32 (OceanLotus Group) is active since 2014. It is known for carrying out sophisticated attacks on several private […]