Severity Medium Analysis Summary The Ramnit malware has numerous variants, which may individually be categorized as trojans, viruses, or worms. The first ramnit malware discovered in […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity High Analysis Summary Meterpreter – a trojan-type program – enables attackers to take control of affected machines remotely. This malware injects itself into compromised processes […]
Severity High Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]
Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary Dridex is a sophisticated strain of banking malware that targets the Windows platform, delivering spam campaigns to infect computers and steal banking […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity Medium Analysis Summary CVE-2022-30533 Modern Events Calendar Lite plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote […]
Severity High Analysis Summary CVE-2018-0171 Cisco IOS and Cisco IOS XE are vulnerable to a buffer overflow, caused by improper bounds checking by the Smart Install […]