Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary Vidar, which first appeared in late 2018, is a malware family that primarily acts as an information stealer and is frequently seen […]
Severity High Analysis Summary CVE-2022-21499 CVSS:9.1 Linux Kernel could allow a remote attacker to bypass security restrictions, caused by a lockdown break issue. By sending a […]
Severity Medium Analysis Summary CVE-2022-22977 VMware Tools for Windows could allow a local authenticated attacker to obtain sensitive information, caused by improper handling of XML external […]
Severity High Analysis Summary Vtflooder is a trojan infection that can infiltrate your system without your awareness and remain undetected for a long time, despite the […]