Severity High Analysis Summary In August 2021, Quantum Ransomware was identified for the first time. One of the first access vectors used by the threat actors […]
Severity High Analysis Summary The crypter being used reuses the code from the ransomware itself. According to the security Researchers, the crypter is a modified form […]
Severity Medium Analysis Summary CVE-2022-20821 Cisco IOS XR could allow a remote attacker to bypass security restrictions, caused by an issue the health check RPM opening […]
Severity Medium Analysis Summary Eternal Stealer – a malware family – can access data from systems like Credential Manager, Vault, and Network Passwords. Browsers, password managers, […]
Severity Medium Analysis Summary CVE-2021-22573 Google OAuth Client Library for Java could allow a remote attacker to bypass security restrictions, caused by improper verification of token […]
Severity Medium Analysis Summary Guloader is currently being distributed via spam email campaigns with archived attachments that contain the malware. The majority of malware downloaded by […]
Severity High Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]
Severity High Analysis Summary Emotet was initially discovered in 2014 when it infected clients of German and Austrian institutions. Emotet serves as a downloader for other […]
Severity Medium Analysis Summary The NanoCore remote access Trojan (RAT) was first discovered in 2013 when it was being sold in underground forums. The malware has […]