Severity High Analysis Summary CVE-2022-21500 Oracle E-Business Suite could allow a remote attacker to obtain sensitive information, caused by a flaw in the Manage Proxies component. […]
Severity High Analysis Summary CVE-2022-1388 is a critical iControl REST authentication bypass vulnerability affecting different versions of F5 BIG-IP. F5 BIG-IP could allow a remote attacker to execute […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed […]
Severity High Analysis Summary A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an […]
Severity High Analysis Summary Donot APT group has been actively dropping malicious samples and targeting Government users to exfiltrate data. The group has previously been active […]
Severity Medium Analysis Summary Ghost RAT is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive information and data. […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]