Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary In a concerning trend, threat attackers are increasingly targeting verified accounts on X, the platform formerly known as Twitter. These accounts, marked […]
Severity High Analysis Summary The SideWinder APT (Advanced Persistent Threat) Group is a sophisticated cyber espionage group active since at least 2012. The group is believed […]
Severity High Analysis Summary Three new malicious packages with the ability to deploy a cryptocurrency miner on Infected Linux devices have been discovered in the Python […]
Severity High Analysis Summary Russian-linked threat actors who breached Kyivstar, Ukraine’s largest telecommunications service provider, have wiped thousands of systems on the main network of the […]
Severity High Analysis Summary CVE-2023-43960 D-Link DPH-400SE FRU could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw in […]
Severity Low Analysis Summary CVE-2023-26208 Fortinet FortiAuthenticator is vulnerable to a denial of service, caused by an improper restriction of excessive authentication attempts flaw. By sending […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]