Severity High Analysis Summary The crypter being used reuses the code from the ransomware itself. According to the security Researchers, the crypter is a modified form […]
Severity Medium Analysis Summary W32/Shodi-F – a virus targeting Windows platform – seeks to infect all files with the EXE extension, except for specific Windows system […]
Severity Medium Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity Medium Analysis Summary AveMaria RAT is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized access to a victim’s […]
Severity High Analysis Summary APT36, just like many other threat actors, is capitalizing on fear, compromising victims with scams or malware campaigns. APT36 is using a […]
Severity High Analysis Summary Gamaredon is a Russia-backed advanced persistent threat (APT) that has been operating since at least 2013. The main goal of this APT […]
Severity High Analysis Summary Kimsuky is a North Korean nation-state actor that has been active since 2012. It primarily targets South Korean government agencies and conducts […]
Severity Medium Analysis Summary CVE-2022-21151 Intel Processors could allow a local authenticated attacker to obtain sensitive information, caused by the processor optimization removal or modification of […]
Severity Low Analysis Summary CVE-2022-21136 CVSS:3.3 Intel Xeon Processors are vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted request, […]