Severity Medium Analysis Summary Ghost RAT is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive information and data. […]
Severity High Analysis Summary An emergent and effective data-harvesting tool dubbed Oski is proliferating in North America and China, stealing online account credentials, credit card numbers, […]
Severity Medium Analysis Summary CVE-2022-22434 CVSS:4.2 IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a user with physical access to create an API request […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity High Analysis Summary Phobos ransomware appeared at the beginning of 2019. It has been noted that this new strain of ransomware is strongly based on […]
Severity High Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary Docker Engine honeypots were compromised by Ukraine supports, most likely the Ukraine IT Army, in attacks against Belarusian and Russian websites. DOS (denial-of-service) […]
Severity High Analysis Summary APT29 aka Nobelium and Cozy Bear are the group which were behind the infamous Solar Wind attacks in 2020. APT29 threat group […]
Severity Medium Analysis Summary CVE-2022-28890 Apache Jena could allow a remote attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations […]