Severity High Analysis Summary A huge wave of ZLoader samples has been observed in the past 24 hours. ZLoader is also known as Terdot, DELoader, that […]
Severity Medium Analysis Summary CVE-2022-22392 CVSS:6.8 IBM Planning Analytics Local 2.0 could allow an attacker to upload arbitrary executable files which, when executed by an unsuspecting […]
Severity High Analysis Summary CVE-2022-25844 CVSS:5.3 Node.js Angular module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw […]
Severity Hight Analysis Summary CVE-2022-21449 – Psychic Signatures An unspecified vulnerability in Oracle Java SE and Oracle GraalVM Enterprise Edition related to the Libraries component could […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity Medium Analysis Summary Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed […]
Severity High Analysis Summary A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an […]
Severity High Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]
Severity High Analysis Summary Vidar, which first appeared in late 2018, is a malware family that primarily acts as an information stealer and is frequently seen […]