Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity Medium Analysis Summary CVE-2023-49587 SAP Solution Manager could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper authorization validation. […]
Severity Medium Analysis Summary FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, […]
Severity High Analysis Summary CVE-2023-40363 IBM InfoSphere Information Server 11.7 could allow an authenticated user to change installation files due to incorrect file permission settings. Impact […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary A new variant of a dynamic link library, or DLL for short, search order hijacking technique has been discovered that could be […]
Severity Medium Analysis Summary CVE-2023-48450, CVE-2023-48451, CVE-2023-48452 Adobe Experience Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker […]
Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]