Severity High Analysis Summary CVE-2022-28893 Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free flaw in the […]
Severity High Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]
Severity High Analysis Summary IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main […]
Severity High Analysis Summary Researchers have identified recent Mustang Panda activity that involves the use of DLL side-loading to deliver PlugX. The initial infection vector is […]
Severity High Analysis Summary CVE-2022-22965 Spring Framework could allow a remote attacker to execute arbitrary code on the system, caused by the improper handling of PropertyDescriptor […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary Conti ransomware was discovered in December 2019 and is delivered via TrickBot. It’s been utilized against large companies and government institutions across […]
Severity Medium Analysis Summary CVE-2022-22339 CVSS:6.5 IBM Planning Analytics 2.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized […]
Severity Medium Analysis Summary CVE-2022-1263 CVSS:5.1 Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference flaw in the kvm_dirty_ring_push function […]