Severity High Analysis Summary Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and […]
Severity High Analysis Summary An exploit was revealed in October 2023 that can generate persistent Google cookies by manipulating tokens. A threat actor can use the […]
Severity High Analysis Summary Threat actors have been observed using spear-phishing attacks to deploy various backdoors and tools, including AppleSeed, MeterPreter, and TinyNuke, to compromise machines. […]
Severity Medium Analysis Summary CVE-2023-48440 CVSS:5.4 Adobe Experience Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could […]
Severity High Analysis Summary Ukrainian security researchers warn of a new phishing campaign launched by the Russian APT28 threat group to distribute new malware like MASEPIE, […]
Severity Medium Analysis Summary CVE-2023-39912 Zoho ManageEngine ADManager Plus could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of […]
Severity Medium Analysis Summary CVE-2023-42899 CVSS:8.8 Apple watchOS could allow a remote attacker to execute arbitrary code on the system, caused by an issue in the […]
Severity Medium Analysis Summary CVE-2023-52079 Node.js msgpackr module is vulnerable to a denial of service, caused by an infinite recursion flaw during conversion of property names […]
Severity High Analysis Summary APT-17, also known as “Bitter APT” or “DeputyDog” is a state-sponsored cyber espionage group that is believed to operate out of China. […]