Severity High Analysis Summary Hive ransomware, which was first observed in June 2021 and likely operates as an affiliate-based ransomware, employs a wide variety of tactics, […]
Severity Medium Analysis Summary Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity High Analysis Summary CVE-2022-0742 Linux Kernel is vulnerable to a denial of service, caused by a memory leak flaw in the igmp6_event_query() and igmp6_event_report() functions. […]
Severity High Analysis Summary Sidewinder is a suspected Indian threat actor group that has been active since 2012. They have been observed attacking political, military, and […]
Severity High Analysis Summary CVE-2022-22669 Apple macOS Monterey could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free issue […]
Severity High Analysis Summary CVE-2022-0980 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in New Tab […]
Severity Medium Analysis Summary CVE-2022-26779 Apache CloudStack could allow a remote authenticated attacker to gain elevated privileges on the system, caused by the use of insecure […]
Severity High Analysis Summary CVE-2022-24420; CVE-2022-24419; CVE-2022-24416; CVE-2022-24415 Dell BIOS could allow a local authenticated attacker to execute arbitrary code on the system, caused by improper […]