Severity Medium Analysis Summary HawkEye, primarily an infostealer, has additional capabilities such as bypassing of AV systems and keylogging. A spear-phishing campaign is detected using malicious […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing […]
Severity High Analysis Summary RU Ransom appears to be targeting Russian assets in retribution for Russia’s invasion of Ukraine. This malware is developed in .Net and […]
Severity Medium Analysis Summary Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the […]
Severity Medium Analysis Summary Quasar virus is a Remote Access Trojan (RAT) that is often abused by cybercriminals to take remote control over users’ computers for […]
Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary CVE-2022-0618 Apple SwiftNIO HTTP/2 is vulnerable to a denial of service, caused by a logical error when parsing a HTTP/2 HEADERS or […]
Severity High Analysis Summary CVE-2022-26878 Linux Kernel is vulnerable to a denial of service, caused by a memory leak in the VirtIO Bluetooth driver in drivers/bluetooth/virtio_bt.c. […]