Severity High Analysis Summary CVE-2023-5399 CVSS:9.8 Schneider Electric SpaceLogic C-Bus Toolkit could allow a remote attacker to traverse directories on the system. An attacker could send […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary APT28 is one of Russia’s longest-running APTs and its operations date back to at least 2007. The group supports Russia in its […]
Severity High Analysis Summary The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be […]
Severity High Analysis Summary Cybersecurity researchers have discovered a new Android malware called Xamalicious that is capable of taking complete control of the infected device and […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary The Qakbot malware has resurfaced less than four months after law enforcement, including US authorities, dismantled its distribution infrastructure in a successful […]
Severity High Analysis Summary CVE-2023-49583, CVE-2023-50422, CVE-2023-50423, CVE-2023-50424 SAP Business Technology Platform (BTP) Security Services Integration Libraries could allow a remote attacker to gain elevated privileges […]
Severity High Analysis Summary CVE-2023-42476 CVSS:6.8 SAP Business Objects Web Intelligence is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated […]