Severity High Analysis Summary CVE-2023-49769 CVSS: 4.3 Integrate Google Drive Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. […]
Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2023-5629 CVSS:8.2 Schneider Electric Trio Ethernet Data Radio products could allow a remote attacker to conduct phishing attacks, caused by an open […]
Severity Medium Analysis Summary CVE-2023-50224 CVSS:6.5 TP-Link TL-WR841N devices could allow a remote attacker to obtain sensitive information, caused by a flaw in the httpd service. […]
Severity High Analysis Summary CVE-2023-51656 Apache IoTDB could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the […]
Severity High Analysis Summary CVE-2023-51467 CVSS:9.8 Apache OFBiz is vulnerable to server-side request forgery, caused by improper authentication validation. By sending a specially crafted request, an […]
Severity High Analysis Summary Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums […]
Severity High Analysis Summary Google and Twitter ads are actively promoting websites featuring a cryptocurrency drainer known as ‘MS Drainer,’ which has reportedly stolen $59 million […]