Severity Medium Analysis Summary CVE-2022-23202 Adobe Creative Cloud could allow a remote attacker to execute arbitrary code on the system, caused by an uncontrolled search path […]
Severity High Analysis Summary Molerats APT – also known as Moonlight, Extreme Jackal, and Gaza Hackers Team – have been active since 2012. They made headlines […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary CVE-2022-24665; CVE-2022-24664; CVE-2022-24663 PHP Everywhere plugin for WordPress could allow a remote authenticated attacker to execute arbitrary code on the system, caused […]
Severity High Analysis Summary CVE-2022-22533 SAP Application Server Java is vulnerable to a denial of service, caused by a memory leak in memory pipe management. By […]
Severity Medium Analysis Summary CVE-2022-23188 Adobe Illustrator is vulnerable to a buffer overflow. By persuading a victim to open a specially-crafted document, a remote attacker could […]
Severity High Analysis Summary A Vietnam-based threat group, APT32 (OceanLotus Group) is active since 2014. It is known for carrying out sophisticated attacks on several private […]
Severity High Analysis Summary Kimsuky is a North Korean threat actor active since 2012. It primarily targets South Korean government agencies and conducts espionage activities against […]
Severity High Analysis Summary Sidewinder is a suspected Indian threat actor group that has been active since 2012. They have observed attacking political, military, and corporate […]