Severity High Analysis Summary CVE-2022-0470 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in […]
Severity Medium Analysis Summary CVE-2022-20680 Cisco Prime Service Catalog could allow a remote authenticated attacker to obtain sensitive information, caused by improper enforcement of Administrator privilege […]
Severity High Analysis Summary CVE-2021-42753 Fortinet FortiWeb could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of user requests. […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Researchers have analyzed the Dark Crystal RAT capabilities and C2 message format. Unlike a real RAT server, this one does not have […]
Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity High Analysis Summary Iran-based nation-state threat group called Phosphorus (aka TA453, COBALT ILLUSION, Charming Kitten, Newscaster, Magic Hound, and APT35) that has been active since […]
Severity High Analysis Summary WannaCry is also called WCry or WanaCrptor ransomware malware, this ransomware can encrypt all your data files and demands a payment to […]
Severity High Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]