Severity High Analysis Summary Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It […]
Severity High Analysis Summary CVE-2022-23181 Apache Tomcat could allow a local authenticated attacker to gain elevated privileges on the system, caused by a time of check, […]
Severity Medium Analysis Summary CVE-2022-22942 Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by improper file descriptor handling in the vmwgfx […]
Severity High Analysis Summary CVE-2021-4034 A memory corruption vulnerability in a SUID-root Program (polkit’s pkexec) was recently discovered by the Qualys Research Team. It is an […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity Medium Analysis Summary Smokeloader is a popular bot and a veteran in its field, this piece of malware is used mainly for loading other malicious […]
Severity Medium Analysis Summary Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the […]
Severity High Analysis Summary APT28 is one of Russia’s longest running APTs and its operations date back to at least 2007. The group supports Russia in […]
Severity High Analysis Summary CVE-2022-21279; CVE-2022-21280; This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle MySQL Cluster. Authentication is not required […]