Severity High Analysis Summary CVE-2022-22590 Apple watchOS could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the WebKit […]
Severity High Analysis Summary CVE-2022-23945 Apache ShenYu could allow a remote attacker to bypass security restrictions, caused by missing authentication on ShenYu Admin. By sending a […]
Severity High Analysis Summary CVE-2022-0330 Linux Kernel could allow a local attacker to obtain sensitive information, caused by a security sensitive bug in the i915 kernel […]
Severity Medium Analysis Summary CVE-2021-29838 IBM Security Guardium Insights 3.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable […]
Severity Medium Analysis Summary Since 2016, FormBook has been active as a data-stealing malware that affects 4% of enterprises in 2020. It tracks and monitors keystrokes, […]
Severity High Analysis Summary Researchers have identified recent Mustang Panda activity that involves the use of DLL side-loading to deliver PlugX. The initial infection vector is […]
Severity High Analysis Summary The watering hole attack gets its name from a hunting technique. In this technique the hunter, instead of hunting the prey, goes […]
Severity High Analysis Summary Molerats APT – also known as Moonlight, Extreme Jackal, and Gaza Hackers Team – have been active since 2012. They made headlines […]
Severity Mediujm Analysis Summary BRATA android malware is equipped with the ability to perform a factory reset on devices and run GPS tracking on them. BRATA […]