Severity High Analysis Summary CVE-2023-50198, CVE-2023-50199, CVE-2023-50200, CVE-2023-50201 D-Link G416 could allow a remote attacker to execute arbitrary commands on the system, caused by a flaw […]
Severity High Analysis Summary A new Python project named ‘Wall of Flippers’ has detected Bluetooth spam attacks that are launched using Flipper Zero and Android devices. […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity High Analysis Summary Researchers have discovered three fake Chrome extensions that pretend to be VPN (Virtual Private Networks) were force-installed 1.5 million times and are […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary A Russian-linked cybercrime group dubbed COLDRIVER has been involved in various credential theft campaigns against organizations that are of strategic interest to […]
Severity High Analysis Summary CVE-2023-42017 IBM Planning Analytics Local 2.0 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file […]
Severity Medium Analysis Summary CVE-2023-45165 IBM AIX 7.2 and 7.3 could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to […]
Severity High Analysis Summary The notorious banking trojan Chameleon has re-emerged with a new variant that disables fingerprint and face unlock features on Android devices to […]