Severity Medium Analysis Summary CVE-2023-50776 CVSS:4.3 Jenkins PaaSLane Estimate Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by the storage of authentication […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity High Analysis Summary According to the latest joint advisory by cybersecurity researchers of Australia and the U.S., the cybercriminals behind the Play ransomware are said […]
Severity High Analysis Summary A hacktivist group linked to Israel dubbed Predatory Sparrow (or Gonjeshke Darande in Persian) has carried out cyberattacks against petrol stations across […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]