Severity High Analysis Summary Dharma ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. It […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2023-4397 CVSS:4.4 Zyxel products are vulnerable to a denial of service, caused by a buffer overflow. By using a specially crafted string, […]
Severity Medium Analysis Summary CVE-2023-20275 Cisco Adaptive Security Appliance and Firepower Threat Defense Software could allow a remote authenticated attacker to bypass security restrictions, caused by […]
Severity High Analysis Summary CVE-2023-40074 CVSS:6.2 Google Android is vulnerable to a denial of service, caused by a flaw in saveToXml of PersistableBundle.java. By executing a […]
Severity High Analysis Summary Identity access management vendor Okta has revised its initial assessment of the security breach it suffered in the fall, revealing that 100% […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. […]
Severity High Analysis Summary CVE-2023-44291 CVSS:7.2 Dell DM5500 could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in […]