Severity High Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity High Analysis Summary CVE-2023-37928 CVSS:8.8 Zyxel NAS326 and NAS542 devices could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by […]
Severity Medium Analysis Summary CVE-2023-47701 CVSS:5.3 IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow an authenticated user […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity Medium Analysis Summary Agent Tesla is a very popular spyware Trojan built for the .NET framework. Since its initial appearance in 2014, this has been […]
Severity High Analysis Summary A new and sophisticated Android malware, named FjordPhantom, has been disclosed by cybersecurity researchers. The malware targets users in Southeast Asian countries, […]
Severity High Analysis Summary The notorious Gh0st RAT malware has been identified with a new variant dubbed “SugarGh0st RAT” used in recent cyber campaigns targeting the […]
Severity High Analysis Summary CVE-2023-6033 CVSS:8.7 GitLab Community and Enterprise Edition are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated […]
Severity High Analysis Summary CVE-2023-42006 IBM Administration Runtime Expert for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information caused […]