Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Low Analysis Summary CVE-2023-44361 CVSS:3.3 Adobe Acrobat and Adobe Reader could allow a remote attacker to obtain sensitive information, caused by a use-after-free error. By […]
Severity Medium Analysis Summary CVE-2023-47060 CVSS:5.5 Adobe Premiere Pro could allow a remote attacker to obtain sensitive information, caused by an access of uninitialized pointer error. […]
Severity High Analysis Summary CVE-2023-48796 Apache DolphinScheduler could allow a remote attacker to obtain sensitive information, caused by improper authorization validation. By sending a specially crafted […]
Severity High Analysis Summary An undisclosed Afghan government entity faced an advanced persistent threat (APT) attack involving a novel web shell named HrServ.dll. This dynamic-link library […]
Severity High Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity High Analysis Summary Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information […]
Severity High Analysis Summary APT37, also known as ScarCruft or Red Eyes, is a state-sponsored cyber espionage group originating from North Korea. The group has been […]
Severity Medium Analysis Summary CVE-2023-47790 CVSS:7.1 Pz-LinkCard Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an […]