Severity Medium Analysis Summary CVE-2023-31403 CVSS: 9.6 SAP Business One could allow a remote attacker to bypass security restrictions, caused by not perform proper authentication and […]
Severity High Analysis Summary The Konni APT (Advanced Persistent Threat) group is a cyber espionage group that has been active since at least 2014. It is […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary CVE-2023-5997 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Garbage […]
Severity High Analysis Summary CVE-2023-34060 VMware Cloud Director Appliance could allow a remote attacker to bypass security restrictions. By sending a specially crafted request, an attacker […]
Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity Medium Analysis Summary CVE-2023-4775 CVSS:6.4 Advanced iFrame plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated […]
Severity High Analysis Summary A new phishing campaign is targeting governments in the Middle East and is distributing an initial access downloader called IronWind. It was […]
Severity Medium Analysis Summary PikaBot is a sophisticated and highly evasive malware that targets Windows operating systems. This malware exhibits a range of malicious behaviors, including […]