Severity High Analysis Summary CVE 2019-7670 The application incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream […]
Severity High Analysis Summary It has been 10 years since the discovery of Skimer, first malware specifically designed to attack automated teller machines (ATMs). At the […]
Severity Medium Analysis Summary A new campaign that uses the Formbook malware, masquerading as an order inquiry through phishing emails. Initial point of infections sources from […]
Severity Medium Analysis Summary Hybrid Composer plugin for WordPress could allow a remote attacker to bypass security restrictions, caused by improper access control in wp_ajax_nopriv_ actions. […]
Severity High Analysis Summary Analysis Summary Phobos ransomware appeared at the beginning of 2019. It has been noted that this new strain of ransomware is strongly […]
Severity Medium Analysis Summary Threat actor TA505 is impersonating Airlines disguising as domestic e-ticket (e-ticket) certificates from the morning of July 25, ahead of the summer […]
Severity High Analysis Summary Since at least 2010, the IRON LIBERTY threat group (also known as TG-4192, Energetic Bear, Dragonfly, and Crouching Yeti) has targeted the […]
Severity High Analysis Summary A targeted APT campaign that utilized malicious RTF documents to deliver custom malware to unsuspecting victims. They dubbed this campaign “Operation LagTime […]
Severity Medium Analysis Summary A white paper was published by Yoroi exploring the risks that users can encounter when downloading materials from P2P sharing network, such […]