Pikabot Malware On The Rise What Organizations Need To Know
A new type of malware is being used by ransomware gangs in their attacks, and its name is PikaBot. A...
A new type of malware is being used by ransomware gangs in their attacks, and its name is PikaBot. A...
Malware loaders (also known as droppers or downloaders) are a popular commodity in the criminal underground. Their primary function is...
February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
NAME__________Kaspersky information disclosurePlatforms Affected:Kaspersky Kaspersky Password Manager for Windows *Risk Level:2.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kaspersky could allow a local authenticated attacker to...
NAME__________MISP weak securityPlatforms Affected:MISP MISP 2.4.186Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MISP could provide weaker than expected security, caused by improper checking for...
NAME__________Standout Color Boxes and Buttons plugin for WordPress cross-site scriptingPlatforms Affected:WordPress WordPress WordPress Standout Color Boxes and Buttons plugin for...
NAME__________Broadcom, Microsoft and MikroTik products denial of servicePlatforms Affected:Broadcom DSL/PON/Wifi routers Microsoft Windows Deployment Services (WDS) MikroTik TFTP serviceRisk Level:7.5Exploitability:UnprovenConsequences:Denial...
NAME__________Sangoma Technologies cg6kwin2k.sys security bypassPlatforms Affected:Sangoma Technologies cg6kwin2k.sysRisk Level:6.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Sangoma Technologies cg6kwin2k.sys could allow a local authenticated attacker to...
NAME__________GnuTLS denial of servicePlatforms Affected:GnuTLS GnuTLS 3.8.3Risk Level:5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________GnuTLS is vulnerable to a denial of service, caused by...
NAME__________GnuTLS information disclosurePlatforms Affected:GnuTLS GnuTLS 3.8.3Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________GnuTLS could allow a remote authenticated attacker to obtain sensitive information, caused...
NAME__________MISP weak securityPlatforms Affected:MISP MISP 2.4.186Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MISP could provide weaker than expected security, caused by improper checking for...
NAME__________Campcodes Online Beauty Parlor Management System SQL injectionPlatforms Affected:Campcodes Complete Online Beauty Parlor Management System 1.0Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Campcodes Online...
NAME__________Campcodes Online Beauty Parlor Management System SQL injectionPlatforms Affected:Campcodes Complete Online Beauty Parlor Management System 1.0Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Campcodes Online...
NAME__________Advantech WebAccess/SCADA SQL injectionPlatforms Affected:Advantech WebAccess/SCADA 9.1.5URisk Level:6.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Advantech WebAccess/SCADA is vulnerable to SQL injection. A remote authenticated attacker...
NAME__________IBM Security Verify Directory information disclosurePlatforms Affected:IBM Security Verify Directory 10.0.0Risk Level:2.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Security Verify Directory 10.0.0 could allow...
NAME__________ Progress Software LoadMaster cross-site request forgeryPlatforms Affected:Progress Software LoadMaster 7.2.59.2Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Progress Software LoadMaster is vulnerable to cross-site...
NAME__________KDDI HGW BL1500HM weak securityPlatforms Affected:KDDI HGW BL1500HM 002.001.013 KDDI HGW BL1500HM 002.001.012Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________KDDI HGW BL1500HM could provide...
NAME__________IBM Security Verify Directory information disclosurePlatforms Affected:IBM Security Verify Directory 10.0.0Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Security Verify Directory 10.0.0 could disclose...
NAME__________IBM Security Verify Directory cross-site scriptingPlatforms Affected:IBM Security Verify Directory 10.0.0Risk Level:4.8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________IBM Security Verify Directory 10.0.0 is vulnerable...
NAME__________IBM Security Verify Directory information disclosurePlatforms Affected:IBM Security Verify Directory 10.0.0Risk Level:4.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Security Verify Directory 10.0.0 uses weaker...
NAME__________CIGESv2 system information disclosurePlatforms Affected:CIGES CIGES 2Risk Level:4.1Exploitability:HighConsequences:Obtain Information DESCRIPTION__________CIGESv2 system could allow a remote authenticated attacker to obtain sensitive...
NAME__________CIGESv2 system cross-site scriptingPlatforms Affected:CIGES CIGES 2Risk Level:6.1Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________CIGESv2 system is vulnerable to cross-site scripting, caused by improper validation...