Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that's equipped...
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that's equipped...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, "only 59%...
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming...
NAME__________IBM CICS Transaction Gateway improper access controlsPlatforms Affected:IBM CICS Transaction Gateway Containers 9.3Risk Level:4Exploitability:UnprovenConsequences:Configuration DESCRIPTION__________IBM CICS Transaction Gateway 9.3 could...
NAME__________QEMU buffer overflowPlatforms Affected:Qemu QemuRisk Level:4.9Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________QEMU is vulnerable to a stack-based buffer overflow, caused by improper bounds checking...
NAME__________Samsung Email information disclosurePlatforms Affected:Samsung EmailRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Email could allow a local attacker to obtain sensitive information, caused...
NAME__________Samsung Mobile Devices security bypassPlatforms Affected:Samsung mobile devicesRisk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile Devices could allow a remote authenticated attacker to...
NAME__________Samsung Mobile Devices information disclosurePlatforms Affected:Samsung mobile devicesRisk Level:4.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to obtain...
NAME__________Samsung Mobile Devices directory traversalPlatforms Affected:Samsung mobile devicesRisk Level:4Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to traverse...
NAME__________Samsung Nearby device scanning information disclosurePlatforms Affected:Samsung Nearby device scanningRisk Level:4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Nearby device scanning could allow a local...
NAME__________Samsung Mobile Devices information disclosurePlatforms Affected:Samsung mobile devicesRisk Level:6.2Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to obtain...
NAME__________IBM Security Verify Access OIDC Provider information disclosurePlatforms Affected:IBM Security Verify Access OIDC Provider 22.09 IBM Security Verify Access OIDC...
NAME__________Samsung Mobile Devices directory traversalPlatforms Affected:Samsung mobile devicesRisk Level:3.3Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to traverse...
NAME__________Samsung Nearby device scanning information disclosurePlatforms Affected:Samsung Nearby device scanningRisk Level:4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Nearby device scanning could allow a local...
NAME__________IBM Storage Fusion HCI information disclosurePlatforms Affected:IBM Storage Fusion HCI 2.1.0 IBM Storage Fusion HCI 2.6.1Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Storage...
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise...
The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which...
U.S. mortgage lender loanDepot has suffered a cyberattack that caused the company to take IT systems offline, preventing online payments...
Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen...
Cybercriminals are abusing X advertisements to promote websites that lead to crypto drainers, fake airdrops, and other scams. Like all...
A campaign delivering the AsyncRAT malware to select targets has been active for at least the past 11 months, using...
Multiple implementations of the Kyber key encapsulation mechanism for quantum-safe encryption, are vulnerable to a set of flaws collectively referred to...
Threat actors affiliated with the Democratic People's Republic of Korea (also known as North Korea) have plundered at least $600...