Apple iOS and iPadOS code execution | CVE-2022-32922
NAME Apple iOS and iPadOS code execution Platforms Affected:Apple iPadOS 15.6 Apple iOS 16Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apple iOS and...
NAME Apple iOS and iPadOS code execution Platforms Affected:Apple iPadOS 15.6 Apple iOS 16Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apple iOS and...
NAME Siemens Siveillance Video Mobile Server security bypass Platforms Affected:Siemens Siveillance Video Mobile Server 2022 R2Risk Level:9.4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Siemens...
NAME F5 BIG-IP (Advanced WAF, ASM) code execution Platforms Affected:F5 BIG-IP (ASM) 14.1.0 F5 BIG-IP (ASM) 13.1.0 F5 BIG-IP (ASM)...
NAME Node.js UglifyJS module code execution Platforms Affected:Node.js UglifyJS 3.13.2Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js UglifyJS module could allow a remote...
A new malvertising campaign, code-named Dormant Colors, is delivering malicious Google Chrome extensions that hijack targets’ browsers. Researchers at Guardio...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-37704 No description provided CVE-2022-37705 No description provided CVE-2022-1271An arbitrary file write...
Cuba Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 8cdbf9a671071ade99212446a7088671SHA1: 6832b0dd4cbb6fccec9ae134b7127d03040dbb03ANALYSIS DATE: 2022-10-24T20:00:20ZTTPS: T1082, T1107, T1490, T1091, T1005, T1081 ScoreMeaningExample10Known badA malware...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 85c74aec951433b76fd8479cf632975fSHA1: ff1ae5a673630b6b93bf8978544b4e7d081901b3ANALYSIS DATE: 2022-10-24T20:00:33ZTTPS: T1107, T1490, T1091, T1005, T1081, T1082 ScoreMeaningExample10Known badA malware...
Score: 9 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 8d1d8ea68874e740eb74826f402a96ebSHA1: 7bd7e2e20a0bc7915826ee9263bcb35707080daaANALYSIS DATE: 2022-10-24T20:20:19ZTTPS: T1091, T1005, T1081, T1082, T1107, T1490 ScoreMeaningExample10Known badA malware...
Score: 10 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: 2acba7d6e7fdff0650b942d051601346SHA1: c4bf28dc8c81c7bc1f0f2b93cec0860acb7a5ff8ANALYSIS DATE: 2022-10-24T20:12:30ZTTPS: T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: asyncratTAGS:family:asyncrat, family:azorult, family:blackmoon, family:dcrat, family:fickerstealer, family:gh0strat, family:hawkeye, family:nanocore, family:oski, family:pony, family:purplefox, family:raccoon, family:redline, family:smokeloader, botnet:5781468cedb3a203003fdf1f12e72fe98d6f1c0f, botnet:@zhilsholi,...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...