Cobalt Stike Beacon Detected – 58[.]87[.]64[.]85:443
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Apple released security updates to fix two zero-day flaws, one of them actively exploited to hack iPhones and Macs. Apple...
DazzleSpy, a piece of malware that attacks macOS, was discovered last fall by researchers at ESET, and now those researchers...
NAME GNU glibc buffer overflow Platforms Affected:GNU glibcRisk Level:8.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION GNU glibc is vulnerable to an off-by-one buffer overflow...
NAME McAfee Data Loss Protection ePO extension SQL injection Platforms Affected:McAfee Data Loss Prevention (DLP) ePO extension 11.6 McAfee Data...
NAME Vim code execution Platforms Affected:Vim Vim 8.1.2135Risk Level:8.4Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION Vim could allow a local attacker to...
NAME StarWind Command Center privilege escalation Platforms Affected:StarWind Command Center v2 build 6003Risk Level:8.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION StarWind Command Center could...
NAME ICONICS and Mitsubishi Electric HMI SCADA security bypass Platforms Affected:Mitsubishi Electric MC Works64 ICONICS GENESIS64 ICONICS Hyper Historian ICONICS...
NAME Zulip information disclosure Platforms Affected:Zulip Zulip Server 4.8Risk Level:8.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION Zulip could allow a remote attacker to obtain...
NAME ICONICS and Mitsubishi Electric HMI SCADA information disclosure Platforms Affected:Mitsubishi Electric MC Works64 ICONICS GENESIS64 ICONICS Hyper Historian ICONICS...
NAME Xen p2m mappings privilege escalation Platforms Affected:XenSource Xen 5.1 XenSource Xen 4.12 XenSource Xen 4.13 XenSource Xen 4.14 XenSource...
NAME AIDE buffer overflow Platforms Affected:AIDE AIDE 0.17.3 AIDE AIDE 0.17.2Risk Level:8.4Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION AIDE is vulnerable to...
NAME CWP Control Web Panel file include Platforms Affected:CWP Control Web PanelRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION CWP Control Web Panel could...
NAME Apache ShardingSphere ElasticJob-UI privilege escalation Platforms Affected:Apache ShardingSphere ElasticJob-UI 3.0.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION Apache ShardingSphere ElasticJob-UI could allow a...
NAME Polkit privilege escalation Platforms Affected:Polkit PolkitRisk Level:7.8Exploitability:Proof of ConceptConsequences:Gain Privileges DESCRIPTION Polkit could allow a local authenticated attacker to...
NAME Node.js @isomorphic-git/cors-proxy module server-side request forgery Platforms Affected:Node.js @isomorphic-git/cors-proxy 2.7.0Risk Level:8.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION Node.js @isomorphic-git/cors-proxy module is vulnerable to...