Cobalt Stike Beacon Detected – 85[.]208[.]136[.]49:443
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomwareMD5: a5b4c672812208b47b9a9370902d4e1cSHA1: 0efd3da2bcad33fc6c91fc8a1c2a499c889eb2f6ANALYSIS DATE: 2022-11-24T10:33:48ZTTPS: T1060, T1112, T1222, T1082, T1012 ScoreMeaningExample10Known badA malware...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: dfb556e14a10b5145a33f1a3efabdf88SHA1: adb76813eda263afa706327cf52ef099f024fd36ANALYSIS DATE: 2022-11-24T10:25:26ZTTPS: T1005, T1081, T1130, T1112,...
Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: fecea0c22b3fc1a848902bcae0d16027SHA1: a5fd3809a7640e4ec3bf7617fff3f70eaff1562bANALYSIS DATE: 2022-11-24T09:02:55ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or...
Score: 8 MALWARE FAMILY: bankerTAGS:banker, ransomwareMD5: 425ca585e1689771f69c442036192d78SHA1: 3d7e48669307cc962f18de5639ae0697ed950d1eANALYSIS DATE: 2022-11-24T09:53:04ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME RubyGems cgi gem HTTP response splitting Platforms Affected:RubyGems cgi gem 0.1.0 RubyGems cgi gem 0.1.0.1 RubyGems cgi gem 0.1.1...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Apache Airflow Hive Provider and Apache Airflow command execution Platforms Affected:Apache Airflow 2.2.5 Apache Airflow Hive Provider 4.0.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Apache Airflow Spark Provider and Apache Airflow command execution Platforms Affected:Apache Airflow 2.2.5 Apache Airflow Spark Provider 3.0.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain...
NAME Zyxel LTE3301-M209 security bypass Platforms Affected:Zyxel LTE3301-M209 1.00Risk Level:9.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Zyxel LTE3301-M209 could allow a remote attacker to...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...
NAME Apache Airflow Pinot Provider and Apache Airflow command execution Platforms Affected:Apache Airflow 2.2.5 Apache Airflow Pinot Provider 3.0.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain...
NAME Optilink Networks OP-XT71000N devices cross-site request forgery Platforms Affected:Optilink Networks OP-XT71000N 2.2Risk Level:8.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Optilink Networks OP-XT71000N devices...