Daily Threat Intelligence – April 05 – 2023
It seems we may have bumped across one of the fastest ransomware strains ever observed. Named Rorschach, it encrypts files...
It seems we may have bumped across one of the fastest ransomware strains ever observed. Named Rorschach, it encrypts files...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to...
A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers,...
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of a...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses,...
The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that packs...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Grade Point Average (GPA) Calculator cross-site scriptingPlatforms Affected:Risk Level:3.5Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Grade Point Average (GPA) Calculator is vulnerable to cross-site scripting,...
NAME__________Multiple QNAP operating systems information disclosurePlatforms Affected:QNAP QTS QNAP QuTS hero QNAP QuTScloud QNAP QVP (QVR Pro appliances)Risk Level:2.7Exploitability:UnprovenConsequences:Obtain Information...
NAME__________QNAP QTS, QNAP QuTS hero, QNAP QuTScloud, QNAP QVP (QVR Pro appliances), and QNAP QVR command executionPlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access...
NAME__________PowerDNS Recursor denial of servicePlatforms Affected:Risk Level:3.4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________PowerDNS Recursor is vulnerable to a denial of service, caused by...
NAME__________Multiple QNAP operating systems information disclosurePlatforms Affected:QNAP QTS QNAP QuTS hero QNAP QuTScloud QNAP QVP (QVR Pro appliances)Risk Level:2.7Exploitability:UnprovenConsequences:Obtain Information...
NAME__________HCL Launch cross-site scriptingPlatforms Affected:Risk Level:4.9Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________HCL Launch is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________NASM denial of servicePlatforms Affected:Risk Level:5.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________NASM is vulnerable to a denial of service, caused by...
NAME__________NASM denial of servicePlatforms Affected:Risk Level:5.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________NASM is vulnerable to a denial of service, caused by...
NAME__________NASM denial of servicePlatforms Affected:Risk Level:5.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________NASM is vulnerable to a denial of service, caused by...
NAME__________Microsoft 3D Builder information disclosurePlatforms Affected:Microsoft 3D BuilderRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft 3D Builder could allow a remote attacker to obtain...
NAME__________Microsoft 3D Builder code executionPlatforms Affected:Microsoft 3D BuilderRisk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft 3D Builder could allow a remote attacker to execute...