Cobalt Stike Beacon Detected – 119[.]3[.]130[.]178:8888
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME VMware - Multiple Platforms Affected:MultipleRisk Level:mediumCVE Type:Privilege escalation DESCRIPTION CVE-2022-22960 is a privilege escalation vulnerability impacting multiple versions of...
NAME CachetHQ - Cachet Platforms Affected:CachetRisk Level:lowCVE Type:Unspecified DESCRIPTION CVE-2021-39173 is an unspecified vulnerability impacting CachetHQ Cachet versions 2.5.0 and...
NAME Bitrix restore.php file upload Platforms Affected:Bitrix Bitrix 7.5.0Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Bitrix could allow a remote attacker to upload...
NAME CENTUM VP products command execution Platforms Affected:Yokogawa Electric Corporation CENTUM VP 4.01.00 Yokogawa Electric Corporation CENTUM VP Small 4.01.00...
NAME Microsoft Edge privilege escalation Platforms Affected:Microsoft Edge (Chromium-based)Risk Level:8.3Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION Microsoft Edge (Chromium-based) could allow a remote attacker...
NAME LDAP Account Manager cross-site scripting Platforms Affected:LDAP Account Manager (LAM) LDAP Account Manager (LAM) 7.9.0Risk Level:8.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION LDAP...
NAME JAI-EXT code execution Platforms Affected:JAI-EXT JAI-EXT 1.1.21Risk Level:10Exploitability:UnprovenConsequences:Gain Access DESCRIPTION JAI-EXT could allow a remote attacker to execute arbitrary...
NAME GeoTools code execution Platforms Affected:GeoTools GeoTools 26.3 GeoTools GeoTools 25.5 GeoTools GeoTools 24.5Risk Level:9.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION GeoTools could allow...
Researchers disclosed a new variant of the SolarMarker malware that implements new techniques to avoid detection. Cybersecurity researchers from Palo...
Credit-based stablecoin protocol Beanstalk discloses a security breach that resulted in the loss of all of its $182 million. The...
Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter team as they were investigating an incident...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...