ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
Collectionrat | Unspecified | 1 | CollectionRAT is a newly identified malware, discovered by cybersecurity researchers who traced its origins through reused infrastructure components. This malicious software, short for Malware, is designed to exploit and damage computers or devices, often infiltrating systems via suspicious download |
Magicrat | Unspecified | 1 | MagicRAT is a type of malware, first observed by Cisco Talos in 2022, that was used by the Lazarus Group to exploit vulnerabilities in publicly exposed VMWare Horizon platforms, primarily targeting energy companies worldwide. This malicious software, which can infiltrate systems through suspicious d |
Quiterat | Unspecified | 1 | QuiteRAT is a new type of malware associated with the North Korea-linked Lazarus Group, known for their use of custom malware. Built using the Qt framework, QuiteRAT is smaller in size compared to MagicRAT, another malware linked to the group, due to its incorporation of fewer Qt libraries and lack |
Conti | Unspecified | 1 | Conti is a type of malware, specifically ransomware, known for its ability to disrupt operations, steal personal information, and hold data hostage for ransom. The malicious software infiltrates systems via suspicious downloads, emails, or websites, often unbeknownst to the user. It has been used in |
ID | Type | Votes | Profile Description |
---|---|---|---|
Peach Sandstorm | has used | 3 | Peach Sandstorm, also known as Curious Serpens, APT33, Elfin, HOLMIUM, MAGNALIUM, and REFINED KITTEN, is a threat actor group believed to be linked to the Iranian nation-state. The group has been active since at least 2013 and has previously targeted sectors such as aerospace and energy for espionag |
Lazarus Group | Unspecified | 1 | The Lazarus Group, a notorious threat actor believed to be linked to North Korea, has been attributed with a series of significant cyber-attacks over the past few years. The group's malicious activities include the exploitation of digital infrastructure, stealing cryptocurrency, and executing large- |
Mint Sandstorm | Unspecified | 1 | Mint Sandstorm, an Iranian nation-state threat actor also known as APT35 and Charming Kitten, has been identified by Microsoft as a significant cybersecurity concern. The group is linked to Iran's Islamic Revolutionary Guard Corps and is known for its sophisticated cyber campaigns targeting high-val |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2022-26134 | Unspecified | 3 | CVE-2022-26134 is a critical software vulnerability that was discovered in Atlassian Confluence Server and Data Center. This flaw, which allows for remote code execution (RCE), was publicly disclosed by Atlassian in June 2022. The Cybersecurity and Infrastructure Security Agency (CISA) recognized th |
CVE-2022-42475 | Unspecified | 2 | The critical zero-day vulnerability, CVE-2022-42475, was discovered in FortiGate firewalls during an incident investigation by the vendor. This flaw in software design or implementation allows an unauthenticated attacker to execute arbitrary code on affected systems. The vulnerability is present in |
CVE-2021-40539 | Unspecified | 1 | None |
CVE-2022-41080 | Unspecified | 1 | CVE-2022-41080 is a significant software vulnerability identified in 2022, specifically a flaw in the design or implementation of Microsoft Exchange Server. This vulnerability enables Server-Side Request Forgery (SSRF), potentially allowing malicious actors to manipulate server requests and execute |
Proxynotshell Cve-2022-41080 | Unspecified | 1 | None |
Proxynotshell | Unspecified | 1 | ProxyNotShell is a software vulnerability, specifically a flaw in the design or implementation of Microsoft Exchange Server. It was first identified and exploited through CVE-2022-41082, as reported by Palo Alto Networks' Unit 42. The ProxyNotShell exploit method leveraged an AutoDiscover endpoint t |
Citrix Bleed | Unspecified | 1 | Citrix Bleed, identified as CVE-2023-4966, is a severe software vulnerability in Citrix Netscaler Gateway and Netscaler ADC products, with a high CVSS score of 9.4 indicating its critical nature. This flaw allows for sensitive information disclosure, bypassing password requirements and multifactor a |
Log4Shell | Unspecified | 1 | Log4Shell is a software vulnerability, specifically a flaw in the design or implementation of the popular Java logging library, Log4j. Identified as CVE-2021-44228, this vulnerability allows an attacker to remotely execute arbitrary code, often leading to full system compromise. Advanced Persistent |
Source | CreatedAt | Title |
---|---|---|
DARKReading | 4 months ago | Fortinet Warns of Yet Another Critical RCE Flaw |
CERT-EU | 7 months ago | Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
BankInfoSecurity | 10 months ago | Hackers Impersonate Meta Recruiter to Target Aerospace Firm |
CERT-EU | 10 months ago | Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders |
BankInfoSecurity | 10 months ago | Feds Warn Health Sector of Lazarus Group Attacks |
CERT-EU | 10 months ago | Iranian Hackers Attack Thousands of Organizations Using Password Spraying |
Securityaffairs | 10 months ago | Iranian Peach Sandstorm group behind recent password spray attacks - Security Affairs |
DARKReading | 10 months ago | Microsoft: 'Peach Sandstorm' Cyberattacks Target Defense, Pharmaceutical Orgs |
CERT-EU | 10 months ago | Global password spray attacks target thousands of organizations |
CERT-EU | 10 months ago | Iranian Threat Group Hits Thousands With Password Spray Campaign |
CERT-EU | 10 months ago | Cyber Security Week in Review: September 15, 2023 |
CERT-EU | 10 months ago | Iranian Nation-State Actors Employ Password Spray Attacks Targeting Multiple Sectors |
DARKReading | 10 months ago | Iranian APT Hits US Aviation Org via ManageEngine, Fortinet Bugs |
Checkpoint | a year ago | 11th September – Threat Intelligence Report - Check Point Research |
CERT-EU | a year ago | Google warns infoseccers getting N Korea's attention again |
CERT-EU | a year ago | APTs hit aeronautic firms with Zoho and Fortinet bugs |
CERT-EU | a year ago | SafeBreach Coverage for US-CERT Alert AA23-250A |
CERT-EU | a year ago | Aviation sector organization hit by exploit of CVE duo | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |
BankInfoSecurity | a year ago | Feds Urge Immediate Patching of Zoho and Fortinet Products |
CERT-EU | a year ago | Cyber Security Week in Review: September 8, 2023 |