Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Blog
Latest Posts
“Agent Smith” malware infected more than 25 million Android devices
The malware leverages known Android exploits and automatically replaces installed apps with malicious clones without users’ knowledge or interaction.
15 July 2019
Magecart hackers copromised more than 17K sites via misconfigured Amazon S3 buckets
Since the beginning of the campaign in April 2019 the group has continuously been scanning the Internet for insecure Amazon S3 buckets.
12 July 2019
Recently patched Windows zero-day exploited in Buhtrap cyber-espionage campaign
The exploit for CVE-2019-1132 created by the Buhtrap group relies on popup menu objects.
11 July 2019
Operation Sea Turtle compromises Greece domain admin, keeps looking for new victims
New evidence suggests that the threat actor has switched to a new infrastructure and is using another DNS hijacking technique.
10 July 2019
Microsoft warns about fileless Astaroth trojan campaign
The researchers spotted a sudden spike in Astaroth malware attacks.
9 July 2019
1
2
...
669
670
671
672
673
...
702
703
Popular Posts
Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws
New cryptojacking campaign exploits DevOps servers via misconfigurations
Google rolls out emergency Chrome update to patch actively exploited flaw
Featured vulnerabilities
Multiple vulnerabilities in catdoc
Low
Not Patched
|
03 Jun, 2025
Integer overflow in xls2csv
Low
Not Patched
|
03 Jun, 2025
Allocation of resources without limits or throttling in IBM Db2
Low
Patched
|
03 Jun, 2025
IBM Engineering Systems Design Rhapsody update for Microsoft .NET
Low
Patched
|
03 Jun, 2025
IBM Engineering Systems Design Rhapsody update for Eclipse Jetty
Medium
Patched
|
03 Jun, 2025