Category: TOP 10 Threats

Top 10 Vulnerabilities

Vulnerability Description CVE-2018-8453 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka “Win32k Elevation of...

0

Top 10 Ransomware

Ransomware Description Dharma – Ransomware The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since...

0

Top 10 Exploit Kits

Exploit Kits Description SofosFO/Stamp Exploit Kit The exploit kit, also known as GrandSoft, uses compromised websites to infect users with browser vulnerabilities containing Flash or Java...

0

Top 10 Campaigns

Campaigns Description Operation WebStorage The campaign uses compromised routers and man-in-the-middle attacks to target legitimate ASUS WebStorage software to distribute the Plead malware. The backdoor is...

0