All / Spotlight / Malware / Ransomware / Intrusions By DateAlphabetical VMware vCenter Server vSAN Health Check plug-in ... June 4, 2021 Overview: Multiple vulnerabilities have been discovered and reported in the VMware vSphere Client (HTML5), specifically in VMware vCenter Server vSAN Health Check plug-in prod … Microsoft Visual Studio RCE Vulnerability June 4, 2021 Overview: Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It can be used to develop console and graphical user interface (GU … NETGEAR ProSAFE NMS MFileUploadController Vulner ... May 28, 2021 Overview: Netgear ProSAFE Network Management System NMS300 is a centralized and comprehensive management application for network administrators that enables them t … Apache OFBiz, Vulnerability May 7, 2021 Overview: Apache OFBiz is an open source enterprise resource planning (ERP) system. It provides a suite of enterprise applications that integrate and automate many … Eaton's Intelligent Power Manager Vulnerability April 30, 2021 Overview: Eaton’s Intelligent Power Manager (IPM) software provides the tools needed to monitor and manage power devices in your physical or virtual environment ke … SSRF, vRealize Operations Manager API April 9, 2021 Overview: VMware vRealize Operations Manager delivers intelligent operations management with application-to-storage visibility across physical, virtual, and cloud … March 2021 OpenSSL Vulnerability April 2, 2021 Overview: A denial of service vulnerability has been reported in OpenSSL library. An OpenSSL TLS server may crash if a remote attacker sends a maliciously crafted … SolarWinds Orion Vulnerability December 14, 2020 Updated January 15, 2021 The U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed that malicious threat ac … Web attacks in November 2018 December 1, 2018 The first step in a web attack begins with mass-scanning the web for vulnerable applications and/or servers. When unpatched software is identified, an attempt is made to explo … Shadowbroker releases alleged NSA EquationGroup ... April 20, 2017 The Sonicwall Threats Research team is actively researching the exploit and malware code released on Good Friday, (4/14/2017), by an anonymous group calling itself “Shadowbrok … CVE-2015-8446 Exploits in the Wild January 8, 2016 There were multiple exploits of CVE-2015-8446 found in the wild and some of them are from Angler EK. The exploits were highly obfuscated. Data stealing trojan described as a JPG file December 31, 2015 The Dell SonicWall Threats Research team has received reports of a data stealing Trojan described as a JPG file.