Keyword: possible
495 Total Search   |   Showing Results : 21 - 40
This URL is a phishing site that spoofs Apple's iTunes store. It is possible that the said URL is sent via email and has a subject pertaining to the renewal of iTunes account. Users are then
administrators have been known to use similar programs to test security and identify possible avenues for intrusion.
Description Name: Possible WEBSHELL - HTTP (Request) .
administrators have been known to use similar programs to test security and identify possible avenues for intrusion.
System administrators are known to use similar tools, if not the same programs, to test security and identify possible avenues of intrusion.
CVE-2015-0285 This vulnerability is found in the ssl3_client_hello function in s3_clnt.c (OpenSSL 1.0.2 before 1.0.2a). When exploited successfully, it may be possible for remote attackers to bypass
Description Name: Possible MIRAI - TCP (Request) .
Description Name: APT - Possible GHOSTRAT - TCP .
Description Name: Possible Data Exfiltration - DNS (Response) .
Description Name: Possible EMOTET - HTTP (Response) - Variant 3 .
Description Name: Possible ADWIND - Malicious Certificate - HTTPS (Response) .
Description Name: APT - Possible POISONIVY - TCP (Request) .
Description Name: APT - Possible BLYPT - HTTP (Request) .
user credentials used by BKDR_VERNOT.A to login to its Evernote account have already expired, it was not able to perform its backdoor routines. It is possible that BKDR_VERNOT.A retrieves its C&C server
Description Name: Possible PUT Header Scanner - HTTP (Response) .
Description Name: Possible Denial of Service - DNP3 (Request) .
Description Name: APT - Possible POISONIVY - TCP (Response) - Variant 2 .
Description Name: Possible Bruteforce - HTTP (Request) .
Description Name: Possible TOR node certificate detected .