Search
Keyword: possible
This URL is a phishing site that spoofs Apple's iTunes store. It is possible that the said URL is sent via email and has a subject pertaining to the renewal of iTunes account. Users are then
Description Name: Possible WEBSHELL - HTTP (Request) .
administrators have been known to use similar programs to test security and identify possible avenues for intrusion.
administrators have been known to use similar programs to test security and identify possible avenues for intrusion.
System administrators are known to use similar tools, if not the same programs, to test security and identify possible avenues of intrusion.
CVE-2015-0285 This vulnerability is found in the ssl3_client_hello function in s3_clnt.c (OpenSSL 1.0.2 before 1.0.2a). When exploited successfully, it may be possible for remote attackers to bypass
Description Name: APT - Possible GHOSTRAT - TCP .
Description Name: Possible MIRAI - TCP (Request) .
Description Name: Possible EMOTET - HTTP (Response) - Variant 3 .
Description Name: Possible ADWIND - Malicious Certificate - HTTPS (Response) .
Description Name: Possible Data Exfiltration - DNS (Response) .
Description Name: APT - Possible BLYPT - HTTP (Request) .
Description Name: APT - Possible POISONIVY - TCP (Request) .
user credentials used by BKDR_VERNOT.A to login to its Evernote account have already expired, it was not able to perform its backdoor routines. It is possible that BKDR_VERNOT.A retrieves its C&C server
Possible Login Brute Force Attempt
Description Name: APT - Possible POISONIVY - TCP (Response) - Variant 2 .
Description Name: Possible TOR node certificate detected .
Description Name: Possible IE Exploit - HTTP (Response) - Variant 3 .
Description Name: Possible PUT Header Scanner - HTTP (Response) .
Description Name: Possible IE Exploit - HTTP (Response) - Variant 2 .