Today > 1 Critical | 2 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Amid the rise of bootkits at the time, a dropper was captured in-the-wild and posted on a malware tracker. The malware was called "Guntior", named after the device object its authors had chosen for it (\Device\Guntior). The name also appears in AV detections.