Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Tracking the Malicious Email Campaigns of Russia-Aligned TA499
TA499 is a group of threat actors aligned with the Russian state March 9, 2023
Threat Level – Red | Vulnerability Report
Threat Actors Exploit Microsoft OneNote for Malware Delivery via Phishing Attacks
Cybercriminals are using Microsoft OneNote’s ability to embed files to deliver malware March 9, 2023
Threat Level – Amber | Vulnerability Report
SYS01 Stealer Targets Government and Manufacturing Industry
The SYS01 stealer has been targeting critical government infrastructure employees, manufacturing companies, March 8, 2023
Threat Level – Amber | Vulnerability Report
ImBetter Stealer Malware Targets Cryptocurrency Wallets
ImBetter Stealer malware steals sensitive data and cryptocurrency wallets by tricking users March 7, 2023
Threat Level – Amber | Vulnerability Report
RedLine Stealer Used in Spear-Phishing Campaign Targeting Hospitality Industry
A spear-phishing campaign targeting the hospitality industry used subject lines and text March 7, 2023
Threat Level – Red | Vulnerability Report
Hiatus Hacking Campaign Targets DrayTek Vigor Routers to Steal Data
A malware campaign called “Hiatus” that targets business-grade routers, specifically DrayTek Vigor March 7, 2023
Threat Level – Amber | Vulnerability Report
Unveiling the Malicious Tactics of LokiBot Malware
LokiBot is a constantly evolving information-stealing malware that creates a backdoor on March 6, 2023
Threat Level – Amber | Vulnerability Report
Two New Vulnerabilities Discovered in TPM 2.0 Library
The Trusted Platform Module (TPM) 2.0 specification, a hardware-based technology used to March 6, 2023
1 114 115 116 169

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo