Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Red | Vulnerability Report
Blind Eagle Hackers resurfaced with a formidable infection chain
Blind Eagle is a financially motivated threat group that has been targeting January 6, 2023
Threat Level – Amber | Vulnerability Report
Zoho Addresses SQL Injection Vulnerability in ManageEngine Products
A security flaw affecting multiple ManageEngine products identified as CVE-2022-47523 is an January 6, 2023
Threat Level – Amber | Vulnerability Report
Linux Malware Using SHC Compiler Installs CoinMiner and DDoS Bots
A new strain of Linux malware, developed using the Shc compiler, has January 6, 2023
Threat Level – Red | Vulnerability Report
Threat Actors Using WerFault.exe to Deploy Pupy RAT
The Pupy RAT malware is using a technique called DLL side-loading to January 6, 2023
Threat Level – Red | Vulnerability Report
A New Emerging CatB Ransomware Using DLL Hijacking to Evade Detection
CatB is a ransomware that uses a technique called DLL hijacking to January 5, 2023
Threat Level – Amber | Vulnerability Report
Synology addresses the RCE vulnerability that affects VPN Plus servers
Synology has addressed a flaw in VPN Plus Server that has the January 5, 2023
Threat Level – Red | Vulnerability Report
Linux malware leverages plugin exploits to backdoor WordPress sites
WordPress sites are being exploited by an unidentified strain of Linux malware January 4, 2023
Threat Level – Red | Vulnerability Report
Malware Distribution via Google PPC by IcedID Botnet Distributors
The IcedID botnet has been using Google pay-per-click ads to distribute itself January 4, 2023
1 132 133 134 174

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here