Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Vulnerability Report
Zero-day vulnerability in Chrome browser being exploited-in-the-wild
The heap buffer overflow vulnerability in chrome browser let attackers to run July 6, 2022 Threat Level – Red | Vulnerability Report
MedusaLocker Ransomware is back targeting organizations in US
Since 2019, a ransomware-as-a-service (RaaS) known as MedusaLocker has been seen to July 1, 2022 Threat Level – Red | Vulnerability Report
Vulnerability in the UnRaR leads to code execution in Zimbra
Unrar has a path traversal vulnerability that allows an unauthenticated attacker to July 1, 2022 Threat Level – Amber | Vulnerability Report
FabricScape lets attackers takeover Linux containers
FabricScape, a container escape vulnerability in Microsoft Service Fabric could allow an July 1, 2022 Threat Level – Red | Vulnerability Report
Bronze Starlight uses loader malware to deploy ransomware
Bronze Starlight, a Chinese APT, is deploying ransomware LockFile, AtomSilo, Rook, Night June 30, 2022 Threat Level – Red | Vulnerability Report
50+ firms attacked by Black Basta ransomware group
Black Basta ransomware is a new ransomware family that has been discovered June 29, 2022 Threat Level – Red | Vulnerability Report
Unknown threat groups continues to exploit Log4j in VMware Products
An unknown APT group is exploiting the Log4j vulnerability that is affecting June 29, 2022 Threat Level – Amber | Vulnerability Report
APT28 exploits Follina to deploy CredoMap
Google Chrome addresses nine vulnerabilities in its latest stable channel update for June 24, 2022