Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Amber | Attack Report
PEAKLIGHT Downloader the Stealthy Malware Living in Memory
The PEAKLIGHT Downloader is an advanced and elusive malware designed to operate August 26, 2024
Amber | Attack Report
Cthulhu Stealer: The New Malware Targeting Mac Users
The Cthulhu Stealer is a macOS-targeted malware written in GoLang that disguises August 26, 2024
Red | Vulnerability Report
CVE-2024-7971: Google Chrome’s Zero-Day Flaw Exploited in the Wild
Google has released a patch for two critical zero-day vulnerabilities in its August 23, 2024
Red | Vulnerability Report
SolarWinds WHD Flaw Lets Attackers Infiltrate Systems with Hardcoded Credentials
SolarWinds has released a hotfix to address a critical vulnerability in its August 23, 2024
Red | Vulnerability Report
CVE-2024-41992: Unpatched Zero-Day RCE Flaw Found in Arcadyan Routers
CVE-2024-41992 is a severe zero-day vulnerability in the Arcadyan FMIMG51AX000J and potentially August 23, 2024
Amber | Attack Report
North Korean Hackers Roll Out Their New MoonPeak RAT
UAT-5394, a state-sponsored North Korean cyber threat actor, is potentially a distinct August 23, 2024
Red | Vulnerability Report
LiteSpeed Cache Plugin Vulnerability Affects Over 5 Million Websites
A critical vulnerability has been discovered in the LiteSpeed Cache WordPress plugin, identified August 22, 2024
Red | Vulnerability Report
Critical WordPress GiveWP Flaw Exposes 100,000+ Sites to RCE & File Deletion
CVE-2024-5932 is a critical vulnerability in the GiveWP plugin for WordPress, allowing August 21, 2024
1 14 15 16 168

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo