Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Vulnerability Report
D-Link Patches Wireless Routers, Fixing Multiple Critical Vulnerabilities
D-Link has patched several critical vulnerabilities affecting its popular wireless routers, including September 17, 2024 Red | Vulnerability Report
Windows Zero-Day Vulnerability Exploited by Void Banshee APT
CVE-2024-43461 is a spoofing vulnerability in Microsoft Windows MSHTML, exploited in zero-day September 16, 2024 Red | Vulnerability Report
Ivanti Sounds Alarm on Active Exploitation of Flaw in Cloud Service Appliance
Ivanti has released a patch for a high-severity vulnerability, CVE-2024-8190, affecting its September 16, 2024 Amber | Attack Report
DragonRank: The SEO Hackers Manipulating Search Results
DragonRank is a newly identified hacking group that primarily targets countries in September 14, 2024 Amber | Vulnerability Report
GitLab Fixes Multiple Flaws, Urges Immediate User Patching
GitLab has released security updates to fix several vulnerabilities, including the critical September 14, 2024 Red | Vulnerability Report
Adobe Addresses Critical Vulnerabilities Leading to Remote Code Execution
Adobe has addressed two critical vulnerabilities in Adobe Acrobat and Reader for September 12, 2024 Red | Vulnerability Report
Microsoft’s September Patch Tuesday Addresses Active Zero-Day Exploits
Microsoft’s September 2024 Patch Tuesday addresses 79 vulnerabilities, including 7 critical, 71 September 12, 2024 Amber | Attack Report
Mustang Panda Reloaded with an Expanding Malware Arsenal
Mustang Panda, also known as Earth Preta and Stately Taurus, is an September 12, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here