Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Vulnerability Report
LockBit 3.0 makes a comeback by exploiting Log4j
LockBit 3.0 (LockBit Black), a new variant of LockBit Ransomware, is deploying August 4, 2022 Threat Level – Red | Vulnerability Report
KNOTWEED exploits zero-days to target US and Europe
KNOTWEED, an Austria-based private-sector offensive actor (PSOA), are exploiting 0-day vulnerabilities of August 1, 2022 Threat Level – Red | Vulnerability Report
APT37 employs Konni malware to target high-level organizations
The Konni remote access trojan, which is widely used malware by the July 29, 2022 Threat Level – Red | Vulnerability Report
Evilnum strikes commodities and cryptocurrency Forum
In recent campaigns, the Evilnum actor group has targeted the Decentralized Finance July 29, 2022 Threat Level – Amber | Vulnerability Report
Shell Command Injection Vulnerability found in Apache Spark
Apache Spark recently disclosed a weakness, CVE-2022-33891, which would allow threat actors July 28, 2022 Threat Level – Red | Vulnerability Report
Revamped version of Redeemer Ransomware has been uncovered on Dark Web Forums
A new version of the free Redeemer ransomware has been discovered on July 27, 2022 Threat Level – Red | Vulnerability Report
APT29 utilizes cloud storage service to deliver malicious payloads
APT29, a cyber espionage gang uses cloud storage services such as Google July 27, 2022 Threat Level – Red | Vulnerability Report
Critical Vulnerabilities in Multiple Atlassian Products being exploited-in-wild
Atlassian has released patches to address a critical security flaw, being tracked July 25, 2022 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here