Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Red | Vulnerability Report
Bronze Starlight uses loader malware to deploy ransomware
Bronze Starlight, a Chinese APT, is deploying ransomware LockFile, AtomSilo, Rook, Night June 30, 2022
Threat Level – Red | Vulnerability Report
50+ firms attacked by Black Basta ransomware group
Black Basta ransomware is a new ransomware family that has been discovered June 29, 2022
Threat Level – Red | Vulnerability Report
Unknown threat groups continues to exploit Log4j in VMware Products
An unknown APT group is exploiting the Log4j vulnerability that is affecting June 29, 2022
Threat Level – Amber | Vulnerability Report
APT28 exploits Follina to deploy CredoMap
Google Chrome addresses nine vulnerabilities in its latest stable channel update for June 24, 2022
Threat Level – Amber | Vulnerability Report
Google addresses new vulnerabilities in Chrome
Google Chrome addresses nine vulnerabilities in its latest stable channel update for June 23, 2022
Threat Level – Red | Vulnerability Report
ToddyCat exploits unknown vulnerability in Microsoft Exchange servers to targets entities in Europe and Asia
ToddyCat, an APT group is deploying web shells by exploiting an unknown June 23, 2022
Threat Level – Red | Vulnerability Report
DriftingCloud exploits zero-day in Sophos firewall
The Chinese APT actor DriftingCloud exploits the RCE vulnerability in Sophos firewall June 22, 2022
Threat Level – Red | Vulnerability Report
New vulnerability allows attackers to takeover entire WordPress website
An unauthenticated attacker can call multiple methods in Ninja Forms class in June 21, 2022
1 153 154 155 174

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here