Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Pandora Ransomware Targets Multiple Plants around the Globe
For a detailed advisory, download the pdf file here Pandora ransomware is a March 16, 2022
Threat Level – Amber | Vulnerability Report
LockBit 2.0 Ransomware affiliates targeting Renowned Organizations
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Since March 15, 2022
Threat Level – Amber | Vulnerability Report
Mustang Panda targets European diplomats using enhanced PlugX backdoor
For a detailed advisory, download the pdf file here Mustang Panda, a Chinese March 12, 2022
Threat Level – Amber | Vulnerability Report
Prophet Spider exploits Log4j and Citrix vulnerabilities to deploy webshells
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Prophet March 10, 2022
Threat Level – Amber | Vulnerability Report
Mozilla release Security Advisories for multiple vulnerabilities affecting Firefox and Firefox ESR
For a detailed advisory, download the pdf file here Mozilla addressed multiple security March 10, 2022
Threat Level – Amber | Vulnerability Report
RangnarLocker Ransomware hits Critical Infrastructure Compromising 50+ Organizations
For a detailed advisory, download the pdf file here The Federal Bureau of March 10, 2022
Threat Level – Amber | Vulnerability Report
Multiple security vulnerabilities in Adobe After Effects and Illustrator
For a detailed advisory, download the pdf file here Adobe addressed 5 security March 9, 2022
Threat Level – Amber | Vulnerability Report
Chinese state-sponsored threat group APT41 targets U.S. critical organizations using two Zero-Days
For a detailed advisory, download the pdf file here A China state-sponsored threat March 9, 2022
1 156 157 158 168

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo