Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Dirty Pipe: A privilege escalation vulnerability in Linux Kernel
For a detailed advisory, download the pdf file here A vulnerability in the March 8, 2022
Threat Level – Amber | Vulnerability Report
Two actively exploited Zero-Day vulnerabilities discovered in Mozilla Firefox
For a detailed advisory, download the pdf file here Two critical zero-day vulnerabilities March 8, 2022
Threat Level – Amber | Vulnerability Report
Linux Distributions affected by a privilege escalation vulnerability
For a detailed advisory, download the pdf file here A new privilege escalation March 8, 2022
Threat Level – Amber | Vulnerability Report
Thousands of GitLab instances impacted by multiple security flaws
For a detailed advisory, download the pdf file here Multiple security vulnerabilities have March 4, 2022
Threat Level – Amber | Vulnerability Report
Multiple government entities targeted by China-linked Daxin malware
For a detailed advisory, download the pdf file here A technologically advanced and March 2, 2022
Threat Level – Amber | Vulnerability Report
UNC2596 exploits Microsoft’s ProxyShell and ProxyLogon vulnerabilities to distribute Cuba Ransomware
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Threat March 1, 2022
Threat Level – Amber | Vulnerability Report
Zabbix affected by two actively exploited vulnerabilities
For a detailed advisory, download the pdf file here Multiple security vulnerabilities have February 24, 2022
Threat Level – Amber | Vulnerability Report
Chinese APT group targets financial institutions in the campaign “Operation Cache Panda”
For a detailed advisory, download the pdf file here Chinese threat actor APT10 February 24, 2022
1 157 158 159 168

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo