Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Millions of WordPress site backups at risk due to a vulnerability in UpdraftPlus plugin
For a detailed advisory, download the pdf file here UpdraftPlus is a backup February 21, 2022
Threat Level – Amber | Vulnerability Report
Privilege Escalation Vulnerability in Snap Package Manager puts Linux users at risk
For a detailed advisory, download the pdf file here A privilege escalation vulnerability February 21, 2022
Threat Level – Amber | Vulnerability Report
Apache Cassandra database affected by easily exploitable Remote code execution
THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here Apache February 18, 2022
Threat Level – Amber | Vulnerability Report
Russian state-sponsored cyber actors targeting U.S. critical infrastructure
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here In February 18, 2022
Threat Level – Amber | Vulnerability Report
VMware addresses security flaws discovered during Tianfu Cup Pwn Contest
THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here VMware February 16, 2022
Threat Level – Amber | Vulnerability Report
First zero-day vulnerability of Google Chrome this year actively exploited in wild
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Google February 15, 2022
Threat Level – Amber | Vulnerability Report
Threat Campaign by Molerats uses NimbleMamba Malware to target Middle East
For a detailed advisory, download the pdf file here An APT group Molerats February 15, 2022
Threat Level – Amber | Vulnerability Report
Critical Magento zero-day vulnerability actively exploiting multiple e-commerce websites
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Adobe February 15, 2022
1 158 159 160 168

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo