Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Attacks on European Union and Ukrainian government entities carried out by the Armageddon group
For a detailed advisory, download the pdf file here The Computer Emergency Response April 13, 2022
Threat Level – Amber | Vulnerability Report
APT 10, a state-sponsored Chinese threat group, conducting a global cyber espionage operation
For a detailed advisory, download the pdf file here A Chinese state-sponsored advanced April 12, 2022
Threat Level – Amber | Vulnerability Report
RCE Spring Framework Zero-Day vulnerability “Spring4Shell”
THREAT LEVEL: Red For a detailed advisory, download the pdf file here A April 12, 2022
Threat Level – Amber | Vulnerability Report
Sandworm Team using a new modular malware Cyclops Blink
For a detailed advisory, download the pdf file here The National Cyber Security April 7, 2022
Threat Level – Amber | Vulnerability Report
Authentication Bypass Vulnerability in Zyxel Firmware
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here A April 2, 2022
Threat Level – Amber | Vulnerability Report
Actively exploited vulnerability affects Trend Micro Apex Central
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here Trend April 2, 2022
Threat Level – Amber | Vulnerability Report
Two Vulnerabilities affecting Apple macOS exploited-in-the-wild
THREAT LEVEL: Red For a detailed advisory, download the pdf file here Two April 2, 2022
Threat Level – Amber | Vulnerability Report
New PlugX variant “Talisman” used by famous Chinese APT
For a detailed advisory, download the pdf file here PlugX is a well-known March 31, 2022
1 158 159 160 174

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here