Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Amber | Vulnerability Report
BlackMagic Ransomware disrupts the Israeli logistics sector
The latest ransomware entity, known as “BlackMagic” has emerged. This gang targets December 9, 2022 Threat Level – Red | Vulnerability Report
Linux flaws could be chained together to achieve root access
Two vulnerabilities (CVE-2022-41974 and CVE-2022-41973) can either be exploited individually or in December 9, 2022 Threat Level – Amber | Vulnerability Report
Buffer Overflow vulnerability in FreeBSD
A vulnerability in FreeBSD ping has been discovered that could allow remote December 8, 2022 Threat Level – Red | Vulnerability Report
Attackers target Telecommunications sector to gain network access
To gain initial access, the adversary used social engineering to impersonate IT, December 8, 2022 Threat Level – Red | Vulnerability Report
Recent Lazarus campaign leveraged Crypto App to spread AppleJeus malware
The Lazarus Group threat actor was noticed employing fake cryptocurrency apps as December 7, 2022 Threat Level – Red | Vulnerability Report
Google Chrome’s ninth zero-day in 2022
CVE-2022-4262 is the fourth actively exploited type confusion bug in Chrome addressed December 6, 2022 Threat Level – Red | Vulnerability Report
Multiple Ransomware groups targets open RDP Ports
Many ransomware attacks are being launched against exposed Remote Desktop services by December 5, 2022 Threat Level – Amber | Vulnerability Report
Do you know about an emerging new infostealer malware named DockLogs
DuckLogs is a new info-stealing malware variant, which is sold as Malware-as-a-Service December 5, 2022 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here