Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Amber | Vulnerability Report
Google fixes multiple vulnerabilities in Chrome
For a detailed advisory, download the pdf file here. Google Chrome has been updated January 6, 2022 Threat Level – Red | Vulnerability Report
New rootkit iLOBleed targets HP servers
For a detailed advisory, download the pdf file here.The rootkit known as iLOBleed January 1, 2022 Threat Level – Red | Vulnerability Report
Apache released a patch to address the critical zero-day vulnerability in log4j
For a detailed advisory, download the pdf file here. A zero-day remote code December 29, 2021 Threat Level – Red | Vulnerability Report
Rook: New Ransomware in the market scavenges code from Babuk
For a detailed advisory, download the pdf file here. Security researchers found new ransomware December 26, 2021 Threat Level – Amber | Vulnerability Report
Old Gatekeeper bypass vulnerability in macOS exploited
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here A December 25, 2021 Threat Level – Amber | Vulnerability Report
Microsoft released patch for actively exploited spoofing vulnerability
For a detailed advisory, download the pdf file here. Microsoft AppX has a December 16, 2021 Threat Level – Red | Vulnerability Report
Cerber targeting organizations with publicly available exploits
For a detailed advisory, download the pdf file here. Cerber, ransomware that mysteriously December 14, 2021 Threat Level – Red | Vulnerability Report
BlackByte ransomware exploits Microsoft Servers ProxyShell Vulnerabilities
For a detailed advisory, download the pdf file here. BlackByte ransomware December 7, 2021 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here