Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Red | Attack Report
BlackByte Ransomware Exploits VMware Flaw and Beyond
BlackByte, a ransomware-as-a-service (RaaS) group believed to have originated from the infamous August 30, 2024
Red | Vulnerability Report
APT-C-60’s 1-Click WPS Office Exploit
The South Korea-linked cyberespionage group APT-C-60 has been actively targeting East Asian August 30, 2024
Red | Vulnerability Report
Critical FileCatalyst Workflow Flaw Enabling Attackers to Gain Admin Access
Fortra has patched a critical security vulnerability affecting its FileCatalyst Workflow software, August 30, 2024
Red | Vulnerability Report
GitHub Addresses Admin Privilege Exploits in Enterprise Server
GitHub has addressed three critical security vulnerabilities in Enterprise Server (GHES), tracked August 28, 2024
Red | Vulnerability Report
SonicWall SonicOS Flaw Allows Unauthorized Access & Firewall Crashes
SonicWall’s SonicOS has been found to have a critical access control vulnerability, August 28, 2024
Amber | Attack Report
HZ RAT Backdoor Slips into macOS Targeting Enterprise Messaging Apps
HZ RAT is a sophisticated backdoor targeting macOS systems, particularly those using August 28, 2024
Red | Vulnerability Report
Versa Networks Patches Severe Zero-Day Flaw in Director Software
A high-severity vulnerability (CVE-2024-39717) in Versa Director allows malicious file uploads by August 27, 2024
Amber | Attack Report
PEAKLIGHT Downloader the Stealthy Malware Living in Memory
The PEAKLIGHT Downloader is an advanced and elusive malware designed to operate August 26, 2024
1 17 18 19 172

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here