Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Actively exploited vulnerability affects Trend Micro Apex Central
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here Trend April 2, 2022
Threat Level – Amber | Vulnerability Report
Two Vulnerabilities affecting Apple macOS exploited-in-the-wild
THREAT LEVEL: Red For a detailed advisory, download the pdf file here Two April 2, 2022
Threat Level – Amber | Vulnerability Report
New PlugX variant “Talisman” used by famous Chinese APT
For a detailed advisory, download the pdf file here PlugX is a well-known March 31, 2022
Threat Level – Amber | Vulnerability Report
Sophos Firewall RCE vulnerability actively exploited
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here A March 30, 2022
Threat Level – Amber | Vulnerability Report
DOS Vulnerability discovered in SonicWall Next-Generation Firewall
THREAT LEVEL: Amber For a detailed advisory, download the pdf file here SonicWall, March 30, 2022
Threat Level – Amber | Vulnerability Report
Prolific threat actor TA551 using new malware IcedID
For a detailed advisory, download the pdf file here TA551 is a financially March 30, 2022
Threat Level – Amber | Vulnerability Report
North Korean state-sponsored threat actor Lazarus Group exploiting Chrome Zero-day vulnerability
THREAT LEVEL: Red. For a detailed advisory, download the pdf file here For March 25, 2022
Threat Level – Amber | Vulnerability Report
Microsoft’s privilege escalation vulnerability that refuses to go away
THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here After March 25, 2022
1 180 181 182 195

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here