Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Vulnerability Report
OpenSSL Vulnerability leads to Remote Code Execution
The Heap Memory Corruption vulnerability in OpenSSL let attackers perform Remote Code July 7, 2022 Threat Level – Red | Vulnerability Report
Zero-day vulnerability in Chrome browser being exploited-in-the-wild
The heap buffer overflow vulnerability in chrome browser let attackers to run July 6, 2022 Threat Level – Red | Vulnerability Report
MedusaLocker Ransomware is back targeting organizations in US
Since 2019, a ransomware-as-a-service (RaaS) known as MedusaLocker has been seen to July 1, 2022 Threat Level – Red | Vulnerability Report
Vulnerability in the UnRaR leads to code execution in Zimbra
Unrar has a path traversal vulnerability that allows an unauthenticated attacker to July 1, 2022 Threat Level – Amber | Vulnerability Report
FabricScape lets attackers takeover Linux containers
FabricScape, a container escape vulnerability in Microsoft Service Fabric could allow an July 1, 2022 Threat Level – Red | Vulnerability Report
Bronze Starlight uses loader malware to deploy ransomware
Bronze Starlight, a Chinese APT, is deploying ransomware LockFile, AtomSilo, Rook, Night June 30, 2022 Threat Level – Red | Vulnerability Report
50+ firms attacked by Black Basta ransomware group
Black Basta ransomware is a new ransomware family that has been discovered June 29, 2022 Threat Level – Red | Vulnerability Report
Unknown threat groups continues to exploit Log4j in VMware Products
An unknown APT group is exploiting the Log4j vulnerability that is affecting June 29, 2022 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here