Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Red | Vulnerability Report
Microsoft’s November Patch Tuesday Addresses Active Zero-Day Exploits
Microsoft’s November 2024 Patch Tuesday addressed 89 vulnerabilities, including two actively exploited November 14, 2024
Amber | Attack Report
North Korean Hackers Unleash Flutter-Based Malware in New macOS Attack
North Korean threat actors have launched a novel approach to target macOS November 14, 2024
Red | Attack Report
New Remcos RAT Variant Targets Windows Users
A new phishing campaign is targeting Windows users with malicious Excel documents. November 14, 2024
Red | Attack Report
Ymir Ransomware a New Era of In-Memory Execution Tactics
The Ymir ransomware, a new and advanced threat, leverages in-memory execution and November 14, 2024
Amber | Attack Report
GootLoader’s Evolution: From SEO Poisoning to Persistent Network Intrusions
GootLoader has recently targeted Bengal cat enthusiasts in Australia with a new November 13, 2024
Amber | Attack Report
CRON#TRAP: Leveraging Emulated Environments for Covert Cyber Operations
A new phishing campaign known as CRON#TRAP is leveraging sophisticated techniques to November 11, 2024
Amber | Attack Report
North Korean Hackers Go After Remote Job Openings
North Korean threat actors behind the Contagious Interview and WageMole campaigns have November 11, 2024
Red | Attack Report
CopyRh(ight)adamantys: Unmasking a Phishing Campaign with the Latest Rhadamanthys Stealer
An extensive, highly sophisticated phishing campaign, dubbed “CopyRh(ight)adamantys,” is currently underway, deploying November 11, 2024
1 2 3 168

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo