Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
Cloud Services Transformed into Cyber Weapons: New Wave of Espionage
Cybercriminals are increasingly leveraging legitimate cloud services like Microsoft OneDrive and Google August 9, 2024 Amber | Attack Report
18 Years of Unresolved Threat: 0.0.0.0 Day Vulnerability in Major Browsers
The “0.0.0.0 Day” vulnerability is a critical security flaw that affects major August 9, 2024 Amber | Vulnerability Report
Cisco SSM On-Prem Flaw Lets Hackers Hijack User Passwords
Cisco has addressed a critical vulnerability, CVE-2024-20419, which could allow attackers to August 9, 2024 Red | Vulnerability Report
Windows Update Zero-Day Flaws Allow Downgrade Attacks on Patched Systems
Two recently discovered zero-day vulnerabilities in Windows, CVE-2024-38202 and CVE-2024-21302, enable attackers August 9, 2024 Amber | Attack Report
CMoon Worm Emerges: Targets Russia in Data Theft Attacks
A new self-spreading worm named ‘CMoon’ has been actively distributed in Russia August 8, 2024 Red | Vulnerability Report
CVE-2024-4885: Active Exploitation of Critical WhatsUp Gold RCE Flaw
Multiple critical security flaws in Progress Software’s WhatsUp Gold, particularly CVE-2024-4885, are August 8, 2024 Amber | Attack Report
RATs on the Loose Through Abused Cloudflare Tunnels
Threat actors are increasingly exploiting the Cloudflare Tunnel service to disseminate a August 7, 2024 Amber | Attack Report
North Korean Hackers Embed Malicious Code in Legitimate npm Packages
The North Korea-linked threat actor group, known as “Stressed Pungsan,” has been August 7, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here