Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
StormBamboo Abuses ISP to Push Malware via Software Updates
The StormBamboo group executed a sophisticated attack by compromising an ISP and August 7, 2024 Amber | Attack Report
BITSLOTH Backdoor Leverages BITS for C2
BITSLOTH is a newly discovered, highly advanced Windows backdoor malware. Leveraging the August 6, 2024 Red | Attack Report
Hunters International is Redefining RaaS Operations
Hunters International, a Ransomware-as-a-Service (RaaS) operation suspected to be a rebrand of August 6, 2024 Red | Vulnerability Report
Apache OFBiz Flaw Enables Attackers to Execute Remote Code
A pre-authentication remote code execution vulnerability, CVE-2024-38856, has been disclosed in Apache August 6, 2024 Amber | Attack Report
Bloody Wolf Targets Kazakhstan with STRRAT Malware
The Bloody Wolf threat group has been targeting organizations in Kazakhstan since August 6, 2024 Amber | Attack Report
Car Sale Scam: APT28 Delivers Malware Instead of the Vehicle
The Russian threat actor APT28, also known as, Fancy Bear, has been August 5, 2024 Amber | Attack Report
DEV#POPPER the North Korean Cyber Threat Hiding in Job Offers
The DEV#POPPER campaign, targeting software developers, has been identified with malware variants August 2, 2024 Red | Attack Report
Mint Stealer: A New Python-Based Information Stealer
The info stealer market is continuously evolving, with a recent addition being August 2, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here