Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Amber | Vulnerability Report
APT28’s Intricate Email Campaign Against Poland
The APT28 group, linked to the GRU, orchestrated a sophisticated email campaign May 10, 2024 Threat Level – Red | Vulnerability Report
Hackers Exploit LiteSpeed Cache for WordPress Site Takeover
The vulnerability in LiteSpeed Cache allows attackers to inject malicious code into May 10, 2024 Threat Level – Red | Vulnerability Report
BIG-IP Next Central Manager Flaws Lead To Administrative Control
Two high-severity vulnerabilities, CVE-2024-26026 and CVE-2024-21793, have been identified in BIG-IP Next May 10, 2024 Threat Level – Amber | Vulnerability Report
HijackLoader Enhances Its Arsenal with New Evasion Techniques
HijackLoader, a modular malware loader, has undergone significant evolution through the adoption May 9, 2024 Threat Level – Amber | Vulnerability Report
Cuttlefish Malware Silent Stalkers of Router Traffic
A newly identified malware, named ‘Cuttlefish’, has been detected infiltrating enterprise-level and May 8, 2024 Threat Level – Red | Vulnerability Report
Tinyproxy Vulnerability Exposes Hosts to Remote Code Execution
CVE-2023-49606 a critical use-after-free vulnerability found in Tinyproxy’s HTTP Connection Headers parsing May 8, 2024 Threat Level – Red | Vulnerability Report
APT42’s Operations Employ “Nicecurl” and “Tamecat” Malwares
APT42 has been observed targeting entities in both the Middle East and May 7, 2024 Threat Level – Red | Vulnerability Report
Cybercriminals Forge Alliances via Compromised Routers
APT28 threat actors utilized compromised EdgeRouters to execute covert cyber operations, repurposing May 3, 2024