Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Attack Report
Void Banshee’s Zero-Day Assault on Windows Users via Internet Explorer
Threat actors are exploiting the CVE-2024-38112 vulnerability by abusing the mhtml protocol July 17, 2024 Threat Level – Red | Attack Report
MuddyWater Expands Its Arsenal with BugSleep Malware
MuddyWater, an Iranian threat group, has substantially escalated its operations in Israel July 16, 2024 Threat Level – Amber | Attack Report
ShadowRoot Ransomware a Menace to Turkish Enterprises
ShadowRoot Ransomware is an advanced malware threat targeting businesses in Turkey. The July 16, 2024 Threat Level – Red | Attack Report
EstateRansomware Leverages Veeam Backup Vulnerability
EstateRansomware is a newly identified ransomware group exploiting a vulnerability in Veeam July 15, 2024 Threat Level – Red | Attack Report
CRYSTALRAY Threat Actor Employs OSS to Strike 1,500 Targets
CRYSTALRAY, a newly emerged cyber threat actor, has dramatically expanded its operations, July 12, 2024 Threat Level – Amber | Vulnerability Report
Critical GitLab Flaw Lets Attackers Hijack User Pipelines
GitLab has issued a warning about a critical vulnerability in its GitLab July 12, 2024 Threat Level – Amber | Attack Report
Kematian: The Versatile Information-Stealing Malware
Kematian is an open-source, PowerShell-based malware available on GitHub under the “Somali-Devs” July 12, 2024 Threat Level – Red | Attack Report
Inside ViperSoftX: Exploiting AutoIt and CLR for Stealthy PowerShell Execution
The sophisticated malware known as ViperSoftX has been observed being distributed as July 12, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here