Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Vulnerability Report
Industrial Spy trades stolen data on dark web Marketplace
Since March 2022, Industrial Spy ransomware, a new menace in the threat July 8, 2024 Threat Level – Red | Vulnerability Report
Chrome’s zero-day flaw allows arbitrary code execution
A vulnerability(CVE-2022-2856) in Google Chrome, has been exploited in the wild. Additionally, July 8, 2024 Threat Level – Red | Vulnerability Report
DarkTortilla crypter is set to become a formidable threat
DarkTortilla is a sophisticated and highly configurable .NET-based crypter that has been July 8, 2024 Threat Level – Amber | Vulnerability Report
Chile government’s Windows and Linux servers hit by RedAlert ransomware
The Chilean Ministry of Interior asserted that RedAlert ransomware aka N13V attack July 8, 2024 Threat Level – Red | Vulnerability Report
Two Zero-day vulnerabilities in macOS BigSur
Apple addresses ten vulnerabilities, two of which are actively exploited. The vulnerabilities July 8, 2024 Threat Level – Red | Vulnerability Report
UNC4034 slips in a backdoor with trojanized PuTTY
UNC4034, a North Korean threat actor, uses a fake job posting to July 8, 2024 Threat Level – Amber | Vulnerability Report
Zero-day vulnerability in Windows terminal management tool gets a hotfix Date
Microsoft Endpoint Configuration Manager (MECM) has a spoofing vulnerability that allows remote July 8, 2024 Threat Level – Red | Vulnerability Report
Zero-day vulnerabilities in Microsoft Exchange Server
Microsoft Exchange Server has two zero-day vulnerabilities. One of them is a July 8, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here