Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Amber | Vulnerability Report
Malware Concealed Within PDFs for Data Theft
In a recently observed campaign an infostealer masquerading as the Adobe Reader March 14, 2024
Threat Level – Amber | Vulnerability Report
VCURMS and STRRAT Trojans Using AWS and GitHub as Launchpads
A sophisticated phishing campaign is targeting personnel, enticing them to click on March 14, 2024
Threat Level – Red | Vulnerability Report
Cisco Secure Client Flaw Enables Attackers To Steal VPN Sessions
A high severity vulnerability tracked as CVE-2024-20337 have been addressed by Cisco March 12, 2024
Threat Level – Red | Vulnerability Report
Evasive Panda China-Linked Cyberespionage Targeting Tibetans
Evasive Panda, a threat actor associated with China, has masterminded an intricate cyberespionage campaign March 12, 2024
Threat Level – Red | Vulnerability Report
Critical VMware Vulnerabilities Leading To Sandbox Escape
Critical vulnerabilities tracked as CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, and CVE-2024-22255 have been addressed March 11, 2024
Threat Level – Red | Vulnerability Report
TA4903 Spoofing Government Entities and SMBs for Financial Gain
TA4903, a financially motivated threat actor, conducts high-volume email campaigns targeting U.S. organizations for March 8, 2024
Threat Level – Amber | Vulnerability Report
SapphireStealer’s Stealthy Invasion via Deceptive Legal Documents
An intricate campaign aimed at Russian individuals has emerged, showcasing the SapphireStealer March 8, 2024
Threat Level – Red | Vulnerability Report
Misconfigured Servers Targeted with New Golang Malwares
In a newly observed malware campaign, threat actors are targeting misconfigured and vulnerable servers March 8, 2024
1 61 62 63 169

Every Threat Advisory is Embedded in Uni5 Xposure. Book a Demo to See Them in Action.

Book a Demo