Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Amber | Vulnerability Report
RedLine InfoStealer exploits Google Chrome’s zero-day
The notorious information-gathering malware RedLine InfoStealer is stealing data from individuals and July 8, 2024 Threat Level – Red | Vulnerability Report
Follina: A zero-day vulnerability in Microsoft Office
Microsoft has issued a patch after almost 15 days for a zero-day July 8, 2024 Threat Level – Red | Vulnerability Report
Deserialization of untrusted data by Fastjson library leads to RCE
Applications using the Fastjson java library are impacted by remote code execution July 8, 2024 Threat Level – Red | Vulnerability Report
BlackCat Ransomware group implements quadruple extortion
The BlackCat ransomware group performs quadruple extortion techniques to pressurize victims in July 8, 2024 Threat Level – Red | Vulnerability Report
Spyware Group Candiru exploits Chrome Zero-Day to Target Middle East
Candiru(Saito Tech) spyware used the recently fixed CVE-2022-2294 Chrome zero-day in assaults July 8, 2024 Threat Level – Red | Vulnerability Report
Industrial Spy trades stolen data on dark web Marketplace
Since March 2022, Industrial Spy ransomware, a new menace in the threat July 8, 2024 Threat Level – Red | Vulnerability Report
Chrome’s zero-day flaw allows arbitrary code execution
A vulnerability(CVE-2022-2856) in Google Chrome, has been exploited in the wild. Additionally, July 8, 2024 Threat Level – Red | Vulnerability Report
DarkTortilla crypter is set to become a formidable threat
DarkTortilla is a sophisticated and highly configurable .NET-based crypter that has been July 8, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here