Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Threat Level – Red | Vulnerability Report
Kinsing Exploits Looney Tunables Vulnerability to Breach Cloud Environments
The threat actor Kinsing has recently been observed exploiting the Linux privilege July 8, 2024 Threat Level – Amber | Vulnerability Report
Jupyter Infostealer Returns with New Addition to Its Arsenal
Jupyter Infostealer is a malware variant initially discovered in late 2020. Since July 8, 2024 Threat Level – Red | Vulnerability Report
SideCopy Leverages Multi-platform RAT, Assaults Indian Government Entities
A threat actor linked to Pakistan named SideCopy is capitalizing on WinRAR’s July 8, 2024 Threat Level – Amber | Vulnerability Report
Malicious CPU-Z App Distributed Through Ads on Fake Windows News Site
A threat actor has been using Google Ads as a platform to July 8, 2024 Threat Level – Red | Vulnerability Report
Lace Tempest Exploits Zero-Day in a Strategic Strike on SysAid
Lace Tempest has been implicated in exploiting a zero-day vulnerability, identified as July 8, 2024 Threat Level – Red | Vulnerability Report
Multiple Critical Vulnerabilities in Juniper Exploited in the Wild
Multiple vulnerabilities have been discovered in Juniper Networks Junos OS, with the July 8, 2024 Threat Level – Red | Vulnerability Report
TA402’s Covert Operation Takes Aim at the Middle East
TA402 (aka Extreme Jackal) launched sophisticated phishing campaigns targeting government entities in July 8, 2024 Threat Level – Red | Vulnerability Report
Kinsing Malware Utilizes Apache ActiveMQ RCE to Deploy Rootkits
The Kinsing malware operator is actively taking advantage of the critical vulnerability July 8, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here