Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Red | Attack Report
CopyRh(ight)adamantys: Unmasking a Phishing Campaign with the Latest Rhadamanthys Stealer
An extensive, highly sophisticated phishing campaign, dubbed “CopyRh(ight)adamantys,” is currently underway, deploying November 11, 2024 Red | Vulnerability Report
Hackers Exploiting Critical Palo Alto Networks Vulnerabilities
Palo Alto Networks has issued patches to address critical vulnerabilities in its November 11, 2024 Red | Actor Report
Hack, Leak, Repeat – Emennet Pasargad’s Quest to Destabilize Israel
Iranian cyber group Emennet Pasargad, operating as Aria Sepehr Ayandehsazan (ASA) since November 8, 2024 Red | Attack Report
Threat Actors Weaponized SharePoint Flaw To Infiltrate Corporate Networks
Threat Actors have leveraged SharePoint Remote Code Execution Flaw, CVE-2024-38094, to infiltrate November 7, 2024 Red | Vulnerability Report
New Windows Themes Vulnerability Exposes NTLM Credentials
A new vulnerability in Windows Themes lets attackers steal NTLM credentials by October 31, 2024 Amber | Attack Report
True Face of Civil Defense: Russian Espionage Group Targets Ukraine
UNC5812, suspected to be a Russian-led hybrid operation, has initiated a complex October 31, 2024 Red | Vulnerability Report
QNAP Patches Critical Flaw in HBS 3 to Prevent Remote Attacks
QNAP has patched a critical vulnerability, tracked as CVE-2024-50388, that was exploited October 31, 2024 Amber | Attack Report
Evasive Panda’s CloudScout: A Stealthy Threat to Cloud Security
Evasive Panda, a Chinese APT group, uses a toolset called CloudScout to October 30, 2024 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here