Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Threat Level – Red | Vulnerability Report
APT29: A Deep Dive into Russia’s Cyber Espionage
Summary: APT29, also known as “Cozy Bear,” is a cyber espionage group July 8, 2024
Threat Level – Red | Vulnerability Report
Polyfill.io Supply Chain Attack: Widespread Compromise Affects Over 100,000 Websites
Summary: A significant supply chain attack on the Polyfill.io JavaScript library, affecting July 6, 2024
Threat Level – Red | Vulnerability Report
8220 Gang’s Heist: Exploiting Oracle WebLogic for Cryptomining
Summary: The 8220 Gang, also known as Water Sigbin, has been aggressively July 6, 2024
Threat Level – Red | Vulnerability Report
MSI Installer Flaw Enables Privilege Escalation on Windows Systems
Summary: A critical local privilege escalation vulnerability has been discovered in MSI July 6, 2024
Threat Level – Amber | Attack Report
Mekotio Trojan Targets the Latin American Financial Sector
The Mekotio banking trojan, a highly sophisticated malware active since at least July 5, 2024
Threat Level – Amber | Attack Report
Attackers Impersonating Israeli Ministry with Blended Tools
An attack campaign has been discovered targeting various Israeli entities using publicly July 5, 2024
Amber | Vulnerability Report
Critical OpenStack Vulnerability Exposes Cloud Data
CVE-2024-32498 is a critical vulnerability in OpenStack’s Cinder, Glance, and Nova components, July 5, 2024
Threat Level – Red | Vulnerability Report
Juniper Routers Auth Bypass Flaw Leads to Complete Device Takeover
Summary: Juniper Networks has released an emergency patch to fix a critical July 3, 2024
1 73 74 75 199

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here