Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
Efimer Trojan: From Fake Lawsuits to Crypto Heists
A large-scale cybercrime operation is leveraging phishing emails, compromised WordPress sites, and August 14, 2025 Red | Vulnerability Report
Zero-Day in WinRAR Actively Weaponized by Multiple Threat Groups
A newly discovered zero-day flaw in WinRAR, tracked as CVE-2025-8088, has been August 13, 2025 Amber | Attack Report
DarkCloud Uses Fileless Techniques Turning into a Nightmare for Windows
DarkCloud, a Windows-based information stealer first detected in 2022, resurfaced in 2025 August 12, 2025 Amber | Attack Report
CastleBot Rising: The Evolving Malware-as-a-Service Threat
CastleBot is a fast-evolving malware framework sold as part of a Malware-as-a-Service August 12, 2025 Red | Attack Report
MedusaLocker Uses ThrottleStop.sys Flaw to Kill AV on Windows
A new BYOVD attack abuses a vulnerability in the legitimate ThrottleStop.sys driver August 11, 2025 Amber | Attack Report
Malicious npm Packages Target WhatsApp Developers with Kill Switch
Two malicious npm packages, naya-flore and nvlore-hsc, have been uncovered targeting developers August 11, 2025 Red | Vulnerability Report
Trend Micro Warns of Active Exploits in Apex One Console
August 8, 2025 Red | Attack Report
SafePay Ransomware’s Rapid Ascent to the Top of the Cybercrime Scene
SafePay, a rapidly rising ransomware group that emerged in September 2024, has August 8, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here