Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
APT37 Operation ToyBox Story Exposes Cybersecurity Blind Spots
In March 2025, the North Korea-linked APT37 group launched Operation ToyBox Story, June 13, 2025 Red | Vulnerability Report
Microsoft’s June 2025 Patch Tuesday Fixes Active Zero-Day Exploits
Microsoft’s June 2025 Patch Tuesday addresses 68 vulnerabilities, including one actively exploited June 13, 2025 Red | Attack Report
Zero-Day Stealth: Inside Stealth Falcon’s Abuse of CVE-2025-33053
Stealth Falcon, a long-active cyber-espionage group, exploited a zero-day vulnerability in Windows June 13, 2025 Amber | Attack Report
Myth Stealer Strikes Through Game Lures
Myth Stealer is a sneaky piece of malware dressed up as game June 12, 2025 Amber | Attack Report
Operation DRAGONCLONE Strikes the Telecom Sector
In a striking display of precision and deception, Operation DRAGONCLONE has emerged June 11, 2025 Amber | Attack Report
Clickfix Scam Targets macOS with AMOS Malware
Cybercriminals are running a slick new scam targeting macOS users by disguising June 11, 2025 Amber | Attack Report
Blitz Malware Exposed: The Dark Side of Free Game
Blitz is a Windows-based malware first identified in 2024, spread through fake June 11, 2025 Red | Vulnerability Report
Cisco ISE Cloud Deployments Exposed to Remote Access Risk
CVE-2025-20286 is a critical vulnerability in Cisco ISE cloud deployments (AWS, Azure, June 9, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here