Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Red | Vulnerability Report
Is Your Server Safe? New OpenSSH Vulnerabilities Exposed
Two critical vulnerabilities, CVE-2025-26465 and CVE-2025-26466, have been identified in OpenSSH, exposing February 20, 2025
Amber | Attack Report
The High-Stakes Game of Vgod Ransomware
A new and highly sophisticated ransomware strain Vgod, has surfaced posing a February 20, 2025
Amber | Attack Report
Chinese Hackers Turn to RA World Ransomware for Profit
A sophisticated ransomware attack in November 2024 revealed a troubling shift in February 20, 2025
Malware-as-a-Service in Action: Lumma Stealer’s Expanding Attack Methods
A sophisticated, ongoing malware campaign involving Lumma Stealer is exploiting compromised educational February 20, 2025
Go-Based Backdoor Exploits Telegram for Covert Command Execution
A newly discovered backdoor malware, written in Go, has been found using February 20, 2025
Red | Vulnerability Report
PostgreSQL Flaw CVE-2025-1094 Joins BeyondTrust Zero-Day in Stealthy Attacks
A high-severity SQL injection vulnerability, CVE-2025-1094, has been discovered in PostgreSQL’s interactive February 17, 2025
Red | Vulnerability Report
CVE-2025-0108: PAN-OS Authentication Bypass Flaw Under Active Exploitation
CVE-2025-0108 is a high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS, February 17, 2025
Amber | Attack Report
REF7707 Cyberespionage Campaign Exploiting Legitimate Cloud Services
A sophisticated cyberespionage operation codenamed REF7707 has been discovered targeting government institutions, February 17, 2025
1 2 179

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here