Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Amber | Attack Report
Chinese Hackers Turn to RA World Ransomware for Profit
A sophisticated ransomware attack in November 2024 revealed a troubling shift in February 20, 2025
Malware-as-a-Service in Action: Lumma Stealer’s Expanding Attack Methods
A sophisticated, ongoing malware campaign involving Lumma Stealer is exploiting compromised educational February 20, 2025
Go-Based Backdoor Exploits Telegram for Covert Command Execution
A newly discovered backdoor malware, written in Go, has been found using February 20, 2025
Red | Vulnerability Report
PostgreSQL Flaw CVE-2025-1094 Joins BeyondTrust Zero-Day in Stealthy Attacks
A high-severity SQL injection vulnerability, CVE-2025-1094, has been discovered in PostgreSQL’s interactive February 17, 2025
Red | Vulnerability Report
CVE-2025-0108: PAN-OS Authentication Bypass Flaw Under Active Exploitation
CVE-2025-0108 is a high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS, February 17, 2025
Amber | Attack Report
REF7707 Cyberespionage Campaign Exploiting Legitimate Cloud Services
A sophisticated cyberespionage operation codenamed REF7707 has been discovered targeting government institutions, February 17, 2025
Amber | Attack Report
DEEP#DRIVE: Kimsuky Exploits Cloud Platforms for Stealthy Cyber Espionage
The DEEP#DRIVE cyber campaign, attributed to Kimsuky, a North Korean state-sponsored hacking February 17, 2025
Red | Vulnerability Report
Patch Tuesday Alert: 63 Fixes, 2 Zero-Days, and a Race Against Hackers
Microsoft’s February 2025 Patch Tuesday delivers fixes for 63 vulnerabilities, including two February 14, 2025
1 16 17 18 195

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here