Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
SERPENTINE#CLOUD: A New Benchmark for Malware Stealth
The “SERPENTINE#CLOUD” campaign represents a highly sophisticated and stealthy malware operation that June 20, 2025 Red | Attack Report
Gunra Ransomware’s Five-Day Deadline Strategy Fuels Panic
Gunra ransomware, a malware strain written in C/C++, is quickly making headlines June 19, 2025 Amber | Attack Report
Stealth in the System: HoldingHands RAT Masquerades as Tax Bureau
A stealthy cyberattack targeting Taiwanese users in early 2025 disguised itself as June 19, 2025 Red | Attack Report
Water Curse Group Weaponizes GitHub Repositories Inbox
Water Curse is a financially motivated threat group that weaponizes GitHub by June 19, 2025 Amber | Attack Report
Katz Stealer: The Silent Thief Lurking in Trusted Apps
Katz Stealer is a stealthy, malware-as-a-service threat that surfaced in 2025, designed June 18, 2025 Red | Attack Report
Anubis Ransomware Emerges with Destructive Encryption and Data Wiping
Anubis is a destructive ransomware threat that emerged in December 2024, offering June 17, 2025 Red | Attack Report
Fog Ransomware: From Financial Extortion to Covert Espionage
Fog ransomware recently struck an Asian financial institution, with attackers dwelling inside June 16, 2025 Red | Attack Report
Wazuh Server Vulnerability Hijacked by Mirai Variants
In late March 2025, a critical Wazuh vulnerability CVE-2025-24016 has fallen into June 16, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here