Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
BERT Ransomware Quietly Gains Global Ground
BERT ransomware, active since March 2025, has rapidly evolved into a multi-platform June 24, 2025 Amber | Attack Report
The Ghost in the Mods: How Stargazers Network is Hacking Minecraft Players
A sophisticated multi-stage malware campaign is targeting Minecraft players through a Distribution-as-a-Service June 23, 2025 Amber | Attack Report
Famous Chollima Weaponizes Recruitment with PylangGhost RAT
PylangGhost, a Python-based remote access trojan (RAT), has emerged as a weapon June 20, 2025 Amber | Attack Report
SERPENTINE#CLOUD: A New Benchmark for Malware Stealth
The “SERPENTINE#CLOUD” campaign represents a highly sophisticated and stealthy malware operation that June 20, 2025 Red | Attack Report
Gunra Ransomware’s Five-Day Deadline Strategy Fuels Panic
Gunra ransomware, a malware strain written in C/C++, is quickly making headlines June 19, 2025 Amber | Attack Report
Stealth in the System: HoldingHands RAT Masquerades as Tax Bureau
A stealthy cyberattack targeting Taiwanese users in early 2025 disguised itself as June 19, 2025 Red | Attack Report
Water Curse Group Weaponizes GitHub Repositories Inbox
Water Curse is a financially motivated threat group that weaponizes GitHub by June 19, 2025 Amber | Attack Report
Katz Stealer: The Silent Thief Lurking in Trusted Apps
Katz Stealer is a stealthy, malware-as-a-service threat that surfaced in 2025, designed June 18, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here