Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
Earth Alux the Cyber Threat Hiding in Plain Sight
Earth Alux, a stealthy China-linked APT group, is making waves in the April 4, 2025 Red | Vulnerability Report
Patch Now: CrushFTP Authentication Bypass Actively Exploited
CrushFTP, a popular file transfer server software, has a critical authentication bypass April 3, 2025 Red | Vulnerability Report
March 2025 Linux Patch Roundup
In March, 230 new vulnerabilities were discovered and addressed within the Linux April 2, 2025 Red | Attack Report
Water Gamayun’s MSC EvilTwin Attack Targets MMC Framework
CVE-2025-26633 is a critical zero-day vulnerability in the Microsoft Management Console (MMC) March 31, 2025 Red | Vulnerability Report
Next.js Under Siege as CVE-2025-29927 Opens the Floodgates for Attackers
A newly discovered vulnerability, CVE-2025-29927, has shaken the foundations of Next.js middleware, March 27, 2025 Red | Vulnerability Report
Chrome Zero-Day Exploited in Operation ForumTroll
Google has addressed a high-severity vulnerability in Chrome on Windows, that hackers March 27, 2025 Red | Attack Report
A New Ransomware Threat: VanHelsing’s Rapid Expansion
VanHelsing is a ransomware-as-a-service (RaaS) operation that emerged on March 7, 2025, March 26, 2025 Amber | Attack Report
Web Shell Warfare: Weaver Ant’s Covert Cyber Espionage Campaign
A stealthy and highly persistent China-linked threat actor, tracked as Weaver Ant March 26, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here