Threat Advisories
Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.
Strengthen Your Defenses With the Latest Intelligence
Amber | Attack Report
Octalyn: The Stealer Hidden in Plain Sight
The Octalyn Forensic Toolkit, though disguised as an educational tool, is actually July 17, 2025 Red | Attack Report
Interlock Ransomware Deploys New PHP RAT via FileFix Phishing
Interlock ransomware has introduced a new PHP-based RAT delivered via the FileFix July 17, 2025 Red | Vulnerability Report
CVE-2025-6558: Chrome Flaw Lets Hackers Break the Sandbox
A zero-day flaw in Google Chrome (CVE-2025-6558) has been actively exploited in July 17, 2025 Amber | Vulnerability Report
Count(er) Strike: CVE-2025-3648 Exposes ServiceNow Data
CVE-2025-3648, codenamed “Count(er) Strike,” is a high-severity flaw in the ServiceNow platform July 16, 2025 Amber | Attack Report
NordDragonScan Turns Simple Lures into Silent Data Heists
NordDragonScan, a newly identified information-stealing malware, is actively targeting systems through malicious July 15, 2025 Red | Vulnerability Report
Wing FTP Flaw Enables System Takeover
A critical vulnerability in Wing FTP Server (CVE-2025-47812) has opened the door July 15, 2025 Red | Vulnerability Report
Critical Unauthenticated SQL Injection Flaw in Fortinet FortiWeb
CVE-2025-25257 is a critical unauthenticated SQL injection vulnerability affecting Fortinet FortiWeb appliances. July 14, 2025 Amber | Attack Report
Gold Melody Is Weaponizing Leaked ASP.NET Machine Keys
An Initial Access Broker group known as Gold Melody has emerged at July 14, 2025 HiveForce Labs Research At Your Fingertips
Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.
Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.
Subscribe Here