Threat Advisories:
🎧 Hive Force Labs: October First Threat Research
👥 Play Count: Loading...

Threat Advisories

Detailed information and guidance on threats and vulnerabilities, focusing on its characteristics, impact, and remediation steps, released daily and weekly to provide actionable intelligence and aid in rapid response and mitigation efforts.

Strengthen Your Defenses With the Latest Intelligence

Red | Vulnerability Report
CVE-2025-25256: Fortinet Rushes to Patch High-Risk FortiSIEM Vulnerability
Fortinet FortiSIEM Vulnerability CVE-2025-25256: Critical Security Flaw Exploited in the Wild Overview August 18, 2025
Amber | Attack Report
Efimer Trojan: From Fake Lawsuits to Crypto Heists
Efimer Trojan Attack Report: From Fake Lawsuits to Cryptocurrency Heists Overview of August 14, 2025
Red | Vulnerability Report
Zero-Day in WinRAR Actively Weaponized by Multiple Threat Groups
Zero-Day in WinRAR Exploited by Multiple Threat Actors CVE-2025-8088 Zero-Day Vulnerability Actively August 13, 2025
Amber | Attack Report
DarkCloud Uses Fileless Techniques Turning into a Nightmare for Windows
DarkCloud, a Windows-based information stealer first detected in 2022, resurfaced in 2025 August 12, 2025
Amber | Attack Report
CastleBot Rising: The Evolving Malware-as-a-Service Threat
CastleBot is a fast-evolving malware framework sold as part of a Malware-as-a-Service August 12, 2025
Red | Attack Report
MedusaLocker Uses ThrottleStop.sys Flaw to Kill AV on Windows
A new BYOVD attack abuses a vulnerability in the legitimate ThrottleStop.sys driver August 11, 2025
Amber | Attack Report
Malicious npm Packages Target WhatsApp Developers with Kill Switch
Two malicious npm packages, naya-flore and nvlore-hsc, have been uncovered targeting developers August 11, 2025
Red | Vulnerability Report
Trend Micro Warns of Active Exploits in Apex One Console
Trend Micro has identified two serious zero-day vulnerabilities in its Apex One August 8, 2025
1 7 8 9 212

HiveForce Labs Research At Your Fingertips

Stay informed with HiveForce Labs as they provide comprehensive insights into the latest vulnerabilities, threats, and threat actor activities.

Subscribe below to receive in-depth weekly and monthly updates, along with daily and weekly advisories designed to help you proactively manage and mitigate cybersecurity risks.

Subscribe Here