Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report
April 1, 2026

Weekly Threat Digest : 23rd to 29th MARCH 2026

HiveForce Labs

HiveForce Labs

For a detailed threat digest, download the PDF file here



HiveForce Labs has recently made significant advancements in identifying cybersecurity threats. Over the past week, eleven major attacks were detected, three critical vulnerabilities were actively exploited, and four threat actors were closely monitored, reflecting an alarming escalation in malicious activities.

CVE-2026-33017 Critical unauthenticated RCE in Langflow, the open-source AI agent and RAG pipeline framework. A single HTTP POST with a JSON payload grants full server privileges, no auth, no chaining required. TeamPCP Automated supply chain threat group compromising tools like Trivy and LiteLLM to steal credentials and inject malicious code across GitHub, PyPI, npm, and container registries via CI/CD pipelines.

Meanwhile, MuddyWater Iranian MOIS-linked APT active since 2017, targeting critical sectors via spear-phishing and multi-language malware. Recent campaigns deploy Dindoor, Fakeset backdoors with cloud exfiltration and Telegram C2, showing AI-assisted development. MOIS Telegram C2 Campaign Iranian state actors target dissidents, journalists, and critical sectors globally via social engineering delivering multi-stage malware for surveillance, data theft, and hack-and-leak operations. These rising threats pose significant and immediate dangers to users worldwide.



Subscribe to receive our weekly threat digests and alerts directly in your inbox.

Recent Resources

Dive into our library of resources for expert insights, guides, and in-depth analysis on maximizing Uni5 Xposure’s capabilities

Book a demo and find out more about how Hive Pro can double your operational efficiency

Book a Demo