For a detailed threat digest, download the PDF file here
HiveForce Labs has recently made significant advancements in identifying cybersecurity threats. Over the past week, five major attacks were detected, three critical vulnerabilities were actively exploited, and three threat actor was closely monitored, reflecting an alarming escalation in malicious activities.
Broadcom issued urgent fixes for VMware flaws, including the zero-day CVE-2025-41244 exploited by UNC5174 for root escalation on guest VMs. Related bugs (CVE-2025-41245, CVE-2025-41246) enable lateral movement, making immediate patching and tighter vCenter access controls critical.
Additionally, FunkLocker is an AI-assisted ransomware from FunkSec that encrypts files with AES‑256/RSA‑2048, appends .funksec, and demands low ransoms to maximize victim payouts. Cisco ASA/FTD are under active attack via CVE-2025-20333, CVE-2025-20362, chained for unauthenticated remote root access, with UAT4356/Storm-1849 deploying persistent RayInitiator bootkit and LINE VIPER loader and tampering logs. These rising threats pose significant and immediate dangers to users worldwide.
Subscribe to receive our weekly threat digests and alerts directly in your inbox.