Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...
October 8, 2025

Weekly Threat Digest : 29 SEPTEMBER to 05 October2025

HiveForce Labs

HiveForce Labs

For a detailed threat digest, download the PDF file here



HiveForce Labs has recently made significant advancements in identifying cybersecurity threats. Over the past week, five major attacks were detected, three critical vulnerabilities were actively exploited, and three threat actor was closely monitored, reflecting an alarming escalation in malicious activities.

Broadcom issued urgent fixes for VMware flaws, including the zero-day CVE-2025-41244 exploited by UNC5174 for root escalation on guest VMs. Related bugs (CVE-2025-41245, CVE-2025-41246) enable lateral movement, making immediate patching and tighter vCenter access controls critical.

Additionally, FunkLocker is an AI-assisted ransomware from FunkSec that encrypts files with AES‑256/RSA‑2048, appends .funksec, and demands low ransoms to maximize victim payouts. Cisco ASA/FTD are under active attack via CVE-2025-20333, CVE-2025-20362, chained for unauthenticated remote root access, with UAT4356/Storm-1849 deploying persistent RayInitiator bootkit and LINE VIPER loader and tampering logs. These rising threats pose significant and immediate dangers to users worldwide.



Subscribe to receive our weekly threat digests and alerts directly in your inbox.

Recent Resources

Dive into our library of resources for expert insights, guides, and in-depth analysis on maximizing Uni5 Xposure’s capabilities

Book a demo and find out more about how Hive Pro can double your operational efficiency

Book a Demo