Comprehensive Threat Exposure Management Platform
For a detailed threat digest, download the PDF file here

HiveForce Labs has reported a sharp rise in cybersecurity threats, highlighting the increasing complexity and frequency of global cyber incidents. Over the past week, ten major attacks were detected, fifteen vulnerabilities were publicly disclosed, and eight active threat actor groups were monitored, signaling a concerning escalation in malicious activity.
Much of this surge is being fueled by the rapid weaponization of newly disclosed and zero-day vulnerabilities. CVE-2025-55182, known as React2Shell, is a critical unauthenticated remote code execution flaw in React Server Components caused by unsafe deserialization in the Flight protocol. The flaw was exploited within days of disclosure by multiple threat actors observed leveraging the vulnerability to deploy cryptominers, web shells, and persistent backdoors during mass scanning campaigns. At the same time, multiple zero-days remain under active exploitation: CVE-2025-62221 enables privilege escalation on Windows systems via the Cloud Files Mini Filter Driver; CVE-2025-14174 targets Google Chromium through an out-of-bounds memory access flaw in the ANGLE graphics engine; and CVE-2025-8110 exposes Gogs deployments to authenticated remote code execution due to improper symbolic-link handling. With fixes incomplete or still pending, hundreds of environments remain exposed to live attacks.
Beyond vulnerability exploitation, state-aligned threat activity continues to intensify. China-linked operators deploy BRICKSTORM, a stealthy Go-based ELF backdoor designed for long-term persistence and deep system control. The malware has also been used by the WARP PANDA threat group during intrusions against U.S. organizations in 2025. Together, these developments underscore the need for timely patching, continuous monitoring, and sustained defensive vigilance as attackers refine and diversify their intrusion strategies.
Subscribe to receive our weekly threat digests and alerts directly in your inbox.