Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

tag icon THREAT OF THE MONTH
05 Dec 2025 16:35

CVE-2025-55182 and CVE-2025-66478: High-Fidelity Detection for RSC/Next.js RCE

SOC Prime Bias: Critical

source icon

Searchlight Cyber

22 Jan 2026 19:09

BigSquatRat npm Package Campaign Analysis

SOC Prime Bias: Critical

source icon

kmsec.uk

22 Jan 2026 18:11

Operation Nomad Leopard: Targeted Spear-Phishing Campaign Against Government Entities in Afghanistan

SOC Prime Bias: Critical

source icon

Seqrite

22 Jan 2026 17:57

How Threat Actors Are Weaponizing Microsoft Visual Studio Code

SOC Prime Bias: Critical

source icon

jamfsoftware

21 Jan 2026 19:34

Dissecting CrashFix: KongTuke’s New Toy

SOC Prime Bias: Critical

source icon

Huntress

21 Jan 2026 19:10

Operation Covert Access: Weaponized LNK-Based Spear-Phishing Targeting Argentina’s Judicial Sector to Deploy a Covert RAT

SOC Prime Bias: Critical

source icon

Seqrite

21 Jan 2026 18:58

BlueNoroff Group: The Financial Cybercrime Arm of Lazarus

SOC Prime Bias: Critical

source icon

picussecurity.com

20 Jan 2026 20:27

Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms

SOC Prime Bias: Critical

source icon

co.kr

20 Jan 2026 20:18

Add Punycode to your Threat Hunting Routine

SOC Prime Bias: Medium

source icon

SANS Internet Storm Center

20 Jan 2026 20:10

Remcos RAT Targets Korean Users in Ongoing Distribution Campaign

SOC Prime Bias: Medium

source icon

ASEC

19 Jan 2026 19:11

GlassWorm Goes Mac: Fresh Infrastructure, New Tricks

SOC Prime Bias: Critical

source icon

koi.ai