Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

18 Nov 2025 00:17

CVE-2025-55752 and CVE-2025-55754: Apache Tomcat Vulnerabilities Expose Servers to RCE Attacks

SOC Prime Bias: Medium

source icon

Apache Tomcat

18 Nov 2025 00:02

CVE-2025-12036 Vulnerability: A New Critical Chrome V8 JavaScript Remote Code Exploit

SOC Prime Bias: Critical

source icon

Google Chrome

17 Nov 2025 23:54

CVE-2025-61932 Exploitation: A New Critical Motex LANSCOPE Endpoint Manager Vulnerability Used in Real-World Attacks

SOC Prime Bias: Critical

source icon

nvd.nist.gov

17 Nov 2025 23:17

CVE-2025-48593: The SOC Report On Critical Zero-Click Vulnerability in Android

SOC Prime Bias: Medium

source icon

Android

17 Nov 2025 22:45

CVE-2024-1086: Critical Privilege Escalation Flaw in Linux Kernel

SOC Prime Bias: Critical

source icon

cve.org

17 Nov 2025 17:45

CVE-2025-62215: The SOC Report on Windows Kernel Zero-Day Vulnerability

SOC Prime Bias: Medium

source icon

Microsoft

17 Nov 2025 16:03

Anthropic Claude AI Attack: First AI-Orchestrated Cyber Espionage Campaign

SOC Prime Bias: Critical

source icon

Anthropic

13 Nov 2025 20:28

CVE-2025-46817: The SOC Report on Hardening the Lua Engine Against Four Critical Vulnerabilities (Redis 8.2.2)

SOC Prime Bias: Medium

source icon

Seqrite

12 Nov 2025 17:00

GreenCharlie: The SOC Report on PowerShell Exploits by Iran-backed APT

SOC Prime Bias: Critical

source icon

Picus Security

12 Nov 2025 16:49

Coyote Banking Malware: SOC Threat Report

SOC Prime Bias: Medium

source icon

CyberProof