Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.
31 Mar 2026 17:31
Supply Chain Attack on Axios Pulls Malicious Dependency from NPM
SOC Prime Bias:
Critical
Socket
31 Mar 2026 17:23
Inside Pay2Key: Technical Analysis of a Linux Ransomware Variant
SOC Prime Bias:
High
Morphisec
31 Mar 2026 17:07
Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework
SOC Prime Bias:
Critical
Censys
31 Mar 2026 16:58
From Phishing to Exfiltration: A Deep Dive into PXA Stealer
SOC Prime Bias:
Medium
CyberProof
31 Mar 2026 16:57
Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER
SOC Prime Bias:
Medium
elastic.co
31 Mar 2026 15:28
Operation DualScript: Multi-Stage PowerShell Malware Targeting Crypto and Finance
SOC Prime Bias:
Critical
Seqrite
30 Mar 2026 18:08
33K Exposed LiteLLM Deployments and the C2 Servers Behind TeamPCP’s Supply Chain Attack
SOC Prime Bias:
High
hunt.io
30 Mar 2026 17:07
T1547.006 Kernel Modules and Extensions in MITRE ATT&CK Explained
SOC Prime Bias:
Critical
picussecurity.com
30 Mar 2026 16:46
Abusing Legitimate Low-Level Tools to Help Ransomware Evade Antivirus Detection