Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

12 Jan 2026 18:32

UAT-7290 targets high value telecommunications infrastructure in South Asia

SOC Prime Bias: Critical

source icon

Cisco Talos Blog

12 Jan 2026 17:55

MuddyWater’s Rust Pivot: Inside the RustyWater Implant

SOC Prime Bias: Critical

source icon

cloudsek.com

12 Jan 2026 15:59

BlueDelta (APT28) Credential Phishing via Free Hosting & Ngrok

SOC Prime Bias: Critical

source icon

Know what matters. Act first.

08 Jan 2026 19:37

MongoBleed (CVE-2025-14847)

SOC Prime Bias: Critical

source icon

ecapuano.com

08 Jan 2026 19:22

Cyberattack by group APT28 using malicious program CredoMap_v2 (CERT-UA#4622)

SOC Prime Bias: Critical

source icon

cert.gov.ua

06 Jan 2026 19:06

PHALT#BLYX Analysis: Fake BSODs and Trusted Build Tools in Malware Chains

SOC Prime Bias: Medium

source icon

Securonix

06 Jan 2026 18:50

From Code to Coverage (Part 2): The Whitespace Nightmare

SOC Prime Bias: Medium

source icon

Huntress

06 Jan 2026 18:29

A Series of Unfortunate (RMM) Events

SOC Prime Bias: Medium

source icon

Huntress

05 Jan 2026 19:10

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

SOC Prime Bias: Medium

source icon

The Hacker News

05 Jan 2026 18:57

APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities

SOC Prime Bias: Critical

source icon

CYFIRMA