Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.
11 Feb 2026 17:47
Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
SOC Prime Bias:
High
Forcepoint
11 Feb 2026 17:27
OpenClaw Malicious Skill Trap
SOC Prime Bias:
Low
Bitdefender Labs
11 Feb 2026 14:40
SolarWinds Web Help Desk Under Active Exploitation
SOC Prime Bias:
Critical
Huntress
10 Feb 2026 17:38
Tenant from Hell: Prometei’s Unauthorized Stay in Your Windows Server
SOC Prime Bias:
Medium
eSentire
10 Feb 2026 17:20
RenEngine Loader and HijackLoader: Dual-Stage Attack Chain Fueling Stealer Campaigns
SOC Prime Bias:
Medium
cyderes.com
10 Feb 2026 16:46
Analysis of Suspected Malware Linked to APT-Q-27 Targeting Financial Institutions
SOC Prime Bias:
Critical
CyStackSecurity
10 Feb 2026 16:26
Hunting OpenClaw: Detection and Containment Guidance for Defenders
SOC Prime Bias:
High
Security Joes
10 Feb 2026 14:29
DYNOWIPER: Destructive Malware Targeting Poland’s Energy Sector
SOC Prime Bias:
Critical
elastic.co
10 Feb 2026 14:20
New Clickfix variant CrashFix deploying Python Remote Access Trojan
SOC Prime Bias:
Medium
Microsoft Security Blog
09 Feb 2026 19:16
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework