Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.
16 Jan 2026 16:13
Prince of Persia APT Analysis: Infy, Foudre, and Tonnerre Malware
SOC Prime Bias:
Critical
picussecurity.com
15 Jan 2026 19:13
“Unreliable Fund”: Targeted cyberattacks UAC-0190 against Ukrainian Defense Forces using PLUGGYAPE
SOC Prime Bias:
Critical
cert.gov.ua
15 Jan 2026 18:51
SHADOW#REACTOR – TEXT-ONLY STAGING, .NET REACTOR, AND IN-MEMORY REMCOS RAT DEPLOYMENT
SOC Prime Bias:
Medium
Securonix
15 Jan 2026 18:39
Gamaredon: Abusing BITS for “Windows Update”-Style Malware Delivery
SOC Prime Bias:
Critical
Synaptic Security Blog
14 Jan 2026 19:49
Inside SafePay: Analyzing the New Centralized Ransomware Group
SOC Prime Bias:
High
picussecurity.com
14 Jan 2026 19:37
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
SOC Prime Bias:
Critical
Red Asgard
14 Jan 2026 18:14
WannaMine Cryptominer Analysis: Fileless Execution and Persistence
SOC Prime Bias:
Critical
picussecurity.com
14 Jan 2026 18:04
How MDR Uncovered a Multi-Stage AsyncRAT Attack Chain
SOC Prime Bias:
Critical
Trend Micro
14 Jan 2026 17:55
Break The Protective Shell Of Windows Defender With The Folder Redirect Technique
SOC Prime Bias:
Critical
zerosalarium.com
13 Jan 2026 17:22
Malware Disguised as Video Files Using RMM Tools (Syncro, SuperOps, NinjaOne, etc)