Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

24 Mar 2026 16:03

Winos 4.0 Malware Masquerading as a KakaoTalk Installer

SOC Prime Bias: Medium

source icon

ASEC

24 Mar 2026 15:48

Phishing Clues Hidden in the /tmp Folder

SOC Prime Bias: Medium

source icon

Huntress

24 Mar 2026 15:40

ESET Research EDR killers explained: Beyond the drivers

SOC Prime Bias: Critical

source icon

welivesecurity.com

24 Mar 2026 14:48

From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill

SOC Prime Bias: Medium

source icon

Huntress

24 Mar 2026 14:37

GSocket Backdoor Delivered Through Bash Script

SOC Prime Bias: Medium

source icon

SANS Internet Storm Center

18 Feb 2026 17:39

Fake Homebrew Typosquats Used to Deliver Cuckoo Stealer via ClickFix

SOC Prime Bias: Medium

source icon

hunt.io

18 Feb 2026 16:42

Tracking Malware Campaigns With Reused Material

SOC Prime Bias: Critical

source icon

SANS Internet Storm Center

18 Feb 2026 16:17

SmartLoader Clones the Oura Ring MCP to Stage a Supply-Chain Attack

SOC Prime Bias: Critical

source icon

straiker.ai

17 Feb 2026 18:00

Unpacking the New “Matryoshka” ClickFix Variant: Typosquatting Campaign Delivers macOS Stealer

SOC Prime Bias: Medium

source icon

The Mac Security Blog

16 Feb 2026 18:05

Update: Arctic Wolf Observes Threat Campaign Targeting BeyondTrust Remote Support Following CVE-2026-1731 PoC Availability

SOC Prime Bias: Critical

source icon

Arctic Wolf