Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

13 Feb 2026 15:45

Cato CTRL Threat Research: Foxveil – New Malware Loader Abusing Cloudflare, Discord, and Netlify as Staging Infrastructure

SOC Prime Bias: Critical

source icon

Cato Networks

13 Feb 2026 13:56

WSL in the Malware Ecosystem

SOC Prime Bias: Medium

source icon

SANS Internet Storm Center

12 Feb 2026 18:45

Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations

SOC Prime Bias: High

source icon

Huntress

12 Feb 2026 12:14

GAC Hijacking

SOC Prime Bias: Medium

source icon

Purple Team

11 Feb 2026 18:47

Deep Dive into New XWorm Campaign Utilizing Multiple-Themed Phishing Emails

SOC Prime Bias: Critical

source icon

Fortinet Blog

11 Feb 2026 18:03

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

SOC Prime Bias: Critical

source icon

Google Cloud Blog

11 Feb 2026 17:47

Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware

SOC Prime Bias: High

source icon

Forcepoint

11 Feb 2026 17:27

OpenClaw Malicious Skill Trap

SOC Prime Bias: Low

source icon

Bitdefender Labs

11 Feb 2026 14:40

SolarWinds Web Help Desk Under Active Exploitation

SOC Prime Bias: Critical

source icon

Huntress

10 Feb 2026 17:38

Tenant from Hell: Prometei’s Unauthorized Stay in Your Windows Server

SOC Prime Bias: Medium

source icon

eSentire