Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

15 Dec 2025 17:42

PyStoreRAT: AI-Driven Supply Chain Malware Targeting IT and OSINT Professionals

SOC Prime Bias: Critical

source icon

Morphisec

12 Dec 2025 17:56

CyberVolk Reemerges: VolkLocker’s New Features and Flaws

SOC Prime Bias: High

source icon

SentinelOne

11 Dec 2025 18:11

Ransomware Targeting ESXi: Practical Hypervisor Hardening Defenses

SOC Prime Bias: Critical

source icon

Huntress

11 Dec 2025 17:46

Hunting Malicious LSASS Access in Windows Environments

SOC Prime Bias: Medium

source icon

Splunk

10 Dec 2025 19:54

CVE-2025-10573: Ivanti EPM Unauthenticated Stored XSS Vulnerability (Patched)

SOC Prime Bias: Critical

source icon

Rapid7

10 Dec 2025 19:28

Makop Ransomware Attacks on Indian Businesses: GuLoader Delivery and Privilege Escalation

SOC Prime Bias: Critical

source icon

Acronis

09 Dec 2025 18:46

Castle RAT Client Malware: Tactics, Techniques, and Tradecraft

SOC Prime Bias: Medium

source icon

Splunk

09 Dec 2025 18:26

LockBit Reborn: Inside the Group’s Post-Takedown Evolution

SOC Prime Bias: High

source icon

picussecurity.com

08 Dec 2025 20:57

Critical King Addons for Elementor Vulnerability Under Active Exploit

SOC Prime Bias: Critical

source icon

Wordfence

08 Dec 2025 16:27

UDPGangster Attacks Spread Across Multiple Countries

SOC Prime Bias: Critical

source icon

Fortinet Blog