Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

06 May 2026 14:31

VENOMOUS#HELPER: Dual-RMM Phishing Campaign Uses JWrapper-Packed SimpleHelp and ScreenConnect for Silent Remote Access

SOC Prime Bias: Medium

source icon

Securonix

06 May 2026 14:26

Quasar Linux (QLNX): A Supply Chain Foothold with Full RAT Capabilities

SOC Prime Bias: Critical

source icon

Trend Micro

06 May 2026 14:19

UAT-8302 and the Malware Toolkit Behind Its Attacks

SOC Prime Bias: Critical

source icon

Cisco Talos Blog

06 May 2026 14:15

Media Company CloudZ RAT potentially steals OTP messages using Pheno plugin

SOC Prime Bias: Critical

source icon

Cisco Talos Blog

05 May 2026 17:21

ClickFix Removes Your Background but Leaves the Malware

SOC Prime Bias: Medium

source icon

Huntress

05 May 2026 17:17

Fake Homebrew Ad Leads to MacSync Stealer Infection

SOC Prime Bias: Medium

source icon

SANS Internet Storm Center

05 May 2026 17:12

Business search APT & Targeted Attacks Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia

SOC Prime Bias: Critical

source icon

Trend Micro

05 May 2026 17:05

“AccountDumpling” Hunting Down the Google-Sent Phishing Wave Compromising 30,000+ Facebook Accounts

SOC Prime Bias: Critical

source icon

guard.io

04 May 2026 20:21

Deep#Door Stealer: Stealthy Python Backdoor and Credential Stealer Leveraging Tunneling, Multi-Layer Persistence, and In-Memory Surveillance Capabilities

SOC Prime Bias: Critical

source icon

Securonix

30 Apr 2026 17:30

Inside a Fake DHL Campaign Built To Steal Credentials

SOC Prime Bias: Medium

source icon

Forcepoint