Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

16 Feb 2026 17:47

How ClickFix Opens the Door to Stealthy StealC Information Stealer

SOC Prime Bias: Medium

source icon

levelblue.com

16 Feb 2026 17:31

Operation MacroMaze: new APT28 campaign using basic tooling and legit infrastructure

SOC Prime Bias: Critical

source icon

lab52

13 Feb 2026 17:23

LummaStealer Is Getting a Second Life Alongside CastleLoader

SOC Prime Bias: Medium

source icon

Bitdefender Labs

13 Feb 2026 17:05

OysterLoader Uncovered: Inside a Multi-Stage Evasion Loader

SOC Prime Bias: High

source icon

Sekoia.io Blog

13 Feb 2026 16:13

Odyssey Stealer: Inside a macOS Crypto-Stealing Operation

SOC Prime Bias: Medium

source icon

Censys

13 Feb 2026 15:45

Cato CTRL Threat Research: Foxveil – New Malware Loader Abusing Cloudflare, Discord, and Netlify as Staging Infrastructure

SOC Prime Bias: Critical

source icon

Cato Networks

13 Feb 2026 13:56

WSL in the Malware Ecosystem

SOC Prime Bias: Medium

source icon

SANS Internet Storm Center

12 Feb 2026 18:45

Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations

SOC Prime Bias: High

source icon

Huntress

12 Feb 2026 12:14

GAC Hijacking

SOC Prime Bias: Medium

source icon

Purple Team

11 Feb 2026 18:47

Deep Dive into New XWorm Campaign Utilizing Multiple-Themed Phishing Emails

SOC Prime Bias: Critical

source icon

Fortinet Blog