Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

11 Feb 2026 18:03

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

SOC Prime Bias: Critical

source icon

Google Cloud Blog

11 Feb 2026 17:47

Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware

SOC Prime Bias: High

source icon

Forcepoint

11 Feb 2026 17:27

OpenClaw Malicious Skill Trap

SOC Prime Bias: Low

source icon

Bitdefender Labs

11 Feb 2026 14:40

SolarWinds Web Help Desk Under Active Exploitation

SOC Prime Bias: Critical

source icon

Huntress

10 Feb 2026 17:38

Tenant from Hell: Prometei’s Unauthorized Stay in Your Windows Server

SOC Prime Bias: Medium

source icon

eSentire

10 Feb 2026 17:20

RenEngine Loader and HijackLoader: Dual-Stage Attack Chain Fueling Stealer Campaigns

SOC Prime Bias: Medium

source icon

cyderes.com

10 Feb 2026 16:46

Analysis of Suspected Malware Linked to APT-Q-27 Targeting Financial Institutions

SOC Prime Bias: Critical

source icon

CyStackSecurity

10 Feb 2026 16:26

Hunting OpenClaw: Detection and Containment Guidance for Defenders

SOC Prime Bias: High

source icon

Security Joes

10 Feb 2026 14:29

DYNOWIPER: Destructive Malware Targeting Poland’s Energy Sector

SOC Prime Bias: Critical

source icon

elastic.co

10 Feb 2026 14:20

New Clickfix variant CrashFix deploying Python Remote Access Trojan

SOC Prime Bias: Medium

source icon

Microsoft Security Blog