Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

27 Nov 2025 19:23

DripLoader Malware: Shellcode Execution and Defense Evasion

SOC Prime Bias: Medium

source icon

coreycburton.com

27 Nov 2025 19:10

Zscaler Threat Hunting Exposes and Reconstructs the Water Gamayun APT Campaign

SOC Prime Bias: Critical

source icon

The Hidden

26 Nov 2025 17:30

Funklocker Ransomware: Detecting and Responding with Wazuh

SOC Prime Bias: High

source icon

Wazuh

26 Nov 2025 17:14

CVE-2025-61757: Oracle Identity Manager Exploit Activity Observed in September

SOC Prime Bias: Critical

source icon

SANS Internet Storm Center

25 Nov 2025 18:38

DarkGate Under the Hood

SOC Prime Bias: Medium

source icon

Sekoia.io

25 Nov 2025 17:59

Clickfix on macOS: AppleScript Malware Campaign Uses Terminal Prompts to Steal Data

SOC Prime Bias: High

source icon

hunt.io

24 Nov 2025 19:49

Akira Ransomware: Response to CISA Advisory AA24-109A

SOC Prime Bias: High

source icon

AttackIQ

24 Nov 2025 14:49

CVE-2025-11001: NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerability

SOC Prime Bias: Critical

source icon

The Hacker News

24 Nov 2025 12:15

NotDoor Insights: Deep Dive into Outlook Macros and Beyond

SOC Prime Bias: Critical

source icon

Splunk

21 Nov 2025 19:30

License to Encrypt: When “The Gentlemen” Go On Offense

SOC Prime Bias: High

source icon

cybereason.com