Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

20 Nov 2025 18:32

Ransom Tales: Volume V — Emulating REvil, DarkSide, and BlackMatter Ransomware

SOC Prime Bias: Critical

source icon

AttackIQ

20 Nov 2025 16:35

Targeted cyberattack on an eastern Ukraine school using the GAMYBEAR tool (CERT-UA#18329)

SOC Prime Bias: Critical

source icon

cert.gov.ua

19 Nov 2025 17:21

APT41 group Tactics vs Ransomware Emulations in AttackIQ Ransom Tales

SOC Prime Bias: Critical

source icon

Hive Pro

19 Nov 2025 12:12

Fortinet FortiWeb Authentication Bypass via Path Traversal Vulnerability (CVE-2025-64446)

SOC Prime Bias: Critical

source icon

horizon3.ai

18 Nov 2025 00:23

CVE-2025-40778 and CVE-2025-40780: Cache Poisoning Vulnerabilities in BIND 9

SOC Prime Bias: Medium

source icon

Internet Systems Consortium

18 Nov 2025 00:17

CVE-2025-55752 and CVE-2025-55754: Apache Tomcat Vulnerabilities Expose Servers to RCE Attacks

SOC Prime Bias: Medium

source icon

Apache Tomcat

18 Nov 2025 00:02

CVE-2025-12036 Vulnerability: A New Critical Chrome V8 JavaScript Remote Code Exploit

SOC Prime Bias: Critical

source icon

Google Chrome

17 Nov 2025 23:54

CVE-2025-61932 Exploitation: A New Critical Motex LANSCOPE Endpoint Manager Vulnerability Used in Real-World Attacks

SOC Prime Bias: Critical

source icon

nvd.nist.gov

17 Nov 2025 23:17

CVE-2025-48593: The SOC Report On Critical Zero-Click Vulnerability in Android

SOC Prime Bias: Medium

source icon

Android

17 Nov 2025 22:45

CVE-2024-1086: Critical Privilege Escalation Flaw in Linux Kernel

SOC Prime Bias: Critical

source icon

cve.org