Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

03 Feb 2026 21:25

Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic

SOC Prime Bias: Medium

source icon

Sekoia.io Blog

03 Feb 2026 20:06

When Malware Strikes Back

SOC Prime Bias: Medium

source icon

Point Wild

03 Feb 2026 19:33

EncystPHP: Weaponized FreePBX Web Shell for Persistent Admin Compromise

SOC Prime Bias: Critical

source icon

Fortinet Blog

02 Feb 2026 14:44

UAC-0001 (APT28) Attacks Using CVE-2026-21509

SOC Prime Bias: Critical

source icon

cert.gov.ua

02 Feb 2026 14:31

Dissecting UAT-8099: New persistence mechanisms and regional focus

SOC Prime Bias: Critical

source icon

Cisco Talos Blog

02 Feb 2026 14:23

Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS

SOC Prime Bias: Medium

source icon

hunt.io

02 Feb 2026 14:10

Novel Fake CAPTCHA Chain Delivers AMATERA Stealer

SOC Prime Bias: Medium

source icon

Blackpoint

02 Feb 2026 10:21

A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor

SOC Prime Bias: Critical

source icon

Google Cloud Blog

30 Jan 2026 20:30

TAMECAT – Analysis of an Iranian PowerShell-Based Backdoor

SOC Prime Bias: Critical

source icon

Pulsedive Blog

30 Jan 2026 20:23

TA584 innovates initial access

SOC Prime Bias: High

source icon

Proofpoint