Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

30 Jan 2026 20:14

How NetSupport RAT Abuses Legitimate Remote Admin Tool

SOC Prime Bias: Medium

source icon

picussecurity.com

30 Jan 2026 19:58

APT Attacks Target India’s Government with SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2

SOC Prime Bias: Critical

source icon

Zscaler

29 Jan 2026 18:51

CVE-2026-24061: GNU InetUtils Telnetd Remote Authentication Bypass

SOC Prime Bias: Critical

source icon

NSFOCUS, Inc.

29 Jan 2026 18:34

APT Attacks Target India’s Government with GOGITTER, GITSHELLPAD, and GOSHELL | Part 1

SOC Prime Bias: Critical

source icon

Zscaler

29 Jan 2026 18:23

The PyRAT Code: Internals of a Python-Based RAT

SOC Prime Bias: Medium

source icon

K7 Labs

28 Jan 2026 16:07

CVE-2025-8088: Diverse Threat Actors Exploit a Critical WinRAR Flaw

SOC Prime Bias: Critical

source icon

Google Cloud Blog

28 Jan 2026 13:13

The Moltbot / ClawdBots Epidemic

SOC Prime Bias: Critical

source icon

TheRegister

28 Jan 2026 12:58

Fake ClowdBot VS Code Extension Drops ScreenConnect RAT

SOC Prime Bias: Critical

source icon

aikido.dev

28 Jan 2026 11:56

A Shared Arsenal: Identifying Common TTPs Across RATs

SOC Prime Bias: Medium

source icon

Splunk

28 Jan 2026 11:41

EndPoint Detection of Recent RMM Distribution Cases

SOC Prime Bias: Critical

source icon

ASEC