Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.
10 Apr 2026 16:43
Fake Windows Support Site Delivers Password-Stealing Malware
SOC Prime Bias:
Medium
Malwarebytes
09 Apr 2026 18:30
ClickFix to MaaS: Inside a Modular Windows RAT and Its Control Panel
SOC Prime Bias:
Medium
Netskope
09 Apr 2026 18:22
Remus: Unpacking the 64-bit Evolution of the Lumma Stealer
SOC Prime Bias:
Medium
GenThreatLabs
09 Apr 2026 18:14
New Whitepaper: BPFDoor Variants Hide in Plain Sight
SOC Prime Bias:
Critical
Rapid7
09 Apr 2026 18:09
NightSpire Ransomware Evolves: Updated Techniques and Detection Tips
SOC Prime Bias:
High
Huntress
09 Apr 2026 17:59
DesckVB RAT Analysis: From JavaScript Loader to Fileless .NET RAT
SOC Prime Bias:
Medium
Point Wild
09 Apr 2026 17:52
ChainShell: MuddyWater & Russian MaaS
SOC Prime Bias:
Critical
JUMPSEC
08 Apr 2026 18:28
hermes-px: A Fake Privacy Proxy Exfiltrating Prompts and Tampering with Claude Code
SOC Prime Bias:
Critical
JFrog Security Research
08 Apr 2026 18:21
Claude Code Lures Turn GitHub Releases into a Malware Delivery Channel
SOC Prime Bias:
Medium
Trend Micro
08 Apr 2026 18:14
UAT-10608 Exposed: Automated Credential Theft at Scale Against Web Applications