Active Threats

Explore the latest active threats being deployed by malicious actors as of Q4 2025. Each report may offer attack flows, actionable detection rules, and simulation instructions to help SOC teams stay ahead of evolving adversary techniques.

25 Nov 2025 17:59

Clickfix on macOS: AppleScript Malware Campaign Uses Terminal Prompts to Steal Data

SOC Prime Bias: High

source icon

hunt.io

24 Nov 2025 19:49

Akira Ransomware: Response to CISA Advisory AA24-109A

SOC Prime Bias: High

source icon

AttackIQ

24 Nov 2025 14:49

CVE-2025-11001: NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerability

SOC Prime Bias: Critical

source icon

The Hacker News

24 Nov 2025 12:15

NotDoor Insights: Deep Dive into Outlook Macros and Beyond

SOC Prime Bias: Critical

source icon

Splunk

21 Nov 2025 19:30

License to Encrypt: When “The Gentlemen” Go On Offense

SOC Prime Bias: High

source icon

cybereason.com

20 Nov 2025 18:32

Ransom Tales: Volume V — Emulating REvil, DarkSide, and BlackMatter Ransomware

SOC Prime Bias: Critical

source icon

AttackIQ

20 Nov 2025 16:35

Targeted cyberattack on an eastern Ukraine school using the GAMYBEAR tool (CERT-UA#18329)

SOC Prime Bias: Critical

source icon

cert.gov.ua

19 Nov 2025 17:21

APT41 group Tactics vs Ransomware Emulations in AttackIQ Ransom Tales

SOC Prime Bias: Critical

source icon

Hive Pro

19 Nov 2025 12:12

Fortinet FortiWeb Authentication Bypass via Path Traversal Vulnerability (CVE-2025-64446)

SOC Prime Bias: Critical

source icon

horizon3.ai

18 Nov 2025 00:23

CVE-2025-40778 and CVE-2025-40780: Cache Poisoning Vulnerabilities in BIND 9

SOC Prime Bias: Medium

source icon

Internet Systems Consortium