Threat actors stories - Page 3
Coruna exploit kit exposes risks for outdated iOS users
Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Ransomware attacks surge 50% as industrial firms hit hardest
Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
AI-driven cyberattacks surge in Asia-Pacific, IBM warns
Last month
#
saas
#
malware
#
ransomware
AI-driven cyberattacks are surging across Asia-Pacific, with IBM warning basic security gaps now let attackers move from scan to impact faster.
Why cybersecurity needs better storytelling; and more women telling It
Last month
#
digital transformation
#
advanced persistent threat protection
#
risk & compliance
Cybersecurity's future hinges on clear storytelling - and more women's voices - to turn technical risks into business-critical narratives.
Tycoon 2FA phishing service disrupted in EU crackdown
Last month
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Slow patching leaves SMB endpoints exposed for weeks
Last month
#
it automation
#
risk & compliance
#
edr
Acronis finds SMBs patch Microsoft flaws in about eight days, but the slowest endpoints stay exposed to known bugs for over five weeks.
Microsoft warns of AI agent risks in Cyber Pulse brief
Last month
#
manufacturing
#
digital transformation
#
physical security
Microsoft's new Cyber Pulse briefing warns ungoverned AI agents and 'double agents' pose rising security and compliance risks for firms.
HP warns of AI-fuelled 'flat-pack' cyberattacks surge
Last month
#
malware
#
uc
#
phishing
HP reports a surge in AI-powered “flat-pack” cyberattacks as criminals trade sophistication for speed, low cost and mass customisation.
F5 Labs unveils monthly AI model security leaderboards
Last month
#
data protection
#
devops
#
application security
F5 Labs launches monthly AI security leaderboards, ranking popular models on new indices of risk, resilience and cost under live attack.
NCC warns ransomware risk persists despite January dip
Fri, 27th Feb 2026
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
ShinyHunters pivots to subdomain phishing & vishing
Fri, 27th Feb 2026
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
AI-driven cyber attacks now breach networks in minutes
Thu, 26th Feb 2026
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
GenAI misuse & ransomware drive surge in cyber attacks
Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Hijacked Google Ads push MacSync malware to Mac users
Wed, 25th Feb 2026
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
CISOs cautious as agentic AI adoption in security lags
Wed, 25th Feb 2026
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Android PromptSpy malware harnesses Gemini for stealth
Fri, 20th Feb 2026
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
EY maps hyper-velocity AI priorities for tech during 2026
Fri, 20th Feb 2026
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
OT cyber threats shift from spying to disruption in 2025
Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Data-only extortion surges as remote access abused
Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Active exploitation seen in BeyondTrust access flaw
Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.