The latest DDoS Threat Intelligence report from NETSCOUT shows sophisticated attacker collaboration, resilient botnets, and compromised IoT infrastructure that drove […]
Category: cyberattack
AI-powered attacks are reshaping cybersecurity, according to Cloudflare
Cloudflare has released its 2026 Threat Intelligence Report, outlining how cyberattacks are changing as nation-state actors and criminal groups move […]
Threat groups collaborate to boost impact
Cooperation is allowing threat groups to repeat successful intrusion models across sectors at speed, turning isolated compromises into sustained, multi-industry […]
Number of ransomware victims hits record high
Ransomware groups listed a record 7,458 victims on dark web leak sites in 2025, representing a significant 30 percent increase […]
77 percent of successful email attacks impersonate trusted platforms
New research from StrongestLayer highlights a fundamental shift in attacker behavior, where adversaries increasingly hide behind business-critical platforms such as […]
The silent danger of SSH key mismanagement [Q&A]
The recent AyySSHush botnet campaign compromised over 9,000 ASUS routers worldwide via SSH key injection. Unlike traditional botnets, this campaign […]
70 percent of major breaches caused by overlapping risks
New research from business risk specialist Panaseer shows that major breaches are being caused by toxic combinations — overlapping risks […]
Ransomware attacks on healthcare businesses increase 30 percent
New research from Comparitech, based on data from its worldwide ransomware tracker, finds a 30 percent rise in ransomware attacks […]
Attackers weaponize workplace communication to install remote access tools
An ongoing phishing campaign is targeting organizations across multiple industries, usingsophisticated social engineering tactics to convincingly impersonate well-knownvideoconferencing platforms and […]
Off-the-shelf tools make life easier for phishing attackers
New research from Fortinet’s FortiGuard Labs highlights a recently identified phishing campaign that uses carefully crafted emails to deliver malicious […]
