Threat intelligence stories
AI has made stolen credentials and careless copy-paste habits a bigger risk than password strength, with scams and breaches accelerating.
Shared UK crime data has helped Google disable nearly 50,000 fraudulent accounts and expose more than 5,000 fake bank websites.
Attackers were exploiting a critical Weaver E-cology flaw within five days of the vendor patch, Vega said, with repeated attempts blocked.
Session cookie theft lets attackers slip past multifactor checks, putting enterprise email accounts at risk even after login.
Web attacks are driving browser makers to bake security in by default, as Norton Neo adds VPN, phishing blocks and anti-fingerprinting tools.
The ranking highlights growing demand for intelligence that can guide detection and response inside security tools, rather than stand-alone reports.
QR code phishing climbed sharply in the quarter, exposing email users to more mobile-led credential theft despite disruption of major infrastructure.
Small defence contractors are left exposed as state-backed hackers spend years mapping supply chains and laying covert access routes before striking.
Threats are spreading beyond inboxes as phishing shifts into Teams, calendars and other collaboration tools, raising the risk for hybrid workers.
Detection of malicious code can collapse when AI reviewers are fed large files packed with harmless text, Cloudflare's research shows.
Security teams can now trace AI-led attacks before phishing begins, as Outtake targets lookalike domains, bot networks and fake accounts.
Fraud teams facing faster AI-driven attacks can now update defences within hours as Sumsub’s detector learns new deepfake tactics automatically.
Businesses faced a sharp rise in image-based scams as QR code phishing jumped 146% in the first quarter, Microsoft said.
Security teams may get faster risk rankings as TrendAI adds Claude Opus 4.7 to its platform to spot exploitable flaws and apply interim controls.
Ransomware attacks are spreading faster as AI helps criminals exploit flaws within 24 to 48 hours, the report says.
Customers will get a single view of suppliers and cyber exposure as fragmented third-party risk data is linked across separate systems.
Security teams can now automate hunts and investigations from existing workflows as Command Zero opens its platform to AI agents and external systems.
Security teams can now feed AI agents internet-scale intelligence through a new protocol as Team Cymru opens access to Pure Signal customers.
Businesses face rising exposure as AI is used to sharpen phishing, while insecure in-house tools and weak controls widen attack surfaces.
The findings add pressure on ministers to modernise the 1990 Computer Misuse Act as breaches hit 43% of UK businesses and 28% of charities.