https://www.infosecurity-magazine.com/news/threat-actors-exploit-calendar-subs/
Dec 4, 2025 - BitSight research has revealed how threat actors exploit calendar subscriptions to deliver phishing links, malware and social engineering attacks through...
threat actorsexploitcalendarsubscriptionsphishing
https://cyberscoop.com/legislation-would-designate-critical-cyber-threat-actors-direct-sanctions-against-them/
Dec 2, 2025 - A House Republican introduced legislation Tuesday aimed at deterring cyberattacks against the United States at a time when the Trump administration is...
threat actorslegislationwoulddesignatecyber
https://apacnewsnetwork.com/2022/01/in-the-cyber-physical-context-we-have-observed-threat-actors-demonstrate-greater-understanding-of-the-target-environment/
May 20, 2022
threat actorscyberphysicalcontextobserved
https://www.redhotcyber.com/en/homepage/threat-actors-interviews/
Sep 17, 2025 - In this trip, we are going to interview cyber criminal gangs because in order to succeed in protecting yourself, you need to know the threats inside out.
threat actorsred hotinterviewscyber
https://www.itprotoday.com/attacks-breaches/threat-actors-increasingly-leaning-on-genai-tools
Aug 5, 2025 - From "eCrime" actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.
threat actorsgenai toolsincreasinglyleaning
https://www.csoonline.com/article/3953828/surge-in-threat-actors-scanning-juniper-cisco-and-palo-alto-networks-devices.html
Apr 4, 2025 - Admins need to change default credentials promptly on Juniper SSR, patch Cisco SLU, warns SANS Institute.
threat actorspalo altosurgescanningjuniper
https://www.informationweek.com/cyber-resilience/how-are-threat-actors-using-adversarial-genai-
Feb 6, 2025 - Threat analysts are learning more about how threat actors misuse and weaponize GenAI tools.
threat actorsusingadversarialgenai
https://www.csoonline.com/article/4066008/government-shutdown-deepens-us-cyber-risk-exposing-networks-to-threat-actors.html
Oct 1, 2025 - As Trump’s cyber spending cuts and CISA firings weaken defenses, the latest government shutdown leaves federal networks even more exposed to nation-state and...
government shutdowncyber riskusexposingnetworks
https://www.varonis.com/blog/cookie-bite
Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.
threat actorscookiebitedigitalcrumbs
https://www.silentpush.com/blog/adaptix-c2/
Oct 31, 2025 - Silent Push has uncovered threat actors tied to the Russian underworld using the AdaptixC2 framework to deliver malicious payloads.
silentpushtiesrussiancriminal
https://danielmiessler.com/blog/threats-vulnerabilities-risks
Threats Threat Actors Vulnerabilities Risks Summary There is never-ending debate on the language around Threat Modeling. About three in four presentations...
threat actorsdifferencethreatsvulnerabilitiesrisks
https://blog.google/innovation-and-ai/technology/safety-security/google-threat-intelligence-group-report-ai-november-2025/
A report from the Google Threat Intelligence Group shows adversaries misusing AI to enhance their operations.
threat actorsmisuseaienhanceoperations
https://www.f5.com/labs/articles/analyzing-react2shell-threat-actors
Sensor Intel Series: December CVE-2025-55182 Trends
threat actorsanalyzinglabs
https://blog.xlab.qianxin.com/kiteshield_packer_is_being_abused_by_linux_cyber_threat_actors/
Background Over the past month, XLab's CTIA(Cyber Threat Insight Analysis) System has captured a batch of suspicious ELF files with low detection rates on...
threat actorspackerabusedlinuxcyber
https://www.phishprotection.com/phishing-awareness/threat-actors-breach-reddit-and-access-internal-documents-code-and-business-systems
Jul 16, 2025 - Threat actors managed to infiltrate the popular social media platform Reddit and access internal documents, code, and some internal business systems,
threat actorsinternal documentsbreachredditaccess
https://www.phishprotection.com/phishing/us-publication-house-targeted-by-threat-actors
Jul 18, 2025 - One of the largest newspaper groups in the US- Lee Enterprises, faced the brunt of a cyberattack recently. The newspaper giant, which has readership across 72
threat actorsuspublicationtargetedcom
https://cyberint.com/solutions/industry/bsfi/
Nov 13, 2024 - Protect your customer’s financial data across all touchpoints, monitor and defend against business executive targeting, compromised credit cards, ATM hacking.
threat actorspreventvulnerabilities
https://cyberscoop.com/openai-threat-report-ai-cybercrime-hacking-scams/
Oct 7, 2025 - A new report from the leader in the generative AI boom says AI is being used in existing workflows, instead of to create new ones dedicated to malicious...
threat actorsopenaiuseefficientmake
https://flashpoint.io/events/how-threat-actors-use-ai-separating-fact-from-fiction/
Oct 17, 2025 - Join this webinar to learn more about how AI is truly changing the game and how threat actors are using it.
threat actorsuse aiflashpointwebinar
https://www.threatdown.com/blog/how-threat-actors-are-using-smb-vulnerabilities/
Apr 16, 2024 - SMB vulnerabilities have been so successful that they’ve been used in some of the most devastating ransomware and Trojan attacks. Learn how they work and how...
threat actorsusingsmbvulnerabilitiesthreatdown
https://www.csoonline.com/article/4127554/threat-actors-hijack-web-traffic-after-exploiting-react2shell-vulnerability.html
Feb 5, 2026 - Researchers at Datadog Security say the hackers have pivoted to hit NGINX web servers.
threat actorsweb traffichijackexploitingvulnerability
https://www.volexity.com/blog/2025/04/22/phishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows/
Jun 7, 2025 - Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at...
threat actorsphishingcodesrussiantarget
https://cyberscoop.com/cybersecurity-ai-chinese-threat-actors/
Apr 23, 2025 - AI is transforming cybersecurity defenses against Chinese threat actors. Learn why US organizations must leverage AI for faster detection and real-time...
nation statethreat actorsaihelpdefenders
https://penmelbourne.org/threat-looms-over-narges-mohammadi-amid-ongoing-intimidation-from-state-affiliated-actors/
Jul 24, 2025 - Free Narges Coalition Statement 11th July 2025 Iranian Nobel laureate Narges Mohammadi has received a series of serious threats to her safety and life
narges mohammadithreatamidongoingintimidation
https://www.cybersecuritydive.com/news/feds-threat-actors-prey-security-mishaps/624135/
Federal authorities and U.S. allies admonished companies to tighten weak controls and configurations.
threat actorsfedsreleasegrimreminder
https://www.phishprotection.com/phishing/water-system-attacks-strategy-leveraged-by-threat-actors
Aug 21, 2025 - There has been a steep rise in the instances of cyberattacks on water systems. Different nations, such as the US, Norway, and Poland, are facing the brunt of
new strategythreat actorswatersystemattacks
https://www.csoonline.com/article/4101890/warning-react2shell-vulnerability-already-being-exploited-by-threat-actors.html
Dec 18, 2025 - It has been seen spreading cryptojacking malware and in attempts to steal cloud credentials from compromised machines.
threat actorscso onlinevulnerabilityalreadyexploited
https://www.cybersecuritydive.com/news/microsoft-security-solarwinds-crowdstrike/607177/
The pandemic created more business opportunity, but malicious actors dogged the company's technology stack. Now, the very same products touted as...
threat actorsmicrosoftattackpositionscyber