https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents
Emergent Cyber Behavior: When AI Agents Become Offensive Threat Actors - Irregular
In controlled experiments, AI agents performing routine enterprise tasks were found to autonomously engage in offensive cyber operations, including...
ai agentsthreat actorsemergentcyberbehavior
https://www.netcraft.com/blog/irl-quishing-scams-target-travelers
Problems in the Parking Lot: Threat Actors Use IRL Quishing to Target Travelers | Netcraft
Sep 18, 2024 - This article explores Netcraft’s research into the recent surge in QR code parking scams in the UK. It also shows how parking payment provider PayByPhone is ...
in theparking lotthreat actorsproblemsuse
https://www.proofpoint.com/uk/compare/proofpoint-vs-symantec
Threat actors target Symantec Email Security | Proofpoint UK
Overview Why Proofpoint Resources Overview Stagnant innovation and shrinking support Once a trusted name, Symantec Email Security.cloud (formerly MessageLabs)...
threat actorsemail securitytargetsymantecproofpoint
https://industrialcyber.co/reports/food-and-ag-isac-finds-72-active-threat-actors-behind-persistent-sophisticated-cyber-attacks-targeting-food-supply-chains/
Food and Ag-ISAC finds 72 active threat actors behind persistent, sophisticated cyber attacks...
threat actorscyber attacksfoodagisac
https://www.threatdown.com/blog/how-threat-actors-are-using-smb-vulnerabilities/
How threat actors are using SMB vulnerabilities - ThreatDown by Malwarebytes
Apr 16, 2024 - SMB vulnerabilities have been so successful that they’ve been used in some of the most devastating ransomware and Trojan attacks. Learn how they work and how...
threat actorsusingsmbvulnerabilitiesthreatdown
https://www.proofpoint.com/au/compare/proofpoint-vs-symantec
Threat actors target Symantec Email Security | Proofpoint AU
Overview Why Proofpoint Resources Overview Stagnant innovation and shrinking support Once a trusted name, Symantec Email Security.cloud (formerly MessageLabs)...
threat actorsemail securitytargetsymantecproofpoint
https://www.finra.org:443/rules-guidance/guidance/cybersecurity-alert-gladinet-centrestack-triofox-vulnerabilities-20260129
Cybersecurity Alert - Threat Actors Exploiting Gladinet CentreStack and TrioFox Vulnerabilities |...
FINRA firms should be aware of multiple critical vulnerabilities in Gladinet’s CentreStack or TrioFox file sharing and collaboration software applications,...
threat actorscybersecurityalertvulnerabilities
https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-are-adapting-post-macro-world
Macro-Blocking & How Threat Actors Are Adapting | Proofpoint US
Threat actors are increasingly adapting to Microsoft's macro-blocking. Learn how threat actors are pivoting away from macro-enabled documents with Proofpoint.
threat actorsmacroblockingproofpointus
https://www.zdnet.com/article/lamphone-attack-lets-threat-actors-recover-conversations-from-your-light-bulb/
Lamphone attack lets threat actors recover conversations from your light bulb | ZDNET
Jun 13, 2020 - Academics record light variations in a light bulb to recover the sound waves (speech, conversations, songs) from a room 25 meters (80 feet) away.
threat actorslight bulbattackletsrecover
https://blog.talosintelligence.com/the-n8n-n8mare/
The n8n n8mare: How threat actors are misusing AI workflow automation
Apr 21, 2026 - Cisco Talos research has uncovered agentic AI workflow automation platform abuse in emails. Recently, we identified an increase in the number of emails that...
ai workflow automationthreat actorsn8n