Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
20 articles
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking ...
Fraud campaign exploiting Indonesia’s Coretax resulted in $1.
GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures t...
This article walks through how Elastic Security's Attack Discovery, combined with Workflows and Agent Builder, can automatically detect, correlate, and confi...
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...
Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation
Written by: Ross Inman, Adrian Hernandez Introduction North Korean threat actors continue to evolve their tradecraft to target the cryptocurrency and decentr...
Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Bitdefender has discovered a new Android malware campaign that uses Hugging Face
CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran
The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats
Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.
Fortra researchers have discovered a new SEO poisoning operation known as “HaxorSEO”
A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm