STAY INFORMED
STAY SECURED
Cyber incidents continue to increase in frequency, scale, and business impact, driven by financially motivated threat actors targeting high-value data assets. Despite advancements in security technologies, many organizations remain underprepared to effectively prevent, detect, and respond to evolving threats.
Metrics
Key trends highlight escalating financial impact, expanding attack surfaces, and growing third-party risk exposure, reinforcing the need for enhanced investment, modernized controls, and mature incident response capabilities.
- Global average breach cost: ~US $4.44M / U.S. average breach cost: ~US $10.22M
- Multi-environment breaches (cloud + on-prem): ~US $5.05M average cost
- PII involved in ~53% of breaches
- AI-related risks emerging: ~16% attacker use; ~20% shadow AI exposure
- Average dwell time: ~241 days
- Third-party involvement in ~30% of breaches
ThreatScape
Cyber threat activity remains persistent and diverse, with widespread website compromise, insider involvement, financially driven attacks, ransomware prevalence, concentrated industry impact, and strong links to organized cybercrime groups.
- 4,800 websites/month are compromised with formjacking.
- 34% of breaches involve internal actors.
- 71% of breaches are financially motivated.
- 24% of malware incidents involve ransomware.
- 95% of breached records** come from government, retail, and technology.
- 36% of external actors** are linked to organized crime.
CyberPulse
The state Attorney General's office had accused a former Adams Township Clerk of illegally sharing election data with unauthorized people after ... The alleged leak of Alberta's entire electoral list, containing the info of nearly 3 million voters, has sparked both blame and calls for ... ______ Follow WBMA on social media: Subscribe now http://www.youtube.com/abc3340?sub_confirmation=1 Follow us on other social media: ABC 33/40 on ... Sandhills Medical says it discovered the ransomware attack almost a year ago. Over 78K patients information, social security numbers. The Canadian Securities Administrators (CSA) are dropping some of the mandated personal information collected on registrants, including eye and ... Social engineering has evolved. Device code phishing and AI lures bypass MFA and blend in. Build a cyber resilience strategy before the next ... Delta Dental has agreed to pay $2.25 million to resolve the New York financial regulator's claims that the insurer maintained inadequate ... A new class action lawsuit alleges Chime Financial failed to protect customers' highly sensitive data during a recent data breach. Cybersecurity threats are an increasing credit risk for banks and other financial institutions. A Calgary-based journalist says she notified Elections Alberta of the leak a month ago and alleges the watchdog didn't act. As RCMP and Elections Alberta investigate an online database that exposed the personal information of millions of voters, a Calgary journalist ... Good "cyber hygiene" like strong passwords, multi-factor authentication and the right banking tools can go a long way in keeping your business safe. Elections Alberta says a list of voters and information was illegally obtained by a separatist group and the price of fuel is rising at the pumps. Keep in mind, Elections Alberta is prohibited by law from commenting on any complaint or investigation that may or may not be happening. A typical ... April 30, 2026 | Alberta separatist group Centurion Project is ordered to remove a public database with millions of voters' personal info. Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. Premier Danielle Smith says her government will look at new legislation depending on what comes out of investigations into claims a separatist ... We at Elections Alberta hear you, and share your concerns in a very real way. Our staff are among the 2.9 million Albertans who are on the List of ... Schubert Jonckheer & Kolbe LLP is investigating a data breach that led to unauthorized access to the sensitive information of patients affiliated ... NEW YORK — New York Attorney General Letitia James today released the following statement after the U.S. Court of Appeals for the Fifth Circuit ...
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code.
It said it "recently identified" the compromise of its source […] A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts.
The activity […] Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of SaaS environments, while leaving minimal […] Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and Southeast Asia, along with one European […] The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the fastest-growing sector[2]. Despite this opportunity, […] The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in […] A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and […] In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft.
According to […] The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into […] Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of […] Intro
A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional […] Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.
The high-severity vulnerability tracked […] Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" GitHub Actions workflow -- that could have […] Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware.
According to reports from Aikido […] Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus large language model (LLM).
The package […] In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain.
We aren't just talking […] Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So, […] cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software.
The problem […] The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities […] In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation […] Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code […] A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot).
"The […] Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, […] Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done.
That assumption is wrong. […] Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited […] When patching isn’t fast enough, NDR helps contain the next era of threats.
If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on […] A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.
Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his […] An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from […] Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild.
The vulnerability in […] Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web.
"Based […]
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them. The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing. Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card. On this day in 2006, Dark Reading went live. We have a celebration planned that spans our two decades of covering the industry, and you, dear readers, are invited. Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain attacks broaden. The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available. In this latest installment of the Reporters' Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press. While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security. Global financial institutions are panicked over Anthropic's new superhacker AI model. Cyber experts aren't quite as worried. Wiz used an AI reverse-engineering tool to pinpoint a vulnerability that previously would have been too costly and time-consuming to undertake. Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft. The emerging ransomware has been deployed against victims of the TeamPCP supply chain attacks, but organizations should think twice before paying for a decryptor. An analysis of the destructive malware reveals sophisticated living-off-the-land (LotL) techniques and detailed strategies for the widespread deletion of data. The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives. Chris Inglis was the head civilian in charge at the NSA when the Snowden leaks exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential […] When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations. The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys. Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware. A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign. A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services. Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by five years. Some fear frontier LLMs like Claude Mythos and OpenAI's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity. People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them. Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites. Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated AI models to take advantage. In the past six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks. Lazarus continues leveraging ClickFix for initial access and data theft: in this case, against Mac-centric organizations and their high-value leaders. The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage. The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs. China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way. Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems. The proof of concept revealed AI-based attacks unfold too fast for human defenders to respond, and that AI evinced more autonomous behavior than expected. The volume of cyberattacks targeting Africa declined in the past year, with weekly attacks down 22%, as attackers seemingly shifted their focus to other regions. Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication. A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware. IT has long been concerned with ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too. A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process. Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are unpatched. The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains. The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution. China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs. Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher notes. The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers say. Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious activity. Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment. In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow. AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role. The National Institute of Standards and Technology is carving a new path for vulnerability remediation by changing the way it prioritizes software flaws. Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.

