Topic: cyber attack trends

  • Industrial Cyberattacks Surge: Critical Infrastructure at Risk

    Industrial Cyberattacks Surge: Critical Infrastructure at Risk

    Critical infrastructure faces a severe and growing cyber threat, with vulnerability disclosures for industrial systems nearly doubling in a single year, highlighting a major risk to essential services like energy and utilities. Research shows a dramatic spike to 2,451 disclosed vulnerabilities in...

    Read More »
  • API Incidents Surge: 40,000+ Reported in First Half of 2025

    API Incidents Surge: 40,000+ Reported in First Half of 2025

    The first half of 2025 saw over 40,000 API incidents, with APIs becoming a prime target for sophisticated automated attacks despite representing a small part of the attack surface. A record-breaking 15 million requests-per-second DDoS attack targeted a financial services API, using botnets that m...

    Read More »
  • Russian Hackers Exploit Patched Microsoft Office Flaw

    Russian Hackers Exploit Patched Microsoft Office Flaw

    A Russian state-sponsored hacking group is actively exploiting a patched Microsoft Office vulnerability (CVE-2026-21509) through phishing campaigns to install backdoors on targeted systems. The attacks use two methods: one deploys a malicious VBA project to steal emails, while the other uses a mu...

    Read More »
  • China Ramps Up Cyberattacks Targeting Taiwan

    China Ramps Up Cyberattacks Targeting Taiwan

    Taiwan faced over 960 million cyber intrusion attempts in 2025, a 6% annual increase, primarily targeting critical infrastructure like energy, emergency services, and hospitals, with attacks attributed to China-based actors. The energy sector saw a tenfold surge in attacks, while emergency and he...

    Read More »
  • Microsoft Uncovers AI-Powered Phishing Scam

    Microsoft Uncovers AI-Powered Phishing Scam

    Cybercriminals are using artificial intelligence, including large language models, to create highly sophisticated phishing scams, deepfakes, and automated data extortion attacks. A specific attack involved hiding malicious code in an SVG file disguised as a PDF, using obfuscated business terms to...

    Read More »