TelcoNews UK - Telecommunications news for ICT decision-makers

Threat actors stories

Ai cyber attack scada control room red alert shadowy hacker

AI reshapes cyber threats as experts warn on automation

Last week
#
threat actors
AI will transform cyber threats by 2026, experts say, but warn over-automation and legacy systems could imperil critical infrastructure.
Night cyber ops room ai testing monitors threat alerts vigilance

AI-native attacks drive shift to continuous cyber tests

Last week
#
threat actors
AI-native cyber attacks and synthetic IDs are forcing firms to shift from periodic checks to continuous, AI-driven security testing by 2026.
Bitdefender one battle after another report 1

Fake Leonardo DiCaprio torrent spreads Agent Tesla trojan

Last week
#
threat actors
Fake torrents of Leonardo DiCaprio film One Battle After Another are spreading Agent Tesla malware that hijacks Windows PCs, experts warn.
Secure enterprise network shield servers laptops cloud threat detection

CrowdStrike hits 100% in latest MITRE cross-domain tests

Last week
#
threat actors
CrowdStrike’s Falcon platform scores 100% detection and protection with no false positives in MITRE’s toughest cross-domain ATT&CK tests yet.
Shadowy hidden browser window warning symbols masked figures

GhostFrame iframe phishing kit powers 1m attacks

Last week
#
threat actors
GhostFrame phishing kit has fuelled over 1m iframe-powered attacks since September, using hidden pages and anti-inspection tricks to evade defences.
Modern uk office ai call centre retail checkout security ops room

AI agents to transform enterprise, retail & security by 2026

Last week
#
threat actors
AI agents are tipped to sweep through enterprises, shops and security by 2026, automating work, reshaping retail and redefining digital trust.
Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Last week
#
threat actors
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Windows laptop shield blocking email malware cloud security

Microsoft patches Windows zero-day & risky Office flaws

Last week
#
threat actors
Microsoft fixes a Windows zero-day used in attacks and Office flaws that can execute code when emails are merely received or previewed.
James headshot

Exclusive: Cohesity's James Blake warns on rising ransomware risks

This month
#
threat actors
Ransomware attacks cost Australian organisations AUD $42 billion annually, urging a shift from prevention to pragmatic cyber resilience amid rising threats.
Shield protecting cloud storage icons cyber attackers digital security

SonicWall acts after backup breach as state actors target cloud files

Last month
#
threat actors
SonicWall confirmed state actors accessed backup cloud files via an API, prompting swift investigation and enhanced security for partners and customers.
Salman  1

The power of cybersecurity dashboards in modern risk management

Last month
#
threat actors
Cybersecurity dashboards reveal hidden system risks, providing real-time data to prioritise and rapidly fix vulnerabilities in today’s complex digital environments.
Digital network web glowing red breaches hackers vs blue security shields

AI-driven cyber attacks surge, outpacing security defences

Last month
#
threat actors
AI-driven cyber attacks are escalating rapidly, outpacing traditional defences and forcing security teams to adopt advanced AI tools to keep pace.
Ritchen

Three hidden risks in your AI stack and what to do about them

Last month
#
threat actors
Rapid AI adoption in APJ exposes firms to hidden risks like shadow AI, API vulnerabilities, and leaked credentials, demanding better governance and security.
Shadowy figure computer digital symbols phishing hooks us iran cyber espionage

Iran-linked cyber spies blend tactics to target US policy experts

Last month
#
threat actors
Iran-linked cyber spies have combined tactics from multiple hacking groups in a new phishing campaign targeting US experts on Iranian politics and the IRGC.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Last month
#
threat actors
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Stressed businessperson office desk locked computer digital padlocks masked figures

Ransom payment rates drop to historic low as attackers adapt

Thu, 30th Oct 2025
#
threat actors
Ransom payments fell to a historic low of 23% in Q3 2025 as cyber extortion tactics shift towards targeted, costlier attacks on larger firms.
Interconnected supply chains digital locks vulnerabilities and overconfidence cybersecurity

Overconfidence threatens supply chain cyber security resilience

Fri, 24th Oct 2025
#
threat actors
Despite 94% public sector confidence in handling supply chain cyberattacks, nearly half faced breaches last year, revealing a troubling gap in resilience.
Hooded figure computer dark room multiple screens abstract encrypted code cyber attack

Ransomware groups surge as automation cuts attack time to 18 mins

Thu, 23rd Oct 2025
#
threat actors
Automation and AI slash ransomware attack times to 18 minutes, challenging defenders to match speed with automated defences, says ReliaQuest report.
Masked hacker at computer dark room lock icons crypto symbols cybercrime

Ransomware’s business model reshapes costs as cybercrime hits USD $10.5 trillion

Tue, 21st Oct 2025
#
threat actors
Ransomware has evolved into a profit-centric business, driving cybercrime costs to USD $10.5 trillion and reshaping global cybersecurity risks and responses.
Computer screen map network connections warning markers cyber threat detection security operations center

Expel Intel launches to deliver actionable threat intelligence insights

Thu, 9th Oct 2025
#
threat actors
Expel has launched Expel Intel, a new team providing actionable cyber threat insights based on real-world incidents to help security teams improve defences.