TelcoNews UK - Telecommunications news for ICT decision-makers

Threat actors stories - Page 4

Global logistics cyber attack shadowy hacker network map art

Russian phishing service targets freight & logistics

Fri, 27th Feb 2026
#
mfa
#
crypto
#
advanced persistent threat protection
Russian-run Diesel Vortex phishing service raided freight and logistics portals in the US and Europe, stealing over 1,600 login credentials.
Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Thu, 26th Feb 2026
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Glowing red world map ransomware ai cyber attack broken padlock

GenAI misuse & ransomware drive surge in cyber attacks

Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Mac laptop fake installer shadowy hands data theft crypto malware

Hijacked Google Ads push MacSync malware to Mac users

Wed, 25th Feb 2026
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Wed, 25th Feb 2026
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Untitled design  80

Horizon3.ai names Dan Bird MBE Field CTO for EMEA cyber push

Wed, 25th Feb 2026
#
devops
#
digital transformation
#
hyperscale
Horizon3.ai appoints defence veteran Dan Bird MBE as EMEA field CTO to sharpen offensive security amid rising regional cyber threats.
Story 299483

Android PromptSpy malware harnesses Gemini for stealth

Fri, 20th Feb 2026
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
Singapore skyline dusk cloud datacenters ai security network

EY maps hyper-velocity AI priorities for tech during 2026

Fri, 20th Feb 2026
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Small business office ransomware attack refusing to pay secure safe

Ransomware victims refuse to pay as data extortion soars

Wed, 18th Feb 2026
#
firewalls
#
data protection
#
dr
Most ransomware-hit firms now refuse to pay, as Arctic Wolf reports an 11-fold surge in data-only extortion and booming remote access abuse.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Fri, 13th Feb 2026
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Fri, 13th Feb 2026
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.
Compromised iis server dark code web to gambling crypto icons

BADIIS malware hijacks IIS servers for covert SEO fraud

Fri, 13th Feb 2026
#
malware
#
firewalls
#
network security
BADIIS malware is hijacking over 1,800 IIS servers worldwide, quietly boosting illicit gambling and crypto phishing sites via poisoned SEO.
Moody data center linux servers botnet ssh attacks asian city skyline

SSHStalker botnet preys on legacy Linux & cloud hosts

Thu, 12th Feb 2026
#
malware
#
firewalls
#
hyperscale
A newly uncovered SSHStalker botnet uses old-school IRC and legacy Linux exploits to hijack outdated corporate and cloud hosts at scale.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Thu, 12th Feb 2026
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
Modern windows desktop security patch shield zero day fix

Microsoft patches zero-day flaws in latest Windows update

Thu, 12th Feb 2026
#
iam
#
cybersecurity
#
microsoft
Microsoft rolls out fixes for 55 Windows flaws, including six exploited zero-days hitting Shell, MSHTML, Word and key desktop services.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.