Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 18 Feb 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
That's essentially the attitude of threat actors, who last year shifted heavily toward abusing remote monitoring and management (RMM) tools and away from traditional malware. Huntress researchers observed a whopping 277% year-over-year increase in RMM abuse, according to the company's 2026 Cyber Threat Report. More here
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials. More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizati… More...
In an unsuccessful phishing attack, threat actors leveraged trusted brands and domains to try to redirect a C-suite exec… More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials. More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
RSAC 2026 CONFERENCE — San Francisco — When people talk about transparency in cybersecurity, they are usually referring … More...
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizati… More...