Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > AI-Powered Cybercrime Surge: Low-Skill Hackers Now Breaching Hundreds of Networks Worldwide

AI-Powered Cybercrime Surge: Low-Skill Hackers Now Breaching Hundreds of Networks Worldwide

A new wave of cyberattacks is reshaping the global threat landscape, as commercially available artificial intelligence tools enable even relatively unskilled hackers to carry out large-scale ...

by Amazon Threat Intelligence, a financially motivated, Russian-speaking threat actor leveraged multiple generative AI services to compromise more than 600 FortiGate network devices across at least 55 countries between January 11 and February 18, 2026. The campaign, notable for its scale and efficiency, signals a pivotal shift in how cybercrime is conducted in the age of AI. Check out here

Similar Stories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

Have your say

 

News Categories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech