Third-Party Content
Recorded Future’s “New ransomware tactics in 2026”
Declining payments, evolving tactics: Ransomware groups made less money in 2025 despite a 47% increase in publicly reported attacks, pushing them to adopt new approaches to extract payment, namely, DDoS-as-a-Service offerings, insider recruitment, and gig worker exploitation (published January 2026). View the report
The Infoblox 2025 DNS Threat Landscape Report
Attackers increasingly exploit DNS to bypass traditional cybersecurity defenses and deliver malicious content undetected.Over a quarter of newly observed domains were classified as malicious or suspicious, showing how many threats hide in plain sight. Learn more from Infoblox’s 2025 report (published October 2025) View the report
The Bitdefender and NETGEAR 2025 IoT Security Landscape Report
Over half of all smart home vulnerabilities come from streaming devices (26%); Smart TVs (21%) and IP cameras (9%). Learn more from this year’s report by Bitdefender and NETGEAR (published October 2025). View the Report
The Microsoft Digital Defense Report 2025
This year’s Microsoft Digital Defense Report showcases the scale and sophistication of today’s cyber threats, the impact of emerging technologies, and the strategies that can be used to defend against them (published October 2025). View the report
The 2025 Comcast Business Cybersecurity Threat Report
Threats are becoming faster and smarter, with adversaries leveraging AI, proxy abuse, and social engineering to outmaneuver defenses. Learn more from the 2025 Comcast Business Cybersecurity Threat Report (published October 2025). View the report
SSSCIP of Ukraine: “Russian Cyber Operations: Analytics for 1H 2025”
On March 23, 2025, the news was dominated by reports of a significant cyberattack on Ukrainian Railways. However, this was not the only cyberattack carried out by UAC-0002 (Sandworm) in the first half of 2025. (published October 2025). View the Report
HackerOne’s “Rise of the Bionic Hacker”
Now in its 9th year, HackerOne’s report benchmarks how enterprises are confronting AI risk, closing exposure gaps, and adapting to faster, more persistent attackers (published October 2025). View the report
Nokia’s Threat Intelligence Report 2025
Nokia’s 2025 threat report shows how stealth intrusions are reaching the telecom core, DDoS floods are hitting multi‑terabit peaks within minutes, and cryptography requirements are accelerating. (Published October 2025). View the Report
ENISA’s “Threat Landscape 2025”
This latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025 (published October 2025). View the Report
Hiya’s ‘State of The Call 2025’
Hiya’s State of the Call report showcases trends and insights about the voice call market and the extent of its vulnerability to fraud. (Published September 2025).View the Report
CISA’s Advisory on “Countering Chinese State-Sponsored Actors”
CISA and partner cybersecurity agency guidance on defending against People’s Republic of China state-sponsored cyber threat actors targeting telecom, government, transportation, lodging, & military infrastructure networks globally (published September 2025). View the Guidance
Interpol’s “Africa Cyber Threat Assessment Report 2025”
Interpol’s report outlines the core cybercrime challenges facing Africa, emerging threat trends, and real-world examples of both systemic barriers and operational success (published June 2025). View the report

