Third-Party Content

Red Piranha’s “2025 Threat Intelligence & Ransomware Report”
A steep rise in double extortion tactics and hybrid cloud-targeting attacks as well as notable dominance of malware variants like LockBit, Cl0p, and BlackCat are among the highlights of Red Piranha’s new threat report (Published February 2025). View the report

NCC Group’s “Cyber Threat Monitoring Report 2024”
2024 saw the highest volume of annual ransomware cases since NCC Group started monitoring ransomware activity, with 5,263 attacks (Published January 2025). View the report

Whalebone’s “Network Security Threat Landscape Report 2024”
Whalebone shares its most recent threat intel findings observed across all malicious traffic analyzed DNS resolvers (Published January 2025). View the report

CTA’s “Cybersecurity in the Age of Gen AI Part 2”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part 2 – Navigating Cyber threats to Gen AI systems (Published January 2025). View the report

CTA’s “Cybersecurity in the Age of Gen AI Part 1”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part I – Combating GenAI Assisted Cyber Threats (Published January 2025). View the report

FortiGuard Lab’s “Cyber Threat Predictions for 2025”
Emerging attack trends to watch for in 2025 and beyond from Fortinet’s FortiGuard Labs (Published January 2025). View the report

Google Cloud’s “Cybersecurity Forecast 2025”
AI-powered attacks, geopolitical tensions, and sophisticated cyber crime attacks are just a few of the challenges organizations will face in the coming year. (Published December 2024) (Published November 2024). View the report

CTA’s ‘Threat Intelligence Practitioner’s Summit’ (TIPS 2025)
CTA’s ‘Threat Intelligence Practitioner’s Summit’ (TIPS 2025) (Arlington, VA May 14th-15th 2025). View the event home page

Russian Influence Operations: “Operation Undercut”
“Operation Undercut” Shows Multifaceted Nature of SDA’s Influence Operations (Published November 2024). View the Report

Vulnerability Disclosure Policy Usage in Global Consumer IoT in 2024
64% of the companies surveyed didn’t have a way for security researchers to contact them acording to this new Copper Horse report on VDP usage in consumer IoT (Published November 2024). View the Report

Gen’s Q3 2024 Threat Report
Cybercriminals are taking scams to the next level, from sneaky malware disguised as CAPTCHA prompts to a surge in “Scam-Yourself Attacks” (Published November 2024).
View the Report

Zimperium’s Global Mobile Threat Report 2024
70% of businesses fail to adequately secure personal devices used for work, reinforcing the belief held by 55% of professionals that smartphones are the most exposed endpoints in their organization according to Zimperium’s new report (Published October 2024). View the Report