Third-Party
Threat Intelligence
Europol’s “Internet Organised Crime Threat Assessment 2026
A growing trend towards high-opacity cryptocurrency coins resistant to blockchain tracing tools poses new challenges to law enforcement authorities according to Europol’s “Internet Organised Crime Threat Assessment (IOCTA) 2026” (published April 2026). View the report
“Uncovering Global Telecom Exploitation by Covert Surveillance Actors”
This Citizen Lab investigation uncovers two sophisticated telecom surveillance campaigns and, for the first time, links real-world attack traffic to mobile operator signalling infrastructure. (published April 2026). View the Report
Rapid7’s “2026 Global Threat Landscape Report”
“The predictive window has collapsed” according to Rapid7’s new report. “Attackers are executing their playbooks faster and at scale in ways never seen before. Highly exploitable vulnerabilities are up 105% and the KEV inclusion dropped from 8.5 to just 5 days after disclosure. Speed is no longer an advantage.” (published April 2026). View the Report
The European Telecommunications ISAC’s ‘Telco Security Landscape 2026’
“The threat of intentional disruption by both logical and physical means is on the rise. There is is a clear and urgent need for joint resilience planning across sectors and supply chains,” according to the European Telecommunications ISAC (published April 2026). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2026”
GSMA’s eighth annual Mobile Telecommunications Security Landscape report 2026 (published February 2026). View the Report
Recorded Future’s “2026 State of Security”
From state-sponsored activity to ransomware and AI-driven deception, this report looks at what’s changing and why it matters (published February 2026). View the report
WEF’s “Global Cybersecurity Outlook 2026”
AI is anticipated to be the most significant driver of change in cybersecurity in the year ahead, according to 94% of survey respondents according to the World Economic Forum’s 2026 global cybersecurity outlook (published January 2026). View the report
Recorded Future’s “New ransomware tactics in 2026”
Declining payments, evolving tactics: Ransomware groups made less money in 2025 despite a 47% increase in publicly reported attacks, pushing them to adopt new approaches to extract payment, namely, DDoS-as-a-Service offerings, insider recruitment, and gig worker exploitation (published January 2026). View the report
The Infoblox 2025 DNS Threat Landscape Report
Attackers increasingly exploit DNS to bypass traditional cybersecurity defenses and deliver malicious content undetected.Over a quarter of newly observed domains were classified as malicious or suspicious, showing how many threats hide in plain sight. Learn more from Infoblox’s 2025 report (published October 2025) View the report
The Microsoft Digital Defense Report 2025
This year’s Microsoft Digital Defense Report showcases the scale and sophistication of today’s cyber threats, the impact of emerging technologies, and the strategies that can be used to defend against them (published October 2025). View the report
The 2025 Comcast Business Cybersecurity Threat Report
Threats are becoming faster and smarter, with adversaries leveraging AI, proxy abuse, and social engineering to outmaneuver defenses. Learn more from the 2025 Comcast Business Cybersecurity Threat Report (published October 2025). View the report
SSSCIP of Ukraine: “Russian Cyber Operations: Analytics for 1H 2025”
On March 23, 2025, the news was dominated by reports of a significant cyberattack on Ukrainian Railways. However, this was not the only cyberattack carried out by UAC-0002 (Sandworm) in the first half of 2025. (published October 2025). View the Report
