Hackers tampered with software updates and open-source tools used by thousands of companies. Source: CSO Online https://www.csoonline.com
Smaller software vendors will be targeted to reach larger enterprises.
What We Saw in 2025
Attackers used AI to speed up phishing, research targets, and launch attacks. Source: SecurityWeek https://www.securityweek.com
2026 Outlook
AI won’t replace hackers—but it will make attacks faster, cheaper, and harder to spot.
Defender Focus
…
Billions in cryptocurrency were stolen, with state-linked groups responsible. Source: Chainalysis https://www.chainalysis.com
Wallets, exchanges, and developer keys will remain prime targets.
Secure private keys Mon…
Mobile phishing and fake apps were used to access corporate systems. Source: Zimperium https://lp.zimperium.com
Phones will be used to steal MFA approvals and cloud access.
Mobile threat defense Block sideloaded apps…
Location
Contact