Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#phishing

🕳️
Vulnerabilities & CVEs

Fake FIFA Sites Fleece Fans

The 2026 FIFA World Cup hype is a goldmine for scammers. They're setting up fake sites, mimicking official channels to steal your money and identity.

5 min read 14 hours ago
Abstract digital network graphic with glowing nodes and lines, representing cyber intrusion.
Nation-State Threats

Ghostwriter's Prometheus Play: Ukraine Govt Targeted with New Phishing Malware

Belarusian threat actor Ghostwriter is leveraging Ukraine's own Prometheus learning platform as a fresh vector for phishing attacks against the nation's government entities. The sophisticated operation employs a multi-stage JavaScript payload designed for deep system reconnaissance and Cobalt Strike deployment.

5 min read 17 hours ago
A digital map showing interconnected nodes, with some glowing red to represent compromised systems.
Nation-State Threats

Cloud Atlas Shifts Tactics [2026]

The notorious Cloud Atlas group is back, wielding new malware and a familiar playbook of SSH tunneling. Threat Digest unpacks their latest moves and what it means for cybersecurity.

6 min read 1 day, 12 hours ago
Abstract representation of interconnected AI nodes and data streams, with a shield overlay symbolizing security.
Threat Intelligence

AI Security: Beyond IT to Core Business Risk

The digital world is morphing, and AI isn't just a new tool – it's the engine of a fundamental platform shift. While opportunity abounds, so do unprecedented threats.

5 min read 5 days, 6 hours ago
A visual representation of a digital network with highlighted points indicating a phishing attack unfolding within a sandbox environment.
Security Tools

Phishing's New Face: 40 Seconds to Spot Exposure

Forget the slow crawl of traditional incident response. We're talking about a seismic shift where a single click can unravel an entire business, and the crucial window to act is measured in mere seconds.

7 min read 5 days, 8 hours ago
A generic image representing data security or a UK government building.
Data Breaches

UK Fines Water Supplier $1.3M for Massive Data Exposure

A significant data breach affecting over 664,000 customers and employees has resulted in a substantial fine for a UK water supplier. The incident highlights persistent vulnerabilities in critical infrastructure.

5 min read 6 days, 4 hours ago
Abstract representation of AI code with digital circuits and security lock icons
Threat Intelligence

AI Learns to Code Maliciously

AI is no longer just a coding assistant; it's becoming a weapon. This week's threat intel report reveals how advanced AI models are being weaponized, alongside significant data breaches and critical zero-day exploits.

6 min read 6 days, 10 hours ago
Illustration of a truck being digitally intercepted by code.
Threat Intelligence

Freight Heists Go Digital

Forget movie-style truck hijackings. The new frontier of cargo crime is digital, employing the very same playbook as sophisticated ransomware gangs. Millions in goods are vanishing.

6 min read 1 week, 2 days ago
Abstract digital network visualization with nodes and connections, representing cyber threats targeting a specific region.
Nation-State Threats

Ghostwriter's Geofenced PDFs: Ukraine Faces New Cyber Offensive

The persistent Belarus-aligned Ghostwriter threat group has escalated its operations, now employing geofenced PDF phishing targeting Ukraine's government. This sophisticated approach aims to evade detection and deploy potent malware.

6 min read 1 week, 2 days ago
Abstract network visualization showing data flow with points of vulnerability and resilience.
Threat Intelligence

Modern Attacks Bypass Defenses: Security Isn't Enough

Prevention alone isn't cutting it anymore. Modern cyberattacks are designed to slip past your perimeter, leaving organizations scrambling. This deep dive explores why recovery is the new frontier of cybersecurity.

5 min read 1 week, 3 days ago
🎯
Threat Intelligence

Operation HookedWing: 500+ Orgs Breached in 4-Year Phishing Assault

A stealthy, multi-year phishing operation has compromised over 500 organizations. Operation HookedWing, documented since 2022 but active longer, continues to adapt and ensnare victims.

6 min read 1 week, 5 days ago
Screenshot of a fake iCloud storage full warning email with a link to pay.
Threat Intelligence

Fake iCloud Alerts Exploit Urgency, Demand Payment

A persistent phishing scam, masquerading as a critical iCloud storage alert, is back with a dangerous twist: it's now demanding payment to prevent data loss.

4 min read 1 week, 6 days ago
Page 1 of 3 Older →

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details