Menu

Our Scans · (FS.8.07) Cybersecurity · Weekly Summary


  • [New] Banks and fintech companies across Latin America face heightened risk as social-engineering and AI-assisted malware converge. Innovate Cybersecurity | Threat Advisory, News, and Eve
  • [New] Cybersecurity experts recommend deploying YARA and Sigma detection rules, restricting unauthorized DoH providers, and enforcing segmentation to counter threats that could compromise sensitive operations in over 50 targeted organizations. GeopoliticsUnplugged Substack
  • [New] Insider threats, amplified by AI's accessibility to sophisticated malware, are expected to rise by 2026. WebProNews
  • [New] With 74% of cybersecurity professionals reporting AI-powered threats as a major challenge, per findings from Darktrace, organizations are grappling with corrupted training data and poisoned models that yield flawed outcomes. WebProNews
  • [New] AI-driven social engineering and ransomware/extortion attacks are viewed as the most significant cyber threats facing organizations in 2026. ISACA
  • [New] Cybersecurity models in 2025 will assume that every user, device, or system could be a threat. SaGeminieTech
  • [New] In 2025, the biggest breakthroughs will come from AI, robotics, cybersecurity, quantum computing, biotechnology, and clean energy. SaGeminieTech
  • [New] Israeli cybersecurity startup Irregular, with $80 million in funding and rising revenues, has become a leading AI security lab testing major models like ChatGPT, Gemini, and Claude for vulnerabilities before they reach the public. HUMAI
  • [New] The world will spend $522 billion on cybersecurity products and services in 2026. Cybercrime Magazine
  • [New] Today, projections from Cybersecurity Ventures already warn of a sharp escalation: global ransomware damage could reach $57 billion in 2026, and by 2031, costs could soar beyond $275 billion annually. Cybercrime Magazine
  • [New] The average cost of a ransomware breach in 2025 is projected to exceed $6 million, not including reputational damage. thebusinessbrilliance
  • [New] In 2025, threats like ransomware and social engineering are expected to become even more sophisticated, as threat actors leverage advanced techniques to bypass traditional security measures and impact businesses. CFC
  • [New] Cyble's data from ODIN and AMIBreached led to a prediction that vulnerabilities in public-facing applications would remain a dominant intrusion vector, with ransomware groups continuing to exploit zero-day flaws throughout 2025. Cyble
  • [New] New cybersecurity rules will soon force messaging platforms, including WhatsApp, Signal, and Telegram, to automatically end desktop and web sessions every six hours. / India Business Today
  • [New] Google's Cybersecurity Forecast 2026 expects threat groups to adopt AI across reconnaissance, exploitation and malware development, while AI enabled tools can also reshape how cyber security teams defend the organization. / China Black Arrow Cyber Consulting
  • [New] In the next 3 to 5 years, the cybersecurity landscape will be marked by an unprecedented convergence of emerging technologies, regulatory shifts, and global instability. Rapid7
  • [New] Stricker cybersecurity regulations and greater awareness of cyber threats are driving the adoption of SSE. Precedence Research
  • Infinite opportunities of Digital transformation - Businesses in 2025 need to adapt technologies like generative AI, cloud computing, and cybersecurity automation to advance progressively. CTO Bridge
  • New global cybersecurity rankings show stark differences in defensive maturity - some countries lead on national cyber preparedness while many lag, exposing supply-chain and cross-border risk. News, Events, Advertising Options
  • The SP 800-172 controls are intended for safeguarding information that may be the target of Advanced Persistent Threats, which are highly capable, resourceful, and patient cybersecurity threat actors generally associated with nation-states such as China, Russia, Iran, or North Korea. JD Supra
  • Threat actors are leveraging a sophisticated two-pronged strategy to evade detection: packaging the malware to obfuscate its function for a low static detection rate, and using code-signing certificates via an abuse of Microsoft's Trusted Signing system. CYDOME
  • As cyber-attacks on Swedish organizations intensify - whether from foreign adversaries, financially motivated cybercriminals, or independent threat actors - the need for robust cybersecurity strategies, risk mitigation frameworks, and enhanced national defences has never been greater. Cybersecurity Conferences 2025 - 2026 | Over 3.4K Event

Last updated: 11 December 2025



Please stand by...

The magic is happening, but it might take a couple of minutes.

Login