Archive for March 11, 2026

Flashpoint Releases 2026 Global Threat Intelligence Report

Posted in Commentary with tags on March 11, 2026 by itnerd

Flashpoint today announced the release of its 2026 Global Threat Intelligence Report (GTIR), providing security leaders from threat intelligence and vulnerability management teams to physical security professionals and the CISO’s office with a proprietary data-driven, ground-truth view of the converging threats defining today’s hybrid risk environment.

Powered by Flashpoint’s Primary Source Collection (PSC), the 2026 GTIR reveals a sharp rise in AI-related discussions, signaling a rapid shift from criminal curiosity to the active development of malicious agentic frameworks. At the same time, the mechanics of cybercrime have shifted from breaking in to logging in, as attackers leverage stolen session cookies to operate as legitimate users. As technical defenses against encryption harden, ransomware groups are pivoting to the path of least resistance: human trust and identity compromise. Meanwhile, the patching window continues to collapse, with mass exploitation of zero-day vulnerabilities occurring in as little as 24 hours after discovery.

Cybercrime Has Entered the Era of Total Convergence

Between late 2025 and early 2026, adversaries rapidly accelerated adoption of agentic AI frameworks capable of orchestrating autonomous attack chains — automating reconnaissance, phishing generation, credential testing, and infrastructure rotation all without direct human control. This dramatically lowers the cost of experimentation and increases the speed of exploitation.

The 2026 GTIR identifies four converging forces reshaping the global threat landscape:

  • Agentic AI Operationalization — Autonomous systems capable of executing
    end-to-end attack chains at machine speed, increasing both the volume and intensity of
    cybercrime
  • Identity as the Primary Exploit Vector — Billions of compromised credentials fueling
    credential-based intrusions beyond the boundaries of organizational oversight and
    control
  • Compression of the Exploitation Window — Vulnerabilities weaponized within hours
    of disclosure before organizations can understand their exposures or begin to respond
  • The Evolution of Extortion — Ransomware shifting toward identity-driven and
    insider-enabled models, enhancing its effectiveness

Together, these dynamics form a single, high-velocity threat ecosystem where automation,
identity compromise, and vulnerability exploitation reinforce one another.

AI-Related Illicit Activity Surged 1,500% in a Single Month

Flashpoint identified a 1,500% rise in AI-related illicit discussions between November and December 2025 from 362,000 mentions to more than 6 million, signaling a rapid transition from experimentation to operationalized malicious AI frameworks.

Threat actors are actively developing autonomous systems capable of scraping data, rotating infrastructure, adjusting messaging, and learning from failed attempts without continuous human oversight. These agentic systems dramatically increase iteration speed and reduce operational friction for attackers.

Identity Has Become the Primary Exploit Vector

Flashpoint observed over 11.1 million machines infected with infostealers in 2025, generating an inventory of 3.3 billion compromised credentials and cloud tokens.

As a result, the mechanics of cybercrime have shifted from “breaking in” to “logging in.” Attackers now leverage stolen session cookies, tokens, and legitimate credentials to bypass traditional security perimeters entirely, turning digital identity into the connective tissue of modern exploitation. The reality of identity data and the potential for its automation necessitate a shift in how organizations must view their attack surface. Infostealers have shown that it is no longer limited to corporate infrastructure; it now includes employee browsers, personal devices, SaaS platforms, and third-party access.

The Window Between Vulnerability Disclosure and Exploitation Is Vanishing

Vulnerability disclosures increased by 12% year-over-year, with one-third (33%) of disclosed vulnerabilities having publicly available exploit code.

Several high-impact vulnerabilities were mass exploited within hours of disclosure, compressing remediation timelines and raising the stakes for exposure management. In this environment, organizations cannot rely solely on reactive patching cycles; they must incorporate early-warning intelligence to anticipate weaponization trends.

Ransomware Is Pivoting Toward Pure-Play Identity Extortion

Ransomware incidents rose by 53% in 2025, with RaaS groups responsible for more than 87% of attacks.

Rather than relying exclusively on encryption payloads, threat actors are increasingly targeting identity and human trust by recruiting malicious insiders, abusing authorized access, and leveraging credential theft to extort organizations without deploying traditional ransomware binaries.

Who should read the 2026 GTIR?

The report is designed for CISOs, threat intelligence teams, vulnerability management leaders, fraud and risk teams, and executive decision-makers seeking a strategic view of converged cyber and hybrid threats.

Read the full report here: https://flashpoint.io/resources/report/flashpoint-global-threat-intelligence-report-2026

New HP Report Highlights SMB Print Security Gap: 57% say print security is a low priority while trusting printers by default

Posted in Commentary on March 11, 2026 by itnerd

HP today released The Workflow Wakeup report, which takes a comprehensive look at how everyday technologies, including printers, can help small businesses improve security and prepare for the future of work.

Despite growing concern among Enterprise IT leaders, print security remains one of the most overlooked weaknesses in SMB cyber defenses. A new global study of 800 IT Decision Makers and 2,400 knowledge workers shows that 57% of SMBs say print security is a low priority in cybersecurity strategies.

The findings come as print-related risk continues to rise. Separate research from Quocirca showed that 56% of SMBs have reported at least one print-related loss of data in the past year, underscoring how easily this “assumed safe” part of the IT estate can become an exposure point.

Key findings from HP’s SMB study include:

  • Policies don’t work or are bypassed: Over half (55%) of SMBs see users trying to bypass print rules or restrictions, while 60% worry existing document processes could lead to a data or privacy issue. A further 50% lack visibility into who prints what and where, while 45% are unsure if print security meets industry compliance standards.
  • Print security assumed: 66% of knowledge workers assume printers on the office network are secure, while 50% don’t think of printers as a security threat. However, 37% do worry about printing confidential information and the wrong person finding it.

Despite low prioritization, 69% of SMBs acknowledge print security needs improvement, and 65% frequently worry about the security risks outdated systems pose. Their top five printer security concerns include:

  1. Cybersecurity risks linked to connected printers
  2. Confidential documents being left at the printer
  3. Cloud vulnerabilities related to scanned documents
  4. Unauthorized access to print files or queues
  5. Misprinting, misfiling, or mishandling materials

The data also suggests these risks are addressable when organizations put the right controls in place. Of SMBs that have adopted smart printing technology, 88% say that smart printing has made their organization more secure. Respondents cite three key reasons: providing clearer visibility into printing and scanning activity across users and locations (89%), meeting compliance and security standards (86%), and enforcing smart rules and restrictions more effectively (85%).

Please visit this blog to learn more about the security findings: https://www.hp.com/us-en/newsroom/blogs/2026/security-threat-small-business-at-risk

Russia-linked hackers breach Signal and WhatsApp accounts

Posted in Commentary with tags on March 11, 2026 by itnerd

Reuters is reporting that Russia-linked hackers have breached the messaging accounts of officials, journalists, and activists using apps including Signal and WhatsApp, according to a warning issued by the Dutch government. Something that I have covered here in the past.

Authorities say the campaign involved targeted account takeovers that allowed attackers to access private communications and potentially monitor sensitive conversations. The activity highlights how threat actors can gain access to messaging platforms without breaking encryption by compromising accounts or exploiting weaknesses in how applications and devices are trusted.

Mark Mazur, Field CTO, Approov Mobile Security had this to say:

“Account takeover attacks often exploit applications’ failure, particularly messaging applications, to accurately assess the risk of tampered mobile applications and devices.

“Security teams need to treat mobile applications and the devices they run on as potential sources of threats. Cloning and modifying an app downloaded from an app store, on a rooted or jailbroken device is an increasing risk due to AI-powered reverse engineering. RASP, Attestation and cryptographically signed API messages should be used in mobile applications to minimize these risks.”

Having strict policies on the use of personal for business use, as well as using MDM products to manage apps on devices and detect jailbroken devices are some ways to keep users safe. Organizations should look at options like those to mitigate the potential threat that this scenario poses.