SecurityBrief Canada - Technology news for CISOs & cybersecurity decision-makers

Threat actors stories

Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last week
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Ai ddos storm dark data streams overwhelming global internet map

AI-fuelled DDoS attacks surge past eight million globally

Last week
#
firewalls
#
ddos
#
network security
AI-driven botnets fuel eight million DDoS attacks in late 2025, as multi-vector assaults hit 30 Tbps and strain global critical services.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last week
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last week
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last week
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Dark office pc abstract code symbolizing fileless malware night scene

Attackers abuse Deno runtime to deploy fileless malware

Last week
#
edr
#
cybersecurity
#
keylogging
Hackers are abusing the trusted Deno JavaScript runtime to run fileless CastleRAT malware solely in memory and evade endpoint defences.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Last week
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Industrial control room with digital shield protecting infrastructure

Claroty named Leader in 2026 Gartner CPS security report

Last week
#
iot security
#
cx
#
martech
Claroty again named a Leader in Gartner's 2026 CPS Protection Platforms Magic Quadrant as industrial cyber-physical threats intensify.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last week
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Last week
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

This month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

This month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

This month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

This month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Hannah perez

Why cybersecurity needs better storytelling; and more women telling It

This month
#
digital transformation
#
advanced persistent threat protection
#
risk & compliance
Cybersecurity's future hinges on clear storytelling - and more women's voices - to turn technical risks into business-critical narratives.
Logos

Tycoon 2FA phishing service disrupted in EU crackdown

This month
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Cluttered small business it office unattended windows laptops dust

Slow patching leaves SMB endpoints exposed for weeks

This month
#
it automation
#
risk & compliance
#
edr
Acronis finds SMBs patch Microsoft flaws in about eight days, but the slowest endpoints stay exposed to known bugs for over five weeks.
Ciso overseeing ai security robots in nighttime office scene

Microsoft warns of AI agent risks in Cyber Pulse brief

This month
#
manufacturing
#
digital transformation
#
physical security
Microsoft's new Cyber Pulse briefing warns ungoverned AI agents and 'double agents' pose rising security and compliance risks for firms.
Office worker ai cyberattack popups warning icons shadowy web

HP warns of AI-fuelled 'flat-pack' cyberattacks surge

This month
#
malware
#
uc
#
phishing
HP reports a surge in AI-powered “flat-pack” cyberattacks as criminals trade sophistication for speed, low cost and mass customisation.
Ai brain circuit shields security icons blocking red attacks

F5 Labs unveils monthly AI model security leaderboards

This month
#
data protection
#
devops
#
application security
F5 Labs launches monthly AI security leaderboards, ranking popular models on new indices of risk, resilience and cost under live attack.