Latest Internet & Cybersecurity News
Kimwolf Botnet Continues Surge Across Global Networks
The Kimwolf botnet has infected more than two million devices by penetrating residential proxy networks and bypassing local firewalls and internet routers. The malware continues to spread into corporate and government networks, representing a major ongoing threat to networked infrastructure worldwide
.
149 Million Credential Database Discovered and Dismantled
Security analyst Jeremiah Fowler discovered an exposed database containing 149 million account usernames and passwords for Gmail, Outlook, iCloud, Facebook, TikTok, and government accounts, reportedly assembled by infostealer malware. The database was continuously growing and self-organizing before being taken down, though the owner was never identified
.
Ransomware Projected to Cost World $74 Billion in 2026
Global ransomware damage is expected to reach $74 billion in 2026, with attacks increasingly incorporating data theft, extortion threats, and DDoS attacks to maximize victim pressure. The evolving ransomware tactics move beyond simple encryption to multi-stage attacks that compromise sensitive information before demanding payment
.
Three New Threat Groups Target Operational Technology Infrastructure
Dragos identified three new threat groups—AZURITE, PYROXENE, and SYLVANITE—specifically targeting operational technology systems and critical infrastructure. These groups employ sophisticated techniques including fake LinkedIn recruitment profiles, engineering workstation manipulation, and rapid exploitation of edge device vulnerabilities before patches are widely deployed
.
Industrial Ransomware Attacks Surge 49 Percent Year-Over-Year
Dragos tracked 119 ransomware groups impacting 3,300 industrial organizations in 2025, representing a 49 percent increase from 80 groups in 2024. Advanced threat actors like KAMACITE and ELECTRUM are systematically mapping control loops in industrial systems to understand how to manipulate physical processes
.
AI-Powered Cyberattacks Accelerate Threat Landscape Transformation
AI is becoming infused across cybersecurity prevention, detection, response, and governance systems rather than existing as a layered feature. Simultaneously, attackers are deploying AI to assess millions of credential guesses and implement sophisticated credential attacks more efficiently
.
Deepfakes Emerge as Alarming Social Engineering Threat
Deepfakes—realistic fake audio and video created with AI—have become a significant security risk in 2026, with attackers using them to deceive employees and executives into divulging confidential information or transferring payments. These attacks appear authentic and are substantially more convincing than traditional phishing attempts
.
Identity and Credential Attacks Dominate Enterprise Breach Causes
Credential theft, session hijacking, and multi-factor authentication bypass are primary attack vectors in 2026, with the DSCI report highlighting credential abuse as a top cause of enterprise breaches particularly in cloud and remote environments. AI amplifies this threat by automating large-scale credential guessing and implementing fake credential attacks at scale
.
Global Cybersecurity Market Reaches $10.8 Trillion in Annual Damage
Global cybercrime is projected to cost the world $10.8 trillion by 2026, according to Cybersecurity Ventures. Investment in cybersecurity solutions remains strong, with major acquisitions including Google's $32 billion bid for cloud security firm Wiz and Palo Alto Networks' $25 billion acquisition of CyberArk
.
Major Data Breaches Impact Dating Apps, Food Chains, and Healthcare
January 2026 saw significant breaches including Match, Hinge, OkCupid, and Panera Bread compromised by ransomware groups, along with 17.5 million Instagram accounts exposed and Nike investigating an alleged data breach. Healthcare breaches also continued, with TriZetto compromising patient data and the Denton County MHMR Center breach affecting 109,000 patients
.
FCC and Regulators Issue Warnings Over Telecom Ransomware Threats
The FCC warned telecommunications companies of escalating ransomware threats targeting critical communication infrastructure. National cybersecurity agencies are preparing for looming threats in 2026, with state privacy laws expanding across the U.S. and increased focus on managed service provider vulnerabilities
.
Zero Trust Security Model Expands to Non-Human Identities
Zero Trust architecture is expanding beyond user authentication to encompass non-human identities including service accounts, workload identities, API tokens, and OAuth grants. Identity threat detection and response has become essential for detecting token abuse, suspicious session behavior, and privilege path anomalies before they cause operational impact
.