Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Most Concerning CyberSecurity Statistics From Recent Data

If you've been paying attention to cybersecurity lately, it's hard not to notice just how fast the landscape is shifting. Threats that were once rare a few years ago are now occurring weekly-sometimes daily-and they're targeting larger targets with more severe consequences. It's not just about data theft anymore. Whole systems are being locked up, leaked, or dismantled in hours. The most recent statistics show just how aggressive and sophisticated these attacks have become, and 2025 is shaping up to be a pivotal year for digital security.

Interlock ransomware: what you need to know

Interlock is a relatively new strain of ransomware, that first emerged in late 2024. Unlike many other ransomware families it not only targets Windows PCs, but also systems running FreeBSD. If you are impacted, you will find that your files have not only been encrypted but have also had ".interlock" appended to their filenames. For example, a file named report.xlsx would become report.xlsx.interlock, visibly signaling that it has been encrypted by Interlock.

Ep 9: The New Frontline

Colonial Pipeline was a warning shot. Now, Chinese hackers are inside the digital guts of hundreds of Colonial equivalents across the U.S.—power, water, transportation, and more. The question isn’t if they’re in. It’s why. And what happens next. Is this digital coercion? A warning to stay out of Taiwan? Is an invasion imminent—and are we ready for the cyber fallout that could come with it?

PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands

In recent months, the Netskope Threat Labs team has observed several different campaigns delivering the PureHVNC RAT and its plugins. In 2024, the same malware was observed being delivered via a Python chain, and a few days ago, it was also observed using genAI sites to lure victims. In this blog post, we’ll describe an infection chain using different methods to lure the victim and successfully deliver the PureHVNC RAT.

What Is a Remote Access Trojan (RAT), and Why Should You Care?

According to our 2025 State of the Underground report—in which we take a look back at cybercrime on the deep and dark web from the past year—384 unique varieties of malware were sold in 2024, an increase from 349 in 2023. To determine this number, our research team examined malware and hacking tools for sale on the top three criminal forums, and as a result, we found that Remote Access Trojans (RATs) were the second most common form of malware in 2024, just behind stealer malware.

PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations

Since September 2023, Trustwave’s Threat Intelligence Team has been tracking a large-scale phishing campaign distributed via email, attributed to "Storm-1575". Storm-1575 is known for developing and distributing a PhaaS platform with adversary-in-the-middle (AiTM) capabilities, known as "Dadsec". The team’s recent investigations have revealed that the infrastructure used by Dadsec is also connected to a new campaign leveraging the "Tycoon2FA" Phishing-as-a-Service (PhaaS) platform.