Ethical Hacking News
The threat landscape has undergone significant transformations over the past year, with various tactics, techniques, and procedures (TTPs) being employed by malicious actors to breach the security of organizations worldwide. Google's M-Trends report highlights the growing sophistication and creativity of threat actors in their attempts to gain unauthorized access to sensitive information.
The threat landscape has evolved significantly over the past year, with increased use of tactics like voice phishing and zero-day exploits. Voice phishing is a growing threat, accounting for 11% of all attacks last year, as attackers use real-time conversations to trick victims into divulging sensitive information. Zero-day exploits are becoming increasingly sophisticated and prevalent, accounting for 32% of successful attacks in the past year. Ransomware and data theft gangs are getting more sophisticated, using "hand-offs" to gain access to systems and steal sensitive information within under 30 seconds. Attackers are increasingly targeting cloud environments, with voice phishing being the top tactic used when breaking into these systems. The report emphasizes the need for robust cybersecurity measures, including endpoint protection, vulnerability management, and incident response planning.
The threat landscape has undergone significant transformations over the past year, with various tactics, techniques, and procedures (TTPs) being employed by malicious actors to breach the security of organizations worldwide. According to Mandiant Consulting at Google Cloud, a comprehensive analysis of more than 500,000 hours of incident response engagements conducted around the world last year has revealed the evolving nature of cybersecurity threats.
The report, which is part of Mandiant's annual M-Trends series, highlights the growing sophistication and creativity of threat actors in their attempts to gain unauthorized access to sensitive information. One of the most striking trends observed in the report is the increasing use of interactive social engineering tactics by cybercriminals, including voice phishing, to trick individuals into divulging confidential information or performing certain actions that compromise security.
Voice phishing has emerged as a significant threat, with attackers using voice-based phishing to gain initial access to systems, accounting for 11 percent of all attacks last year. This tactic involves the use of real-time conversations to steer victims towards divulging sensitive information or executing malicious commands on their own computers. According to Google's VP of Mandiant Consulting, Jurgen Kutscher, "It's the interactive ones, the voice-based ones, that are really creating a new challenge."
Another trend highlighted in the report is the use of zero-day exploits by threat actors to breach network edge devices such as firewalls, routers, and VPNs. These devices often do not have endpoint security products installed, making them vulnerable to attacks that can evade defenders. The use of zero-day bugs to exploit vulnerabilities has accounted for 32 percent of successful attacks in the past year.
The report also highlights the growing sophistication of ransomware and data theft gangs, which are increasingly using "hand-offs" to gain access to systems and steal sensitive information. In these hand-offs, one individual or crew gains initial access and then hands it over to another group, often within under 30 seconds. This trend has been dubbed "living on the edge" by Kutscher.
Furthermore, the report notes that attackers are increasingly targeting cloud environments, with voice phishing being the top tactic used when breaking into these systems. The use of zero-day bugs and exploits remains a significant threat to cloud security, with firewall vulnerabilities accounting for 21 percent of successful attacks last year.
The report's findings have significant implications for organizations worldwide, emphasizing the need for robust cybersecurity measures, including endpoint protection, vulnerability management, and incident response planning. As Kutscher noted, "What is interesting is the evolution of how they're leveraging these edge devices... It's a new challenge that we need to address."
In conclusion, the M-Trends report highlights the evolving landscape of cybersecurity threats, with interactive social engineering tactics, zero-day exploits, and hand-offs becoming increasingly sophisticated and prevalent. Organizations must adapt their security strategies to address these emerging trends and remain vigilant in the face of an ever-evolving threat landscape.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Evolving-Landscape-of-Cybersecurity-Threats-Trends-and-Insights-from-Googles-M-Trends-Report-ehn.shtml
https://go.theregister.com/feed/www.theregister.com/2026/03/23/voice_phishing_skyrockets_as_smooth/
https://www.theregister.com/2026/03/23/voice_phishing_skyrockets_as_smooth/
https://x.com/TheRegister/status/2036097307683475638
Published: Mon Mar 23 12:05:28 2026 by llama3.2 3B Q4_K_M