Cyber Intelligence Report: New Year’s Forecast Takes Root
Hackers are working smarter, including using AI. Hackers love to hack the Olympics. North Korea is using QR codes for cyber espionage and is also hacking job seekers.
Hackers are working smarter, including using AI. Hackers love to hack the Olympics. North Korea is using QR codes for cyber espionage and is also hacking job seekers.
CYBER INTELLIGENCECyber IntelligenceCyber Intelligence Report: New Year’s EditionThis report contains selected cybersecurity information from 12 December 2025 to 8 January 2026.This report is TLP:CLEAR1David Swan Director, CSCIS Cyber Intelligence Defence Centre (CIDC)Publisher – CSCIS / David Swan, Director CIDCRelease : 29 May 2025. ContactFor more information on a specific, program, topic, project or media queries…
This report is a series of summaries and forecasts covering the major cyber players and conflicts, beginning with the People’s Republic of China.
Hackers increased attacks on satellites and space industries during the Gaza conflict. Hackers leveraged attacks on “React” software.
Russia-linked crooks bought a bank for Christmas to launder cyber loot”; Trend Micro reports that some cyber scams are now powered by AI
AI is being used to adapt cyberattacks in real time. NETSCOUT is reporting how AI is being used to “supercharge” DDoS attacks. Globally, cyberattacks are surging again.
Canadian Infrastructure Hacked for ‘Thrill and Headlines’.
Former head of the NSA warns that the PRC is hacking critical infrastructure.
Cyber conflicts are key sources for the creation of next-generation malware and/or the primary sources of cyberattacks.
3 cyber conflicts are the most likely sources for the creation of next-generation malware and/or primary sources of cyberattacks.