Threat Landscape Briefing – March 2026

In this month’s briefing we explore:

  • Stop AI Tools From Becoming Hidden Malware Channels – By Michel Hebert (01:56)
    • Check Point Research demonstrated an “AI-in-the-middle” technique which can be abused as command-and-control (C2) relays.
    • Learn how Info-Tech’s research can help you Get Started With AI Red Teaming.
  • Wynn Resorts Cyberattack: Data Breach Confirmed – By Victor Okorie (11:08)
  • Hackers and Nation-States Leverage AI for Attacks – By Jon Nelson (22:25)
    • Google has identified a troubling trend where adversaries are leveraging generative AI models to accelerate and enhance cyberattack campaigns across their entire lifecycle.
    • Discover how Info-Tech can help you Build an Autonomous Security Delivery Roadmap.
  • Chinese Aligned Threat Actor Breaches Telcos – By Fritz Jean Louis (33:40)
    • The Security Agency of Singapore recently released a report summarizing a multi-agency response to an attack by Chinese state‑aligned threat actor UNC3886.
    • See Info-Tech’s guidance on how to Create a Zero Trust Implementation Plan.

    If you have a question or would like to receive these monthly briefings via email, submit a request here.

Featured Speakers

Jeremy Roberts

Senior Director, Research & Content
Read Bio

Bob Wilson

Cybersecurity Advisor
Read Bio

Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171