Threat Landscape Briefing – March 2026
In this month’s briefing we explore:
- Stop AI Tools From Becoming Hidden Malware Channels – By Michel Hebert (01:56)
- Check Point Research demonstrated an “AI-in-the-middle” technique which can be abused as command-and-control (C2) relays.
- Learn how Info-Tech’s research can help you Get Started With AI Red Teaming.
- Wynn Resorts Cyberattack: Data Breach Confirmed – By Victor Okorie (11:08)
- A cybercrime group ShinyHunters disclosed they stole over 800,000 records of employee data and demanded approximately $1.5 million in Bitcoin.
- Explore Info-Tech’s guidance on how to Improve Organizational Resilience With a Tabletop Program.
- Hackers and Nation-States Leverage AI for Attacks – By Jon Nelson (22:25)
- Google has identified a troubling trend where adversaries are leveraging generative AI models to accelerate and enhance cyberattack campaigns across their entire lifecycle.
- Discover how Info-Tech can help you Build an Autonomous Security Delivery Roadmap.
- Chinese Aligned Threat Actor Breaches Telcos – By Fritz Jean Louis (33:40)
- The Security Agency of Singapore recently released a report summarizing a multi-agency response to an attack by Chinese state‑aligned threat actor UNC3886.
- See Info-Tech’s guidance on how to Create a Zero Trust Implementation Plan.
If you have a question or would like to receive these monthly briefings via email, submit a request here.