Threat Intelligence: March 30, 2026
Start your week with a fresh dose of the latest cybersecurity news, trends, and potential threats that can impact you and your industry.
Check out what’s trending below, tune into the top incidents this week in the podcast above, and scroll down for helpful cybersecurity resources you can bookmark.
Cloud and third-party infrastructure are primary entry points: Attackers are increasingly targeting externally exposed systems, partner integrations, and cloud-hosted environments as lower-friction access points compared to core enterprise networks.
Social engineering continues to outperform technical exploitation: Phishing, user-executed commands, and trusted-platform abuse are consistently enabling initial access, often bypassing traditional security controls without requiring vulnerabilities.
Developer and software supply chain ecosystems are increasingly targeted: Adversaries are embedding malicious code into development workflows and open-source ecosystems, creating scalable opportunities for downstream compromise across multiple organizations.
Data exfiltration, not disruption, is the dominant objective: The majority of activity centers on accessing and extracting sensitive data (e.g., credentials, communications, internal records), indicating a continued preference for intelligence gathering and monetization over operational impact.
AI is materially improving attack scale and efficiency: Automation and AI-assisted tooling are enabling attackers to rapidly generate convincing lures, scale campaigns, and reduce the cost and effort required to execute attacks.
Financially motivated attacks remain high-impact and fast-moving: Attacks against financial platforms are designed for immediate monetization, with rapid exploitation and fund movement reducing the window for detection and response.
To learn more about these trends and other important cyber events in the past week, check out the full report below.
Find this helpful? Share this report with others.
Have questions or comments? Reach out to the team.
Resources:
Check out our Cyber Threat Index, a monthly aggregation of trends and threats around the globe.
Our Cyber Threat Attack Map tracks the top attacks of the day.
Read our blogs to learn more about our cutting-edge research.
Learn more about who we are here.
