Pellera Cybersecurity Threat Intel Report

 

The Business Enablers That Became the Attack Surface

March’s activity made it clear that attackers no longer need exploits when trust and access already exist. This report breaks down how endpoint management, hiring processes, and human interaction were abused at scale.

Inside the report:

  • Intune’s wipe capability used to reset 80,000 enterprise endpoints
    Workforce infiltration tied to sanctioned North Korean fraud networks
    Phone‑based social engineering driving widespread initial access

Download the full report to understand the evolving threat landscape and how to fortify your defenses.

Questions or comments about the report are welcome! Please email us at [email protected] to get in touch.

Pellera Threat Intel Report

Past Issues

February 2026

Highlighting a shift toward trust abuse, with attackers leveraging identity and legitimate tools to bypass defenses and operate undetected.

 

January 2026

Illustrates how quickly geopolitical events translate into real targeting and how emerging automation layers can become unexpected privilege pathways.

 

December 2025

This report explores React2Shell’s rapid weaponization and GRU-aligned campaigns targeting misconfigured cloud and edge environments.