February 2026
Highlighting a shift toward trust abuse, with attackers leveraging identity and legitimate tools to bypass defenses and operate undetected.
March’s activity made it clear that attackers no longer need exploits when trust and access already exist. This report breaks down how endpoint management, hiring processes, and human interaction were abused at scale.
Inside the report:
Download the full report to understand the evolving threat landscape and how to fortify your defenses.
Questions or comments about the report are welcome! Please email us at [email protected] to get in touch.

Highlighting a shift toward trust abuse, with attackers leveraging identity and legitimate tools to bypass defenses and operate undetected.
Illustrates how quickly geopolitical events translate into real targeting and how emerging automation layers can become unexpected privilege pathways.
This report explores React2Shell’s rapid weaponization and GRU-aligned campaigns targeting misconfigured cloud and edge environments.