Ontinue Threat Intelligence Report Reveals Attackers Increasingly "Log In," Rather Than Breaking In
Ontinue's 2H 2025 report reveals a 72% surge in stolen credential listings linked to LummaC2 and over 7,000 ransomware attacks worldwide, driven by identity-based intrusions.
7 Articles
7 Articles
AI Supercharging Cyber-attacks And Their Defence, PwC Report Finds
March 30, 2026, London — Artificial intelligence is increasingly being used by both attackers and defenders, and threat actors across a wide range of motivations found new ways to accelerate through the blind corners of edge devices, supply chains and cloud ecosystems, PwC’s Annual Threat Dynamics 2026: Cyber threats in motion report found. Identity is the key battleground Adversaries across a wide range of motivations are increasingly choosing …
Attackers Aren’t Breaking In Anymore. They’re Logging In. Inside the Identity-Driven Cyber Threat Surge of 2025
The defining cybersecurity story of late 2025 is not about zero-days or sophisticated exploits. It is about access. Attackers are no longer forcing their way into networks. They are signing in.According to new threat intelligence report by Ontinue, the industry has crossed a structural tipping point where identity has become the central battleground. Credentials, tokens, and machine identities now function as both the entry point and the control…
The new Ontinue Threat Intelligence Report proves that the theft of access data is increasing. The post burglary was yesterday: Hackers simply log in today a appeared first on IT-I-Ko.
Identity theft becomes the new perimeter as attackers bypass security defenses
A fundamental shift in how cyberattacks are carried out is well underway as threat actors now increasingly log in using stolen credentials rather than breaking through traditional defenses. That’s according to a new report out today from Swiss artificial intelligence-powered managed extended detection and response company Ontinue AG. Its 2H 2025 Threat Intelligence Report finds that identity […] The post Identity theft becomes the new perimeter …
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium



