Adversaries weaponize and target AI at scale:
- How adversaries use AI for deception
- Key insights into hands-on-keyboard attacks
- Why speed is the adversary’s top advantage
Vishing is on track to double last year's volume3
of the top 10 most commonly used MITRE ATT&CK® techniques were Discovery techniques1
surge in cloud intrusions2
increase in cloud intrusions attributed to China-nexus adversaries1
increase in hands-on-keyboard intrusions1
of hands-on-keyboard intrusions were malware-free1
Meet the world’s most dangerous adversaries — and the tradecraft they don’t want you to see.
1. In the last 12 months
2. In the first half of 2025 compared to all of 2024
3. By the end of 2025