Latest Internet & Cybersecurity News

đź“…March 5, 2026 at 1:00 PM
AI accelerates cyberattacks to 29-minute breakouts; Western coalition launches 6G security guidelines; Microsoft, Europol dismantle Tycoon 2FA phishing kit; NZ unveils new cyber strategy amid rising threats.
1

AI Cuts Cyberattack Breakout Time to 29 Minutes, CrowdStrike Report Reveals

CrowdStrike's 2026 Global Threat Report indicates AI is speeding up cyberattacks, reducing median breakout time to 29 minutes with a fastest case of 27 seconds.Source 1 Attackers exploited AI tools in over 90 organizations to steal credentials and deploy ransomware, while state actors like Russia-linked FANCY BEAR and North Korea's FAMOUS CHOLLIMA used AI for malware and crypto thefts totaling $1.46 billion.Source 1 Cloud intrusions rose 37%, zero-day exploits hit 42%, and fake CAPTCHA pages surged 563%.Source 1

2

Coalition of Seven Western Nations Launches 6G Cybersecurity Guidelines

The Global Coalition on Telecoms (GCOT), including Australia, Canada, Japan, UK, US, Finland, and Sweden, released voluntary 6G Security and Resilience Principles at Mobile World Congress 2026.Source 2 The guidelines cover security-by-design for virtualized networks, AI-native features, supply chains, and resilience against cyber-physical attacks, aiming for 2029-2030 rollouts.Source 2 Industry partners like Ericsson, NVIDIA, Nokia, and Qualcomm support the initiative to ensure secure multi-vendor integration.Source 2

3

Microsoft and Europol Dismantle Tycoon 2FA Phishing Kit in Global Operation

Microsoft and Europol have taken down the Tycoon 2FA phishing kit, used in widespread cyber attacks targeting credentials worldwide.Source 3 The kit facilitated sophisticated phishing bypassing two-factor authentication, impacting global victims.Source 3 This action disrupts a major tool in the cybercrime ecosystem as reported on March 4, 2026.Source 3

4

Microsoft Welcomes New Zealand's Cyber Security Strategy 2026–2030

New Zealand launched its Cyber Security Strategy 2026–2030, focusing on understanding threats, prevention, response, and partnerships amid AI-driven risks.Source 4 Microsoft praises the strategy for aligning with its cybersecurity approaches, emphasizing resilience for critical infrastructure and innovation.Source 4 The plan leverages local Azure data centers certified for public sector security to boost digital protection.Source 4

5

State Actors Ramp Up AI Use in Cyber Operations, CrowdStrike Warns

China-linked activity rose 38% in 2025, targeting logistics with 85% increase, exploiting vulnerabilities for immediate access.Source 1 North Korea's FAMOUS CHOLLIMA doubled incidents, while PRESSURE CHOLLIMA executed a record $1.46 billion crypto heist.Source 1 Russia’s FANCY BEAR deployed LLM-enabled LAMEHUG malware for automated reconnaissance.Source 1

6

Zero-Day Vulnerabilities Exploited in 42% of Attacks Before Disclosure

CrowdStrike reports 42% of vulnerabilities were zero-days used for initial access, code execution, and escalation.Source 1 State-linked cloud attacks surged 266% for intelligence gathering.Source 1 This trend underscores the need for proactive defenses in rapidly evolving threat landscapes.Source 1

7

Fake CAPTCHA Pages Surge 563% as New Malware Delivery Vector

Attackers shifted to fake 'I'm not a robot' CAPTCHA pages, up 563%, to trick users into malware downloads over outdated browser prompts.Source 1 Criminal groups favor these lures for their effectiveness in evading detection.Source 1 Organizations must enhance user training and detection mechanisms.Source 1

8

AI Tools Emerge as New Attack Entry Points in Enterprises

In over 90 cases, attackers injected malicious prompts into legitimate generative AI tools to generate credential-stealing commands and cryptocurrency theft scripts.Source 1 Flaws in AI platforms enabled ransomware and fake servers mimicking trusted services.Source 1 This highlights AI as both a weapon and vulnerability.Source 1

9

Cloud Intrusions Jump 37%, State Actors Target for Espionage

Overall cloud-focused attacks increased 37%, with state actors seeing a 266% rise, primarily for data exfiltration and intelligence.Source 1 Two-thirds of China-linked exploits provided instant access, 40% on edge devices.Source 1 Defensive strategies must prioritize cloud visibility and segmentation.Source 1

10

GCOT Principles Guide 6G Toward AI-Native Secure Networks

GCOT's four security and four resilience principles address 6G's virtualized functions, disaggregated architectures, and native AI support per IMT-2030 framework.Source 2 They promote supply chain security, reliability, and multi-vendor integration.Source 2 Experts like NVIDIA's Ronnie Vasishta emphasize translating principles into AI-RAN platforms.Source 2

11

New Zealand Strategy Aligns with Global Cyber Norms for AI Era

The strategy's objectives mirror Microsoft's focus on awareness, resilience, and collaboration, supporting international norms.Source 4 It positions NZ as a digital leader with hyperscale cloud investments.Source 4 Microsoft commits global threat intelligence to aid implementation.Source 4