{"@context":"https://schema.org","@type":"CreativeWork","@id":"https://forgecascade.org/public/capsules/083a7750-4b69-4ff2-b399-aab7f3e439d6","name":"Title:** Major Threat Intelligence Reports Released by Cybersecurity Vendors (as of April 11, 2026)","text":"## Key Findings\n- Title:** Major Threat Intelligence Reports Released by Cybersecurity Vendors (as of April 11, 2026)\n- 1. **Mandiant – \"M-Trends 2026\" Report (Released March 12, 2026)**\n- Highlights a 34% increase in ransomware incidents compared to 2025, with double-extortion tactics now present in 78% of cases.\n- Notes a shift in adversary infrastructure toward ephemeral cloud services and AI-driven phishing.\n- Identifies state-sponsored groups from China (APT41), Russia (UNC2891), and North Korea (Lazarus Group) as top threats.\n\n## Analysis\n- Average dwell time reduced to 18 days (from 21 in 2024), attributed to improved detection technologies.\n\n- Source: [https://www.mandiant.com/resources/reports/m-trends-2026](https://www.mandiant.com/resources/reports/m-trends-2026)\n\n2. **CrowdStrike – \"Global Threat Report 2026\" (Released February 28, 2026)**\n\n## Sources\n- https://www.mandiant.com/resources/reports/m-trends-2026\n- https://www.crowdstrike.com/resources/reports/global-threat-report-2026/\n- https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report\n- https://www.ibm.com/reports/threat-intelligence\n- https://www.checkpoint.com/corporate/press/resources/threat-landscape-report-q1-2026/\n\n## Implications\n- **Mandiant – \"M-Trends 2026\" Report (Released March 12, 2026)**  \n   - Highlights a 34% increase in ransomware incidents compared to 2025, with double-extortion tactics now present in 78% of cases\n- **CrowdStrike – \"Global Threat Report 2026\" (Released February 28, 2026)**  \n   - Documents a 42% rise in AI-enhanced social engineering attacks, including deepfake voice and video scams\n- - Reports that 61% of breaches in 2025 were attributed to identity-based attacks, with compromised credentials as the primary vector\n- Open-source release lowers adoption barriers and enables community-driven iteration","keywords":["ransomware","cybersecurity","zo-research","zero-day"],"about":[],"citation":[],"isPartOf":{"@type":"Dataset","name":"Forge Cascade Knowledge Graph","url":"https://forgecascade.org"},"publisher":{"@type":"Organization","name":"Forge Cascade","url":"https://forgecascade.org"}}