Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco sees vulnerability exploitation top phishing in Q4
    Cybersecurity

    Cisco sees vulnerability exploitation top phishing in Q4

    adminBy adminJanuary 31, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco sees vulnerability exploitation top phishing in Q4
    Share
    Facebook Twitter LinkedIn Pinterest Email

    This audio is auto-generated. Please let us know if you have feedback.

    Dive Brief:

    • The share of cyberattacks that relied on vulnerability exploitation as the initial means of access dropped in the fourth quarter of 2025, although it still remained high, researchers from Cisco’s Talos threat intelligence team said in a blog post published on Thursday.
    • Nearly 40% of the incidents to which Cisco responded in Q4 began with the exploitation of public-facing network services, compared with 62% in the third quarter.
    • Cisco also saw fewer ransomware attacks in Q4 (13% of all incidents) compared with Q3 (when it was 20%) and the first half of the year (when it was nearly 50% in both Q1 and Q2).
    • Notably, Cisco said it “did not respond to any previously unseen ransomware variants.”

    Dive Insight:

    While vulnerability exploitation remained high in Q4, there were no major exploitation campaigns that accounted for the lion’s share of the activity, Cisco said — a departure from Q3, when the ToolShell campaign unleashed a wave of attacks. Still, there were multiple attacks targeting a flaw in Oracle’s E-Business Suite and a vulnerability in React Server Components.

    One threat actor exploited the Oracle flaw in an attack that Cisco said was “likely related  to a large-scale campaign aiming to extort executives.” Another threat actor exploited the React flaw to deploy cryptocurrency mining malware. Cisco said cryptomining was “one of the many types of operations we expect to see as threat actors race to quickly capitalize on unpatched systems.”

    Phishing ranked second behind exploitation on the list of most common initial access methods that Cisco observed, and the company described a campaign targeting a victim community that rarely features in threat intelligence reports: Native American tribal organizations.

    In one case, Cisco analysts observed a threat actor using compromised email accounts and websites to distribute malware in believable messages. “While no lateral movement beyond email account abuse could be confirmed,” researchers wrote, “the exposure of additional accounts within the victim’s environment and external recipients indicates the potential for a wider impact. ”

    Cisco also observed a second phishing campaign against tribal organizations that shared characteristics — including indicators of compromise — with the earlier attacks.

    On the ransomware front, Cisco said the Qilin ransomware gang “remains dominant and was observed in the majority of ransomware attacks,” although researchers also responded to attacks using DragonForce ransomware, which the company said it had not seen “for over a year.”

    Government agencies were the most-targeted sector in Cisco’s Q4 incident response engagements — a continuation of a Q3 trend — followed by telecommunications, education and healthcare.

    Based on its incident response findings, Cisco recommended that organizations routinely patch systems, enable robust logging, practice rapid response and “implement detections to identify MFA abuse and [enable] strong MFA policies.”

    Cisco exploitation Phishing sees Top vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle tests third-party endorsements in search ads
    Next Article EFF calls out major tech companies on encryption promises
    admin
    • Website

    Related Posts

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026

    The Complete Guide To Agentic Commerce

    April 19, 2026

    I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,399)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,674)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026

    The Complete Guide To Agentic Commerce

    April 19, 2026
    Most Popular
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    • If X Isn’t Working, It’s Not Just You
    • Recently leaked Windows zero-days now exploited in attacks
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.