- Our research sheds light on the tools and techniques used by TeamTNT and the potential impact of the group’s sundry malicious activities.Our two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.ICS endpoint security has become more important as the interconnection between IT and OT continues to grow. Our research shares the status of global industrial systems in terms of security against both known and new threats that hound ICS endpoints.Modern ransomware like Nefilim present new challenges and security concerns for enterprises across the world. How do these new families differ from traditional ransomware? And what can organizations do to mitigate risks?The 4G/5G campus network demonstrates the growing role of telecom technologies in different industries. Organizations and IT/OT experts need to keep up with these changes and consider their security implications.Industrial control systems (ICSs) are integral to smart factories, but gaps in the security of these systems could be exploited by malicious actors for cyberattacks. Enterprises should therefore address weak links in ICSs in their cybersecurity strategy.The use of connected cars continues to grow. While the vehicles’ link to technologies such as 5G and the cloud present opportunities for improving efficiency and safety, it can also attract risks from threat actors as well.We analyzed the tools, relationships, and behaviors used in a long-standing intrusion of a company after its security team observed malicious C&C traffic.We discuss the present state of the malicious uses and abuses of AI and ML and the plausible future scenarios in which cybercriminals might abuse these technologies for ill gain.