This cyber threat intelligence summary highlights the emergence of likely AI-generated malware in live ransomware operations, alongside active zero-day exploitation and large-scale data breaches. Threat actors are combining automated tooling, vulnerability exploitation, and credential-driven access to accelerate intrusion speed and persistence.
The use of large language models in malware development is beginning to materialise in real-world attacks, lowering the barrier to entry and increasing the speed at which malicious tooling can be developed and deployed. At the same time, unpatched vulnerabilities and exposed credentials continue to provide reliable access pathways into enterprise environments.
For further context on active exploitation of Cisco Secure FMC vulnerabilities, refer to the CISA Known Exploited Vulnerabilities Catalog.
Download the full Weekly Cyber Threat Intelligence Summary – 23 March 2026