• Fake Google Forms Job Scam Harvesting Credentials

    Overview

    A phishing campaign is impersonating Google Forms to steal Google account credentials using fake job opportunity lures. Victims are directed to URLs resembling legitimate Google Forms pages (e.g., forms.google.ss-o[.]com) that generate personalized links and present a convincing form requesting personal details. Clicking “Sign in” redirects users to a credential-harvesting page hosted on a known phishing domain.

    Masquerading adversary-in-the-middle (AiTM) credential harvesters continue to evolve and remain an effective method of initial access and credential theft. Organisations should continue strengthening and updating email policies and filtering controls. User awareness remains crucial for reporting and detecting these phishing attacks early.


    Changes in Behaviour

    This campaign shows increased sophistication through personalized phishing URLs, realistic Google Forms cloning, and redirection tactics that hide the payload from researchers.

    Attackers leverage job-themed lures and likely distribute links via targeted email or LinkedIn outreach, aligning with ongoing trends exploiting remote work opportunities.

    This aligns with a broader trend of actors using social engineering through job offers or advertisements to exploit user trust via trusted platforms such as Google and LinkedIn. Similar techniques have been observed in campaigns conducted by groups such as Lazarus, which have orchestrated sophisticated social engineering operations via LinkedIn.


    Campaign Behaviour

    Threat actors use domain impersonation and dynamic link generation to tailor phishing pages to individual victims. The fake form mimics Google branding and legal disclaimers to build trust, while the sign-in process redirects victims to a credential harvesting site.

    Redirecting suspicious visits to Google search pages helps prevent detection and analysis.


    Indicators of Compromise (IOCs)

    • forms.google.ss-o[.]com
    • id-v4[.]com (inactive)
    • generation_form.php hosted on phishing infrastructure
    • Fake Google Forms job application pages requesting Google sign-in credentials

    Note: Assume additional infrastructure and IOCs may be in use.


    Recommendations to Organisations and Defenders

    Budosec is a solo-owned blog and is not sponsored by any vendors. The advice provided is vendor-neutral. Exact remediation steps will depend on your tooling; however, the guidance below applies broadly.

    Detection Opportunities

    See my GitHub for detection and hunting queries you can use for this campaign

    Initial indicators

    • User reports suspicious email
    • Clicks on shortened or suspicious URLs
    • Navigation to domains with malicious or newly registered reputation

    Further downstream indicators

    • Anomalous sign-ins from unseen locations
    • Impossible travel events
    • Suspicious inbox forwarding rules created
    • New MFA method or device added

    Creating detections that correlate multiple events within a short timeframe is effective. Threat actors typically move quickly to establish persistence, expand access, and exfiltrate data.


    Threat Hunting Guidance

    Using DNSTwist, defenders can generate permutations of suspicious Google domains and perform a 90-day hunt across the environment (depending on log retention).

    If using Microsoft Sentinel or similar platforms, run retrospective searches for these domains.

    If IOCs are found:

    • Remove malicious emails from user inboxes
    • Block associated domains and infrastructure

    If click-through activity is observed, follow up with the user immediately to determine whether credentials were entered.


    If Credentials Were Entered

    If a user entered credentials into a suspected phishing or AiTM page, treat the account as compromised immediately:

    • Force a password reset
    • Revoke all active sessions and refresh tokens to invalidate stolen cookies
    • Require reauthentication and re-register MFA methods
    • Remove unrecognized devices or security info changes
    • Review recent sign-ins for unfamiliar IPs, impossible travel, or anonymous proxy use
    • Audit and remove suspicious inbox rules, OAuth app consents, and forwarding settings
    • Check for data access anomalies and unauthorized downloads
    • Instruct the user to report unexpected MFA prompts
    • Monitor closely for follow-up activity or lateral movement attempts

    Source: Malwarebytes GitHub

  • Summary of 2025 from a SOC Analyst

    Overview

    2025 showed clear, practical shifts in what actually hurts enterprises day-to-day: identity and user execution was the popular path for threat actors. The year wasn’t packed with advanced persistent threat (APT) tradecraft for most enterprise environments. It was about scale: AI-assisted social engineering, commodity malware delivered through trusted platforms, and “make the user do it” execution Click-fix style chains that bypass controls.

    What stood out most in 2025 was how heavily attackers leaned into trusted surfaces — Microsoft 365, Teams, browser sessions, GitHub/CDN-style hosting, and advertising platforms — while running the same repeatable playbooks at scale: infostealers to harvest credentials and tokens, followed by initial access, then ransomware or business email compromise (BEC). This wasn’t about novel tradecraft; it was about efficiency. Microsoft’s reporting and ENISA’s 2025 threat landscape both reinforce this shift, highlighting the growing scale of social engineering, faster exploitation cycles, and the increasing abuse of legitimate services as core drivers of modern enterprise compromise.

    For obvious reasons I cannot be to specific, however Below are the patterns I saw repeatedly across 2025, and why they matter.


    1) Infostealers

    What changed in 2025

    Infostealers aren’t “just password grabbers” anymore they’re an access factory. MaaS ecosystems like Lumma kept showing up with flexible delivery, fast iteration, and reliable stealing of browser data/session material that fuels downstream compromise.

    How it showed up in enterprise

    • Initial access increasingly looked like “valid login + normal tools” because creds/tokens were already stolen.
    • Infostealers arrived via malvertising/redirect chains and were often staged on “normal looking” platforms (including developer/hosting ecosystems). Microsoft documented large-scale malvertising leading victims through redirectors and ultimately to payload hosting on platforms like GitHub.

    Practical takeaways

    Treat session theft as a first-class risk. In practice, conditional access, token protection, and device compliance matter far more than traditional password policies that involve complexity. Defenders should prioritise detections that focus on unusual browser credential access patterns, new persistence mechanisms appearing after “user-initiated” installer activity, and outbound connections to fresh or low-reputation infrastructure immediately following a download or ZIP execution.

    Tips for hunting in Kusto query langauge (KQL)

    1. Look for payloads being pulled from the internet
    DeviceProcessEvents
    | where FileName in~ ("powershell.exe", "mshta.exe", "msbuild.exe", "rundll32.exe")
    | where ProcessCommandLine has_any ("http", "https", "Invoke-WebRequest", "curl", "wget")
    | join kind=inner (
        DeviceNetworkEvents
        | where RemoteIPType == "Public"
        | where ActionType == "ConnectionSuccess"
    ) on DeviceId
    | project TimeGenerated, DeviceName, FileName, ProcessCommandLine, RemoteIP, RemoteUrl
    1. Look for non-browser processes touching credential stores
    DeviceProcessEvents
    | where ProcessCommandLine has_any ("Login Data", "Cookies", "Local State", "Web Data")
    | where InitiatingProcessFileName !in~ ("chrome.exe", "msedge.exe", "firefox.exe")
    | project TimeGenerated, DeviceName, FileName, ProcessCommandLine

    2) AI-driven phishing

    What changed in 2025

    The big change wasn’t that AI invented new attack vectors ( that is changing), however it lowered the effort to produce high-volume, high-quality lures and impersonation content. Microsoft’s Digital Defence reporting explicitly calls out AI-enabled phishing and fast-evolving multi-stage chains as a key theme. ([Microsoft][1]) ENISA’s 2025 threat landscape also flags AI as a defining element, particularly around social engineering at scale. ([ENISA][4])

    Waves of new reports and research are being released on the expected evolving Ai situation and how it will continue to change and affect the industry.

    How it showed up in enterprise

    • Better-written pretexts, fewer “obvious scam” tells.
    • Faster iteration: lure themes changed weekly, not quarterly.
    • More multi-channel delivery (email + messaging + calls), which links directly to the next sections.

    Practical takeaways

    • Stop relying on “users will spot bad grammar” as a control.
    • Harden identity workflows: phishing-resistant MFA where possible, stronger verification for payment/invoice changes, and out-of-band verification procedures that don’t depend on the same compromised channel.
    • AI and business email compromise (BEC) is a lethal combination. Users should feel comfortable reporting anything that seems out of place.

    Investigation tips:

    1. Check email context in the business environment
    2. Does it relate to receipient users role. (IMPORTANT: this does not mean it is benign, but forumaltes part of your investigation)
    3. Pull the email in alignment with your organisations arrangemenbt for viewing emails – Look for any signs of spoofing in email authentication – Analyse links and attachments (IMPORTANT: Links or attachments may not work in sandboxed environments this is threat actor design, don’t assume benign) – Look for suspicious redirections or cloned sites that do no line up in the URL field. – If suspicious move to the next phase and check if user interacted/ downloaded.
    EmailEvents
    | where TimeGenerated >= ago(90d)
    | where SenderFromAddress contains "<insert email>"
    
    // customise as you see fit, but establishing context is important, however again not a indication of benign.

    TIP: Being a good analyst is about coming to accurate decisions in a reasonable amount of time, and justifying why you have come to a verdict based on the evidence.

    3) Impersonation via WhatsApp and social media (trust hijack)

    What changed in 2025

    Attackers kept moving toward platforms where people respond quickly, and moves them out of site of security monitoring: WhatsApp, SMS, social Dms, and other encrypted collaboration applications. Even when the exact scam mechanics vary, the consistent pattern is impersonation, urgency or establishing trust via a high profile identity like a CEO for example..

    How it showed up in enterprise

    • Finance/HR impersonation attempts outside email.
    • “Vendor” or “exec” outreach pushing invoice changes, gift cards, or urgent login steps.
    • Staff assuming WhatsApp/DM = “more legitimate” because it feels personal.
    • CEO or executive impersonation.

    Practical takeaways

    • Write (and enforce) a policy: no financial approvals or credential workflows over consumer messaging apps.
    • Train staff to treat “new number, urgent request” as a default red flag and to verify via known channels.

    4) Helpdesk phishing / identity resets

    What changed in 2025

    Threat groups kept proving that the helpdesk is a privileged access path. If an attacker can get a password reset or MFA change approved, they don’t need malware.

    Australia’s ASD/ACSC guidance on Scattered Spider explicitly calls out social engineering of IT helpdesks to reset passwords/MFA as a core technique. ([cyber.gov.au][6]) CrowdStrike also described Scattered Spider activity expanding targets in 2025 with consistent tradecraft, reinforcing how operationally “standard” helpdesk abuse has become. ([CrowdStrike][7])

    How it showed up in enterprise

    • MFA resets and enrollment changes followed by rapid access to M365/SSO apps.
    • Attackers living inside collaboration platforms after identity takeover (including Teams/communications abuse). Microsoft discussed threats targeting Teams and how attackers leverage password resets/MFA control to operate. ([Microsoft][8])

    Practical takeaways

    • Lock down helpdesk workflows:

      • Require strong identity verification for resets (not KBA).
      • Add “cool-off” periods or manager approval for MFA changes on privileged accounts.
      • Alert on MFA method changes + new device + new geo sequences.

    5) Trojanised installers ads + fake sites leading to stealers/loaders/RATs

    What changed in 2025

    Fake installers stayed brutally effective because they exploit normal behaviour (“I need this tool now”). The distribution got better: sponsored ads, SEO poisoning, and “looks real enough” landing pages.

    Kaspersky described a macOS infostealer campaign using paid search ads and even abuse of shared AI chat links to lure users into running commands that install an infostealer/backdoor. ([me-en.kaspersky.com][9]) This is the same underlying enterprise lesson: users will trust what’s at the top of search results if it looks official.

    One example is that of the fake PuTTY installers. PuTTY is a commonly used tool by IT professionals, it is a lightweight Windows tool used to make remote command-line connections to other systems. Recent campaigns have exploited this tools widespread use in the enterprise environment. Artic Wolf

    How it showed up in enterprise

    • Users downloading “utilities” (PDF tools, archivers, remote tools) from sponsored results.
    • Initial foothold becoming infostealer → then remote access tooling or loader deployment.

    Practical takeaways

    • Restrict execution of new/untrusted installers where possible (application control).
    • Browser controls matter: block known bad ad/redirect infrastructure, enforce safe browsing, and monitor for first-time installs from user profile/temp locations.
    Sponsored malicious PuTTY advertisements. Image from (Artic Wolf)

    6) ClickFix (make the user run the payload)

    What changed in 2025

    ClickFix is one of the most important “enterprise reality” shifts: attackers intentionally add a human step (copy/paste or run a command) to bypass controls that are better at blocking automated droppers.

    Microsoft broke down ClickFix as a social engineering technique: lure the user to execute command followed by malware chain. ([Microsoft][10]) Huntress also documented ClickFix campaigns delivering infostealers (including Lumma and others), showing how it ties directly into the credential-theft economy. ([Huntress][11])

    How it showed up in enterprise

    • Fake error prompts, “verification” pages, fake security messages, fake update flows.
    • Clipboard-driven PowerShell execution that looks like “user did it” (because they did).

    Practical takeaways

    • Train specifically on “never run commands from a webpage / email” (most training is too generic).
    • Detection focus: suspicious parent/child chains and command lines around PowerShell/mshta/msbuild/rundll32 triggered shortly after browser activity.

    Fake verification getting a user to open WindowsRun to launch PowerShelll. Image from Proofpoint

    7) AiTM phishing using site clones / brand impersonation (MFA bypass remains common)

    What changed in 2025

    AiTM phishing stayed dominant because it beats basic MFA by stealing session cookies/tokens via reverse proxies and realistic clones.

    Sekoia’s 2025 analysis highlights the scale and prevalence of AiTM kits (Tycoon 2FA and others) and notes rapid evolution in delivery formats (e.g., shifting attachment/link delivery techniques). ([Sekoia.io Blog][12]) Barracuda also discussed the volume and evolution of phishing-as-a-service and AiTM-style kits in 2025 targeting Microsoft 365. ([Barrcuda Blog][13])

    How it showed up in enterprise

    • Microsoft 365 account takeovers where the login looked legitimate (because it was proxied).
    • “New MFA prompt” fatigue exploited to complete the chain.

    Practical takeaways

    • Push toward phishing-resistant MFA for high-risk users (where feasible).
    • Enforce conditional access: impossible travel, device compliance, risk-based sign-in policies.
    • Alert on sign-in from new device + token issuance + mailbox rules changes (classic post-phish behaviour).

    Wrap-up: the 2025 pattern in one line

    2025 was the year attackers doubled down on identity + user execution while hiding behind trusted platforms and accelerating with AI-assisted scale. This has been my personal experience in my role, across all these various threats. While there is some variations this has been a consistent theme. I have not included extensions in this blog, however I am going to go into more detail on malicious extensions in the next blog.

    Hopefully this blog for new or aspiring analyst has given you a firm idea of the threat environment particularly for the enterprise environment. By staying up to date on threat intelligence and strategic shifts you will be stronger as a defensive analyst and will move to proactive security.


    References

    • Microsoft: Lumma Stealer delivery techniques (May 21, 2025) (Microsoft)
    • Microsoft: large-scale malvertising leading to info stealers hosted on platforms like GitHub (Mar 6, 2025) (Microsoft)
    • Microsoft: ClickFix social engineering technique (Aug 21, 2025) (Microsoft)
    • Huntress: ClickFix delivering infostealers via steganography/image stages (Nov 24, 2025) (Huntress)
    • Sekoia: global analysis of AiTM phishing kits & evolving delivery (Jun 11, 2025) (Sekoia.io Blog)
    • Barracuda: phishing-as-a-service / AiTM trends in early 2025 (Barrcuda Blog)
    • cyber.gov.au: Scattered Spider helpdesk/MFA reset social engineering (cyber.gov.au)
    • CrowdStrike: Scattered Spider escalation across industries (Jul 2, 2025) (CrowdStrike)
    • Microsoft: threats targeting Microsoft Teams and identity takeover flow (Oct 7, 2025) (Microsoft)
    • ENISA Threat Landscape 2025 (Oct 7, 2025) (ENISA)
    • Kaspersky: paid search ads + AI-chat link abuse delivering AMOS infostealer (Dec 2025) (me-en.kaspersky.com)
    +
  • Hunting Shai-Hulud: Detecting the npm Supply-Chain Worm with Sentinel

    Shai-Hulud is a self-replicating npm supply-chain worm that slipped malicious post-install scripts into popular packages to steal secrets like npm/GitHub tokens, cloud keys, and create/modify GitHub repos & workflows for exfiltration, and then auto-publish poisoned updates wherever it found additional npm tokens—letting it spread across the ecosystem. Initial tallies cited 100+ affected packages; subsequent advisories and vendor tracking raised the scope to hundreds (500+ reported in some counts), so teams should assume impact is still evolving.

    Behaviour

    The Shai-Hulud worm behaves as a malicious npm package payload that executes a post-install script to harvest secrets (npm tokens, GitHub tokens, API keys, cloud credentials), then exfiltrates them to attacker-controlled GitHub repos and webhooks. It goes further by creating malicious GitHub Actions workflows to continuously leak secrets, and it forcibly migrates private repositories into public attacker-owned repos with a “Shai-Hulud Migration” tag. Critically, if additional npm tokens are present, it will auto-publish infected versions of any accessible packages, giving it worm-like, self-propagating capabilities across the npm ecosystem.

    This is a massive supply chain attack and organisations if not already should treat this with high priority. This article is provided as a quick threat intelligence report you can read, although many sources and research is availible. This article goes into some KQL ( Kusto Query Language) scripts you can use to hunt for this activity. This article may also be benficial for new analyst who want to understand how to break down threat intelligence or research articles into actionable or useful bits of information for security operations.

    Indicators of Compromise

    Files & paths

    • /tmp/processor.sh — creates shai-hulud branch and uploads workflow payload.
    • /tmp/migrate-repos.sh — forces private repos → public “migration.”
    • Temp working dir observed: /tmp/github-migration (used during repo cloning).

    GitHub artifacts / repo signals

    • Public repos named Shai-Hulud containing data.json (double-base64 secrets dump).
    • Repos with description “Shai-Hulud Migration” and -migration suffix (private → public flip). Look for a CreateEvent followed quickly by a PublicEvent.
    • Branches named shai-hulud created across impacted repos; hidden workflow commits under .github/workflows/*.yml.

    Network / exfil endpoints

    • https://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7 (noting free-tier deactivated after excessive activity; secrets may still appear in GitHub workflow logs).

    Hashes

    • 46faab8ab153fae6e80e7cca38eab363075bb524edd79e42269217a083628f09 — malicious JS SHA256.

    Tactics & behaviours to hunt

    • Post-install scripts invoking TruffleHog; harvesting env vars/IMDS cloud creds.
    • Automated npm publish from unexpected actors/machines (worm propagation).
    • Creation/modification of .github/workflows/* followed by unusual GitHub API POST/PUT events.

    KQL Queries

    Let’s jump into crafting a query we can use to hunt. This query can be adpated to whatever SIEM ( security incident event management) tool you are using or are learning with. KQL is the language I use so I am going to work with that.

    let lookback = 7d;
    let procs = DeviceProcessEvents
    | where TimeGenerated >= ago(lookback)
    | where FileName in ("node.exe","npm.exe","yarn.exe","git.exe","gh.exe")
    | where ProcessCommandLine has_any ("postinstall","preinstall","install","bundle.js","eval(","trufflehog","gh repo create","push","remote add","api.github.com")
    | project TimeGenerated, Source = "Process", DeviceName, AccountName, FileName, ProcessCommandLine;
    let files = DeviceFileEvents
    | where TimeGenerated >= ago(lookback)
    | where FilePath has ".github\\workflows" or FileName in ("processor.sh","migrate-repos.sh")
    | project TimeGenerated, Source = "File", DeviceName, AccountName, FilePath, FileName, ActionType, SHA256;
    procs
    | union files
    | sort by TimeGenerated desc
    | take 200
    1. Set the variable for time and the table you want to call in. This is a good habit to get into because it will make creating bigger queries further down the track easier.
    2. We are interested in Filename table and Processcommandline to detect the workflows we are looking for or any the /tmp/*.sh files the worm drops.
    3. We are creating a second vairable to call to DeviceFileEvents.
    4. In that KQL, the union operator is simply combining the results of two separate queries into one table.
      • The first part (procs) collects suspicious process events (e.g., npm install with postinstall, trufflehog, etc.).
      • The second part (files) collects suspicious file events (e.g., .github/workflows changes or /tmp/processor.sh).
      • union merges them together so you can review all suspicious signals in one results set instead of running two separate queries. If your just starting playing around running the queries separately and exploring the logs is good to, for getting a feel of the tables.

    This query might be a bit noisy, however when hunting for activity we want to start wide and then narrow it down. It is good to get a sense for what is benign and what might be worth looking further into. The -migration will likely pull in legitimate migration activity, but again double checking might not hurt. You can start to filter out certain fields that you don’t want to see to narrow the information down.

    Takeaways and Recommendations

    The Shai-Hulud incident shows how fast a supply-chain compromise can spread and why proactive hunting matters. This mindset builds resilience for organisations and sharpens investigative skills for analysts.

    • Always review new threat reports for relevance to your environment.
    • If risk is high, run a targeted hunt rather than waiting for alerts.
    • Maintain strong monitoring and tuned detections around Git and npm activity.
    • Enforce clear policies for developer workflows and package use.
    • Rotate and protect credentials aggressively after any suspected compromise.

    Sources

    +
  • The Biggest Cyber Threats Small Businesses Face in 2026

    Introduction

    “43% of cyberattacks target small businesses, yet 60% close within 6 months of a breach.”

    The world is moving deeper into the tech space with rapid cloud adoption and an accelerating AI race. For small businesses, this creates both opportunity and risk. Cybersecurity is no longer just a “big business” concern — the evolving threat landscape directly impacts small and medium enterprises (SMEs) as they scale and adopt new technology to streamline operations.

    The reality is cybercrime is evolving quickly, and it will eventually affect nearly everyone connected to the digital space. In this blog, we’ll break down the top cyber threats facing small businesses in 2026 and provide actionable defense strategies to help you stay secure.


    Threat #1 – Ransomware-as-a-Service (RaaS)

    Ransomware has long been a headline threat, but now it’s more accessible than ever. Cybercriminals can purchase Ransomware-as-a-Service (RaaS) kits that come with dashboards, technical support, and user-friendly interfaces — lowering the barrier to entry even for low-skill attackers.

    Impact on small businesses:

    • Data loss
    • Downtime and disruption
    • Ransom payments
    • Reputational damage

    Why SMEs are targeted: Larger organizations draw heavy scrutiny from law enforcement and security teams. Targeting smaller firms presents attackers with lower risk, higher volume, and a greater chance of ransom payment due to fear of reputational damage.

    Defense strategies:

    • Maintain regular, tested backups of critical data
    • Patch and update operating systems and applications consistently
    • Deploy endpoint detection and response (EDR) solutions
    • Store offline, immutable backups segmented from production

    Threat #2 – Phishing & Business Email Compromise (BEC)

    Phishing remains the #1 entry point for attacks. Business Email Compromise (BEC) is particularly dangerous:

    • If a third-party supplier’s email is compromised, malicious emails may appear legitimate to your staff.
    • If your business email is breached, attackers can impersonate executives, escalate privileges, spread malware, and exfiltrate sensitive data.

    In 2026, AI-generated phishing emails and voice deepfakes make detection harder. Messages that once looked obviously fake now require deeper analysis and stricter verification.

    Defense strategies:

    • Conduct regular employee awareness training
    • Enforce multi-factor authentication (MFA) on all accounts
    • Use advanced email filtering and attachment/link sandboxing
    • Implement call-back/secondary-channel verification for financial or sensitive requests

    Threat #3 – Supply Chain Attacks

    Attackers increasingly compromise third-party vendors and SaaS platforms to target downstream clients. Recent incidents show how one weak link can impact many organizations.

    Small businesses rely heavily on vendors and SaaS tools, making this risk unavoidable. The key is understanding risk tolerance and preparing for risks you cannot entirely eliminate.

    Defense strategies:

    • Perform vendor risk assessments (security questionnaires, certifications, breach history)
    • Continuously monitor third-party integrations and API connections
    • Apply least-privilege access and scoped tokens for vendor accounts

    Threat #4 – Cloud Misconfigurations & Data Leaks

    As cloud adoption soars, misconfigured storage buckets and databases remain prime targets. Attackers constantly scan for exposed services, and simple mistakes can lead to devastating breaches.

    Defense strategies:

    • Implement Cloud Security Posture Management (CSPM) and remediate findings
    • Encrypt sensitive data at rest and in transit
    • Enforce strong access controls, logging, and periodic permissions reviews
    • Enable private endpoints, network segmentation, and WAF where applicable

    Threat #5 – Insider Threats & Human Error

    Remote and hybrid work expands the attack surface. Insider threats — whether intentional or accidental — represent a significant risk for SMEs.

    Examples:

    • Unintentional mistakes (e.g., emailing sensitive data to the wrong recipient)
    • Disgruntled employees deleting or leaking data after termination
    • Malicious insiders motivated by financial gain or coercion

    Defense strategies:

    • Enforce the principle of least privilege (only the access needed for the job)
    • Restrict access to approved, compliant devices; use device posture checks
    • Apply conditional access policies and geo-restrictions
    • Implement Data Loss Prevention (DLP) and insider risk monitoring
    • Maintain documented, enforced offboarding procedures (access removal, device return)

    Threat #6 – AI-Driven Attacks (Forward-Looking)

    AI is accelerating both offense and defense. Threat actors leverage AI to:

    • Automate phishing and social engineering
    • Crack passwords and test credentials more efficiently
    • Create deepfake audio/video to impersonate executives

    Defense strategies:

    • Adopt a zero-trust approach (assume breach, verify explicitly, least privilege)
    • Deploy anomaly detection/UEBA to catch unusual behavior
    • Out-of-band verification for sensitive instructions and transactions

    Takeaway

    For small and medium businesses, improving security doesn’t need to be the most expensive or difficult process. These are some basic implementations you can add to your business. You can enable multi-factor authentication (MFA) everywhere (email, VPN, cloud apps), keep systems and firmware patched, and back up critical data offline with regular restore tests. Run phishing simulations to strengthen employee awareness, and maintain a documented incident response plan with clear roles and contacts. Centralize logging and monitoring with EDR/XDR, segment networks to limit lateral movement, and review third-party access regularly while rotating API keys or tokens.

    Engaging a pay-per-session or retained security consultant is an excellent way for small and scaling businesses to strengthen their defenses. An experienced consultant can provide expert guidance, proactive monitoring, and tailored support that aligns with your business goals. They can identify gaps in your current security infrastructure, recommend practical improvements using the resources you already have, and design a roadmap that factors in long-term growth and scalability.


    Conclusion

    Cybersecurity is no longer optional for small businesses. The threats in 2026 from RaaS to AI-driven attacks demand proactive defense. By applying strong cyber hygiene, adopting modern security tools, and fostering a culture of awareness, small businesses can defend themselves against today’s most pressing threats and build resilience for the future.

    +