High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports

Infosecurity Magazine

Overview

In a recent report by Mandiant, the high-tech sector has emerged as the most targeted industry for cyber-attacks in 2025, surpassing the financial services sector, which held that position in 2023 and 2024. This shift indicates a growing trend where attackers are increasingly focusing on technology firms, which often handle sensitive data and critical infrastructure. The report suggests that as technology advances, so do the tactics used by cybercriminals, making it essential for tech companies to bolster their security measures. The implications of this trend are significant, as a successful attack on a high-tech firm can lead to widespread data breaches and disruption of services, affecting not only the companies involved but also their customers and the broader economy.

Key Takeaways

  • Affected Systems: High-tech sector companies, including software developers and tech infrastructure providers
  • Action Required: Companies in the high-tech sector should enhance their cybersecurity protocols, conduct regular security audits, and implement advanced threat detection systems.
  • Timeline: Disclosed in 2025

Original Article Summary

High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024

Impact

High-tech sector companies, including software developers and tech infrastructure providers

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Disclosed in 2025

Remediation

Companies in the high-tech sector should enhance their cybersecurity protocols, conduct regular security audits, and implement advanced threat detection systems.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Data Breach, Critical.

Related Coverage

Russian Initial Access Broker Handed 81-Month Sentence

Infosecurity Magazine

Aleksei Volkov, a Russian cybercriminal, has been sentenced to 81 months in prison for his involvement with the Yanluowang ransomware. This ransomware has been linked to various attacks on organizations, encrypting files and demanding ransom payments for decryption. Volkov's arrest and sentencing mark a significant step in the ongoing efforts to combat ransomware and cybercrime. His actions not only impacted individual victims but also contributed to the broader threat posed by ransomware groups, which continue to target businesses and institutions worldwide. The case serves as a reminder of the legal consequences that cybercriminals face, hopefully deterring future attacks.

Mar 24, 2026

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

SecurityWeek

Stryker, a medical technology company, has reported discovering a malicious file during an investigation into a cyber attack linked to Iranian hackers. The FBI has issued an alert detailing the malware used in this incident, emphasizing the threat posed by state-sponsored cyber activities. This attack is significant as it highlights the ongoing risks that organizations face from sophisticated hacking groups, particularly those linked to nation-states. The incident raises concerns about the security of sensitive data within the healthcare sector, which is often a target due to the critical nature of its operations. Companies in this field should review their cybersecurity measures to protect against similar threats.

Mar 24, 2026

Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals

Infosecurity Magazine

The FBI has issued a warning about the Iranian hacking group known as Handala, which has been actively targeting dissidents and opponents of the Iranian regime since 2023. This group is believed to be involved in hack-and-leak operations, where they steal sensitive information and then publicly disclose it to undermine their targets. The FBI's alert emphasizes the potential risks for individuals and organizations opposing the Iranian government, highlighting the ongoing threat posed by state-sponsored cyber activities. Such actions not only threaten personal security but also impact the broader landscape of free expression and dissent, particularly for those in vulnerable positions. As cyber attacks from state actors become more sophisticated, the need for vigilance among potential targets is increasingly critical.

Mar 24, 2026

Privileged by Design: AI Agents and the New Identity Risk to Production Systems - Shashwat Sehgal - RSAC26 #1

SCM feed for Latest

In the article, Shashwat Sehgal discusses the emerging risks associated with AI agents in production systems. As these AI systems gain privileges, they can inadvertently create new identity risks that could be exploited by malicious actors. The focus is on how these AI agents, if not properly managed, could lead to unauthorized access and compromise sensitive data. This situation affects organizations that rely on AI for operational efficiency, making it crucial for them to understand the potential vulnerabilities introduced by these technologies. The discussion emphasizes the need for robust security measures to safeguard against these evolving risks.

Mar 24, 2026

Scripted Sparrow: A Prolific BEC Group - John Wilson - RSAC26 #1

SCM feed for Latest

A new report has identified a cybercrime group known as Scripted Sparrow, which is heavily involved in Business Email Compromise (BEC) schemes. This group has gained notoriety for its sophisticated tactics, targeting various organizations to steal funds through deceptive email communications. Researchers have noted that Scripted Sparrow utilizes social engineering techniques to manipulate employees into transferring money, often impersonating trusted contacts. The implications of their activities are significant, as they not only lead to financial losses for companies but also erode trust in email communications. Organizations are urged to enhance their email security protocols and train employees to recognize potential scams as this group continues to evolve its methods.

Mar 24, 2026

Trivy Supply Chain Attack Targets CI/CD Secrets

darkreading

A recent supply chain attack has targeted the open-source security tool Trivy, which is commonly used in CI/CD workflows. Attackers exploited this tool to deploy an infostealer that compromised sensitive data, including cloud credentials, SSH keys, and tokens. This incident raises serious concerns for organizations relying on CI/CD processes, as it puts critical infrastructure and security at risk. The breach could lead to unauthorized access to cloud environments, potentially resulting in data loss or further exploitation. Companies using Trivy should review their security practices and ensure they are not inadvertently exposing their secrets through vulnerable tools.

Mar 23, 2026