From control rooms to cloud inboxes, attackers are switching lanes fast. Russian-aligned hacktivists are targeting exposed HMIs in water utilities, with honeypot data revealing a shift in OT attacks toward easy-access disruption. At the same time, phishing has gone malware-free, as a slick campaign uses a seemingly legitimate PDF to redirect victims to a fake Dropbox login page. Adding a geopolitical edge, a new actor dubbed Punishing Owl has emerged, targeting networks tied to Russian security agencies. Continue reading for more.