technology
kē jì
科技
report
bàogào
报告
to show / to reveal
xiǎnshì
显示
hackers
hēikè
黑客
increasingly / more and more
yuèlái yuè duo
越来越多
to leverage / to make use of
jizhù
借助
AI (artificial intelligence)
AI
AI
to launch / to carry out
fādòng
发动
cyberattacks
wanglùo gongjí
网络攻击
Google-owned / under Google
Guge qíxià
谷歌旗下
cybersecurity
wanglùo anquán
网络安全
company
gongsì
公司
Mandiant (cybersecurity company)
Mandiant
Mandiant
to release / to publish
fabù
发布
2026 annual
2026 niándù
2026年度
threat
weīxié
威胁
report
bàogào
报告
to point out
zhichu
指出
hackers
hēikè
黑客
are (progressive)
zhèngzài
正在
(introducing object)
jiāng
将
artificial intelligence
réngong zhìnéng
人工智能
to integrate
zhènghé
整合
into
jìn
进
attack
gongjí
攻击
process / workflow
liúchéng
流程
report
bàogào
报告
also / furthermore
hái
还
to find / to discover
faxiàn
发现
from
cóng
从
vulnerability
lòudòng
漏洞
disclosure / publication
pilu
披露
to
dào
到
to suffer / to be subject to
zaoshòu
遭受
attack
gongjí
攻击
(modifier particle)
de
的
time window
shíjian chuangkou
时间窗口
has significantly shortened
yǐ dàfú suoduan
已大幅缩短
May 5, 2026 at 10:20 AM
Google-owned / under Google
Guge qíxià
谷歌旗下
cybersecurity company
wanglùo anquán gongsì
网络安全公司
Mandiant (cybersecurity company)
Mandiant
Mandiant
recently / in recent days
jìnrì
近日
released / published
fabùle
发布了
2026
2026 nián
2026年
annual edition
dù
度
cyber threat
wanglùo weīxié
网络威胁
report
bàogào
报告
M-Trends (Mandiant threat report series)
M-Trends
M-Trends
report
bàogào
报告
to point out
zhichu
指出
whether it is
wúlùn shì
无论是
nation-state
guójiā
国家
state-sponsored
zhichí de
支持的
hackers
hēikè
黑客
or
háishi
还是
financially motivated
yǐ móulì wéi mùdì de
以牟利为目的的
attackers
gongjízhě
攻击者
are all
jun zài
均在
(introducing object)
jiāng
将
large language models
dàxíng yuyán móxíng
大型语言模型
to integrate
zhènghé
整合
into
jìn
进
attack
gongjí
攻击
chain / pipeline
liànlù
链路
report
bàogào
报告
shows / reveals
xiǎnshì
显示
28.3 percent
28.3%
28.3%
(modifier particle)
de
的
known / disclosed
yǐzhi
已知
vulnerabilities
lòudòng
漏洞
within
zài
在
after disclosure
pilù hòu
披露后
within 24 hours
24 xiaoshí nèi
24小时内
are immediately subjected to
jí zao
即遭
exploitation
lìyòng
利用
hackers
hēikè
黑客
increasingly
yuèlái yuè duo
越来越多
to leverage
jizhù
借助
AI (artificial intelligence)
AI
AI
to carry out
kaizhǎn
开展
highly targeted
gaodù zhenzuìxìng de
高度针对性的
social engineering
shèhuì gonchéngxué
社会工程学
attacks
gongjí
攻击
going beyond
chaoyuè
超越
traditional
chuántong
传统
mass / bulk
piliàng
批量
phishing emails
diàoyú yóujiàn
钓鱼邮件
report
bàogào
报告
also
hái
还
documented / recorded
jìlùle
记录了
one
yì qi
一起
supply chain
gongying liàn
供应链
breach / intrusion
rùqin
入侵
case / example
ànlì
案例
hackers
hēikè
黑客
in
zài
在
compromised
bèi rùqin de
被入侵的
devices
shèbèi shàng
设备上
to exploit / to use
lìyòng
利用
AI (artificial intelligence)
AI
AI
tools
gongjù
工具
to steal
qiète
窃取
developer
kaifazhě
开发者
access tokens
fǎngwèn lìngpái
访问令牌
ransomware
lèsuǒ ruanjian
勒索软件
attackers
gongjízhě
攻击者
on the other hand / moreover
zé
则
began
kaishi
开始
systematically
xìtongxìng de
系统性地
to destroy / to sabotage
pòhuài
破坏
the victim
shòuhài zhě
受害者
(modifier particle)
de
的
backup systems
bèifèn
备份
and
hé
和
recovery
huifù
恢复
infrastructure
jichú shèshi
基础设施
to force / to compel
pòshi
迫使
them (formal)
qí
其
to pay a ransom
zhifù shùjin
支付赎金
Mandiant (cybersecurity company)
Mandiant
Mandiant
to emphasize
qiangdiào
强调
although / even though
jingguan
尽管
AI (artificial intelligence)
AI
AI
has become
yǐ chéngwéi
已成为
attack-related
gongjí de
攻击的
accelerator
jiasùqì
加速器
the majority
dàduoshù
大多数
successful
chénggong de
成功的
breaches / intrusions
rùqin
入侵
still stem from
réng yuányú
仍源于
human
rénwéi
人为
and
hé
和
systemic
xìtongxìng
系统性
(modifier particle)
de
的
vulnerabilities / gaps
lòudòng
漏洞