Cybersecurity's Most Wanted
The Most Dangerous People on the Internet 2025: Cybercriminals Rule the Digital Underworld
Wired's latest exposé profiles the top 10 cyber threats of 2025, highlighting figures like 'CryptoKing' and 'ScamQueen' who are reshaping the digital threat landscape with sophisticated scams and state‑sponsored attacks.
Introduction
Top Internet Threats of 2025
Profile of 'CryptoKing'
Impact of 'ScamQueen' and AI Scams
LockBit Ransomware Group's Activities
Deepfake Disinformation by 'DeepfakeDaddy'
Chinese APT41 Supply Chain Attacks
Cyber‑Espionage by Iranian 'GhostCrew'
Threats from 'AIForger' and Deepfake Marketplace
Mass Phishing by Brazilian 'PhishLord'
'ZeroDayBroker' and Vulnerability Weaponization
Trends in Cyber Threats and Predictions for 2026
Practical Advice for Digital Safety
Public Reactions to the Article
Economic Implications of Cyber Threats
Social and Political Implications
Future Cybersecurity Trends and Mitigations
Conclusion
Sources
- 1.Wired article(wired.com)
Related News
May 20, 2026
Google Fires Back at Anthropic Mythos With CodeMender Security Agent
Google announced CodeMender API access at I/O 2026, positioning its AI code-security agent as a direct response to Anthropic's Mythos. The move signals that cybersecurity — not chatbots — is becoming the key revenue battleground for frontier AI labs racing toward IPOs.
May 19, 2026
Anthropic to Brief Global Financial Watchdog on Mythos Cyber Flaws
Anthropic is preparing to brief the Financial Stability Board — the G20's financial stability watchdog — on cybersecurity vulnerabilities its Mythos model has uncovered in the global banking system. It marks the first coordinated global regulatory response to a single AI model's capabilities.
May 18, 2026
Pentagon Deploys Anthropic Mythos AI for Cybersecurity While Planning to Cut Ties
The Pentagon is deploying Anthropic's unreleased Claude Mythos model for cybersecurity defense under Project Glasswing — even as it plans to phase out Anthropic's other products. Japan is also crafting cyberdefense guidelines in response. The model can find decades-old vulnerabilities autonomously, marking a new era in AI-powered security.