Une gestion de version détaillée se trouve à la fin de ce document. Version française: 🇫🇷 The boundaries which traditionally separate state-sponsored and cybercriminal actors continued to blur in 2025, thereby further complexifying the imputation process. The exploitation of legitimate applications and services for malicious purposes can, for example, no longer be viewed as a hallmark of reputedly state-sponsored groups. Social engineering techniques have also grown increasingly innovative, go