Cybersecurity researchers identify five active threat groups using phishing, malware and influence tactics as cyber activity ...