Black Arrow Cyber Threat Intelligence Briefing 06 February 2026
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
A new evolving business threat has come to the fore, caused by autonomous AI assistants such as OpenClaw (aka Clawdbot and Moltbot), with significant and developing cyber risk considerations. In our summaries below, we also give details of other developing attack methods, including voicemail alerts and fake PDFs. AI, as predicted, is also escalating the dangers of phishing emails and is a concern for 75% of cyber professionals.
We also look at how employees and supply chains represent significant security weaknesses and how to address them, further underlining why cyber security is not a technology subject but instead requires coordinated risk management across the business.
To address these risks, leadership teams need to ensure their cyber knowledge comes from impartial experts, to take greater command of the risks and avoid the same blind spots as their control providers across people, operations and technology. Contact us to discuss how to achieve this in a proportionate manner.
Top Cyber Stories of the Last Week
From Clawdbot to OpenClaw: This Viral AI Agent Is Evolving Fast – and It’s Nightmare Fuel for Security Pros
OpenClaw, a fast growing open source personal AI assistant, shows how quickly AI tools could reshape cyber risk. It can connect to everyday apps like WhatsApp, email and calendars, and needs broad permissions to take actions on a user’s behalf. That access creates new routes for cyber attack, including fake downloads and scams, malicious add-ons, unsafe settings that leak passwords or access keys, and hidden instructions that trick the AI into harmful actions. Despite 34 recent security fixes, leaders should treat autonomous assistants as high risk until governance and controls mature.
https://www.zdnet.com/article/clawdbot-moltbot-openclaw-security-nightmare/
Why Moltbook Changes the Enterprise Security Conversation
A new risk is emerging as artificial intelligence agents begin talking to each other on social platforms such as Moltbook, often without ongoing human oversight. Once an employee sets an agent in motion, it can continue reading and posting online for long periods, creating a largely invisible route for sensitive information to leak, including source code, customer data, or internal project details. There is also an inbound threat where agents may absorb harmful instructions or links posted by others, influencing behaviour and decisions. Organisations should consider blocking such platforms by default, with tightly governed exceptions where needed.
https://securityboulevard.com/2026/02/why-moltbook-changes-the-enterprise-security-conversation/
Beware of Weaponised Voicemail Messages Granting Hackers Remote Access to Your System
A new “Voicemail Trap” campaign is using fake voicemail notifications to trick staff into handing criminals remote access to their devices. The messages often impersonate trusted financial organisations and direct recipients to convincing, bank themed websites. Victims are told to download an “audio update” to hear the message, but the file is a script that silently installs legitimate remote management software, allowing attackers persistent access to steal data or deploy further malware. Researchers observed 86 websites linked to this activity on 12 January 2026. Leaders should reinforce click caution and block untrusted download prompts.
https://cybersecuritynews.com/beware-of-weaponized-voicemail-messages/
Open the Wrong “PDF” and Attackers Gain Remote Access to Your PC
A phishing campaign known as DEAD#VAX is tricking staff into opening what looks like a normal PDF invoice or purchase order, but is actually a virtual hard disk file. When opened, Windows mounts it as a new drive and runs a hidden script that installs AsyncRAT, giving attackers remote access and the ability to monitor and control the PC. Because the malicious code runs in memory and hides inside trusted Microsoft processes, it can be harder for security tools and later investigation to spot. This can lead to password theft, data exposure, and a foothold into wider networks.
AI Drives Doubling of Phishing Attacks in a Year
Cofense reports that security filters intercepted one phishing email every 19 seconds in 2025, more than double the rate in 2024. It warns that criminals are using AI to create faster, more convincing scams, including messages written in near flawless local languages. Nearly one in five phishing emails now relies on conversation alone, a tactic often linked to business email compromise, where attackers impersonate trusted contacts to trick staff into making payments or sharing sensitive information. Cofense also saw a 105% rise in remote access tools abuse and a 204% increase in phishing emails delivering malware.
https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/
Nitrogen Ransomware Is So Broken Even the Crooks Can’t Unlock Your Files
Researchers at Coveware have found that the Nitrogen ransomware group has a serious flaw in its file unlocking tool, meaning victims may be unable to recover data even if they pay. The issue affects attacks against VMware ESXi, a common virtualisation platform used to run servers, where the malware encrypts files using a corrupted key that cannot be matched to any working unlock code. Active since 2023 and extorting organisations since around September 2024, Nitrogen is not the most prolific group, but this bug turns its attacks into purely destructive cyber crime.
https://www.theregister.com/2026/02/04/nitrogen_ransomware_broken_decryptor/
The Human Layer of Security: Why People Are Still the Weakest Link in 2026
Despite major investment in tools and automation, people remain the primary cause of cyber security incidents. Gartner expects human error and social engineering, where criminals trick staff into unsafe actions, to drive 85% of data breaches by 2026, and Verizon links roughly two thirds of incidents to mistakes or misuse of login details. Threat actors are increasingly using AI to scale deception, with CrowdStrike’s 2025 report showing 79% of intrusions were malware-free and voice phishing rising 442%. Leaders should prioritise stronger day-to-day security habits, not just annual training, so staff become a resilient first line of defence.
What Is Cyber Risk Management and Why It Is Important for Businesses?
Cyber risk management is how organisations identify, understand and reduce the risks that come with using digital systems, networks and data. It is a continuous process, not a one-off exercise, because threats evolve as technology and working practices change. Effective cyber risk management considers people, processes and technology together, covering areas such as staff awareness, access controls, software updates, backups and monitoring. With around 39% of UK businesses reporting a cyber security breach or cyber attack in the last year, this approach helps reduce financial loss, disruption and reputational harm, while supporting compliance and stakeholder trust.
The Growing Cyber Risk in Interconnected Supply Chains
Supply chains are now a major driver of cyber risk across the UK, as disruption can spread quickly beyond a single organisation. Jaguar Land Rover, M&S, Heathrow and the Co-op were among hundreds impacted last year, with reported losses in the hundreds of millions, affecting thousands of suppliers, partners and customers. Human error contributes to over 60% of breaches, while attackers increasingly use convincing impersonation techniques to trick staff. Leaders can reduce exposure by setting clear security expectations for third parties, investing in staff training, and strengthening business continuity so essential services can keep running during disruption.
https://www.techuk.org/resource/the-growing-cyber-risk-in-interconnected-supply-chains.html
Over 75 Percent of Cyber Security Professionals Worry About AI Agent Risks
A survey of more than 1,500 cyber security professionals found that 73% say AI-powered threats are already significantly affecting their organisation, yet nearly half feel unprepared, even as 92% report major upgrades to defences. While 96% say AI improves the speed and efficiency of their work, concerns remain around data exposure (61%), regulatory breaches (56%) and misuse of AI tools (51%). Only 37% have a formal policy for deploying AI securely, highlighting that oversight of AI agents, including who and what they can access, is now a board-level issue.
Experts Show How Major UK Food Crisis Might Occur
A new study involving 39 experts from institutions including Anglia Ruskin University and the University of York warns that shocks such as extreme weather, a cyber attack or war could quickly disrupt the UK’s just-in-time food supply networks, driving price spikes and shortages. The report argues these pressures would hit low-income households hardest, increasing food insecurity and raising the risk of fraud, black market sales and illness, with worst case outcomes including social unrest. It recommends improving energy security, diversifying supply chains and supporting more resilient diets, alongside better cross-government planning.
https://www.aru.ac.uk/news/experts-show-how-major-uk-food-crisis-might-occur
Governance, Risk and Compliance
The Human Layer of Security: Why People are Still the Weakest Link in 2026 - Security Boulevard
Global tech spending is skyrocketing, and European firms are doubling down on investment | IT Pro
Novel Cyber Expectations for 2026 Reveal a Grab Bag of Risk
Why boards should be obsessed with their most 'boring' systems | CyberScoop
What is cyber risk management and why it is important for businesses? | The Global Recruiter
Threats
Ransomware, Extortion and Destructive Attacks
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Ransomware gangs focus on winning hearts and minds | Computer Weekly
Hackers exploit unsecured MongoDB instances to wipe data and demand ransom
Experts show how major UK food crisis might occur - ARU
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks
Nitrogen can't unlock its own ransomware after coding error • The Register
DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information
Ransomware gang uses ISPsystem VMs for stealthy payload delivery
CISA quietly updated ransomware flags on 59 flaws last year • The Register
Critical SmarterMail Vulnerability Exploited in Ransomware Attacks - SecurityWeek
The Case for a Ransom Payment Ban and When It Might Happen
Researchers Warn of New “Vect” RaaS Variant - Infosecurity Magazine
Ransomware Victims
M&S attackers hit German insurance giant – HanseMerkur | Cybernews
Ransomware leaves Belgian hospitals unable to pay staff | Cybernews
Panera Bread breach affected 5.1 Million accounts, HIBP Confirms
Quarterly losses top £300m at JLR in wake of cyber attack | Insider Media
One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch
Italian university La Sapienza goes offline after cyberattack
Romanian oil pipeline operator Conpet discloses cyberattack
Qilin claims Tulsa airport cyberattack | Cybernews
Spain's Ministry of Science shuts down systems after breach claims
Phishing & Email Based Attacks
AI Drives Doubling of Phishing Attacks in a Year - Infosecurity Magazine
Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals
Open the wrong “PDF” and attackers gain remote access to your PC | Malwarebytes
Private school parents targeted by fraudsters stealing fee payments | Scams | The Guardian
Cloud storage payment scam floods inboxes with fake renewals
Attackers Harvest Dropbox Logins Via Fake PDF Lures
Don't get caught out by Apple Pay phishing scams | Stuff
Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System
Zendesk spam wave returns, floods users with 'Activate account' emails
Other Social Engineering
Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals
Attackers Harvest Dropbox Logins Via Fake PDF Lures
Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
2FA/MFA
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Artificial Intelligence
AI Drives Doubling of Phishing Attacks in a Year - Infosecurity Magazine
OpenClaw AI Runs Wild in Business Environments
Alarm Grows as Social Network Entirely for AI Starts Plotting Against Humans
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
MoltBot Skills exploited to distribute 400+ malware packages in days
Moltbook, the AI social network, exposed human credentials due to vibe-coded security flaw
Researchers Hacked Moltbook and Accessed Thousands of Emails and DMs - Business Insider
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
It Turns Out 'Social Media for AI Agents' Is a Security Nightmare
DIY AI bot farm OpenClaw is a security 'dumpster fire' • The Register
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw - Infosecurity Magazine
Over 75 percent of cybersecurity professionals worry about AI agent risks - BetaNews
95% of AI Projects Are Unproductive and Not Breach Ready - Security Boulevard
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
82 percent of hackers now use AI - BetaNews
Cybersecurity in 2026: How AI will reshape the Digital Battlefield
AWS intruder pulled off AI-assisted cloud break-in in 8 mins • The Register
Autonomous attacks ushered cybercrime into AI era in 2025 - TechCentral.ie
AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+ - Infosecurity Magazine
Deepfake job seeker applied to work for an AI security firm • The Register
Paris Prosecutors Raid Elon Musk’s X Offices in France - Infosecurity Magazine
ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine
Bots/Botnets
Wave of Citrix NetScaler scans use thousands of residential proxies
Global SystemBC Botnet Found Active Across 10,000 Infected Systems - Infosecurity Magazine
Polish cops bail 20-year-old bedroom botnet operator • The Register
Careers, Roles, Skills, Working in Cyber and Information Security
Cyber Success Trifecta: Education, Certifications & Experience
How risk culture turns cyber teams predictive | CSO Online
Cloud/SaaS
AWS intruder pulled off AI-assisted cloud break-in in 8 mins • The Register
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Attackers Harvest Dropbox Logins Via Fake PDF Lures
Mandiant details how ShinyHunters abuse SSO to steal cloud data
Cloud storage payment scam floods inboxes with fake renewals
Cloud sovereignty is no longer just a public sector concern • The Register
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw - Infosecurity Magazine
Step Finance says compromised execs' devices led to $40M crypto theft
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Coinbase confirms insider breach linked to leaked support tool screenshots
Cyber Crime, Organised Crime & Criminal Actors
Holiday Hits: Hackers Love to Strike When Defenders Are Away
Cybercriminals set sites on identities | CSO Online
China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera
Data Breaches/Leaks
Exposed MongoDB instances still targeted in data extortion attacks
Step Finance says compromised execs' devices led to $40M crypto theft
Moltbook, the AI social network, exposed human credentials due to vibe-coded security flaw
Researchers Hacked Moltbook and Accessed Thousands of Emails and DMs - Business Insider
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Coinbase confirms insider breach linked to leaked support tool screenshots
Police Service of Northern Ireland officer names published on courts website - BBC News
Betterment breach scope pegged at 1.4M users • The Register
Hacker claims theft of data from 700,000 Substack users; Company confirms breach
Researcher reveals evidence of private Instagram profiles leaking photos
PSNI to compensate officers £7,500 for 2023 data breach • The Register
Panera Bread breach affected 5.1 Million accounts, HIBP Confirms
The Government Published Dozens of Nude Photos in the Epstein Files - The New York Times
Redditors breached Epstein’s email account using #1Island | Cybernews
Iron Mountain: Data breach mostly limited to marketing materials
Data Protection
Why Data Protection Matters | Cohen Seglias Pallas Greenhall & Furman PC - JDSupra
Data/Digital Sovereignty
Cloud sovereignty is no longer just a public sector concern • The Register
Denial of Service/DoS/DDoS
Polish cops bail 20-year-old bedroom botnet operator • The Register
Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics
Police shut down global DDoS operation, arrest 20-year-old - Help Net Security
Fraud, Scams and Financial Crime
Cloud storage payment scam floods inboxes with fake renewals
AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+ - Infosecurity Magazine
Private school parents targeted by fraudsters stealing fee payments | Scams | The Guardian
National Crime Agency and NatWest Issue Warning Over Invoice Fraud - Infosecurity Magazine
China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera
Google's disruption rips millions out of devices out of malicious network | CyberScoop
Identity and Access Management
Cybercriminals set sites on identities | CSO Online
Rising Risk of Compromised Credentials in AD - Security Boulevard
Insider Risk and Insider Threats
Ransomware gangs focus on winning hearts and minds | Computer Weekly
Step Finance says compromised execs' devices led to $40M crypto theft
The Human Layer of Security: Why People are Still the Weakest Link in 2026 - Security Boulevard
The best cyber defence is employee awareness, not technology
Human risk management: CISOs’ solution to the security awareness training paradox | CSO Online
Coinbase confirms insider breach linked to leaked support tool screenshots
Deepfake job seeker applied to work for an AI security firm • The Register
Law Enforcement Action and Take Downs
Paris raid on X focuses on child abuse material allegations
Empire Market co-founder faces 10 years to life after guilty plea
Polish cops bail 20-year-old bedroom botnet operator • The Register
Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine
Google's disruption rips millions out of devices out of malicious network | CyberScoop
Police shut down global DDoS operation, arrest 20-year-old - Help Net Security
Paris Prosecutors Raid Elon Musk’s X Offices in France - Infosecurity Magazine
ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine
Alleged 764 member arrested, charged with CSAM possession in New York | CyberScoop
International sting dismantles illegal streaming empire serving millions - Help Net Security
Four held in £3m illegal TV streaming raids - BBC News
Linux and Open Source
Open-source attacks move through normal development workflows - Help Net Security
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
Malware
Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
Open the wrong “PDF” and attackers gain remote access to your PC | Malwarebytes
Attackers Use Windows Screensavers to Drop Malware, RMM Tools
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
MoltBot Skills exploited to distribute 400+ malware packages in days
Global SystemBC Botnet Found Active Across 10,000 Infected Systems - Infosecurity Magazine
Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek
New GlassWorm attack targets macOS via compromised OpenVSX extensions
This stealthy Windows RAT holds live conversations with its operators | CSO Online
eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek
GlassWorm Returns to Shatter Developer Ecosystems
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Mobile
9 Million Android Devices Hijacked in Secret Proxy Network - Tech Advisor
IPE - Are printers and mobile devices your Achilles heel?
Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine
Google's disruption rips millions out of devices out of malicious network | CyberScoop
Apple's new privacy feature limits how precisely carriers track your location - Help Net Security
Models, Frameworks and Standards
NIST’s AI guidance pushes cybersecurity boundaries | CSO Online
Passwords, Credential Stuffing & Brute Force Attacks
From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain | CSO Online
Rising Risk of Compromised Credentials in AD - Security Boulevard
McDonald's tells customers to use better passwords • The Register
Regulations, Fines and Legislation
UK government must get its hands dirty on security, report says | Computer Weekly
The Case for a Ransom Payment Ban and When It Might Happen
The Government Published Dozens of Nude Photos in the Epstein Files - The New York Times
Five updates on the Trump admin’s cybersecurity agenda | Federal News Network
CISA tells agencies to stop using unsupported edge devices | CyberScoop
Social Media
Researcher reveals evidence of private Instagram profiles leaking photos
Paris raid on X focuses on child abuse material allegations
ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine
Supply Chain and Third Parties
Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek
The Growing Cyber Risk in Interconnected Supply Chains
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries - SecurityWeek
UK government must get its hands dirty on security, report says | Computer Weekly
Cyber Terrorism: A New Threat To World Security – OpEd – Eurasia Review
Cyber Insights 2026: Cyberwar and Rising Nation State Threats - SecurityWeek
Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security
UK warns of rising Russian, Chinese activity in High North
Nation State Actors
How does cyberthreat attribution help in practice?
Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security
China
Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries - SecurityWeek
Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek
FUD on the line as telcos contemplate the cost of quitting Chinese kit | Euractiv
UK warns of rising Russian, Chinese activity in High North
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera
Chinese organized crime networks moved $16 billion in crypto in 2025, according to report
Russia
Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks - Infosecurity Magazine
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
Russian ship anchors over trans-Atlantic cables in Bristol Channel
Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics
ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid - SecurityWeek
Poland traces December cyberattacks on 30 energy sites to Russian spy agency - Euromaidan Press
UK warns of rising Russian, Chinese activity in High North
North Korea
Labyrinth Chollima Evolves into Three North Korean Hacking Groups - Infosecurity Magazine
Iran
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security
Tools and Controls
IPE - Are printers and mobile devices your Achilles heel?
Attackers Use Windows Screensavers to Drop Malware, RMM Tools
Open-source attacks move through normal development workflows - Help Net Security
The Human Layer of Security: Why People are Still the Weakest Link in 2026 - Security Boulevard
Global tech spending is skyrocketing, and European firms are doubling down on investment | IT Pro
Open-source AI pentesting tools are getting uncomfortably good - Help Net Security
We moved fast and broke things. It’s time for a change. | CyberScoop
eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek
Rising Risk of Compromised Credentials in AD - Security Boulevard
Onboarding new AI hires calls for context engineering - here's your 3-step action plan | ZDNET
Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine
Holiday Hits: Hackers Love to Strike When Defenders Are Away
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities - Schneier on Security
AI May Supplant Pen Testers, But Trust Is Not There Yet
What Are Risk Sciences? A New Framework for Understanding Risk and Uncertainty | Newswise
Why boards should be obsessed with their most 'boring' systems | CyberScoop
Reports Published in the Last Week
Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals
Other News
Experts show how major UK food crisis might occur - ARU
UK government must get its hands dirty on security, report says | Computer Weekly
Dark Patterns Undermine Security, One Click at a Time
DOJ releases details alleged talented hacker working for Jeffrey Epstein
Advice firms' lack of focus on cybersecurity 'worrying'
Energy infrastructure cyberattacks are suddenly in fashion • The Register
Vulnerability Management
We moved fast and broke things. It’s time for a change. | CyberScoop
EU’s answer to CVE solves dependency issue, adds fragmentation risks | CSO Online
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities - Schneier on Security
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
Vulnerabilities
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks
Microsoft 365 Outlook Add-ins Weaponized to Exfiltrate Sensitive Email Data Without Leaving Traces
Microsoft fixes Outlook bug blocking access to encrypted emails
Cisco, F5 Patch High-Severity Vulnerabilities - SecurityWeek
Threat actors hijack web traffic after exploiting React2Shell vulnerability | CSO Online
Critical SmarterMail Vulnerability Exploited in Ransomware Attacks - SecurityWeek
Ivanti’s EPMM is under active attack, thanks to two critical zero-days | CyberScoop
CISA flags critical SolarWinds RCE flaw as exploited in attacks
SQL Injection Flaw Affects 40,000 WordPress Sites - Infosecurity Magazine
Malicious Commands in GitHub Codespaces Enable RCE - Infosecurity Magazine
Microsoft to disable NTLM by default in future Windows releases
Critical React Native Vulnerability Exploited in the Wild - SecurityWeek
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
Vulnerabilities Allowed Full Compromise of Google Looker Instances - SecurityWeek
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.