Black Arrow Cyber Threat Intelligence Briefing 06 February 2026

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

A new evolving business threat has come to the fore, caused by autonomous AI assistants such as OpenClaw (aka Clawdbot and Moltbot), with significant and developing cyber risk considerations. In our summaries below, we also give details of other developing attack methods, including voicemail alerts and fake PDFs. AI, as predicted, is also escalating the dangers of phishing emails and is a concern for 75% of cyber professionals.

We also look at how employees and supply chains represent significant security weaknesses and how to address them, further underlining why cyber security is not a technology subject but instead requires coordinated risk management across the business.

To address these risks, leadership teams need to ensure their cyber knowledge comes from impartial experts, to take greater command of the risks and avoid the same blind spots as their control providers across people, operations and technology. Contact us to discuss how to achieve this in a proportionate manner.


Top Cyber Stories of the Last Week

From Clawdbot to OpenClaw: This Viral AI Agent Is Evolving Fast – and It’s Nightmare Fuel for Security Pros

OpenClaw, a fast growing open source personal AI assistant, shows how quickly AI tools could reshape cyber risk. It can connect to everyday apps like WhatsApp, email and calendars, and needs broad permissions to take actions on a user’s behalf. That access creates new routes for cyber attack, including fake downloads and scams, malicious add-ons, unsafe settings that leak passwords or access keys, and hidden instructions that trick the AI into harmful actions. Despite 34 recent security fixes, leaders should treat autonomous assistants as high risk until governance and controls mature.

https://www.zdnet.com/article/clawdbot-moltbot-openclaw-security-nightmare/

Why Moltbook Changes the Enterprise Security Conversation

A new risk is emerging as artificial intelligence agents begin talking to each other on social platforms such as Moltbook, often without ongoing human oversight. Once an employee sets an agent in motion, it can continue reading and posting online for long periods, creating a largely invisible route for sensitive information to leak, including source code, customer data, or internal project details. There is also an inbound threat where agents may absorb harmful instructions or links posted by others, influencing behaviour and decisions. Organisations should consider blocking such platforms by default, with tightly governed exceptions where needed.

https://securityboulevard.com/2026/02/why-moltbook-changes-the-enterprise-security-conversation/

Beware of Weaponised Voicemail Messages Granting Hackers Remote Access to Your System

A new “Voicemail Trap” campaign is using fake voicemail notifications to trick staff into handing criminals remote access to their devices. The messages often impersonate trusted financial organisations and direct recipients to convincing, bank themed websites. Victims are told to download an “audio update” to hear the message, but the file is a script that silently installs legitimate remote management software, allowing attackers persistent access to steal data or deploy further malware. Researchers observed 86 websites linked to this activity on 12 January 2026. Leaders should reinforce click caution and block untrusted download prompts.

https://cybersecuritynews.com/beware-of-weaponized-voicemail-messages/

Open the Wrong “PDF” and Attackers Gain Remote Access to Your PC

A phishing campaign known as DEAD#VAX is tricking staff into opening what looks like a normal PDF invoice or purchase order, but is actually a virtual hard disk file. When opened, Windows mounts it as a new drive and runs a hidden script that installs AsyncRAT, giving attackers remote access and the ability to monitor and control the PC. Because the malicious code runs in memory and hides inside trusted Microsoft processes, it can be harder for security tools and later investigation to spot. This can lead to password theft, data exposure, and a foothold into wider networks.

https://www.malwarebytes.com/blog/news/2026/02/open-the-wrong-pdf-and-attackers-gain-remote-access-to-your-pc

AI Drives Doubling of Phishing Attacks in a Year

Cofense reports that security filters intercepted one phishing email every 19 seconds in 2025, more than double the rate in 2024. It warns that criminals are using AI to create faster, more convincing scams, including messages written in near flawless local languages. Nearly one in five phishing emails now relies on conversation alone, a tactic often linked to business email compromise, where attackers impersonate trusted contacts to trick staff into making payments or sharing sensitive information. Cofense also saw a 105% rise in remote access tools abuse and a 204% increase in phishing emails delivering malware.

https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/

Nitrogen Ransomware Is So Broken Even the Crooks Can’t Unlock Your Files

Researchers at Coveware have found that the Nitrogen ransomware group has a serious flaw in its file unlocking tool, meaning victims may be unable to recover data even if they pay. The issue affects attacks against VMware ESXi, a common virtualisation platform used to run servers, where the malware encrypts files using a corrupted key that cannot be matched to any working unlock code. Active since 2023 and extorting organisations since around September 2024, Nitrogen is not the most prolific group, but this bug turns its attacks into purely destructive cyber crime.

https://www.theregister.com/2026/02/04/nitrogen_ransomware_broken_decryptor/

The Human Layer of Security: Why People Are Still the Weakest Link in 2026

Despite major investment in tools and automation, people remain the primary cause of cyber security incidents. Gartner expects human error and social engineering, where criminals trick staff into unsafe actions, to drive 85% of data breaches by 2026, and Verizon links roughly two thirds of incidents to mistakes or misuse of login details. Threat actors are increasingly using AI to scale deception, with CrowdStrike’s 2025 report showing 79% of intrusions were malware-free and voice phishing rising 442%. Leaders should prioritise stronger day-to-day security habits, not just annual training, so staff become a resilient first line of defence.

https://securityboulevard.com/2026/02/the-human-layer-of-security-why-people-are-still-the-weakest-link-in-2026/

What Is Cyber Risk Management and Why It Is Important for Businesses?

Cyber risk management is how organisations identify, understand and reduce the risks that come with using digital systems, networks and data. It is a continuous process, not a one-off exercise, because threats evolve as technology and working practices change. Effective cyber risk management considers people, processes and technology together, covering areas such as staff awareness, access controls, software updates, backups and monitoring. With around 39% of UK businesses reporting a cyber security breach or cyber attack in the last year, this approach helps reduce financial loss, disruption and reputational harm, while supporting compliance and stakeholder trust.

https://www.theglobalrecruiter.com/what-is-cyber-risk-management-and-why-it-is-important-for-businesses/

The Growing Cyber Risk in Interconnected Supply Chains

Supply chains are now a major driver of cyber risk across the UK, as disruption can spread quickly beyond a single organisation. Jaguar Land Rover, M&S, Heathrow and the Co-op were among hundreds impacted last year, with reported losses in the hundreds of millions, affecting thousands of suppliers, partners and customers. Human error contributes to over 60% of breaches, while attackers increasingly use convincing impersonation techniques to trick staff. Leaders can reduce exposure by setting clear security expectations for third parties, investing in staff training, and strengthening business continuity so essential services can keep running during disruption.

https://www.techuk.org/resource/the-growing-cyber-risk-in-interconnected-supply-chains.html

Over 75 Percent of Cyber Security Professionals Worry About AI Agent Risks

A survey of more than 1,500 cyber security professionals found that 73% say AI-powered threats are already significantly affecting their organisation, yet nearly half feel unprepared, even as 92% report major upgrades to defences. While 96% say AI improves the speed and efficiency of their work, concerns remain around data exposure (61%), regulatory breaches (56%) and misuse of AI tools (51%). Only 37% have a formal policy for deploying AI securely, highlighting that oversight of AI agents, including who and what they can access, is now a board-level issue.

https://betanews.com/article/over-75-percent-of-cybersecurity-professionals-worry-about-ai-agent-risks/

Experts Show How Major UK Food Crisis Might Occur

A new study involving 39 experts from institutions including Anglia Ruskin University and the University of York warns that shocks such as extreme weather, a cyber attack or war could quickly disrupt the UK’s just-in-time food supply networks, driving price spikes and shortages. The report argues these pressures would hit low-income households hardest, increasing food insecurity and raising the risk of fraud, black market sales and illness, with worst case outcomes including social unrest. It recommends improving energy security, diversifying supply chains and supporting more resilient diets, alongside better cross-government planning.

https://www.aru.ac.uk/news/experts-show-how-major-uk-food-crisis-might-occur



Threats

Ransomware, Extortion and Destructive Attacks

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations | Dinsmore & Shohl LLP - JDSupra

Hackers exploit unsecured MongoDB instances to wipe data and demand ransom

Experts show how major UK food crisis might occur - ARU

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks

Nitrogen can't unlock its own ransomware after coding error • The Register

DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information

Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoing | IT Pro

Ransomware gang uses ISPsystem VMs for stealthy payload delivery

Bulletproof hosting providers renting cheap infrastructure to supply virtual machines to ransomware hackers | TechRadar

CISA quietly updated ransomware flags on 59 flaws last year • The Register

Critical SmarterMail Vulnerability Exploited in Ransomware Attacks - SecurityWeek

The Case for a Ransom Payment Ban and When It Might Happen

Researchers Warn of New “Vect” RaaS Variant - Infosecurity Magazine

Ransomware Victims

M&S attackers hit German insurance giant – HanseMerkur | Cybernews

Ransomware leaves Belgian hospitals unable to pay staff | Cybernews

Panera Bread breach affected 5.1 Million accounts, HIBP Confirms

Quarterly losses top £300m at JLR in wake of cyber attack | Insider Media

One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch

Italian university La Sapienza goes offline after cyberattack

Romanian oil pipeline operator Conpet discloses cyberattack

Qilin claims Tulsa airport cyberattack | Cybernews

Spain's Ministry of Science shuts down systems after breach claims

Phishing & Email Based Attacks

AI Drives Doubling of Phishing Attacks in a Year - Infosecurity Magazine

Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data

Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals

Open the wrong “PDF” and attackers gain remote access to your PC | Malwarebytes

Private school parents targeted by fraudsters stealing fee payments | Scams | The Guardian

Cloud storage payment scam floods inboxes with fake renewals

Attackers Harvest Dropbox Logins Via Fake PDF Lures

Almost a third of UK businesses hit by remote working-related cyberattacks as phishing concerns reach record high | Bdaily

Don't get caught out by Apple Pay phishing scams | Stuff

Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System

Zendesk spam wave returns, floods users with 'Activate account' emails

Other Social Engineering

Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals

Attackers Harvest Dropbox Logins Via Fake PDF Lures

Beware of Weaponized Voicemail Messages Granting Hackers Remote Access to Your System

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2FA/MFA

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Artificial Intelligence

AI Drives Doubling of Phishing Attacks in a Year - Infosecurity Magazine

OpenClaw AI Runs Wild in Business Environments

Alarm Grows as Social Network Entirely for AI Starts Plotting Against Humans

From Clawdbot to OpenClaw: This viral AI agent is evolving fast - and it's nightmare fuel for security pros | ZDNET

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

MoltBot Skills exploited to distribute 400+ malware packages in days

Moltbook, the AI social network, exposed human credentials due to vibe-coded security flaw

Researchers Hacked Moltbook and Accessed Thousands of Emails and DMs - Business Insider

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

It Turns Out 'Social Media for AI Agents' Is a Security Nightmare

DIY AI bot farm OpenClaw is a security 'dumpster fire' • The Register

Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw - Infosecurity Magazine

Over 75 percent of cybersecurity professionals worry about AI agent risks - BetaNews

95% of AI Projects Are Unproductive and Not Breach Ready - Security Boulevard

2026: The Year Agentic AI Becomes the Attack-Surface Poster Child

82 percent of hackers now use AI - BetaNews

Cybersecurity in 2026: How AI will reshape the Digital Battlefield

Microsoft and ServiceNow's exploitable agents reveal a growing - and preventable - AI security crisis | ZDNET

AWS intruder pulled off AI-assisted cloud break-in in 8 mins • The Register

Autonomous attacks ushered cybercrime into AI era in 2025 - TechCentral.ie

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign - SecurityWeek

AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+ - Infosecurity Magazine

Deepfake job seeker applied to work for an AI security firm • The Register

Paris Prosecutors Raid Elon Musk’s X Offices in France - Infosecurity Magazine

ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine

Bots/Botnets

Botnet smashes DDoS traffic record, equivalent to streaming 2.2 million Netflix 4K movies at once  — 31.4 Tb/s attack was large enough to take entire countries offline | Tom's Hardware

Massive 31.4 Tbps DDoS attack breaks records: How the 'apex' of botnets could be weaponizing your home devices | ZDNET

Wave of Citrix NetScaler scans use thousands of residential proxies

Global SystemBC Botnet Found Active Across 10,000 Infected Systems - Infosecurity Magazine

Polish cops bail 20-year-old bedroom botnet operator • The Register

Careers, Roles, Skills, Working in Cyber and Information Security

Cyber Success Trifecta: Education, Certifications & Experience

How risk culture turns cyber teams predictive | CSO Online

Cloud/SaaS

AWS intruder pulled off AI-assisted cloud break-in in 8 mins • The Register

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Attackers Harvest Dropbox Logins Via Fake PDF Lures

Mandiant details how ShinyHunters abuse SSO to steal cloud data

Cloud storage payment scam floods inboxes with fake renewals

Cloud sovereignty is no longer just a public sector concern • The Register

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw - Infosecurity Magazine

Step Finance says compromised execs' devices led to $40M crypto theft

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Coinbase confirms insider breach linked to leaked support tool screenshots

Cyber Crime, Organised Crime & Criminal Actors

Bulletproof hosting providers renting cheap infrastructure to supply virtual machines to ransomware hackers | TechRadar

BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game - Security Boulevard

Holiday Hits: Hackers Love to Strike When Defenders Are Away

Cybercriminals set sites on identities | CSO Online

China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera

Data Breaches/Leaks

Exposed MongoDB instances still targeted in data extortion attacks

BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game - Security Boulevard

Step Finance says compromised execs' devices led to $40M crypto theft

From Clawdbot to OpenClaw: This viral AI agent is evolving fast - and it's nightmare fuel for security pros | ZDNET

Moltbook, the AI social network, exposed human credentials due to vibe-coded security flaw

Researchers Hacked Moltbook and Accessed Thousands of Emails and DMs - Business Insider

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Coinbase confirms insider breach linked to leaked support tool screenshots

Dating-app giants investigate incidents after cybercriminals claim to steal data | The Record from Recorded Future News

Police Service of Northern Ireland officer names published on courts website - BBC News

Betterment breach scope pegged at 1.4M users • The Register

Hacker claims theft of data from 700,000 Substack users; Company confirms breach

Researcher reveals evidence of private Instagram profiles leaking photos

PSNI to compensate officers £7,500 for 2023 data breach • The Register

Panera Bread breach affected 5.1 Million accounts, HIBP Confirms

The Government Published Dozens of Nude Photos in the Epstein Files - The New York Times

Redditors breached Epstein’s email account using #1Island | Cybernews

Iron Mountain: Data breach mostly limited to marketing materials

Data Protection

Why Data Protection Matters | Cohen Seglias Pallas Greenhall & Furman PC - JDSupra

Data/Digital Sovereignty

Cloud sovereignty is no longer just a public sector concern • The Register

Denial of Service/DoS/DDoS

Botnet smashes DDoS traffic record, equivalent to streaming 2.2 million Netflix 4K movies at once  — 31.4 Tb/s attack was large enough to take entire countries offline | Tom's Hardware

Polish cops bail 20-year-old bedroom botnet operator • The Register

Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics

Police shut down global DDoS operation, arrest 20-year-old - Help Net Security

Fraud, Scams and Financial Crime

Cloud storage payment scam floods inboxes with fake renewals

AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+ - Infosecurity Magazine

Private school parents targeted by fraudsters stealing fee payments | Scams | The Guardian

National Crime Agency and NatWest Issue Warning Over Invoice Fraud - Infosecurity Magazine

China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera

Google's disruption rips millions out of devices out of malicious network | CyberScoop

A romance fraudster ruined my life – how I survived two years with a psychopath | Relationships | The Guardian

Identity and Access Management

Cybercriminals set sites on identities | CSO Online

Rising Risk of Compromised Credentials in AD - Security Boulevard

Insider Risk and Insider Threats

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Step Finance says compromised execs' devices led to $40M crypto theft

The Human Layer of Security: Why People are Still the Weakest Link in 2026 - Security Boulevard

The best cyber defence is employee awareness, not technology

Human risk management: CISOs’ solution to the security awareness training paradox | CSO Online

Coinbase confirms insider breach linked to leaked support tool screenshots

Deepfake job seeker applied to work for an AI security firm • The Register

Law Enforcement Action and Take Downs

Paris raid on X focuses on child abuse material allegations

Empire Market co-founder faces 10 years to life after guilty plea

Polish cops bail 20-year-old bedroom botnet operator • The Register

Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine

Google's disruption rips millions out of devices out of malicious network | CyberScoop

Police shut down global DDoS operation, arrest 20-year-old - Help Net Security

Paris Prosecutors Raid Elon Musk’s X Offices in France - Infosecurity Magazine

ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine

Alleged 764 member arrested, charged with CSAM possession in New York | CyberScoop

International sting dismantles illegal streaming empire serving millions - Help Net Security

Four held in £3m illegal TV streaming raids - BBC News

Linux and Open Source

Open-source attacks move through normal development workflows - Help Net Security

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

Malware

Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data

Open the wrong “PDF” and attackers gain remote access to your PC | Malwarebytes

Microsoft warns infostealer malware is 'rapidly expanding beyond traditional Windows-focused campaigns' and targeting Mac devices | TechRadar

Attackers Use Windows Screensavers to Drop Malware, RMM Tools

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

MoltBot Skills exploited to distribute 400+ malware packages in days

Global SystemBC Botnet Found Active Across 10,000 Infected Systems - Infosecurity Magazine

Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek

New GlassWorm attack targets macOS via compromised OpenVSX extensions

This stealthy Windows RAT holds live conversations with its operators | CSO Online

Attackers Use Legitimate Forensic Driver to Disable Endpoint Security, Huntress Warns - IT Security Guru

eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek

GlassWorm Returns to Shatter Developer Ecosystems

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Mobile

9 Million Android Devices Hijacked in Secret Proxy Network - Tech Advisor

IPE - Are printers and mobile devices your Achilles heel?

Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine

Google's disruption rips millions out of devices out of malicious network | CyberScoop

Apple's new privacy feature limits how precisely carriers track your location - Help Net Security

Models, Frameworks and Standards

NIST’s AI guidance pushes cybersecurity boundaries | CSO Online

Passwords, Credential Stuffing & Brute Force Attacks

From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain | CSO Online

Rising Risk of Compromised Credentials in AD - Security Boulevard

McDonald's tells customers to use better passwords • The Register

Regulations, Fines and Legislation

UK government must get its hands dirty on security, report says | Computer Weekly

The Case for a Ransom Payment Ban and When It Might Happen

The Government Published Dozens of Nude Photos in the Epstein Files - The New York Times

Five updates on the Trump admin’s cybersecurity agenda | Federal News Network

Civil Aviation Cybersecurity: EASA Part-IS Sets New Information Security Obligations | Jones Day - JDSupra

CISA tells agencies to stop using unsupported edge devices | CyberScoop

Social Media

Researcher reveals evidence of private Instagram profiles leaking photos

Paris raid on X focuses on child abuse material allegations

ICO Launches Investigation into X Over AI Non Consensual Sexual Images - Infosecurity Magazine

Supply Chain and Third Parties

Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek

The Growing Cyber Risk in Interconnected Supply Chains

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries - SecurityWeek

UK government must get its hands dirty on security, report says | Computer Weekly

Cyber Terrorism: A New Threat To World Security – OpEd – Eurasia Review

Cyber Insights 2026: Cyberwar and Rising Nation State Threats - SecurityWeek

Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security

UK warns of rising Russian, Chinese activity in High North

Nation State Actors

How does cyberthreat attribution help in practice?

Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security

China

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries - SecurityWeek

Notepad++ Supply Chain Hack Conducted by China via Hosting Provider - SecurityWeek

FUD on the line as telcos contemplate the cost of quitting Chinese kit | Euractiv

UK warns of rising Russian, Chinese activity in High North

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

China carries out further executions of Myanmar scam centre suspects | Crime News | Al Jazeera

Chinese organized crime networks moved $16 billion in crypto in 2025, according to report

Russia

Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks - Infosecurity Magazine

Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days

Russian ship anchors over trans-Atlantic cables in Bristol Channel

Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid - SecurityWeek

Poland traces December cyberattacks on 30 energy sites to Russian spy agency - Euromaidan Press

UK warns of rising Russian, Chinese activity in High North

North Korea

Labyrinth Chollima Evolves into Three North Korean Hacking Groups - Infosecurity Magazine

Iran

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security


Tools and Controls

Attackers Use Legitimate Forensic Driver to Disable Endpoint Security, Huntress Warns - IT Security Guru

Is A Cybersecurity Boom On The Horizon KPMG Survey Shows Surge In Cybersecurity Investment As AI Threats Redefine Risk

IPE - Are printers and mobile devices your Achilles heel?

Attackers Use Windows Screensavers to Drop Malware, RMM Tools

Open-source attacks move through normal development workflows - Help Net Security

The Human Layer of Security: Why People are Still the Weakest Link in 2026  - Security Boulevard

Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles - Security Boulevard

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations | Dinsmore & Shohl LLP - JDSupra

Global tech spending is skyrocketing, and European firms are doubling down on investment | IT Pro

Open-source AI pentesting tools are getting uncomfortably good - Help Net Security

We moved fast and broke things. It’s time for a change. | CyberScoop

eScan Antivirus Delivers Malware in Supply Chain Attack - SecurityWeek

Rising Risk of Compromised Credentials in AD - Security Boulevard

Onboarding new AI hires calls for context engineering - here's your 3-step action plan | ZDNET

Smartphones Now Involved in Nearly Every Police Investigation - Infosecurity Magazine

Holiday Hits: Hackers Love to Strike When Defenders Are Away

AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities - Schneier on Security

AI May Supplant Pen Testers, But Trust Is Not There Yet

What Are Risk Sciences? A New Framework for Understanding Risk and Uncertainty | Newswise

Why boards should be obsessed with their most 'boring' systems | CyberScoop





Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.


Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 30 January 2026