Black Arrow Cyber Threat Intelligence Briefing 10 April 2026
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
There are two big headlines for business leaders this week in our review of cyber security in the specialist and public media.
Anthropic’s AI model has identified thousands of new serious vulnerabilities in major operating systems and quickly established ways to exploit them. This is a ground-shift, because AI models used by attackers will likely be able to do the same soon, and many of these vulnerabilities had been undiscovered by human security researchers for decades. The second headline is the escalating use of a new type of phishing attack that can bypass controls. We published advisories on our website last week, with recommended actions that business leaders should focus on in response to these developments; see below for links to the advisories.
Other developments this week include ransomware attackers who disable security monitoring tools, Russian attackers gaining access to home and small-office routers, and research into organisations using Mac devices with out-of-date operating systems.
Our advice for business leaders remains consistent: ensure you have an unbiased understanding of your risks and how effectively those risks are addressed through your controls. This is achieved by upskilling on cyber security from a business perspective, and implementing proportionate governance enhanced by working with specialists in cyber risk management. Contact us to discuss how you can achieve this to help protect your business.
Top Cyber Stories of the Last Week
Anthropic’s New AI Model Finds and Exploits Zero-Days Across Every Major OS and Browser
Anthropic has reported a sharp leap in the ability of advanced AI to find and exploit previously unknown software flaws across major operating systems and web browsers. In testing, its new model uncovered thousands of serious weaknesses and produced working attack methods far more often than earlier versions. It also turned known flaws into usable exploits in less than a day at relatively low cost. The findings suggest the window between a vulnerability being discovered and weaponised is shrinking. This increases pressure on organisations to patch faster and strengthen their preparations for incident response.
https://www.helpnetsecurity.com/2026/04/08/anthropic-claude-mythos-preview-identify-vulnerabilities/
Hundreds of Orgs Compromised Daily in Microsoft Device Code Phishing Attacks
Microsoft has reported a large-scale phishing campaign that is compromising hundreds of organisations each day by abusing a legitimate sign in process designed for devices such as smart TVs and printers. The attackers use AI to create convincing, highly personalised emails and automate much of the attack, helping them evade detection and bypass multi-factor authentication. Once inside, they focus on finance related accounts, stealing sensitive emails and financial information. The campaign underlines the need for business leaders to restrict unnecessary sign‑in methods, reinforce employee phishing awareness, and ensure unusual authentication activity is monitored.
https://www.theregister.com/2026/04/07/microsoft_device_code_phishing/
Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions
Researchers have uncovered how the ransomware group Qilin is using a sophisticated attack chain designed to disable more than 300 security monitoring tools before launching encryption. The group hides malware inside trusted software, runs it largely in memory to avoid detection, and installs software to interfere with core Windows security functions. The campaign shows how attackers are neutralising defences first to extend their time undetected. For business leaders, this underlines the need for layered security and oversight of unusual system changes, and avoiding reliance on a single protective tool.
https://cybersecuritynews.com/qilin-ransomware-kill-edr/
More than Half of Enterprises Are Using Devices with Out-of-Date Operating Systems – and It’s Leaving Them Wide Open to Attacks
A review of more than 150,000 Mac devices shows weak device management is leaving many organisations exposed to cyber security risks. 53% of organisations had at least one device running a critically out of date operating system, while 95% of assessed applications had at least one medium severity weakness. The findings also show growing risks on Mac devices, with 44% seeing malicious network activity and 26% affected by cryptojacking, where attackers misuse devices to generate cryptocurrency.
Russian Hackers Exploiting Home and Small-office Routers in Massive DNS hijacking Attack
A Russian state-linked hacking group has compromised more than 200 organisations and 5,000 consumer devices by targeting home and small office routers since at least August 2025. By changing internet settings on these devices, the group was able to monitor web traffic and, in some cases, intercept sensitive information such as emails, login details and cloud data. Sectors affected include government, technology, telecoms and energy. The campaign highlights how poorly secured home networks used by remote and hybrid staff can create a serious cyber security risk for organisations.
https://cybersecuritynews.com/russian-hackers-exploiting-routers/
Why Britain’s Most Common Crime Has Been Poorly Investigated for Decades
Fraud remains the most common crime in Britain, with an estimated 4.2 million cases recorded in the year to September 2025, yet only a small share result in prosecution. For years, victims have faced poor support, weak investigations and outdated reporting systems, with some police forces taking no action on most cases. Reviews have also found too few specialist investigators, limited investment and inadequate technology. The UK Government has launched a new strategy focused on better victim support, reimbursement, stronger justice outcomes and a renewed reporting system.
Mobile Attack Surface Expands as Enterprises Lose Control
Jamf’s review of more than 1.7 million mobile devices shows many organisations are losing control of a rapidly expanding mobile risk. Over half had at least one device running a critically outdated operating system, 18% had users connecting to risky public Wi‑Fi, and 8% had clicked phishing links designed to steal credentials or sensitive data. The report also found 86% of widely used mobile apps carried known security weaknesses, with “shadow AI” in everyday apps creating new exposure. For business leaders, this underlines the importance of knowing what devices and apps are accessing corporate data, enforcing basic hygiene such as updates and secure connections, and maintaining visibility over how mobile tools are actually being used.
https://www.securityweek.com/mobile-attack-surface-expands-as-enterprises-lose-control/
FBI: Cyber Fraud Surges to $17.6 Billion in Losses as Scams, Crypto Theft Soar
The FBI’s latest figures show $17.6 billion in cyber‑enabled fraud losses in 2025, with over one million complaints filed. Investment scams caused the greatest financial harm, while business email compromise exceeded $3 billion in losses. Cryptocurrency was linked to more than $11.3 billion stolen, and reports involving AI‑enabled fraud are rising. For business leaders, the figures highlight growing financial exposure from impersonation, payment fraud, and emerging technologies, not just technical cyber incidents.
https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3
Boards Are Falling Short on Cyber Security
Board attention to cyber security is rising, but progress in reducing risk remains slow. Recent data shows cybercrime losses increased by 33% year on year, underlining the scale of the challenge. A common weakness is that boards often lack the expertise to judge whether senior cyber security leaders are effective, treat artificial intelligence mainly as a growth issue rather than a security and governance risk, and confuse regulatory compliance with genuine protection. Stronger outcomes come when cyber security is overseen as a business resilience issue tied to leadership accountability, operational continuity and competitive strength.
https://hbr.org/2026/04/boards-are-falling-short-on-cybersecurity
72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds
A Sagiss survey of 500 desk-based workers found that AI is making phishing emails and chat messages more polished, convincing and harder to recognise. Nearly three quarters of respondents said these messages are more believable than a year ago, while 64% said AI could plausibly imitate a colleague. The risk is heightened by pressured working habits: 63% admitted clicking a work link before properly checking it, 57% verified a request only after acting, and 68% review work messages outside normal hours. The findings show that speed and fatigue are now amplifying phishing risk as much as technical deception.
The Rise of Proactive Cyber: Why Defence Is No Longer Enough
Cyber attacks are moving too quickly for a purely reactive approach to keep pace. The time between an attacker gaining access and passing that access to a second criminal group has fallen from eight hours in 2022 to just 22 seconds in 2025, showing how coordinated and fast moving the threat has become. In response, governments and major technology providers are stepping up efforts to disrupt attackers earlier through legal action, infrastructure takedowns and stronger product security. For most organisations, however, the priority remains strong internal resilience, rapid evidence sharing and well rehearsed incident response.
Better Prepare for a Cyber Breach
Mid-market organisations face growing exposure to cyber attacks as a breach at one supplier or technology provider can quickly disrupt operations, deliveries and customer service across an entire business network. At the same time, 77% of organisations still lack the basic controls needed to protect artificial intelligence systems, data and cloud environments. The priority is stronger oversight of how AI tools are used, tighter access controls, clearer rules for staff and suppliers, and better governance so businesses can spot threats earlier, limit disruption and protect long term value.
https://professionalsecurity.co.uk/products/cyber/better-prepare-for-a-cyber-breach/
Advisories Published in the Last Week
Black Arrow Cyber Advisory 10 April 2026 – Frontier AI and the Changing Cyber Threat Landscape
https://www.blackarrowcyber.com/blog/advisory-10-april-2026-frontier-ai-changing-threat-landscape
Black Arrow Cyber Advisory - 10 April 2026 - Microsoft device code phishing campaigns targeting Microsoft 365 users
https://www.blackarrowcyber.com/blog/advisory-10-april-2026-microsoft-device-code-phishing
Governance, Risk and Compliance
Cyber threats need to be embedded in corporate culture – report
Most Organizations Do Not Fully Trust Their Cybersecurity Vendors
The rise of proactive cyber: Why defense is no longer enough | CSO Online
Better prepare for a cyber breach | Professional Security Magazine
Boards Are Falling Short on Cybersecurity
How to know you’re a real-deal CSO — and whether that job opening truly seeks one | CSO Online
Meaningful metrics demonstrate the value of cyber-resiliency | TechTarget
Cyberattacks On Law Firms Are Rising. Here’s What’s Driving It. - Above the Law
Threats
Ransomware, Extortion and Destructive Attacks
Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor's EDR Solutions
Qilin EDR killer infection chain
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
Man admits to locking thousands of Windows devices in extortion plot
German authorities identify REvil and GandCrab ransomware bosses
Ransomware reimagined: Why containment alone is no longer enough | resource | SC Media
Emulating the Concealed Sinobi Ransomware - Security Boulevard
Ransomware and Destructive Attack Victims
Die Linke German political party confirms data stolen by Qilin ransomware
Dutch hospitals hit after patient software cyberattack | Cybernews
Ransomware knocks Dutch healthcare software vendor offline • The Register
Signature Healthcare hit by cyberattack, services and pharmacies impacted
Ransomware attack on company that manages Dutch hospitals' patient files | NL Times
Phishing & Email Based Attacks
72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds
Hundreds compromised daily in Microsoft device code phishes • The Register
Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog
New Phishing Platform Used in Credential Theft Campaigns - Infosecurity Magazine
Device code phishing attacks surge 37x as new kits spread online
Phishers sneak through using GitHub and Jira’s own mail delivery infrastructure - Help Net Security
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
How a burner email can protect your inbox - setting one up one is easy and free | ZDNET
Business Email Compromise (BEC)/Email Account Compromise (EAC)
Other Social Engineering
Hundreds compromised daily in Microsoft device code phishes • The Register
Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog
Device code phishing attacks surge 37x as new kits spread online
Axios Attack Shows Social Complex Engineering Is Industrialized
I knew about North Korean hackers—they still tricked me and got into my computer | Fortune
Traffic violation scams switch to QR codes in new phishing texts
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malwarebytes
New macOS stealer campaign uses Script Editor in ClickFix attack
Social engineering attacks on open source developers are escalating - Help Net Security
Artificial Intelligence
72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds
Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog
Threat actor abuse of AI accelerates from tool to cyberattack surface | Microsoft Security Blog
Claude Code's innards revealed as source code leaked online • The Register
The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek
CISOs grapple with AI demands within flat budgets - Help Net Security
Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security - IT Security Guru
Anthropic Issues Copyright Takedowns to Scrub Claude Code Leak | PCMag
A.I. Is on Its Way to Upending Cybersecurity - The New York Times
Agentic AI's role in amplifying and creating insider risks | TechTarget
The AI Revolution in Cyber Conflict | Lawfare
How Security Leaders Can Safeguard Against Vibe Coding Security Risks - Infosecurity Magazine
Bots/Botnets
Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security
Residential proxies evaded IP reputation checks in 78% of 4B sessions
Residential proxies make a mockery of IP-based defenses - Help Net Security
Careers, Roles, Skills, Working in Cyber and Information Security
How to know you’re a real-deal CSO — and whether that job opening truly seeks one | CSO Online
ISC2 Publishes Guidance on the Inclusion of AI Security Concepts Across all its Certifications
The cybersecurity boom hiding a growing privacy skills shortage | TechRadar
Why modern cyber conflict is partly a global skills challenge | TechRadar
Cloud/SaaS
Trivy supply chain attack enabled European Commission cloud breach - Help Net Security
The EU is suffering a hacking crisis. Here’s what we know. – POLITICO
Snowflake customers hit in data theft attacks after SaaS integrator breach
Chaos malware expands from routers to Linux cloud servers - Help Net Security
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Hackers steal $3.6 million from crypto ATM giant Bitcoin Depot
Cryptographers place $5,000 bet whether quantum will matter • The Register
Cyber Crime, Organised Crime & Criminal Actors
Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security
Don't glamorize cybercrims, roast them instead • The Register
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
Threat Actors Get Crafty With Emojis to Escape Detection
Security lapse lets researchers view React2Shell hackers’ dashboard | CSO Online
Criminal wannabes even more dangerous than the pros • The Register
Data Breaches/Leaks
European Commission breach exposed data of 30 EU entities, CERT-EU says
Trivy supply chain attack enabled European Commission cloud breach - Help Net Security
The EU is suffering a hacking crisis. Here’s what we know. – POLITICO
Snowflake customers hit in data theft attacks after SaaS integrator breach
Jones Day Law Firm Says Hackers Accessed Some Clients’ Data (1)
FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’ - POLITICO
Claude Code's innards revealed as source code leaked online • The Register
Adobe Breach - Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records
Hundreds of UK soldiers exposed at military bases… by their Strava workouts
Anthropic Issues Copyright Takedowns to Scrub Claude Code Leak | PCMag
Die Linke German political party confirms data stolen by Qilin ransomware
Better prepare for a cyber breach | Professional Security Magazine
Google: New UNC6783 hackers steal corporate Zendesk support tickets
Hims & Hers warns of data breach after Zendesk support ticket breach
Denial of Service/DoS/DDoS
Major outage cripples Russian banking apps and metro payments nationwide
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals - Security Boulevard
Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest
Encryption
‘It’s a real shock’: quantum-computing breakthroughs pose imminent risks to cybersecurity
Cryptographers place $5,000 bet whether quantum will matter • The Register
Fraud, Scams and Financial Crime
Why Britain's most common crime has been poorly investigated for decades | UK News | Sky News
Nigerian romance scammer jailed after being caught out by fellow fraudster
Websites suffering from subscription bombing attacks | Cybernews
Life imprisonment for Cambodian scam compound operators - but will it make a difference?
Your marketing stack is an attack surface – is security watching? | TechRadar
Your customer passed authentication. So why are they sending money to a scammer? - Help Net Security
Hidden scammer arms race every business now faces - Insurance Post
Identity and Access Management
The Hidden Cost of Recurring Credential Incidents
MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert
Insider Risk and Insider Threats
Agentic AI's role in amplifying and creating insider risks | TechTarget
Insurance
Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net
Internet of Things – IoT
Internet-Connected Coffee Machine Reportedly Led to Corporate Data Breach - Security Boulevard
Law Enforcement Action and Take Downs
Man admits to locking thousands of Windows devices in extortion plot
Police Are Using Cookies To Catch Criminals - Here's How
Why Britain's most common crime has been poorly investigated for decades | UK News | Sky News
Nigerian romance scammer jailed after being caught out by fellow fraudster
Life imprisonment for Cambodian scam compound operators - but will it make a difference?
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
German authorities identify REvil and GandCrab ransomware bosses
Linux and Open Source
Social engineering attacks on open source developers are escalating - Help Net Security
The State of Trusted Open Source Report
Chaos malware expands from routers to Linux cloud servers - Help Net Security
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Microsoft suspends dev accounts for high-profile open source projects
Malvertising
Your marketing stack is an attack surface – is security watching? | TechRadar
Malware
Chaos malware expands from routers to Linux cloud servers - Help Net Security
New macOS stealer campaign uses Script Editor in ClickFix attack
Hackers use pixel-large SVG trick to hide credit card stealer
Malware Threat to Critical Infrastructure Raises Alarms
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
Mobile
Mobile Attack Surface Expands as Enterprises Lose Control - SecurityWeek
Android Malware Infects Over 2.3 Million Devices - Is Yours One? - Tech Advisor
Your phone is shouting your identity to every Wi-Fi network — fix it now
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Outages
‘Skipping a beat on resilience investment isn’t an option any more’ as IT outage costs soar | IT Pro
Passwords, Credential Stuffing & Brute Force Attacks
New Phishing Platform Used in Credential Theft Campaigns - Infosecurity Magazine
React2Shell Exploited in Large-Scale Credential Harvesting Campaign - SecurityWeek
MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malwarebytes
Regulations, Fines and Legislation
Old laws treat whitehats like criminals and pose risks | Cybernews
Trump wants to slash $707M from CISA's budget • The Register
Social Media
Software Supply Chain
Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack | CSO Online
Supply Chain and Third Parties
Axios Attack Shows Social Complex Engineering Is Industrialized
MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert
Trivy supply chain attack enabled European Commission cloud breach - Help Net Security
Snowflake customers hit in data theft attacks after SaaS integrator breach
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
MSSPs Caught in the Middle of Iran’s Cyber Escalation | perspective | MSSP Alert
Google: New UNC6783 hackers steal corporate Zendesk support tickets
Hims & Hers warns of data breach after Zendesk support ticket breach
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek
Cyber threat must be recognised despite geopolitical tensions
Iranian cyber activity hits US energy, water, and government networks - Help Net Security
The AI Revolution in Cyber Conflict | Lawfare
Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net
Why modern cyber conflict is partly a global skills challenge | TechRadar
Microsoft hints at bit bunkers for war zones • The Register
Fiber Optic Cables Turned Into Hidden Microphones to Secretly Spy on Your Conversations
Nation State Actors
The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek
Cyber threat must be recognised despite geopolitical tensions
China
FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’ - POLITICO
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
Russia
Russian military hackers reroute British internet users’ traffic
FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users
Feds quash widespread Russia-backed espionage network spanning 18,000 devices | CyberScoop
Your router could be Russian spy — Ukraine and FBI just exposed how Moscow did it - Euromaidan Press
Russian Hackers Exploiting Home and Small-office Routers in Massive DNS hijacking Attack
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
Russia's attempt to block VPNs is causing widespread banking outages | TechSpot
Major outage cripples Russian banking apps and metro payments nationwide
North Korea
Axios Attack Shows Social Complex Engineering Is Industrialized
How North Korean hackers turn legitimate infrastructure into an attack surface | TechFinitive
I knew about North Korean hackers—they still tricked me and got into my computer | Fortune
Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack | CSO Online
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
North Korea–linked hackers drain $285M from Drift in sophisticated attack
Iran
Iranian cyber activity hits US energy, water, and government networks - Help Net Security
MSSPs Caught in the Middle of Iran’s Cyber Escalation | perspective | MSSP Alert
Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest
News brief: Iran cyberattacks escalate, U.S. targets named | TechTarget
Cyber Agency Issues First Iran Threat Amid Government Shutdown
Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies
How Iranian hackers pose a threat to US critical infrastructure
Iran Conflict Heightens Cyber Threats to U.S. Energy Infrastructure
Iran digital repression surged amid war and protests: rights group
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Cyber threat must be recognised despite geopolitical tensions
The Hack That Exposed Syria’s Sweeping Security Failures | WIRED
Hack-for-hire spyware campaign targets journalists in Middle East, North Africa | CyberScoop
Tools and Controls
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Most Organizations Do Not Fully Trust Their Cybersecurity Vendors
Anthropic withholds Mythos Preview model because its hacking is too powerful
Better prepare for a cyber breach | Professional Security Magazine
Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security
The rise of proactive cyber: Why defense is no longer enough | CSO Online
‘Skipping a beat on resilience investment isn’t an option any more’ as IT outage costs soar | IT Pro
Social engineering attacks on open source developers are escalating - Help Net Security
Microsoft suspends dev accounts for high-profile open source projects
The Hidden Cost of Recurring Credential Incidents
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals - Security Boulevard
CISOs grapple with AI demands within flat budgets - Help Net Security
Why risk alone doesn't get you to yes - Help Net Security
How Security Leaders Can Safeguard Against Vibe Coding Security Risks - Infosecurity Magazine
Security Bosses Are All-In on AI, Here's Why
Proactive Threat Hunting - Security Boulevard
Russia's attempt to block VPNs is causing widespread banking outages | TechSpot
Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net
Meaningful metrics demonstrate the value of cyber-resiliency | TechTarget
Other News
Cyberattacks On Law Firms Are Rising. Here’s What’s Driving It. - Above the Law
Threat Actors Get Crafty With Emojis to Escape Detection
Even cybersecurity experts make simple mistakes. Here's the real lesson | PCWorld
Most CNI Firms Face Up to £5m in Downtime from OT Attacks - Infosecurity Magazine
Click, wait, repeat: Digital trust erodes one login at a time - Help Net Security
Why Cybersecurity Is the First Step in Preparing Your Company for an IPO - Security Boulevard
Vulnerability Management
Anthropic withholds Mythos Preview model because its hacking is too powerful
‘BlueHammer’ Windows Exploit Signals Microsoft Disclosure Issues
AI Vulnerability Detection With Anthropic Glasswing - Futurum
Is Anthropic’s New Claude Model a Cybersecurity Disaster?
Why Microsoft is forcing Windows 11 25H2 update on all eligible PCs | ZDNET
Vulnerabilities
React2Shell Exploited in Large-Scale Credential Harvesting Campaign - SecurityWeek
OpenClaw gives users yet another reason to be freaked out about security - Ars Technica
Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit - Infosecurity Magazine
Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers
New FortiClient EMS flaw exploited in attacks, emergency patch released
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
Hackers exploit critical flaw in Ninja Forms WordPress plugin
GPU Rowhammer Attack Enables Privilege Escalation - Infosecurity Magazine
Acrobat Reader zero-day exploited in the wild for many months - Help Net Security
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities - SecurityWeek
New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In - Security Boulevard
OpenSSL 3.6.2 lands with eight CVE fixes - Help Net Security
Severe StrongBox Vulnerability Patched in Android - SecurityWeek
Flatpak 1.16.4 fixes sandbox escape and three other security flaws - Help Net Security
Critical Flowise Vulnerability in Attacker Crosshairs - SecurityWeek
Grafana Patches AI Bug That Could Have Leaked User Data
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users - SecurityWeek
13-year-old bug in ActiveMQ lets hackers remotely execute commands
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.