Black Arrow Cyber Threat Intelligence Briefing 10 April 2026

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

There are two big headlines for business leaders this week in our review of cyber security in the specialist and public media.

Anthropic’s AI model has identified thousands of new serious vulnerabilities in major operating systems and quickly established ways to exploit them. This is a ground-shift, because AI models used by attackers will likely be able to do the same soon, and many of these vulnerabilities had been undiscovered by human security researchers for decades. The second headline is the escalating use of a new type of phishing attack that can bypass controls. We published advisories on our website last week, with recommended actions that business leaders should focus on in response to these developments; see below for links to the advisories.

Other developments this week include ransomware attackers who disable security monitoring tools, Russian attackers gaining access to home and small-office routers, and research into organisations using Mac devices with out-of-date operating systems.

Our advice for business leaders remains consistent: ensure you have an unbiased understanding of your risks and how effectively those risks are addressed through your controls. This is achieved by upskilling on cyber security from a business perspective, and implementing proportionate governance enhanced by working with specialists in cyber risk management. Contact us to discuss how you can achieve this to help protect your business.


Top Cyber Stories of the Last Week

Anthropic’s New AI Model Finds and Exploits Zero-Days Across Every Major OS and Browser

Anthropic has reported a sharp leap in the ability of advanced AI to find and exploit previously unknown software flaws across major operating systems and web browsers. In testing, its new model uncovered thousands of serious weaknesses and produced working attack methods far more often than earlier versions. It also turned known flaws into usable exploits in less than a day at relatively low cost. The findings suggest the window between a vulnerability being discovered and weaponised is shrinking. This increases pressure on organisations to patch faster and strengthen their preparations for incident response.

https://www.helpnetsecurity.com/2026/04/08/anthropic-claude-mythos-preview-identify-vulnerabilities/

Hundreds of Orgs Compromised Daily in Microsoft Device Code Phishing Attacks

Microsoft has reported a large-scale phishing campaign that is compromising hundreds of organisations each day by abusing a legitimate sign in process designed for devices such as smart TVs and printers. The attackers use AI to create convincing, highly personalised emails and automate much of the attack, helping them evade detection and bypass multi-factor authentication. Once inside, they focus on finance related accounts, stealing sensitive emails and financial information. The campaign underlines the need for business leaders to restrict unnecessary sign‑in methods, reinforce employee phishing awareness, and ensure unusual authentication activity is monitored.

https://www.theregister.com/2026/04/07/microsoft_device_code_phishing/

Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions

Researchers have uncovered how the ransomware group Qilin is using a sophisticated attack chain designed to disable more than 300 security monitoring tools before launching encryption. The group hides malware inside trusted software, runs it largely in memory to avoid detection, and installs software to interfere with core Windows security functions. The campaign shows how attackers are neutralising defences first to extend their time undetected. For business leaders, this underlines the need for layered security and oversight of unusual system changes, and avoiding reliance on a single protective tool.

https://cybersecuritynews.com/qilin-ransomware-kill-edr/

More than Half of Enterprises Are Using Devices with Out-of-Date Operating Systems – and It’s Leaving Them Wide Open to Attacks

A review of more than 150,000 Mac devices shows weak device management is leaving many organisations exposed to cyber security risks. 53% of organisations had at least one device running a critically out of date operating system, while 95% of assessed applications had at least one medium severity weakness. The findings also show growing risks on Mac devices, with 44% seeing malicious network activity and 26% affected by cryptojacking, where attackers misuse devices to generate cryptocurrency.

https://www.itpro.com/hardware/more-than-half-of-enterprises-are-using-devices-with-out-of-date-operating-systems-and-its-leaving-them-wide-open-to-attacks

Russian Hackers Exploiting Home and Small-office Routers in Massive DNS hijacking Attack

A Russian state-linked hacking group has compromised more than 200 organisations and 5,000 consumer devices by targeting home and small office routers since at least August 2025. By changing internet settings on these devices, the group was able to monitor web traffic and, in some cases, intercept sensitive information such as emails, login details and cloud data. Sectors affected include government, technology, telecoms and energy. The campaign highlights how poorly secured home networks used by remote and hybrid staff can create a serious cyber security risk for organisations.

https://cybersecuritynews.com/russian-hackers-exploiting-routers/

Why Britain’s Most Common Crime Has Been Poorly Investigated for Decades

Fraud remains the most common crime in Britain, with an estimated 4.2 million cases recorded in the year to September 2025, yet only a small share result in prosecution. For years, victims have faced poor support, weak investigations and outdated reporting systems, with some police forces taking no action on most cases. Reviews have also found too few specialist investigators, limited investment and inadequate technology. The UK Government has launched a new strategy focused on better victim support, reimbursement, stronger justice outcomes and a renewed reporting system.

https://news.sky.com/story/why-britains-most-common-crime-has-been-poorly-investigated-for-decades-13527495

Mobile Attack Surface Expands as Enterprises Lose Control

Jamf’s review of more than 1.7 million mobile devices shows many organisations are losing control of a rapidly expanding mobile risk. Over half had at least one device running a critically outdated operating system, 18% had users connecting to risky public Wi‑Fi, and 8% had clicked phishing links designed to steal credentials or sensitive data. The report also found 86% of widely used mobile apps carried known security weaknesses, with “shadow AI” in everyday apps creating new exposure. For business leaders, this underlines the importance of knowing what devices and apps are accessing corporate data, enforcing basic hygiene such as updates and secure connections, and maintaining visibility over how mobile tools are actually being used.

https://www.securityweek.com/mobile-attack-surface-expands-as-enterprises-lose-control/

FBI: Cyber Fraud Surges to $17.6 Billion in Losses as Scams, Crypto Theft Soar

The FBI’s latest figures show $17.6 billion in cyber‑enabled fraud losses in 2025, with over one million complaints filed. Investment scams caused the greatest financial harm, while business email compromise exceeded $3 billion in losses. Cryptocurrency was linked to more than $11.3 billion stolen, and reports involving AI‑enabled fraud are rising. For business leaders, the figures highlight growing financial exposure from impersonation, payment fraud, and emerging technologies, not just technical cyber incidents.

https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3

Boards Are Falling Short on Cyber Security

Board attention to cyber security is rising, but progress in reducing risk remains slow. Recent data shows cybercrime losses increased by 33% year on year, underlining the scale of the challenge. A common weakness is that boards often lack the expertise to judge whether senior cyber security leaders are effective, treat artificial intelligence mainly as a growth issue rather than a security and governance risk, and confuse regulatory compliance with genuine protection. Stronger outcomes come when cyber security is overseen as a business resilience issue tied to leadership accountability, operational continuity and competitive strength.

https://hbr.org/2026/04/boards-are-falling-short-on-cybersecurity

72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds

A Sagiss survey of 500 desk-based workers found that AI is making phishing emails and chat messages more polished, convincing and harder to recognise. Nearly three quarters of respondents said these messages are more believable than a year ago, while 64% said AI could plausibly imitate a colleague. The risk is heightened by pressured working habits: 63% admitted clicking a work link before properly checking it, 57% verified a request only after acting, and 68% review work messages outside normal hours. The findings show that speed and fatigue are now amplifying phishing risk as much as technical deception.

https://www.businesswire.com/news/home/20260402115530/en/72-of-Workers-Say-AI-Is-Giving-Phishing-a-Dangerous-New-Edge-Sagiss-Managed-Security-Survey-Finds

The Rise of Proactive Cyber: Why Defence Is No Longer Enough

Cyber attacks are moving too quickly for a purely reactive approach to keep pace. The time between an attacker gaining access and passing that access to a second criminal group has fallen from eight hours in 2022 to just 22 seconds in 2025, showing how coordinated and fast moving the threat has become. In response, governments and major technology providers are stepping up efforts to disrupt attackers earlier through legal action, infrastructure takedowns and stronger product security. For most organisations, however, the priority remains strong internal resilience, rapid evidence sharing and well rehearsed incident response.

https://www.csoonline.com/article/4154228/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough.html

Better Prepare for a Cyber Breach

Mid-market organisations face growing exposure to cyber attacks as a breach at one supplier or technology provider can quickly disrupt operations, deliveries and customer service across an entire business network. At the same time, 77% of organisations still lack the basic controls needed to protect artificial intelligence systems, data and cloud environments. The priority is stronger oversight of how AI tools are used, tighter access controls, clearer rules for staff and suppliers, and better governance so businesses can spot threats earlier, limit disruption and protect long term value.

https://professionalsecurity.co.uk/products/cyber/better-prepare-for-a-cyber-breach/


Advisories Published in the Last Week

Black Arrow Cyber Advisory 10 April 2026 – Frontier AI and the Changing Cyber Threat Landscape

https://www.blackarrowcyber.com/blog/advisory-10-april-2026-frontier-ai-changing-threat-landscape

Black Arrow Cyber Advisory - 10 April 2026 - Microsoft device code phishing campaigns targeting Microsoft 365 users

https://www.blackarrowcyber.com/blog/advisory-10-april-2026-microsoft-device-code-phishing



Threats

Ransomware, Extortion and Destructive Attacks

Akira ransomware group can achieve initial access to data encryption in less than an hour | CyberScoop

Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor's EDR Solutions

Cybercrime in the UK has nearly doubled, while police staffing grew just 31% — the numbers are staggering | TechRadar

Qilin EDR killer infection chain

Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations | Microsoft Security Blog

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Man admits to locking thousands of Windows devices in extortion plot

German authorities identify REvil and GandCrab ransomware bosses

Ransomware reimagined: Why containment alone is no longer enough | resource | SC Media

Emulating the Concealed Sinobi Ransomware - Security Boulevard

Ransomware and Destructive Attack Victims

Die Linke German political party confirms data stolen by Qilin ransomware

Dutch hospitals hit after patient software cyberattack | Cybernews

Ransomware knocks Dutch healthcare software vendor offline • The Register

Signature Healthcare hit by cyberattack, services and pharmacies impacted

Ransomware attack on company that manages Dutch hospitals' patient files | NL Times

Phishing & Email Based Attacks

72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds

Hundreds compromised daily in Microsoft device code phishes • The Register

Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog

New Phishing Platform Used in Credential Theft Campaigns - Infosecurity Magazine

Device code phishing attacks surge 37x as new kits spread online

Hackers are exploiting LinkedIn notifications with fake job alerts, tricking millions into giving away sensitive login information fast | TechRadar

Phishers sneak through using GitHub and Jira’s own mail delivery infrastructure - Help Net Security

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

How a burner email can protect your inbox - setting one up one is easy and free | ZDNET

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Business Email Compromises: Current Legal Trends and Key Strategies | Foley Hoag LLP - Security, Privacy and the Law - JDSupra

Other Social Engineering

Hundreds compromised daily in Microsoft device code phishes • The Register

Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog

Device code phishing attacks surge 37x as new kits spread online

Axios Attack Shows Social Complex Engineering Is Industrialized

Hackers are exploiting LinkedIn notifications with fake job alerts, tricking millions into giving away sensitive login information fast | TechRadar

'Verify before you act': security expert reveals the simple steps you can take to stay safe from deepfakes | TechRadar

I knew about North Korean hackers—they still tricked me and got into my computer | Fortune

Traffic violation scams switch to QR codes in new phishing texts

That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malwarebytes

New macOS stealer campaign uses Script Editor in ClickFix attack

Social engineering attacks on open source developers are escalating - Help Net Security

Artificial Intelligence

72% of Workers Say AI Is Giving Phishing a Dangerous New Edge, Sagiss Managed Security Survey Finds

Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog

Threat actor abuse of AI accelerates from tool to cyberattack surface | Microsoft Security Blog

Claude Code's innards revealed as source code leaked online • The Register

The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek

CISOs grapple with AI demands within flat budgets - Help Net Security

Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security - IT Security Guru

'Verify before you act': security expert reveals the simple steps you can take to stay safe from deepfakes | TechRadar

Anthropic Issues Copyright Takedowns to Scrub Claude Code Leak | PCMag

OpenAI, Anthropic contractor Mercor targeted in major security breach — what data was stolen, who carried out the hack? | Mint

A.I. Is on Its Way to Upending Cybersecurity - The New York Times

Agentic AI's role in amplifying and creating insider risks | TechTarget

The AI Revolution in Cyber Conflict | Lawfare

How Security Leaders Can Safeguard Against Vibe Coding Security Risks - Infosecurity Magazine

Bots/Botnets

Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Residential proxies make a mockery of IP-based defenses - Help Net Security

Careers, Roles, Skills, Working in Cyber and Information Security

How to know you’re a real-deal CSO — and whether that job opening truly seeks one | CSO Online

ISC2 Publishes Guidance on the Inclusion of AI Security Concepts Across all its Certifications

Why Graduate-Level Cybersecurity Training Is Becoming Essential for a Global Career | Wandering Educators

The cybersecurity boom hiding a growing privacy skills shortage | TechRadar

Why modern cyber conflict is partly a global skills challenge | TechRadar

Cloud/SaaS

EU cyberattack may have been worse than we thought - 90GB of data published online as 30 entities hit | TechRadar

Trivy supply chain attack enabled European Commission cloud breach - Help Net Security

The EU is suffering a hacking crisis. Here’s what we know. – POLITICO

Snowflake customers hit in data theft attacks after SaaS integrator breach

Chaos malware expands from routers to Linux cloud servers - Help Net Security

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar | The Record from Recorded Future News

Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now | Tom's Hardware

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Hackers steal $3.6 million from crypto ATM giant Bitcoin Depot

I can't think of anything that's off limits to them': FBI slams cybercriminals for attacking schools, hospitals, as crypto fraud soars | TechRadar

Cryptographers place $5,000 bet whether quantum will matter • The Register

Cyber Crime, Organised Crime & Criminal Actors

FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar | The Record from Recorded Future News

Cybercrime in the UK has nearly doubled, while police staffing grew just 31% — the numbers are staggering | TechRadar

Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security

Don't glamorize cybercrims, roast them instead • The Register

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat Actors Get Crafty With Emojis to Escape Detection

Security lapse lets researchers view React2Shell hackers’ dashboard | CSO Online

Criminal wannabes even more dangerous than the pros • The Register

Data Breaches/Leaks

European Commission breach exposed data of 30 EU entities, CERT-EU says

EU cyberattack may have been worse than we thought - 90GB of data published online as 30 entities hit | TechRadar

Trivy supply chain attack enabled European Commission cloud breach - Help Net Security

The EU is suffering a hacking crisis. Here’s what we know. – POLITICO

Snowflake customers hit in data theft attacks after SaaS integrator breach

Jones Day Law Firm Says Hackers Accessed Some Clients’ Data (1)

FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’ - POLITICO

Claude Code's innards revealed as source code leaked online • The Register

Adobe Breach - Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records

Hundreds of UK soldiers exposed at military bases… by their Strava workouts

'It beggars belief': UK military reveal locations inside sensitive bases through exercise app | UK News | Sky News

Anthropic Issues Copyright Takedowns to Scrub Claude Code Leak | PCMag

Die Linke German political party confirms data stolen by Qilin ransomware

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN

Better prepare for a cyber breach | Professional Security Magazine

Google: New UNC6783 hackers steal corporate Zendesk support tickets

Hims & Hers warns of data breach after Zendesk support ticket breach

Denial of Service/DoS/DDoS

Cyberattack on telecom giant Rostelecom disrupts internet services across Russia | The Record from Recorded Future News

Major outage cripples Russian banking apps and metro payments nationwide

Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals - Security Boulevard

Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest

Encryption

Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now | Tom's Hardware

‘It’s a real shock’: quantum-computing breakthroughs pose imminent risks to cybersecurity

Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account | TechCrunch

Cryptographers place $5,000 bet whether quantum will matter • The Register

Fraud, Scams and Financial Crime

Why Britain's most common crime has been poorly investigated for decades | UK News | Sky News

FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar | The Record from Recorded Future News

Cybercrime in the UK has nearly doubled, while police staffing grew just 31% — the numbers are staggering | TechRadar

'Verify before you act': security expert reveals the simple steps you can take to stay safe from deepfakes | TechRadar

Nigerian romance scammer jailed after being caught out by fellow fraudster

Websites suffering from subscription bombing attacks | Cybernews

Life imprisonment for Cambodian scam compound operators - but will it make a difference?

Your marketing stack is an attack surface – is security watching? | TechRadar

I can't think of anything that's off limits to them': FBI slams cybercriminals for attacking schools, hospitals, as crypto fraud soars | TechRadar

Your customer passed authentication. So why are they sending money to a scammer? - Help Net Security

Hidden scammer arms race every business now faces - Insurance Post

Identity and Access Management

The Hidden Cost of Recurring Credential Incidents

MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert

Insider Risk and Insider Threats

Agentic AI's role in amplifying and creating insider risks | TechTarget

Insurance

Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net

Internet of Things – IoT

When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers - Security Boulevard

Internet-Connected Coffee Machine Reportedly Led to Corporate Data Breach - Security Boulevard

Law Enforcement Action and Take Downs

Cybercrime in the UK has nearly doubled, while police staffing grew just 31% — the numbers are staggering | TechRadar

Man admits to locking thousands of Windows devices in extortion plot

Police Are Using Cookies To Catch Criminals - Here's How

Why Britain's most common crime has been poorly investigated for decades | UK News | Sky News

Nigerian romance scammer jailed after being caught out by fellow fraudster

Life imprisonment for Cambodian scam compound operators - but will it make a difference?

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

German authorities identify REvil and GandCrab ransomware bosses

Linux and Open Source

Social engineering attacks on open source developers are escalating - Help Net Security

The State of Trusted Open Source Report

Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account | TechCrunch

Chaos malware expands from routers to Linux cloud servers - Help Net Security

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

Microsoft suspends dev accounts for high-profile open source projects

Malvertising

Your marketing stack is an attack surface – is security watching? | TechRadar

Malware

Chaos malware expands from routers to Linux cloud servers - Help Net Security

New macOS stealer campaign uses Script Editor in ClickFix attack

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments | Microsoft Security Blog

Hackers use pixel-large SVG trick to hide credit card stealer

Malware Threat to Critical Infrastructure Raises Alarms

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Mobile

Mobile Attack Surface Expands as Enterprises Lose Control - SecurityWeek

Android Malware Infects Over 2.3 Million Devices - Is Yours One? - Tech Advisor

'This rootkit is highly persistent; a standard factory reset will not remove it': "NoVoice" Android malware on Google Play infects 50 apps across 2.3 million devices, here's what we know | TechRadar

Your phone is shouting your identity to every Wi-Fi network — fix it now

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Outages

‘Skipping a beat on resilience investment isn’t an option any more’ as IT outage costs soar | IT Pro

Passwords, Credential Stuffing & Brute Force Attacks

New Phishing Platform Used in Credential Theft Campaigns - Infosecurity Magazine

React2Shell Exploited in Large-Scale Credential Harvesting Campaign - SecurityWeek

MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert

Hackers are exploiting LinkedIn notifications with fake job alerts, tricking millions into giving away sensitive login information fast | TechRadar

That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malwarebytes

Regulations, Fines and Legislation

Cybercrime in the UK has nearly doubled, while police staffing grew just 31% — the numbers are staggering | TechRadar

Old laws treat whitehats like criminals and pose risks​ | Cybernews

EU data regulators support loosening cybersecurity compliance requirements | Article | Compliance Week

Trump wants to slash $707M from CISA's budget • The Register

Social Media

Hackers are exploiting LinkedIn notifications with fake job alerts, tricking millions into giving away sensitive login information fast | TechRadar

LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data | Tom's Hardware

Software Supply Chain

Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack | CSO Online

Supply Chain and Third Parties

Axios Attack Shows Social Complex Engineering Is Industrialized

MSSPs Are the New Target in Login-Based Attacks – Blackpoint Cyber | news | MSSP Alert

EU cyberattack may have been worse than we thought - 90GB of data published online as 30 entities hit | TechRadar

Trivy supply chain attack enabled European Commission cloud breach - Help Net Security

Snowflake customers hit in data theft attacks after SaaS integrator breach

OpenAI, Anthropic contractor Mercor targeted in major security breach — what data was stolen, who carried out the hack? | Mint

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

MSSPs Caught in the Middle of Iran’s Cyber Escalation | perspective | MSSP Alert

Google: New UNC6783 hackers steal corporate Zendesk support tickets

Hims & Hers warns of data breach after Zendesk support ticket breach


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek

Cyber threat must be recognised despite geopolitical tensions

Iranian cyber activity hits US energy, water, and government networks - Help Net Security

Russia denies Ukrainian intelligence assessment that its hackers have teamed up with Iran's for cyberattacks | Reuters

The AI Revolution in Cyber Conflict | Lawfare

Defence secretary reveals month-long Russian submarine operation over cables and pipelines north of UK - live updates - BBC News

Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net

Why modern cyber conflict is partly a global skills challenge | TechRadar

Microsoft hints at bit bunkers for war zones • The Register

Fiber Optic Cables Turned Into Hidden Microphones to Secretly Spy on Your Conversations

Nation State Actors

The New Rules of Engagement: Matching Agentic Attack Speed - SecurityWeek

Cyber threat must be recognised despite geopolitical tensions

China

FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’ - POLITICO

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN

Russia

Russian military hackers reroute British internet users’ traffic

Germany Intelligence Warns TP-Link Routers Exploited By Russian Hackers To Spy On Military And Critical I - Benzinga

FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users

Feds quash widespread Russia-backed espionage network spanning 18,000 devices | CyberScoop

Your router could be Russian spy — Ukraine and FBI just exposed how Moscow did it - Euromaidan Press

Russian Hackers Exploiting Home and Small-office Routers in Massive DNS hijacking Attack

Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks | The Record from Recorded Future News

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Russia denies Ukrainian intelligence assessment that its hackers have teamed up with Iran's for cyberattacks | Reuters

Defence secretary reveals month-long Russian submarine operation over cables and pipelines north of UK - live updates - BBC News

Russia's major internet services instructed on how to detect VPNs — but there may be some workarounds | TechRadar

Russia's attempt to block VPNs is causing widespread banking outages | TechSpot

Cyberattack on telecom giant Rostelecom disrupts internet services across Russia | The Record from Recorded Future News

Major outage cripples Russian banking apps and metro payments nationwide

Russia slowly trying to splinter its internet from rest of world, analysts say | Russia | The Guardian

North Korea

Axios Attack Shows Social Complex Engineering Is Industrialized

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

How North Korean hackers turn legitimate infrastructure into an attack surface | TechFinitive

I knew about North Korean hackers—they still tricked me and got into my computer | Fortune

Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack | CSO Online

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

North Korea–linked hackers drain $285M from Drift in sophisticated attack

Iran

Iran-linked hackers use Cold War tricks and fake online identities to steal secrets from Apple and Microsoft users | TechRadar

Russia denies Ukrainian intelligence assessment that its hackers have teamed up with Iran's for cyberattacks | Reuters

Iranian cyber activity hits US energy, water, and government networks - Help Net Security

MSSPs Caught in the Middle of Iran’s Cyber Escalation | perspective | MSSP Alert

Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest

News brief: Iran cyberattacks escalate, U.S. targets named | TechTarget

US warns of Iran-affiliated cyber-attacks on critical infrastructure across country | Iran | The Guardian

Cyber Agency Issues First Iran Threat Amid Government Shutdown

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

How Iranian hackers pose a threat to US critical infrastructure

Iran Conflict Heightens Cyber Threats to U.S. Energy Infrastructure

Iran digital repression surged amid war and protests: rights group

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Cyber threat must be recognised despite geopolitical tensions

The Hack That Exposed Syria’s Sweeping Security Failures | WIRED

Hack-for-hire spyware campaign targets journalists in Middle East, North Africa | CyberScoop


Tools and Controls

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Most Organizations Do Not Fully Trust Their Cybersecurity Vendors

Anthropic's new AI model finds and exploits zero-days across every major OS and browser - Help Net Security

Anthropic withholds Mythos Preview model because its hacking is too powerful

Apple, Google, and Microsoft join Anthropic's Project Glasswing to defend world's most critical software | ZDNET

Better prepare for a cyber breach | Professional Security Magazine

Cybercriminals move deeper into networks, hiding in edge infrastructure - Help Net Security

The rise of proactive cyber: Why defense is no longer enough | CSO Online

‘Skipping a beat on resilience investment isn’t an option any more’ as IT outage costs soar | IT Pro

Social engineering attacks on open source developers are escalating - Help Net Security

Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account | TechCrunch

Microsoft suspends dev accounts for high-profile open source projects

The Hidden Cost of Recurring Credential Incidents

Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals - Security Boulevard

CISOs grapple with AI demands within flat budgets - Help Net Security

Why risk alone doesn't get you to yes - Help Net Security

How Security Leaders Can Safeguard Against Vibe Coding Security Risks - Infosecurity Magazine

Security Bosses Are All-In on AI, Here's Why

Proactive Threat Hunting - Security Boulevard

Russia's major internet services instructed on how to detect VPNs — but there may be some workarounds | TechRadar

Russia's attempt to block VPNs is causing widespread banking outages | TechSpot

Act-of-War Clauses Cloud Cyber Insurance Coverage - DataBreaches.Net

Meaningful metrics demonstrate the value of cyber-resiliency | TechTarget





Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Advisory 10 April 2026 – Frontier AI and the Changing Cyber Threat Landscape