Black Arrow Cyber Threat Intelligence Briefing 13 June 2025

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week’s review starts with evolving cyber attack techniques including the targeting of IT and managed service providers to gain access to multiple firms through a single compromise, while other techniques include exploiting end-user trust in messages appearing in browsers, attacks on smartphones, and increasingly complex DDoS attacks. We also reflect on the need for all organisations to proactively plan for a cyber incident, and the need to improve cyber-resilience of food supplies.

Our analysis of specialist and other media highlights the threats that organisations face in protecting their data, with high criminal demand and sensitive data being exposed to insecure and unverified AI tools. We also include information on penetration testing, which is one of the key ways for organisations to identify and address vulnerabilities that can be exploited by attackers.

Finally, we include articles on developments within the attacker community, including groups of teenagers and young adults as well as nation states, and insights into the impact of geo-political developments on cyber security for organisations.

At Black Arrow, we believe organisations achieve the most appropriate security by taking a proactive, cross-functional approach to cyber resilience. This starts with board engagement and threat-informed decision-making, including managing risks that are currently being exploited through third parties such as IT and managed service providers.


Top Cyber Stories of the Last Week

Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks

ReliaQuest has reported that the group behind recent cyber attacks on UK retailers, including Marks & Spencer and Harrods, is now using advanced impersonation tactics to breach organisations via their IT providers. Over 80% of associated domains mimic trusted technology vendors, enabling attacks on high-value targets such as CISOs and CFOs. The group combines phishing kits with social engineering to bypass multi-factor authentication and exploit help desks. Its use of ransomware-as-a-service partnerships allows access to powerful attack tools, expanding its reach. Attacks increasingly target managed service providers to access multiple organisations through a single compromise.

https://www.infosecurity-magazine.com/news/scattered-spider-tech-vendor/

An Emerging Phishing Technique Exploits Trust in Browser-based Messages

ClickFix is an emerging phishing technique exploiting user trust in browser-based messages to deliver malware, with attacks now observed across EMEA and the US. These campaigns trick users into executing PowerShell commands by mimicking familiar prompts, such as fake CAPTCHA checks, browser errors or job interview glitches. Unlike traditional phishing emails, these attacks unfold entirely within the browser, making detection and prevention more difficult. Threat actors are leveraging ClickFix to install a range of malware, from credential stealers to remote access tools, and the method’s adaptability is increasing its appeal. Organisations are advised to adopt phishing-resistant authentication and identity-focused defences.

https://www.darkreading.com/remote-workforce/cutting-edge-clickfix-snowball-phishing

Cyber Attacks on Smartphones Hit New High – Here’s How to Stay Safe

Kaspersky has reported a sharp rise in mobile cyber threats, with malware targeting Android users increasing by 27% in early 2025 compared to the previous quarter. Over 12 million users were affected, with banking trojans and data-stealing malware identified as the primary threats. Some infections were traced to preinstalled malware on new phones, highlighting supply chain risks. Notably active malware families included those capable of stealing credentials, intercepting messages and tampering with cryptocurrency transactions. The report warns that mobile devices are not inherently safer than desktops, and users should treat app downloads and device permissions with far greater caution.

https://www.techradar.com/pro/security/cyberattacks-on-smartphones-hit-new-high-heres-how-to-stay-safe

Distributed Denial of Service Attacks on Financial Sector Surge in Scale and Sophistication

FS-ISAC and Akamai have reported a sharp rise in both the volume and complexity of Distributed Denial of Service (DDoS) attacks targeting the financial sector. In October 2024 alone, nearly 350 separate DDoS events were recorded, with some comprising billions of malicious requests. The report highlights a 23% increase in application-layer attacks over the past year, affecting login portals and APIs. What was once seen as a nuisance is now considered a strategic threat, with attackers using adaptive, multi-vector techniques to bypass defences. This surge is fuelled by escalating geopolitical tensions, with hacktivist groups exploiting global events to launch targeted disruption campaigns.

https://www.infosecurity-magazine.com/news/ddos-financial-sector-surge/

Cyber Resilience Begins Before the Crisis

Microsoft’s Deputy CISO highlights the critical need for proactive planning and clear communication in cyber incident response. Many firms treat cyber attacks as isolated IT issues, yet the impact extends across legal, HR, communications and executive leadership. Two common misconceptions, assuming incidents are minor and viewing them as purely technical, undermine resilience. Effective preparation includes tested playbooks, decision frameworks, backup communications, and rehearsed messaging strategies. AI is emerging as a valuable support tool, enhancing detection and response coordination. Ultimately, cyber resilience is a leadership issue requiring cross-functional accountability, continuous refinement, and executive engagement.

https://www.microsoft.com/en-us/security/blog/2025/06/12/cyber-resilience-begins-before-the-crisis/

How Did Britain’s Food Supplies Become So Vulnerable?

A ransomware attack on chilled food distributor Peter Green Chilled left over £100,000 worth of meat products stranded, highlighting vulnerabilities in the UK's cold chain logistics. With around 50 per cent of all UK food moving through this network, any disruption can rapidly impact supermarket shelves. Industry experts warn that cyber attacks on supply chain providers are growing in sophistication, with attackers targeting warehouse systems and vehicle tracking to halt distribution. Despite the sector’s critical role in food and pharmaceutical delivery, it currently lacks formal Critical National Infrastructure recognition, limiting coordinated incident response planning at a national level.

https://www.telegraph.co.uk/news/2025/06/05/how-did-britains-food-supplies-become-so-vulnerable/

Europol Says Criminal Demand for Data is “Skyrocketing”

Europol’s latest assessment highlights a booming criminal underground economy fuelled by an insatiable demand for data. With personal and business information now a central commodity, cyber criminals are exploiting gaps in digital literacy and complex IT environments to steal, trade and weaponise data at scale. Stolen credentials are repeatedly used to fuel further breaches, while specialised marketplaces and encrypted channels facilitate widespread illicit trade. Europol warns this cycle is eroding public trust and undermining economic stability.

https://www.infosecurity-magazine.com/news/europol-criminal-demand-data/

AI Is a Data-Breach Time Bomb, Reveals New Report

Varonis has found that nearly every organisation is vulnerable to data exposure as a result of adopting AI without adequate controls. Analysis of 1,000 data risk assessments revealed 99% had sensitive data exposed to AI tools, and 90% had critical cloud data openly accessible. Shadow AI and unverified apps were present in 98% of cases, while 1 in 7 lacked multi-factor authentication. The report highlights how poor identity governance, excessive data access, and sprawling cloud environments are creating significant breach risks. It urges organisations to tighten access, monitor data use, and employ automation to safeguard information in the AI era.

https://www.bleepingcomputer.com/news/security/ai-is-a-data-breach-time-bomb-reveals-new-report/

What Is Penetration Testing? Types, Processes, Tools, and Why It’s All Worth It

Penetration testing is a controlled and authorised simulation of a cyber attack, designed to identify vulnerabilities that could be exploited by real-world threat actors. Ethical hackers emulate criminal tactics to test systems, infrastructure, and even staff behaviour. While automated scans help detect known flaws, penetration testing offers deeper insight by revealing how small issues can be combined into significant risks. It plays a critical role in strengthening cyber resilience, supporting regulatory compliance such as ISO 27001, and demonstrating due diligence. Organisations typically conduct pen tests one or more times a year, often alongside continuous automated scanning.

Black Arrow delivers tailored penetration testing services together with a range of selected partners to help uncover real-world risks through expert-led assessments.

https://blog.jetbrains.com/teamcity/2025/06/what-is-penetration-testing/

Internet Infamy Drives the Com’s Crime Sprees

A growing cyber criminal movement known as “The Com” is drawing in teenagers and young adults who are motivated more by notoriety than money. Their activities range from phishing and SIM swapping to swatting, sextortion and, in some cases, physical violence. Researchers estimate only a small core group is responsible for the most serious crimes, but the wider subculture is expanding rapidly. Law enforcement is now treating parts of the movement as a terrorism threat, with arrests increasing. Analysts warn that underlying socio-economic pressures are driving recruitment, particularly among minors who are seen as lower-risk by criminal gangs.

https://cyberscoop.com/the-com-subculture-infamy-crimes/

China-Linked Threat Actor Targeted +70 Orgs Worldwide, SentinelOne Warns

SentinelOne has uncovered a sustained cyber espionage campaign linked to China, affecting over 70 organisations globally between July 2024 and March 2025. Targets included government bodies, media outlets, and firms in sectors such as finance, manufacturing, and telecoms. The threat actor, dubbed PurpleHaze, used sophisticated techniques including obfuscated malware and dynamic relay networks to maintain stealth and persistence. Victims ranged from a South Asian government entity to a European media firm and even SentinelOne itself. The research highlights an ongoing trend of state-aligned groups targeting cyber security providers, underscoring the need for continuous monitoring and collective defence through intelligence sharing.

https://securityaffairs.com/178819/apt/china-linked-threat-actor-targeted-70-orgs-worldwide-sentinelone-warns.html

Here’s Why Ignoring Politics Is No Longer an Option for Cyber Defence

Flashpoint’s latest report underscores the growing overlap between global politics and cyber threats, with geopolitical tensions now seen as a key driver of cyber activity. Russian organisations, once largely avoided by cyber criminals, are increasingly targeted due to shifting allegiances following the Ukraine conflict. The SANS Institute found that nearly 500 professionals now view cyber security as a core business risk shaped by international events. Threat actors from countries such as North Korea, Iran, and China are deploying tactics including AI-generated deepfakes and disinformation to destabilise democratic processes and evade sanctions, highlighting the need for a broader geopolitical lens in threat assessments.

https://cybernews.com/security/ignoring-politics-is-no-longer-an-option-for-cyber-pros/

UK to Join Up with Allies for Stronger Response to Putin’s ‘Grey Zone’ Warfare

The UK is strengthening cooperation with allies to deter and respond to so-called grey zone threats, including cyber attacks, sabotage of undersea infrastructure and disinformation operations. These sub-threshold activities, increasingly used by Russia, are designed to destabilise without triggering full-scale military conflict. The Government’s latest Strategic Defence Review highlights the need for joint crisis decision-making and improved readiness to counter such tactics. NATO has reaffirmed that cyber or hybrid attacks may justify a collective response under Article 5. The review also stresses the growing complexity of threats, particularly where state actors blur the lines between conventional, cyber and nuclear deterrence.

https://inews.co.uk/news/politics/uk-allies-putin-grey-zone-warfare-3735380



Threats

Ransomware, Extortion and Destructive Attacks

DragonForce Victimisation on the Rise | SC Media UK

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Scattered Spider and DragonForce unite to cash in on M&S hacking

Scattered Spider Uses Tech Vendor Impersonation to Target Helpdesks - Infosecurity Magazine

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Threat hunting case study: DragonForce | Intel 471

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Agencies Release Actionable Guidance on Play Ransomware | Schwabe, Williamson & Wyatt PC - JDSupra

'PathWiper' Attack Hits Critical Infrastructure In Ukraine

LockBit panel data leak shows Chinese orgs among the most targeted - Help Net Security

South African man imprisoned after ransom demand against his former employer

Ransomware Victims

Scattered Spider and DragonForce unite to cash in on M&S hacking

M&S food sales growth collapses after cyber attack

M&S cyber attack should prompt retailers to focus on response

How did Britain’s food supplies become so vulnerable?

M&S restarts online orders after cyber attack - BBC News

Tax resolution firm Optima Tax Relief hit by ransomware, data leaked

Main distributor to Amazon’s Whole Foods hit by cyber attack

British Horseracing Authority targeted by cyber attack - BBC Sport

Phishing & Email Based Attacks

Cutting-Edge ClickFix Tactics Snowball

Study: 73% of founders can’t spot phishing emails | Cybernews

Employees repeatedly fall for vendor email compromise attacks - Help Net Security

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

What is asymmetric cyberattack? | Definition from TechTarget

AitM Phishing Attacks Targeting Microsoft 365 and Google to Steal Login Credentials

That ‘unsubscribe’ link is actually a hidden security risk — do this instead | Tom's Guide

Phishing Alert as Erie Insurance Reveals Cyber “Event” - Infosecurity Magazine

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Employees repeatedly fall for vendor email compromise attacks - Help Net Security

Other Social Engineering

Cutting-Edge ClickFix Tactics Snowball

Help Desk Hoax: How Attackers Bypass Tech Defenses

Cybercriminals are turning stolen data into a thriving black market - Help Net Security

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

What is asymmetric cyberattack? | Definition from TechTarget

The 'red flag' Grindr users should watch out for to stay safe

FIN6 hackers pose as job seekers to backdoor recruiters’ devices

Fraud, Scams and Financial Crime

The 'red flag' Grindr users should watch out for to stay safe

145 criminal domains linked to BidenCash Marketplace seized - Help Net Security

Mastercard: Fraud attempts jump as retailers feel cyber attack sting

US files to seize $7.7M laundered by North Korean IT workers • The Register

Five plead guilty to laundering $36 million stolen in investment scams

44% of people encounter a mobile scam every single day, Malwarebytes finds | Malwarebytes

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

Amazon promises fake reviews crackdown after investigation by UK watchdog | Amazon | The Guardian

Artificial Intelligence

Godfather of AI Alarmed as Advanced Systems Quickly Learning to Lie, Deceive, Blackmail and Hack

Next-Gen Developers Are a Cybersecurity Powder Keg

AI threats leave SecOps teams burned out and exposed - Help Net Security

Cloud and AI drive efficiency, but open doors for attackers - Help Net Security

Cyber crime is surging. Will AI make it worse?

AI is a data-breach time bomb, reveals new report

What CISOs need to know about agentic AI - Help Net Security

AI agents sometimes act like rogue employees, and nearly no one is watching what they’re doing | TechRadar

Securing agentic AI systems before they go rogue - Help Net Security

UK ICO publishes AI and biometrics strategy | Computer Weekly

Enterprises stuck in AI pilot hell, says Chatterbox Labs • The Register

When Grok is wrong: The risks of AI chatbots spreading misinformation in a crisis - Bulletin of the Atomic Scientists

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

Malware

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

CISO who helped unmask Badbox warns: Version 3 is coming • The Register

Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified - SecurityWeek

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

React Native Aria Packages Backdoored in Supply Chain Attack - SecurityWeek

Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems - SecurityWeek

Dangerous new MacOS malware is targeting Apple users everywhere - here's what you need to know | TechRadar

DanaBot malware operators exposed via C2 bug added in 2022

Bots/Botnets

CISO who helped unmask Badbox warns: Version 3 is coming • The Register

New Mirai botnet infect TBK DVR devices via command injection flaw

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years - SecurityWeek

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

Mobile

Cyber attacks on smartphones hit new high - here's how to stay safe | TechRadar

44% of people encounter a mobile scam every single day, Malwarebytes finds | Malwarebytes

Millions of low-cost Android devices turn home networks into crime platforms - Ars Technica

Chinese phone hacks, user lapses create 'mobile security crisis' | Fortune

Blocking stolen phones from the cloud can but won't be done • The Register

Cops want Apple, Google to kill stolen phones remotely • The Register

Apple and Google clash with police and MPs over phone thefts - BBC News

Google patched bug leaking phone numbers tied to accounts

Denial of Service/DoS/DDoS

Don’t give hacktivists what they really want | CSO Online

DDoS Attacks on Financial Sector Surge in Scale and Sophistication - Infosecurity Magazine

Internet of Things – IoT

Millions of low-cost Android devices turn home networks into crime platforms - Ars Technica

CISO who helped unmask Badbox warns: Version 3 is coming • The Register

New Mirai botnet infect TBK DVR devices via command injection flaw

40,000 cameras expose feeds to datacenters, health clinics • The Register

I found terrifying smart home security holes and you probably have them too

Data Breaches/Leaks

Cyber criminals are turning stolen data into a thriving black market - Help Net Security

Europol Says Criminal Demand for Data is “Skyrocketing” - Infosecurity Magazine

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years - SecurityWeek

AI is a data-breach time bomb, reveals new report

The Dark Web's Currency of Choice: Stolen Data - IT Security Guru

Legal aid lawyers face 'chaos' following cyber attack - as some left 'in tears' and... - LBC

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

'Major compromise' at NHS temping arm never disclosed • The Register

Phishing Alert as Erie Insurance Reveals Cyber “Event” - Infosecurity Magazine

86 million AT&T customer records reportedly up for sale on the dark web | ZDNET

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source

Over 4 billion user records leaked in "largest breach ever" - here's what you need to know | TechRadar

Insurer Exposed Drivers' Personal Information, Court Told - Law360

Organised Crime & Criminal Actors

Cyber criminals are turning stolen data into a thriving black market - Help Net Security

Europol Says Criminal Demand for Data is “Skyrocketing” - Infosecurity Magazine

Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified - SecurityWeek

Cyber crime is surging. Will AI make it worse?

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

Five plead guilty to laundering $36 million stolen in investment scams

Cyber criminals turn to “residential proxy” services to hide malicious traffic

Internet infamy drives The Com's crime sprees | CyberScoop

Cyber crime news: How this Canadian hacker was caught

How Crime-As-A-Service Turned Hacking Into A Subscription Business

Hacking the Hackers: When Bad Guys Let Their Guard Down

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Hacker arrested after exploiting 5,000 accounts in $4.5 million cryptojacking scheme | TechSpot

US accuses Russian crypto entrepreneur of money laundering and sanctions evasion

145 criminal domains linked to BidenCash Marketplace seized - Help Net Security

Insurance

Cyber insurance demand is rising, but not 'evenly': Beazley cyber head | Insurance Business America

MSSPs, MSPs See Growing Strategic Role in Cyber Insurance   | MSSP Alert

Supply Chain and Third Parties

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

M&S restarts online orders after cyber attack - BBC News

Main distributor to Amazon’s Whole Foods hit by cyber attack

CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness | CSO Online

Third-party security weaknesses threaten Europe’s big banks | Computer Weekly

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

Cloud/SaaS

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Cloud and AI drive efficiency, but open doors for attackers - Help Net Security

AitM Phishing Attacks Targeting Microsoft 365 and Google to Steal Login Credentials

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Google Cloud and Cloudflare hit by widespread service outages

Outages

Massive cloud outage knocks out internet services across the globe | ZDNET

‘Severe’ network outages costing $160bn globally | Computer Weekly

Encryption

CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness | CSO Online

See How Much Faster a Quantum Computer Will Crack Encryption | WIRED

Quantum Computers Pose a Grave Risk to The Future. Here's Why. : ScienceAlert

Digital rights groups sound alarm on Stop CSAM Act  | CyberScoop

Linux and Open Source

Unverified code is the next national security threat | CyberScoop

Passwords, Credential Stuffing & Brute Force Attacks

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

Social Media

The 'red flag' Grindr users should watch out for to stay safe

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Regulations, Fines and Legislation

Trump cyber executive order takes aim at prior orders, secure software, more | CyberScoop

Banks Challenge Treasury on Cybersecurity Failures - The Global Treasurer

Digital rights groups sound alarm on Stop CSAM Act  | CyberScoop

UK ICO publishes AI and biometrics strategy | Computer Weekly

Trump limits use of cyber rules to punish US hackers, election meddlers - Defense One

Trump to Keep Starlink at White House Despite Cyber Security Concern

Models, Frameworks and Standards

Enterprise SIEMs miss 79% of known MITRE ATT&CK techniques - Help Net Security

SIEMs Missing the Mark on MITRE ATT&CK Techniques

NIST Launches Updated Incident Response Guide - Security Boulevard

NIST Publishes New Zero Trust Implementation Guidance - Infosecurity Magazine

Data Protection

Security & data protection: when two become one | TechRadar

Careers, Working in Cyber and Information Security

Human vs digital therapy: AI falls short when IT pros need help | Computer Weekly

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn't Always the Goal - SecurityWeek

Hands-On Skills Now Key to Landing Your First Cyber Role - Infosecurity Magazine

Law Enforcement Action and Take Downs

Hacker arrested after exploiting 5,000 accounts in $4.5 million cryptojacking scheme | TechSpot

145 criminal domains linked to BidenCash Marketplace seized - Help Net Security

Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified - SecurityWeek

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

Five plead guilty to laundering $36 million stolen in investment scams

Police arrests 20 suspects for distributing child sexual abuse content

South African man imprisoned after ransom demand against his former employer

Misinformation, Disinformation and Propaganda

When Grok is wrong: The risks of AI chatbots spreading misinformation in a crisis - Bulletin of the Atomic Scientists

Disinformation security is a major concern for cyber teams – here's what your business can do | IT Pro

Amazon promises fake reviews crackdown after investigation by UK watchdog | Amazon | The Guardian


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

EU Prepares for Transnational Cyberattacks - DataBreachToday

UK to join up with allies for stronger response to Putin's 'grey zone' warfare

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

What would break first if hackers hit US infrastructure? | Cybernews

Nation State Actors

Ignoring politics is no longer an option for cyber pros | Cybernews

Advanced Persistent Threats (APTs) - Detection and Defense Strategies

EU Prepares for Transnational Cyberattacks - DataBreachToday

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

China

China-linked threat actor targeted +70 orgs worldwide, SentinelOne warns

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

Chinese hackers broke into US telecom earlier than previously known, Bloomberg reports | Reuters

Chinese phone hacks, user lapses create 'mobile security crisis' | Fortune

Russian Spies Are Suspicious of China, Even as Putin and Xi Grow Close - The New York Times

SentinelOne shares new details on China-linked breach attempt

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source

Over 4 billion user records leaked in "largest breach ever" - here's what you need to know | TechRadar

Russia

Eastern Europe’s Cyber Reckoning: Russia’s Digital Threat Is Forcing a Strategic Shift - Inkstick

UK to join up with allies for stronger response to Putin's 'grey zone' warfare

Russian Spies Are Suspicious of China, Even as Putin and Xi Grow Close - The New York Times

Why Russia Should Fear Ukraine’s Advanced Intelligence Network - The National Interest

'PathWiper' Attack Hits Critical Infrastructure In Ukraine

How The Times Obtained Secret Russian Intelligence Documents - The New York Times

US accuses Russian crypto entrepreneur of money laundering and sanctions evasion

LockBit panel data leak shows Chinese orgs among the most targeted - Help Net Security

'Librarian Ghouls' Cyberattackers Strike at Night

North Korea

US files to seize $7.7M laundered by North Korean IT workers • The Register


Tools and Controls

Enterprise SIEMs miss 79% of known MITRE ATT&CK techniques - Help Net Security

SIEMs Missing the Mark on MITRE ATT&CK Techniques

Next-Gen Developers Are a Cybersecurity Powder Keg

Cyber resilience begins before the crisis | Microsoft Security Blog

CISOs call for operational threat intelligence integration - Help Net Security

Nearly all CISOs struggle with threat intelligence barriers: report

Advanced Persistent Threats (APTs) - Detection and Defense Strategies

NIST Launches Updated Incident Response Guide - Security Boulevard

Cyber insurance demand is rising, but not 'evenly': Beazley cyber head | Insurance Business America

AI threats leave SecOps teams burned out and exposed - Help Net Security

The massive, no-good concerns around agentic AI cybersecurity - Tech Monitor

Study: 73% of founders can’t spot phishing emails​ | Cybernews

Prep for Layoffs Before They Compromise Security

Europe just launched DNS4EU, a public DNS resolver with privacy and security options - gHacks Tech News

Why Threat Agents Must be Included in Cyber Security Risk Assessments - Security Boulevard

NIST Publishes New Zero Trust Implementation Guidance - Infosecurity Magazine

MSSPs, MSPs See Growing Strategic Role in Cyber Insurance   | MSSP Alert

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

Your Android phone is getting new security protections - and it's a big deal for enterprises | ZDNET

Microsoft Outlook to block more risky attachments used in attacks

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks




Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

 

Previous
Previous

Black Arrow Cyber Threat Intelligence Briefing 20 June 2025

Next
Next

Black Arrow Cyber Advisory 11 June 2025 – Security Updates from Microsoft, Adobe, Ivanti, Salesforce, SAP, and Google