Black Arrow Cyber Threat Intelligence Briefing 16 January 2026
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
Looking at various sources in this week’s review, the recurring conclusion is the need for organisations to make sure they understand the risks of AI before and during its use. Examples include a vulnerability in popular business software that allowed abuse by attackers, while organisations are deploying AI faster than their security. AI, and cyber risks in general, are top business risks according to research by the World Economic Forum and Allianz.
From a business leadership perspective, cyber reliance is increasingly important, yet research shows that executives are more likely to fall for a phishing attack. We look at emerging threats to businesses, including stylised QR codes, LinkedIn scams and attackers recruiting insiders to gain entry to targeted organisations. Ransomware remains a primary risk and is at record levels.
We are consistent in our messaging on how business leaders should address these risks. Ensure you have a contemporary understanding of how cyber is evolving, through our weekly threat intelligence briefings and leadership training, and establish a proportionate strategy to address the risks across people, operations and technology. By gaining your own impartial perspective, you will be better placed to govern and challenge others who are designing and maintaining your security controls.
Top Cyber Stories of the Last Week
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
A critical ServiceNow AI vulnerability demonstrates how weaknesses introduced during rapid AI deployment can lead to serious security failures. The flaw allowed unauthenticated attackers to impersonate administrators and abuse AI agents. Default configurations, weak authentication and limited oversight are common in agentic AI systems, expanding organisational attack surfaces and enabling privilege abuse through automation.
The Speed Mismatch Putting Modern Security At Risk
Attackers now operate at machine speed, while many organisations still rely on quarterly or annual security checks. This gap creates hidden risk, as vulnerabilities can appear and disappear between reviews and be exploited before they are identified. Security validation must move away from periodic checks and keep pace with continuously changing systems and attack activity.
New Intelligence Is Moving Faster than Enterprise Controls
Enterprises are deploying AI faster than supporting infrastructure, governance and data controls can keep up, according to NTT research. Only a small proportion of organisations can operate AI at scale, with infrastructure limits and weak data hygiene creating security and reliability risks. The use of unsanctioned AI tools raises concerns around data leakage and inaccurate outputs, while governance maturity varies widely.
Source: https://www.helpnetsecurity.com/2026/01/16/ntt-data-enterprise-ai-governance/
Cyber Risk Enters a New Era as AI and Supply Chains Reshape Global Security
According to the World Economic Forum’s Global Cybersecurity Outlook 2026, AI‑related vulnerabilities surged more than any other cyber risk in 2025. Many organisations reported sensitive data leaking through generative AI tools as adoption outpaces governance, and a significant share of respondents expressed growing concern over attackers’ use of advanced AI capabilities. Uneven cyber security strength across suppliers and regions increases the risk that incidents spread beyond individual organisations, causing wider disruption across connected ecosystems.
Source: https://petri.com/cyber-risk-ai-supply-chains-global-security/
Allianz Risk Barometer 2026: Cyber Remains Top Business Risk but AI Fastest Riser at #2
Cyber incidents remain the top global business risk for the fifth consecutive year, ranked number one by 42% of respondents worldwide, driven largely by ransomware. AI rose from #10 to #2 as adoption accelerates faster than governance, creating operational, legal and reputational risk. Supply chain dependence and third‑party exposure continue to amplify the impact of disruption across businesses of all sizes.
Downtime Pushes Resilience Planning into Security Operations
Operational disruption and prolonged downtime caused by security incidents are becoming routine, with recovery often taking days and direct remediation costs reaching millions. These impacts are now prominent in board discussions. In response, research shows that CISOs are increasingly defining success in their role based on recovery and continuity rather than prevention alone, with growing executive expectations and accountability for restoring operations from risks including ransomware, supply chains, insiders and failures in trusted security software.
Source: https://www.helpnetsecurity.com/2026/01/12/absolute-ciso-resilience-planning/
Executives More Likely to Take Phishing Bait than Junior Staff
Yubico data shows over 11% of C‑suite respondents interacted with phishing in the past week, compared to 8.8% of entry‑level staff. Perception gaps persist, with 44% of C‑suite respondents saying they believe their organisation’s cyber security is “very good”, compared with 25% of entry‑level staff. Small businesses show low training and MFA adoption, increasing exposure to AI‑driven social engineering.
Source: https://betanews.com/article/executives-more-likely-to-take-phishing-bait-than-junior-staff/
QR Codes Are Getting Colourful, Fancy, and Dangerous
QR codes are increasingly used by attackers in phishing campaigns known as quishing. Research highlights how stylised QR codes using colours, logos and backgrounds preserve scan reliability while evading traditional URL inspection and email security controls. Industry data shows 22% of QR‑related attacks involve phishing, with state‑sponsored and criminal actors using redirection chains to harvest credentials via mobile devices.
Source: https://www.helpnetsecurity.com/2026/01/15/fancy-qr-codes-phishing-risk/
Convincing LinkedIn Comment-Reply Tactic Used in New Phishing
Attackers are posting fake LinkedIn comment replies impersonating the platform to claim policy violations and drive users to phishing sites. Some campaigns abuse LinkedIn’s own lnkd.in shortener, obscuring destinations. Fake company pages using LinkedIn branding have been identified, with LinkedIn confirming it does not notify users of violations via public comments.
Cyber Criminals Recruiting Insiders at Specific Organisations
Dark web forums show criminals actively seeking insiders at named organisations to access customer data and internal systems. Listings target crypto firms, consultancies and consumer platforms, offering payments of $3,000–$15,000. Insiders can bypass standard alerts, with researchers citing previous incidents where recruited employees enabled large‑scale data theft and financial loss.
Source: https://www.itpro.com/security/cyber-criminals-recruiting-insiders-at-specific-organizations
Ransomware Activity Surges to Record Levels
Global ransomware activity reached record levels in 2025, with 2,287 victims reported in Q4 alone and 124 active ransomware groups, a 46% year‑on‑year increase. Victim numbers rose 58% as law enforcement pressure fragmented larger groups of attackers into many smaller operators running frequent, repeatable attacks. The US accounted for 55% of victims, but activity remains global and sustained.
Source: https://betanews.com/article/ransomware-activity-surges-to-record-levels/
State-Backed Cyberattacks Are No Longer a Government Problem – They’re Now a Boardroom Priority
State‑backed actors increasingly target private organisations and supply chains rather than governments alone. The UK NCSC handled 204 nationally significant incidents in 12 months, up from 89 the previous year. Smaller suppliers are frequently exploited as backdoors, with resilience, governance and supply chain controls highlighted as practical responses to persistent geopolitical cyber threats.
Governance, Risk and Compliance
Executives more likely to take phishing bait than junior staff - BetaNews
Businesses in 2026: AI security oh yeah better look at that • The Register
Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly
Privacy and Cybersecurity Laws in 2026 Pose Challenges
Downtime pushes resilience planning into security operations - Help Net Security
Cyber Risk Enters a New Era as AI Reshapes Global Security
CISOs flag gaps in third-party risk management - Help Net Security
CISO Succession Crisis Highlights How Turnover Amplifies Risks
Allianz Risk Barometer 2026: Cyber Remains Top Business Risk but AI Fastest Riser at #2
CISO Role Reaches “Inflexion Point” With Executive-Level Titles - Infosecurity Magazine
Technology dominates global risk concerns – Allianz
What insurers expect from cyber risk in 2026 - Help Net Security
Threats
Ransomware, Extortion and Destructive Attacks
The Ransomware Paradox: Why Payments Are Soaring as Attacks “Drop” | MSSP Alert
Ransomware activity surges to record levels - BetaNews
Ransomware activity never dies, it multiplies - Help Net Security
Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly
Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
Ransomware: Tactical Evolution Fuels Extortion Epidemic | SECURITY.COM
Takedowns and arrests didn't slow down ransomware in 2025 | TechRadar
DeadLock ransomware uses smart contracts to evade defenders • The Register
Ransomware by the Numbers: Count of Victims and Groups Surge
Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
France swaps alleged ransomware crook for conflict researcher • The Register
Sicarii Ransomware: Truth vs Myth - Check Point Research
MEED | Construction is third most targeted sector by ransomware
Ransomware Victims
South Korean giant Kyowon confirms data theft in ransomware attack
Cyberattack forces Belgian hospitals to cancel surgeries | Cybernews
Government statement on 'serious cyber attack' at Nuneaton school | Coventry Live
Belgian hospitals refuse ambulances following cyberattack • The Register
Phishing & Email Based Attacks
Executives more likely to take phishing bait than junior staff - BetaNews
QR codes are getting colorful, fancy, and dangerous - Help Net Security
FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes - SecurityWeek
North Korea turns QR codes into phishing weapons • The Register
FBI Flags Quishing Attacks From North Korean APT
Why can’t companies stop social engineering attacks?
Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs - Infosecurity Magazine
Trellix warns of advanced Facebook phishing using browser-in-the-browser attacks - SiliconANGLE
Facebook login thieves now using browser-in-browser trick
Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Why QR Codes Are Education's New Phishing Blind Spot - Security Boulevard
Fake Facebook pop-ups mimic browser window | Cybernews
Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security
China spies used Maduro capture as lure to phish US agencies • The Register
Other Social Engineering
QR codes are getting colorful, fancy, and dangerous - Help Net Security
Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine
Why can’t companies stop social engineering attacks?
Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs - Infosecurity Magazine
Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes
Fake Facebook pop-ups mimic browser window | Cybernews
Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security
Artificial Intelligence
Businesses in 2026: AI security oh yeah better look at that • The Register
Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly
Cyber Risk Enters a New Era as AI Reshapes Global Security
Allianz Risk Barometer 2026: Cyber Remains Top Business Risk but AI Fastest Riser at #2
WEF: Deepfake Face-Swapping Tools Are Creating Critical Risks - Infosecurity Magazine
Top cyber threats to your AI systems and infrastructure | CSO Online
LLMs in Attacker Crosshairs, Warns Threat Intel Firm - SecurityWeek
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster - Security Boulevard
New intelligence is moving faster than enterprise controls - Help Net Security
AI-Powered Truman Show Operation Industrializes Investment Fraud - Infosecurity Magazine
Hackers target misconfigured proxies to access paid LLM services
Generative AI in Enterprises: Security Risks Most Companies Are Not Measuring - Security Boulevard
Mac users are being targeted by a fake Grok app, and it's powered by AI - PhoneArena
AI driving serious fraud spike – WEF
What Should We Learn From How Attackers Leveraged AI in 2025?
Your Copilot data can be hijacked with a single click - here's how | ZDNET
AI Agents Are Becoming Authorization Bypass Paths
The quiet way AI normalizes foreign influence | CyberScoop
Malaysia and Indonesia block X over deepfake smut • The Register
Elon Musk calls UK government ‘fascist’ over touted X ban
California AG launches investigation into X’s sexualized deepfakes | CyberScoop
Vibe coding security risks and how to mitigate them | TechTarget
Ofcom continues X probe despite Grok 'nudify' fix • The Register
Bots/Botnets
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects - SecurityWeek
Careers, Roles, Skills, Working in Cyber and Information Security
We're losing in recruitment | Professional Security Magazine
Cloud/SaaS
New Linux malware targets the cloud, steals creds, then vanishes • The Register
New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine
Crypto crime hits record levels as state actors move billions - Help Net Security
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects - SecurityWeek
Betterment Customer Data Accessed in Online Crypto Scam Attack
Cyber Crime, Organised Crime & Criminal Actors
Russia’s Cyber Sanctuary in Transition: Implications for Global Cybercrime | Geopolitical Monitor
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest - Infosecurity Magazine
The country at the heart of the global scam industry
Exclusive research: Cybersecurity issues may worsen in 2026 | PaymentsSource | American Banker
The New Threats: Attackers Don't Just Break In, They Blend In - The New Stack
We're losing in recruitment | Professional Security Magazine
Why are cybercriminals getting younger? | TechRadar
BreachForums Breach Exposes 324K Cybercriminals
Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
BreachForums Data Leak Raises Fresh Questions Over Credibility - IT Security Guru
Data Breaches/Leaks
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
France fines telcos €42M for issues leading to 2024 breach • The Register
California bans data broker reselling health data of millions
After Goldman, JPMorgan Discloses Law Firm Data Breach - SecurityWeek
Sensitive data of Eurail, Interrail travelers compromised in data breach - Help Net Security
BreachForums Data Leak Raises Fresh Questions Over Credibility - IT Security Guru
BreachForums hacking forum database leaked, exposing 324,000 accounts
Manage My Health starts notifying affected practices after major cyber breach | Cybernews
Second health provider, Canopy Health, hit in major cyber attack | RNZ News
Central Maine Healthcare breach exposed data of over 145,000 people
Instagram denies data breach after password reset emails spark leak claims - SiliconANGLE
Target employees confirm leaked source code is authentic
Threat actor claims the theft of full customer data from Spanish energy firm Endesa
Denial of Service/DoS/DDoS
ICE Agent Doxxing Site DDoS-ed Via Russian Servers - Infosecurity Magazine
Encryption
EU’s Chat Control could put government monitoring inside robots - Help Net Security
Michael Tsai - Blog - UK Child Protections and Messaging Backdoor
WFE Urges Regulators to Balance Quantum Risks With Immediate Cyber Threats - FinanceFeeds
G7 Sets 2034 Deadline for Finance to Adopt Quantum-Safe Systems - Infosecurity Magazine
Fraud, Scams and Financial Crime
Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine
Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF - SecurityWeek
WEF: Deepfake Face-Swapping Tools Are Creating Critical Risks - Infosecurity Magazine
The country at the heart of the global scam industry
Exclusive research: Cybersecurity issues may worsen in 2026 | PaymentsSource | American Banker
Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
AI-Powered Truman Show Operation Industrializes Investment Fraud - Infosecurity Magazine
AI driving serious fraud spike – WEF
Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes
Online shoppers at risk as Magecart skimming hits major payment networks | Malwarebytes
Identity and Access Management
AI Agents Are Becoming Authorization Bypass Paths
Insurance
What insurers expect from cyber risk in 2026 - Help Net Security
US regulator tells GM to hit the brakes on customer tracking • The Register
Insider Risk and Insider Threats
Cyber criminals recruiting insiders at specific organizations | IT Pro
Internet of Things – IoT
Is your smart home at risk of being hacked? 6 ways experts lock theirs down | ZDNET
Sorry I'm late for work boss, my car's been hacked | Autocar
Why hacking could be the biggest threat facing automotive | Autocar
Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
China targets US cybersecurity firms, Tesla's FSD subscription
Law Enforcement Action and Take Downs
Takedowns and arrests didn't slow down ransomware in 2025 | TechRadar
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest - Infosecurity Magazine
Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam • The Register
Why are cybercriminals getting younger? | TechRadar
Hacker gets seven years for breaching Rotterdam and Antwerp ports
'Violence-as-a-service' suspect arrested • The Register
Appeal fails for hacker who opened port to coke smugglers • The Register
Illinois man charged with hacking Snapchat accounts to steal nude photos
Linux and Open Source
New Linux malware targets the cloud, steals creds, then vanishes • The Register
GoBruteforcer Botnet Targets 50K-plus Linux Servers
New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine
Europe Has a New Plan to Break Free from US Tech Dominance
Malware
New Linux malware targets the cloud, steals creds, then vanishes • The Register
ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
GoBruteforcer Botnet Targets 50K-plus Linux Servers
Mac users are being targeted by a fake Grok app, and it's powered by AI - PhoneArena
Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
How real software downloads can hide remote backdoors | Malwarebytes
Gootloader now uses 1,000-part ZIP archives for stealthy delivery
Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam • The Register
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
Misinformation, Disinformation and Propaganda
The quiet way AI normalizes foreign influence | CyberScoop
Mobile
Your phone is sharing data without your knowledge - how to stop it ASAP | ZDNET
Apple iPhone Attacks Confirmed — Experts Warn 'Update Now or Stay Exposed' | IBTimes
Tories want kids off social media and phones out of schools • The Register
Models, Frameworks and Standards
UK government exempting itself from flagship cyber law inspires little confidence • The Register
Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill - Infosecurity Magazine
Michael Tsai - Blog - UK Child Protections and Messaging Backdoor
Outages
Investor Lawsuit Over CrowdStrike Outage Dismissed - SecurityWeek
Verizon blames nationwide outage on a "software issue"
Passwords, Credential Stuffing & Brute Force Attacks
Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
Regulations, Fines and Legislation
UK government exempting itself from flagship cyber law inspires little confidence • The Register
Privacy and Cybersecurity Laws in 2026 Pose Challenges
France fines telcos €42M for issues leading to 2024 breach • The Register
Elon Musk calls UK government ‘fascist’ over touted X ban
California AG launches investigation into X’s sexualized deepfakes | CyberScoop
EU’s Chat Control could put government monitoring inside robots - Help Net Security
Dems pressure Google, Apple to drop X app as international regulators turn up heat | CyberScoop
Ofcom continues X probe despite Grok 'nudify' fix • The Register
The US doesn’t need a Cyber Force: it needs to prioritize cybersecurity
Hill warning: Don’t put cyber offense before defense | CyberScoop
Treat US tech firms the same as Chinese providers say campaigners | UKAuthority
UK backtracks on digital ID requirement for right to work • The Register
US cybersecurity weakened by congressional delays despite Plankey renomination | CSO Online
Social Media
Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes
Ofcom continues X probe despite Grok 'nudify' fix • The Register
Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security
Trellix warns of advanced Facebook phishing using browser-in-the-browser attacks - SiliconANGLE
Facebook login thieves now using browser-in-browser trick
Tories want kids off social media and phones out of schools • The Register
Instagram says it fixed the issue behind shady password reset emails - Digital Trends
Instagram denies breach amid claims of 17 million account data leak
Supply Chain and Third Parties
Cyber Risk Enters a New Era as AI Reshapes Global Security
CISOs flag gaps in third-party risk management - Help Net Security
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
The quiet way AI normalizes foreign influence | CyberScoop
Is the US adopting the gray zone cyber playbook? | CyberScoop
Estonia: Small State Security and the International Order
Taiwan Endures Greater Cyber Pressure From China
Nation State Actors
Cyber Risk Enters a New Era as AI Reshapes Global Security
The quiet way AI normalizes foreign influence | CyberScoop
Crypto crime hits record levels as state actors move billions - Help Net Security
China
New Linux malware targets the cloud, steals creds, then vanishes • The Register
China crew abused ESXi zero-days a year before disclosure • The Register
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine
China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware
China bans U.S. and Israeli cybersecurity software over security concerns
Taiwan Endures Greater Cyber Pressure From China
China spies used Maduro capture as lure to phish US agencies • The Register
Treat US tech firms the same as Chinese providers say campaigners | UKAuthority
Russia
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
Russia’s Cyber Sanctuary in Transition: Implications for Global Cybercrime | Geopolitical Monitor
Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
Russia-linked APT28 targets energy and defense groups tied to NATO | SC Media
Ukraine's army targeted in new charity-themed malware campaign
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
ICE Agent Doxxing Site DDoS-ed Via Russian Servers - Infosecurity Magazine
France swaps alleged ransomware crook for conflict researcher • The Register
Estonia: Small State Security and the International Order
North Korea
FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes - SecurityWeek
North Korea turns QR codes into phishing weapons • The Register
FBI Flags Quishing Attacks From North Korean APT
Iran
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Iran cuts Internet nationwide amid deadly protest crackdown
‘Kill Switch’—Iran Shuts Down Starlink Internet For First Time
Trump’s cyber options in Iran - POLITICO
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Cyber Risk Enters a New Era as AI Reshapes Global Security
The quiet way AI normalizes foreign influence | CyberScoop
Venezuelan Oil Industry Is Running on WhatsApp After Cyberattack - Bloomberg
Trump’s cyber options in Iran - POLITICO
Treat US tech firms the same as Chinese providers say campaigners | UKAuthority
Is the US adopting the gray zone cyber playbook? | CyberScoop
How hackers fight back against ICE surveillance tech • The Register
Tools and Controls
Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs - Infosecurity Magazine
CISOs flag gaps in third-party risk management - Help Net Security
Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
Vibe coding security risks and how to mitigate them | TechTarget
Downtime pushes resilience planning into security operations - Help Net Security
China bans U.S. and Israeli cybersecurity software over security concerns
What insurers expect from cyber risk in 2026 - Help Net Security
The 2 faces of AI: How emerging models empower and endanger cybersecurity | CSO Online
DRAM shortage may drive firewall prices higher: analysts • The Register
Deploying AI agents is not your typical software launch - 7 lessons from the trenches | ZDNET
Reports Published in the Last Week
The State of Ransomware in the U.S.: Report and Statistics 2025
Other News
The Speed Mismatch Putting Modern Security At Risk
UK establishes Government Cyber Unit to protect against large-scale cyberattacks - SZR | УНН
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
Cyber body ISC2 signs on as UK software security ambassador | Computer Weekly
Hedge funds step up cybersecurity spending amid rising threats and regulatory pressure - Hedgeweek
Act Now To Enhance Your Business's Cyber Resilience - British Chambers of Commerce
Cyber Threat Actors Ramp Up Attacks on Industrial Environments - Infosecurity Magazine
The concerning cyber-physical security disconnect | SC Media
The US doesn’t need a Cyber Force: it needs to prioritize cybersecurity
Vulnerability Management
Vulnerabilities Surge, But Messy Reporting Blurs Picture
Vulnerabilities
Hackers Launched 8.1 Million Attack Sessions to React2Shell Vulnerability
China crew abused ESXi zero-days a year before disclosure • The Register
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155) - Help Net Security
Apple iPhone Attacks Confirmed — Experts Warn 'Update Now or Stay Exposed' | IBTimes
Hackers exploit Modular DS WordPress plugin flaw for admin access
Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network
Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED
Flipping one bit leaves AMD CPUs open to VM vuln • The Register
Trend Micro Patches Critical Code Execution Flaw in Apex Central - SecurityWeek
CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
'Most Severe AI Vulnerability to Date' Hits ServiceNow
Adobe Patches Critical Apache Tika Bug in ColdFusion - SecurityWeek
SAP's January 2026 Security Updates Patch Critical Vulnerabilities - SecurityWeek
Broadcom Wi-Fi Chipset Flaw Allows Hackers to Disrupt Networks - SecurityWeek
8000+ SmarterMail Hosts Vulnerable to RCE Attack - PoC Exploit Released
US government told to patch high-severity Gogs security issue or face attack | TechRadar
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.