Black Arrow Cyber Threat Intelligence Briefing 16 January 2026

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Looking at various sources in this week’s review, the recurring conclusion is the need for organisations to make sure they understand the risks of AI before and during its use. Examples include a vulnerability in popular business software that allowed abuse by attackers, while organisations are deploying AI faster than their security. AI, and cyber risks in general, are top business risks according to research by the World Economic Forum and Allianz.

From a business leadership perspective, cyber reliance is increasingly important, yet research shows that executives are more likely to fall for a phishing attack. We look at emerging threats to businesses, including stylised QR codes, LinkedIn scams and attackers recruiting insiders to gain entry to targeted organisations. Ransomware remains a primary risk and is at record levels.

We are consistent in our messaging on how business leaders should address these risks. Ensure you have a contemporary understanding of how cyber is evolving, through our weekly threat intelligence briefings and leadership training, and establish a proportionate strategy to address the risks across people, operations and technology. By gaining your own impartial perspective, you will be better placed to govern and challenge others who are designing and maintaining your security controls.


Top Cyber Stories of the Last Week

We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster

A critical ServiceNow AI vulnerability demonstrates how weaknesses introduced during rapid AI deployment can lead to serious security failures. The flaw allowed unauthenticated attackers to impersonate administrators and abuse AI agents. Default configurations, weak authentication and limited oversight are common in agentic AI systems, expanding organisational attack surfaces and enabling privilege abuse through automation.

Source: https://securityboulevard.com/2026/01/were-moving-too-fast-why-ais-race-to-market-is-a-security-disaster/

The Speed Mismatch Putting Modern Security At Risk

Attackers now operate at machine speed, while many organisations still rely on quarterly or annual security checks. This gap creates hidden risk, as vulnerabilities can appear and disappear between reviews and be exploited before they are identified. Security validation must move away from periodic checks and keep pace with continuously changing systems and attack activity.

Source: https://www.forbes.com/sites/tonybradley/2026/01/14/the-speed-mismatch-putting-modern-security-at-risk/

New Intelligence Is Moving Faster than Enterprise Controls

Enterprises are deploying AI faster than supporting infrastructure, governance and data controls can keep up, according to NTT research. Only a small proportion of organisations can operate AI at scale, with infrastructure limits and weak data hygiene creating security and reliability risks. The use of unsanctioned AI tools raises concerns around data leakage and inaccurate outputs, while governance maturity varies widely.

Source: https://www.helpnetsecurity.com/2026/01/16/ntt-data-enterprise-ai-governance/

Cyber Risk Enters a New Era as AI and Supply Chains Reshape Global Security

According to the World Economic Forum’s Global Cybersecurity Outlook 2026, AI‑related vulnerabilities surged more than any other cyber risk in 2025. Many organisations reported sensitive data leaking through generative AI tools as adoption outpaces governance, and a significant share of respondents expressed growing concern over attackers’ use of advanced AI capabilities. Uneven cyber security strength across suppliers and regions increases the risk that incidents spread beyond individual organisations, causing wider disruption across connected ecosystems.

Source: https://petri.com/cyber-risk-ai-supply-chains-global-security/

Allianz Risk Barometer 2026: Cyber Remains Top Business Risk but AI Fastest Riser at #2

Cyber incidents remain the top global business risk for the fifth consecutive year, ranked number one by 42% of respondents worldwide, driven largely by ransomware. AI rose from #10 to #2 as adoption accelerates faster than governance, creating operational, legal and reputational risk. Supply chain dependence and third‑party exposure continue to amplify the impact of disruption across businesses of all sizes.

Source: https://www.businesswire.com/news/home/20260114388360/en/Allianz-Risk-Barometer-2026-Cyber-Remains-Top-Business-Risk-but-AI-Fastest-Riser-at-2

Downtime Pushes Resilience Planning into Security Operations

Operational disruption and prolonged downtime caused by security incidents are becoming routine, with recovery often taking days and direct remediation costs reaching millions. These impacts are now prominent in board discussions. In response, research shows that CISOs are increasingly defining success in their role based on recovery and continuity rather than prevention alone, with growing executive expectations and accountability for restoring operations from risks including ransomware, supply chains, insiders and failures in trusted security software.

Source: https://www.helpnetsecurity.com/2026/01/12/absolute-ciso-resilience-planning/

Executives More Likely to Take Phishing Bait than Junior Staff

Yubico data shows over 11% of C‑suite respondents interacted with phishing in the past week, compared to 8.8% of entry‑level staff. Perception gaps persist, with 44% of C‑suite respondents saying they believe their organisation’s cyber security is “very good”, compared with 25% of entry‑level staff. Small businesses show low training and MFA adoption, increasing exposure to AI‑driven social engineering.

Source: https://betanews.com/article/executives-more-likely-to-take-phishing-bait-than-junior-staff/

QR Codes Are Getting Colourful, Fancy, and Dangerous

QR codes are increasingly used by attackers in phishing campaigns known as quishing. Research highlights how stylised QR codes using colours, logos and backgrounds preserve scan reliability while evading traditional URL inspection and email security controls. Industry data shows 22% of QR‑related attacks involve phishing, with state‑sponsored and criminal actors using redirection chains to harvest credentials via mobile devices.

Source: https://www.helpnetsecurity.com/2026/01/15/fancy-qr-codes-phishing-risk/

Convincing LinkedIn Comment-Reply Tactic Used in New Phishing

Attackers are posting fake LinkedIn comment replies impersonating the platform to claim policy violations and drive users to phishing sites. Some campaigns abuse LinkedIn’s own lnkd.in shortener, obscuring destinations. Fake company pages using LinkedIn branding have been identified, with LinkedIn confirming it does not notify users of violations via public comments.

Source: https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/

Cyber Criminals Recruiting Insiders at Specific Organisations

Dark web forums show criminals actively seeking insiders at named organisations to access customer data and internal systems. Listings target crypto firms, consultancies and consumer platforms, offering payments of $3,000–$15,000. Insiders can bypass standard alerts, with researchers citing previous incidents where recruited employees enabled large‑scale data theft and financial loss.

Source: https://www.itpro.com/security/cyber-criminals-recruiting-insiders-at-specific-organizations

Ransomware Activity Surges to Record Levels

Global ransomware activity reached record levels in 2025, with 2,287 victims reported in Q4 alone and 124 active ransomware groups, a 46% year‑on‑year increase. Victim numbers rose 58% as law enforcement pressure fragmented larger groups of attackers into many smaller operators running frequent, repeatable attacks. The US accounted for 55% of victims, but activity remains global and sustained.

Source: https://betanews.com/article/ransomware-activity-surges-to-record-levels/

State-Backed Cyberattacks Are No Longer a Government Problem – They’re Now a Boardroom Priority

State‑backed actors increasingly target private organisations and supply chains rather than governments alone. The UK NCSC handled 204 nationally significant incidents in 12 months, up from 89 the previous year. Smaller suppliers are frequently exploited as backdoors, with resilience, governance and supply chain controls highlighted as practical responses to persistent geopolitical cyber threats.

Source: https://growthbusiness.co.uk/state-backed-cyberattacks-are-no-longer-a-government-problem-theyre-now-a-boardroom-priority-2584268/



Threats

Ransomware, Extortion and Destructive Attacks

The Ransomware Paradox: Why Payments Are Soaring as Attacks “Drop” | MSSP Alert

Ransomware activity surges to record levels - BetaNews

Ransomware activity never dies, it multiplies - Help Net Security

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Ransomware: Tactical Evolution Fuels Extortion Epidemic | SECURITY.COM

Takedowns and arrests didn't slow down ransomware in 2025 | TechRadar

DeadLock ransomware uses smart contracts to evade defenders • The Register

There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radar | IT Pro

Ransomware by the Numbers: Count of Victims and Groups Surge

Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

France swaps alleged ransomware crook for conflict researcher • The Register

Sicarii Ransomware: Truth vs Myth - Check Point Research

MEED | Construction is third most targeted sector by ransomware

Ransomware Victims

South Korean giant Kyowon confirms data theft in ransomware attack

Cyberattack forces Belgian hospitals to cancel surgeries​ | Cybernews

Government statement on 'serious cyber attack' at Nuneaton school | Coventry Live

Belgian hospitals refuse ambulances following cyberattack • The Register

Phishing & Email Based Attacks

Executives more likely to take phishing bait than junior staff - BetaNews

QR codes are getting colorful, fancy, and dangerous - Help Net Security

FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes - SecurityWeek

North Korea turns QR codes into phishing weapons • The Register

FBI Flags Quishing Attacks From North Korean APT

Why can’t companies stop social engineering attacks?

Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs - Infosecurity Magazine

Trellix warns of advanced Facebook phishing using browser-in-the-browser attacks - SiliconANGLE

Facebook login thieves now using browser-in-browser trick

Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Why QR Codes Are Education's New Phishing Blind Spot - Security Boulevard

Fake Facebook pop-ups mimic browser window | Cybernews

Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security

China spies used Maduro capture as lure to phish US agencies • The Register

Other Social Engineering

QR codes are getting colorful, fancy, and dangerous - Help Net Security

Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine

Why can’t companies stop social engineering attacks?

Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs - Infosecurity Magazine

Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes

Fake Facebook pop-ups mimic browser window | Cybernews

Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security

Artificial Intelligence

Businesses in 2026: AI security oh yeah better look at that • The Register

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Cyber Risk Enters a New Era as AI Reshapes Global Security

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains - Help Net Security

Allianz Risk Barometer 2026: Cyber Remains Top Business Risk but AI Fastest Riser at #2

WEF: Deepfake Face-Swapping Tools Are Creating Critical Risks - Infosecurity Magazine

Top cyber threats to your AI systems and infrastructure | CSO Online

LLMs in Attacker Crosshairs, Warns Threat Intel Firm - SecurityWeek

We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster - Security Boulevard

New intelligence is moving faster than enterprise controls - Help Net Security

Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum | CSO Online

AI-Powered Truman Show Operation Industrializes Investment Fraud - Infosecurity Magazine

Hackers target misconfigured proxies to access paid LLM services

Generative AI in Enterprises: Security Risks Most Companies Are Not Measuring - Security Boulevard

Mac users are being targeted by a fake Grok app, and it's powered by AI - PhoneArena

AI driving serious fraud spike – WEF

What Should We Learn From How Attackers Leveraged AI in 2025?

Your Copilot data can be hijacked with a single click - here's how | ZDNET

AI Agents Are Becoming Authorization Bypass Paths

The quiet way AI normalizes foreign influence | CyberScoop

Malaysia and Indonesia block X over deepfake smut • The Register

U.K. investigation into X over AI deepfakes risks igniting a U.S.-Europe free speech battle | Fortune

Elon Musk calls UK government ‘fascist’ over touted X ban

California AG launches investigation into X’s sexualized deepfakes | CyberScoop

Vibe coding security risks and how to mitigate them | TechTarget

Ofcom continues X probe despite Grok 'nudify' fix • The Register

Bots/Botnets

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

GoBruteforcer Botnet Targeting Crypto, Blockchain Projects - SecurityWeek

Careers, Roles, Skills, Working in Cyber and Information Security

We're losing in recruitment | Professional Security Magazine

Cloud/SaaS

New Linux malware targets the cloud, steals creds, then vanishes • The Register

Experts warn this new Chinese Linux malware could be preparing something seriously worrying | TechRadar

New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine

Crypto crime hits record levels as state actors move billions - Help Net Security

GoBruteforcer Botnet Targeting Crypto, Blockchain Projects - SecurityWeek

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

Betterment Customer Data Accessed in Online Crypto Scam Attack

Cyber Crime, Organised Crime & Criminal Actors

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains - Help Net Security

Russia’s Cyber Sanctuary in Transition: Implications for Global Cybercrime | Geopolitical Monitor

Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest - Infosecurity Magazine

The country at the heart of the global scam industry

Exclusive research: Cybersecurity issues may worsen in 2026 | PaymentsSource | American Banker

The New Threats: Attackers Don't Just Break In, They Blend In - The New Stack

We're losing in recruitment | Professional Security Magazine

Why are cybercriminals getting younger? | TechRadar

BreachForums Breach Exposes 324K Cybercriminals

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

BreachForums Data Leak Raises Fresh Questions Over Credibility - IT Security Guru

Microsoft disrupts global cybercrime subscription service responsible for millions in fraud losses - Microsoft On the Issues

Data Breaches/Leaks

Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft

France fines telcos €42M for issues leading to 2024 breach • The Register

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

California bans data broker reselling health data of millions

After Goldman, JPMorgan Discloses Law Firm Data Breach - SecurityWeek

Sensitive data of Eurail, Interrail travelers compromised in data breach - Help Net Security

BreachForums Data Leak Raises Fresh Questions Over Credibility - IT Security Guru

BreachForums hacking forum database leaked, exposing 324,000 accounts

Manage My Health starts notifying affected practices after major cyber breach | Cybernews

Second health provider, Canopy Health, hit in major cyber attack | RNZ News

Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified - SecurityWeek

Central Maine Healthcare breach exposed data of over 145,000 people

Instagram denies data breach after password reset emails spark leak claims - SiliconANGLE

Another plastic surgery practice fell prey to a cyberattack with extortion attempt – DataBreaches.Net

Target employees confirm leaked source code is authentic

Threat actor claims the theft of full customer data from Spanish energy firm Endesa

Denial of Service/DoS/DDoS

ICE Agent Doxxing Site DDoS-ed Via Russian Servers - Infosecurity Magazine

Encryption

EU’s Chat Control could put government monitoring inside robots - Help Net Security

Michael Tsai - Blog - UK Child Protections and Messaging Backdoor

WFE Urges Regulators to Balance Quantum Risks With Immediate Cyber Threats - FinanceFeeds

G7 Sets 2034 Deadline for Finance to Adopt Quantum-Safe Systems - Infosecurity Magazine

Fraud, Scams and Financial Crime

Impersonation Fraud Drives Record $17bn in Crypto Losses - Infosecurity Magazine

Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF  - SecurityWeek

Cyber-Enabled Fraud Is Now One of the Most Pervasive Global Threats, Says New Report > Press releases | World Economic Forum

WEF: Deepfake Face-Swapping Tools Are Creating Critical Risks - Infosecurity Magazine

The country at the heart of the global scam industry

Exclusive research: Cybersecurity issues may worsen in 2026 | PaymentsSource | American Banker

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

AI-Powered Truman Show Operation Industrializes Investment Fraud - Infosecurity Magazine

AI driving serious fraud spike – WEF

Microsoft disrupts global cybercrime subscription service responsible for millions in fraud losses - Microsoft On the Issues

Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes

Online shoppers at risk as Magecart skimming hits major payment networks | Malwarebytes

Identity and Access Management

AI Agents Are Becoming Authorization Bypass Paths

Insurance

What insurers expect from cyber risk in 2026 - Help Net Security

US regulator tells GM to hit the brakes on customer tracking • The Register

Insider Risk and Insider Threats

Cyber criminals recruiting insiders at specific organizations | IT Pro

Internet of Things – IoT

Is your smart home at risk of being hacked? 6 ways experts lock theirs down | ZDNET

Sorry I'm late for work boss, my car's been hacked | Autocar

Why hacking could be the biggest threat facing automotive | Autocar

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

China targets US cybersecurity firms, Tesla's FSD subscription

Law Enforcement Action and Take Downs

Takedowns and arrests didn't slow down ransomware in 2025 | TechRadar

Microsoft disrupts global cybercrime subscription service responsible for millions in fraud losses - Microsoft On the Issues

Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest - Infosecurity Magazine

Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam • The Register

Why are cybercriminals getting younger? | TechRadar

Hacker gets seven years for breaching Rotterdam and Antwerp ports

'Violence-as-a-service' suspect arrested • The Register

Appeal fails for hacker who opened port to coke smugglers • The Register

Illinois man charged with hacking Snapchat accounts to steal nude photos

Linux and Open Source

New Linux malware targets the cloud, steals creds, then vanishes • The Register

Experts warn this new Chinese Linux malware could be preparing something seriously worrying | TechRadar

GoBruteforcer Botnet Targets 50K-plus Linux Servers

New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine

Europe Has a New Plan to Break Free from US Tech Dominance

Malware

New Linux malware targets the cloud, steals creds, then vanishes • The Register

Experts warn this new Chinese Linux malware could be preparing something seriously worrying | TechRadar

ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details

GoBruteforcer Botnet Targets 50K-plus Linux Servers

Mac users are being targeted by a fake Grok app, and it's powered by AI - PhoneArena

Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

How real software downloads can hide remote backdoors | Malwarebytes

Gootloader now uses 1,000-part ZIP archives for stealthy delivery

Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam • The Register

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

Misinformation, Disinformation and Propaganda

The quiet way AI normalizes foreign influence | CyberScoop

Mobile

Your phone is sharing data without your knowledge - how to stop it ASAP | ZDNET

Apple iPhone Attacks Confirmed — Experts Warn 'Update Now or Stay Exposed' | IBTimes

Tories want kids off social media and phones out of schools • The Register

Models, Frameworks and Standards

UK government exempting itself from flagship cyber law inspires little confidence • The Register

Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill - Infosecurity Magazine

Michael Tsai - Blog - UK Child Protections and Messaging Backdoor

How the OWASP Application Security Verification Standard Helps Improve Software Security - Security Boulevard

Outages

Investor Lawsuit Over CrowdStrike Outage Dismissed - SecurityWeek

Verizon blames nationwide outage on a "software issue"

Passwords, Credential Stuffing & Brute Force Attacks

Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations

Regulations, Fines and Legislation

UK government exempting itself from flagship cyber law inspires little confidence • The Register

Privacy and Cybersecurity Laws in 2026 Pose Challenges

France fines telcos €42M for issues leading to 2024 breach • The Register

The Impact of AI-Enabled Capabilities on the Application of International Law in the Cyber Domain - Lieber Institute West Point

U.K. investigation into X over AI deepfakes risks igniting a U.S.-Europe free speech battle | Fortune

Elon Musk calls UK government ‘fascist’ over touted X ban

California AG launches investigation into X’s sexualized deepfakes | CyberScoop

EU’s Chat Control could put government monitoring inside robots - Help Net Security

Dems pressure Google, Apple to drop X app as international regulators turn up heat | CyberScoop

Ofcom continues X probe despite Grok 'nudify' fix • The Register

The US doesn’t need a Cyber Force: it needs to prioritize cybersecurity

Hill warning: Don’t put cyber offense before defense | CyberScoop

Treat US tech firms the same as Chinese providers say campaigners | UKAuthority

UK backtracks on digital ID requirement for right to work • The Register

US cybersecurity weakened by congressional delays despite Plankey renomination | CSO Online

Social Media

Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malwarebytes

Ofcom continues X probe despite Grok 'nudify' fix • The Register

Browser-in-the-Browser phishing is on the rise: Here's how to spot it - Help Net Security

Trellix warns of advanced Facebook phishing using browser-in-the-browser attacks - SiliconANGLE

Facebook login thieves now using browser-in-browser trick

Tories want kids off social media and phones out of schools • The Register

Instagram says it fixed the issue behind shady password reset emails - Digital Trends

Instagram denies breach amid claims of 17 million account data leak

Supply Chain and Third Parties

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains - Help Net Security

Cyber Risk Enters a New Era as AI Reshapes Global Security

CISOs flag gaps in third-party risk management - Help Net Security


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

State-backed cyberattacks are no longer a government problem – they’re now a boardroom priority - Growth Business

The quiet way AI normalizes foreign influence | CyberScoop

Is the US adopting the gray zone cyber playbook? | CyberScoop

Estonia: Small State Security and the International Order

Taiwan Endures Greater Cyber Pressure From China

Nation State Actors

State-backed cyberattacks are no longer a government problem – they’re now a boardroom priority - Growth Business

Cyber Risk Enters a New Era as AI Reshapes Global Security

The quiet way AI normalizes foreign influence | CyberScoop

Crypto crime hits record levels as state actors move billions - Help Net Security

China

New Linux malware targets the cloud, steals creds, then vanishes • The Register

Experts warn this new Chinese Linux malware could be preparing something seriously worrying | TechRadar

China crew abused ESXi zero-days a year before disclosure • The Register

Scope Of Chinese ‘Salt Typhoon’ Hack Keeps Getting Worse, As Trump Dismantles U.S. Cybersecurity Defenses | Techdirt

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

New Chinese-Made Malware Framework Targets Linux Cloud Environments - Infosecurity Magazine

China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware

China bans U.S. and Israeli cybersecurity software over security concerns

Taiwan Endures Greater Cyber Pressure From China

China spies used Maduro capture as lure to phish US agencies • The Register

Treat US tech firms the same as Chinese providers say campaigners | UKAuthority

Russia

Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft

Russia’s Cyber Sanctuary in Transition: Implications for Global Cybercrime | Geopolitical Monitor

Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations

Russia-linked APT28 targets energy and defense groups tied to NATO | SC Media

Poland was on the verge of large-scale power outages due to Russian cyber sabotage - Minister Gawkowski | УНН

Ukraine's army targeted in new charity-themed malware campaign

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

ICE Agent Doxxing Site DDoS-ed Via Russian Servers - Infosecurity Magazine

France swaps alleged ransomware crook for conflict researcher • The Register

Estonia: Small State Security and the International Order

North Korea

FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes - SecurityWeek

North Korea turns QR codes into phishing weapons • The Register

FBI Flags Quishing Attacks From North Korean APT

Iran

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Iran cuts Internet nationwide amid deadly protest crackdown

‘Kill Switch’—Iran Shuts Down Starlink Internet For First Time

Trump’s cyber options in Iran - POLITICO

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Cyber Risk Enters a New Era as AI Reshapes Global Security

The quiet way AI normalizes foreign influence | CyberScoop

Venezuelan Oil Industry Is Running on WhatsApp After Cyberattack - Bloomberg

Trump’s cyber options in Iran - POLITICO

Treat US tech firms the same as Chinese providers say campaigners | UKAuthority

Is the US adopting the gray zone cyber playbook? | CyberScoop

How hackers fight back against ICE surveillance tech • The Register






Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Advisory - 14 January 2026 - Security Updates - Microsoft, SAP, Adobe