Black Arrow Cyber Threat Intelligence Briefing 19 December 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
This week we start with interesting research findings on organisations that pay ransoms, and we look at how organisations are planning to increase their spend on security. We also look at developments by attackers to look out for over the next year, including of course phishing and AI, as well as organisational practices highlighted in the articles that are closely linked to risk exposure.
Addressing these requires a sound understanding of how risks are evolving and the pragmatic and proportionate ways that business leaders can address them. The key is knowing the questions to ask of your control providers, including your IT, with support from impartial specialists.
As we head into the festive season, we thank you for reading our weekly summaries. We wish you a merry and peaceful holiday.
Top Cyber Stories of the Last Week
Streisand Effect: Businesses That Pay Ransomware Gangs Are More Likely to Hit the Headlines
Analysis of LockBit negotiation data suggests organisations that pay ransomware demands are more likely to attract press coverage than those that refuse. Researcher Max Smeets compared reporting on 100 payers with 100 non-payers and found paying did not reduce publicity. The data also shows victims making negotiating errors, including admitting they lacked backups or sharing insurance documents. After Operation Chronos where the US National Crime Agency seized LockBit’s infrastructure, LockBit’s reputation and payments reportedly fell sharply.
Future of Security Holds Bigger Budgets, New Threats
A Marsh survey of 2,200 cyber security leaders found two‑thirds plan to increase cyber-risk prevention investment in 2026, and at least one in four intend to raise spending by more than 25%. 70% experienced at least one third‑party security incident in the past year. Separately, US senators raised concerns about AI‑driven attacks, and analysts warned humanoid robots are currently easy to hack.
The ‘World Is Not Ready’ for AI Cyber Security Risks, Booz Allen CEO Warns
Booz Allen Hamilton CEO Horacio Rozanski warned that advanced artificial intelligence could amplify cyber threats, including network compromise, data theft and ransomware, and argued that trust in models is critical for adoption. He framed US - China competition as a race across technology, adoption and national security use. Rozanski also highlighted the risk of disruption in space, using an example of bank ATMs that rely on GPS information, and pointed to Chinese plans for space-based computing.
Phishing Messages and Social Scams Flood Users Ahead of Christmas
Check Point reported a surge of festive scams, claiming it detected 33,500 unique Christmas-themed phishing emails and over 10,000 seasonal social media ads in the prior 14 days. It said artificial intelligence is improving localisation and brand mimicry, enabling fake e-commerce sites with chatbots and checkout pages, plus deepfake and scripted voice phishing. Check Point also claimed a 100% increase in fake delivery scams in November/December compared with the same period last year.
Source: https://www.infosecurity-magazine.com/news/phishing-messages-social-scams/
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
The article highlights how phishing in 2025 is evolving around authentication and multi-channel lures. It describes tactics designed to defeat or abuse multi-factor authentication, including repeated prompts and real-time interception during sign-in. It also notes attackers moving beyond email into messaging and collaboration tools, while using familiar hooks such as invoices, account warnings and delivery notifications. The article describes approaches such as layered controls, realistic user guidance and monitoring across channels.
The Agentic Shift: How Autonomous AI Is Reshaping the Global Threat Landscape
Control Risks describes an agentic shift where autonomous AI agents can plan, act and adapt with limited human input, changing both defence and offence. It notes automation can improve monitoring and response, but attackers can use agents to accelerate reconnaissance, exploitation and social engineering. Risks include where objectives are delegated to systems that behave unpredictably, and outlines governance, testing and control considerations.
From Open Source to OpenAI: The Evolution of Third-Party Risk
Third‑party risk has expanded from suppliers and open-source dependencies to include cloud services and generative AI. AI features can introduce new external dependencies and data flows, complicating vendor oversight and risk assessment. The article discusses improving visibility into components, strengthening contractual requirements, and continuously monitoring suppliers, arguing that third-party governance should be treated as a business risk discipline, not just a technical exercise.
Source: https://www.securityweek.com/from-open-source-to-openai-the-evolution-of-third-party-risk/
Shadow Spreadsheets: The Security Gap Your Tools Can’t See
“Shadow spreadsheets” are unmanaged files that end up holding operational or sensitive information outside approved systems. Employees use spreadsheets for tracking projects, budgets, access lists and customer data, bypassing access controls, logging and retention policies. Because files are often shared, copied and stored in multiple places, they can expose credentials, personal data and business logic. The article discusses discovery, ownership and governance to bring these files under control.
Financial Times Investigation Raises Questions Over King Gaming Saga
A Financial Times investigation into cyber crime and fraud has prompted scrutiny of due diligence by local authorities in their dealings with a firm called King Gaming. It focuses on how the government of the Isle of Man granted planning permission for a substantial headquarters project by King Gaming; later police executed raids linked to the operation and arrests were made. Court records from China show convictions for investment fraud by individuals connected to a related Isle of Man entity.
North Korea Stole a Record $2B in Crypto This Year
North Korea-linked actors are estimated to have stolen just over $2 billion in cryptocurrency in 2025, a 51% year‑on‑year increase, and about $3.4 billion was stolen globally. DPRK attacks accounted for a record 76% of service compromises, with the February Bybit incident contributing about $1.5 billion. The piece also reports increased targeting of personal wallets (44% of value) and a shift towards recruiter-style social engineering.
Source: https://www.theregister.com/2025/12/18/north_korea_stole_2b_crypto_2025/
New MI6 Chief Warns of Acute Russian Threat, Urges Tech-Driven Intelligence
In her first public speech as MI6 chief, Blaise Metreweli warned of a more acute Russian threat and described a security environment that sits between peace and war. She pointed to hybrid tactics, including cyberattacks on infrastructure and drones appearing over airports and airbases. The article also highlights her emphasis on technology and tradecraft, saying MI6 officers must be as comfortable with code as with human sources and fluent in Python.
Source: https://www.easterneye.biz/new-mi6-chief-warns-russian-threat/
The Things Young Kids Are Using AI for Are Absolutely Horrifying
An Aura report analysing anonymised activity from about 3,000 children aged five to 17 found 42% used AI chatbots specifically for companionship across nearly 90 services. Among those using chatbots for companionship, 37% engaged in conversations depicting violence, including coercion and non-consensual acts. The report says violent conversations peaked among 11-year-olds, with 44% of interactions turning violent, and that sexual or romantic roleplay peaked among 13-year-olds at 63%.
Source: https://futurism.com/future-society/young-kids-using-ai
Governance, Risk and Compliance
How to justify your security investments | CSO Online
News brief: Future of security holds bigger budgets, new threats | TechTarget
The CISO-COO Partnership: Protecting Operational Excellence
The internet in 2025: Bigger, more fragile than ever - and 'fundamentally rewired' by AI | ZDNET
The Budget Effect of a Security Incident - Infosecurity Magazine
Cyber resilience in the UK: learning to take the punches | IT Pro
Trend Micro's 2025 Defenders Survey Report | Trend Micro (US)
Increased workloads, strategic influence and technical focus - CISO predictions for 2026 - BetaNews
Threats
Ransomware, Extortion and Destructive Attacks
RansomHouse RaaS Service Upgraded with Double Extortion Strategy that Steals and Encrypt Data
Clop ransomware targets Gladinet CentreStack in data theft attacks
Researchers see global surge in attacks by new ransomware group “Gentlemen” | Cybernews
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
How CISOs Can Beat the Ransomware Blame Game - Security Boulevard
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
Ransomware Victims
JLR cyberattack pushes TCS to standardize security for top clients | Company Business News
Jaguar Land Rover workers’ payroll data stolen in cyber attack
PornHub extorted after hackers steal Premium member activity data
Askul confirms theft of 740k customer records in ransomware attack
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack - Infosecurity Magazine
Under Armour Sued After Ransomware Group Reports Data Breach (1)
Phishing & Email Based Attacks
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 - Infosecurity Magazine
Where does the data stolen in a phishing attack go? | Kaspersky official blog
Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine
Inside a purchase order PDF phishing campaign | Malwarebytes
Clipping Scripted Sparrow's wings: Tracking a global phishing ring - Help Net Security
Google Sues Chinese ‘Darcula’ Group Over Alleged Phishing Scheme
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
Other Social Engineering
Hackers Are Stealing Microsoft Account Passwords With This Trick
Shut Down And Restart—New Microsoft Attack Beats Passwords, 2FA And Passkeys
ClickFix attacks that bypass cyber controls on the rise | Computer Weekly
New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware
The WhatsApp takeover scam that doesn’t need your password
Deepfakes Expose New Risks in Identity and Digital Trust
Amazon blocked 1,800 suspected DPRK job applicants • The Register
Inside a purchase order PDF phishing campaign | Malwarebytes
Fraud, Scams and Financial Crime
Financial Times investigation raises questions over King Gaming saga | Isle of Man Today
Money Mules Require Banks to Switch from Defense to Offense
European authorities dismantle call center fraud ring in Ukraine
What Is 'NGate'? The Android Phone ATM Scam You Need To Know About
Darkweb Powers Decentralized Financial Crimes
Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram
Nomad settles with the FTC over $186M cyberattack • The Register
HMRC Warns of Over 135,000 Scam Reports - Infosecurity Magazine
Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News
Singapore Entrepreneur Loses Entire Crypto Portfolio After Downloading Fake Game - Decrypt
Artificial Intelligence
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Cybersecurity Crossed the AI Rubicon: Why 2025 Marked a Point of No Return - Security Boulevard
Deepfakes Expose New Risks in Identity and Digital Trust
The internet in 2025: Bigger, more fragile than ever - and 'fundamentally rewired' by AI | ZDNET
AI-era cybersecurity is 'so dangerous,' CrowdStrike pres. explains
AI breaks the old security playbook - Help Net Security
The agentic shift: how autonomous AI is reshaping the global threat landscape
Chrome, Edge privacy extensions quietly snarf AI chats • The Register
Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram
Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow - SecurityWeek
The Things Young Kids Are Using AI for Are Absolutely Horrifying
NIST releases draft AI cybersecurity framework profile to guide secure AI adoption - SiliconANGLE
What Cyber Defenders Really Think About AI Risk | Trend Micro (US)
I Work at Google in AI Security: Things I Would Never Tell Chatbots - Business Insider
AI is causing all kinds of problems in the legal sector | CyberScoop
AML/CFT/Money Laundering/Terrorist Financing/Sanctions
Europe Targets Kremlin Disinformation, Cyber Networks in New Sanctions Push
EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times
2FA/MFA
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Your Accounts Can Still Get Hacked, Even Using Multi-Factor Authentication
Malware
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek
New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware
New SantaStealer malware steals data from browsers, crypto wallets
What is driving the rise of infostealer malware? | Computer Weekly
A Browser Extension Risk Guide After the ShadyPanda Campaign
17 Firefox extensions hide malware in icons | Cybernews
China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
Stop clicking “allow” on these pop-ups — they’re more dangerous than malware
Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine
Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
Elastic detects stealthy NANOREMOTE malware using Google Drive as C2
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
Fake ‘One Battle After Another’ torrent hides malware in subtitles
New BeaverTail Malware Variant Linked to Lazarus Group - Infosecurity Magazine
Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal
Man jailed for teaching criminals how to use malware
Bots/Botnets
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
Mobile
What Is 'NGate'? The Android Phone ATM Scam You Need To Know About
The WhatsApp takeover scam that doesn’t need your password
Android mobile adware surges in second half of 2025 | Malwarebytes
'Cellik' Android RAT Leverages Google Play Store
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
The ghosts of WhatsApp: How GhostPairing hijacks accounts | Malwarebytes
WhatsApp users unknowingly link hackers’ devices | Cybernews
Europe's DMA raises new security worries for mobile ecosystems - Help Net Security
‘Completely Deactivate Wi-Fi’—Cyber Agency Warns iPhone And Android Users
Microsoft to block Exchange Online access for outdated mobile devices
Denial of Service/DoS/DDoS
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
Internet of Things – IoT
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
Is your smart home an easy target? 6 ways experts lock theirs down | ZDNET
Your car’s web browser may be on the road to cyber ruin • The Register
Data Breaches/Leaks
Coupang data breach traced to ex-employee who retained system access
ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru
Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats
Data breach at credit check giant 700Credit affects at least 5.6 million | TechCrunch
PornHub Premium hacked. This is the info they reportedly stole. | Mashable
Analytics provider: We didn't expose stolen smut data • The Register
Data may have been taken in Ombudsman office cyber attack
French Interior Ministry confirms cyberattack on email servers
France arrests suspect tied to cyberattack on Interior Ministry
UK Information Commissioner Investigates Film & TV Worker Data Breach
Personal data breach affects thousands across Channel Islands - BBC News
GDPR failures in Home Office eVisa rollout in spotlight • The Register
SoundCloud confirms breach after member data stolen, VPN access disrupted
NHS tech supplier probes cyberattack on internal systems • The Register
University of Sydney suffers data breach exposing student and staff info
Organised Crime & Criminal Actors
Financial Times investigation raises questions over King Gaming saga | Isle of Man Today
Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film
North Korea stole a record $2B in crypto this year • The Register
Hackers Are Stealing Microsoft Account Passwords With This Trick
Money Mules Require Banks to Switch from Defense to Offense
European authorities dismantle call center fraud ring in Ukraine
Darkweb Powers Decentralized Financial Crimes
Nomad settles with the FTC over $186M cyberattack • The Register
Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case - Infosecurity Magazine
Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
North Korea stole a record $2B in crypto this year • The Register
New SantaStealer malware steals data from browsers, crypto wallets
Nomad settles with the FTC over $186M cyberattack • The Register
Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Singapore Entrepreneur Loses Entire Crypto Portfolio After Downloading Fake Game - Decrypt
Insider Risk and Insider Threats
Coupang data breach traced to ex-employee who retained system access
Amazon blocked 1,800 suspected DPRK job applicants • The Register
Insurance
What is a Cyber Insurance Managing General Agent?
Supply Chain and Third Parties
JLR cyberattack pushes TCS to standardize security for top clients | Company Business News
From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek
PornHub Premium hacked. This is the info they reportedly stole. | Mashable
Analytics provider: We didn't expose stolen smut data • The Register
NHS tech supplier probes cyberattack on internal systems • The Register
Software Supply Chain
From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek
Cloud/SaaS
Elastic detects stealthy NANOREMOTE malware using Google Drive as C2
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 - Infosecurity Magazine
US sues ex-Accenture manager over Army cloud security claims • The Register
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
NATO's battle for cloud sovereignty: Speed is existential • The Register
Identity and Access Management
Identity risk is changing faster than most security teams expect - Help Net Security
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Encryption
Linux and Open Source
From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek
Passwords, Credential Stuffing & Brute Force Attacks
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
FBI Confirms 630 Million Stolen Passwords — How To Check Yours Now
Social Media
Deepfakes Expose New Risks in Identity and Digital Trust
Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram
Privacy risks sit inside the ads that fill your social media feed - Help Net Security
Meta adopts new age-check system to meet global child safety laws
Regulations, Fines and Legislation
Financial Times investigation raises questions over King Gaming saga | Isle of Man Today
Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film
ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru
UK Lords propose ban on VPNs for children | TechRadar
Making cybercrime illegal won't stop it; making cybersec research legal may | CSO Online
Whistleblowers raise ‘extreme’ concern about security of government’s Digital ID | ITV News
Nomad settles with the FTC over $186M cyberattack • The Register
Europe's DMA raises new security worries for mobile ecosystems - Help Net Security
UK surveillance law still full of holes, watchdog warns • The Register
Are Trade Concerns Trumping Cybersecurity?
Trump Administration Turning to Private Firms in Cyber Offensive
Legal protection for ethical hacking is only the first step • The Register
Models, Frameworks and Standards
ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru
UK Lords propose ban on VPNs for children | TechRadar
GDPR failures in Home Office eVisa rollout in spotlight • The Register
NIST releases draft AI cybersecurity framework profile to guide secure AI adoption - SiliconANGLE
Data Protection
ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru
GDPR failures in Home Office eVisa rollout in spotlight • The Register
Careers, Roles, Skills, Working in Cyber and Information Security
EU can’t attract and retain cyber talent: why? | Cybernews
What lies in store for cyber security skills in 2026? | Computer Weekly
Increased workloads, strategic influence and technical focus - CISO predictions for 2026 - BetaNews
The Burnout Nobody Talks About: When “Always-On” Leadership Becomes a Liability - Security Boulevard
Leading Through Ambiguity: Decision-Making in Cybersecurity Leadership - Security Boulevard
Law Enforcement Action and Take Downs
European police busts Ukraine scam call centers - Help Net Security
France arrests suspect tied to cyberattack on Interior Ministry
Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case - Infosecurity Magazine
Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News
Man jailed for teaching criminals how to use malware
France arrests Latvian for installing malware on Italian ferry
Misinformation, Disinformation and Propaganda
EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
MI6 chief: 'We are operating in space between peace and war' - BBC News
MI6 chief warns of Russian hybrid threats, urges tech focus | EasternEye
China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
The agentic shift: how autonomous AI is reshaping the global threat landscape
Three ways teams can tackle Iran's tangled web of state-sponsored espionage | SC Media
Israel Issues Chilling Cyber Warfare Warning After Iran Attacks
Russia suspected of hacking European ferry with ‘remote control’
Nation State Actors
A ‘whole society’ response to threats to national security
China
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek
A Browser Extension Risk Guide After the ShadyPanda Campaign
The $0 Transaction That Signaled a Nation-State Cyberattack
US has failed to stop massive Chinese cyber campaign, warns senator
React2Shell vuln exploited by China, Iran, Google warns • The Register
China's Ink Dragon hides out in European government networks • The Register
China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear - SecurityWeek
China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
Financial Times investigation raises questions over King Gaming saga | Isle of Man Today
Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film
Google Sues Chinese ‘Darcula’ Group Over Alleged Phishing Scheme
Russia
MI6 chief: 'We are operating in space between peace and war' - BBC News
MI6 chief warns of Russian hybrid threats, urges tech focus | EasternEye
France and Germany Grappling With Nation-State Hacks
Germany accuses Russia of 2024 cyber attack and election disinformation campaign - BBC News
EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times
Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine
Amazon security boss blames Russia's GRU for energy hacks • The Register
Russia suspected of hacking European ferry with ‘remote control’
Amazon disrupts Russian GRU hackers attacking edge network devices
German Parliament Hit By Cyber-Attack During Zelensky Visit
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
Iran
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek
React2Shell vuln exploited by China, Iran, Google warns • The Register
Dormant Iran APT is Still Alive, Spying on Dissidents
Three ways teams can tackle Iran's tangled web of state-sponsored espionage | SC Media
Israel Issues Chilling Cyber Warfare Warning After Iran Attacks
North Korea
North Korea stole a record $2B in crypto this year • The Register
Amazon blocked 1,800 suspected DPRK job applicants • The Register
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal
New BeaverTail Malware Variant Linked to Lazarus Group - Infosecurity Magazine
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow - SecurityWeek
Tools and Controls
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
Amazon disrupts Russian GRU hackers attacking edge network devices
A Browser Extension Risk Guide After the ShadyPanda Campaign
From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek
How to justify your security investments | CSO Online
News brief: Future of security holds bigger budgets, new threats | TechTarget
The Budget Effect of a Security Incident - Infosecurity Magazine
More than half of public vulnerabilities bypass leading WAFs - Help Net Security
5 ways to scour the dark web for your data after Google kills its free report | ZDNET
AI isn't one system, and your threat model shouldn’t be either - Help Net Security
Reports Published in the Last Week
Trend Micro's 2025 Defenders Survey Report | Trend Micro (US)
Other News
How the Hacking World Has Changed: 'All Tech is Political'
CISO Communities – Cybersecurity’s Secret Weapon - SecurityWeek
Shadow spreadsheets: The security gap your tools can’t see
Cybersecurity - indispensable in the defense industry
Most schools underprepared for cybersecurity threats - BetaNews
No more orange juice? Why one ship reveals America's maritime cybersecurity crisis | CSO Online
The soft underbelly of space isn't in orbit, it's on the ground - Help Net Security
Online Attacks Against Women Human Rights Workers Double In Five Years
Vulnerability Management
More than half of public vulnerabilities bypass leading WAFs - Help Net Security
41 Microsoft Zero-Day Warnings — Millions Of Users Face Update Choice
Vulnerabilities
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek
React2Shell vuln exploited by China, Iran, Google warns • The Register
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
Half of exposed React servers remain unpatched amid attacks • The Register
Another bad week for SonicWall as SMA 1000 0-day exploited • The Register
China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear - SecurityWeek
Google and Apple roll out emergency security updates after zero-day attacks | TechCrunch
Emergency fixes deployed by Google and Apple after targeted attacks
Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
Chrome Security Update - Patch for Critical Vulnerabilities that Enables Remote Code Execution
Hackers are exploiting critical Fortinet flaws days after patch release
Notepad++ fixed updater bugs that allowed malicious update hijacking
Microsoft: December security updates cause Message Queuing failures
Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges
Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution
New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
Microsoft RasMan 0-day gets an unofficial patch and exploit • The Register
Recent GeoServer Vulnerability Exploited in Attacks - SecurityWeek
Hewlett Packard Enterprise (HPE) fixed maximum severity OneView flaw
CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
JumpCloud Windows Agent Flaw Enables Local Privilege Escalation - Infosecurity Magazine
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.