Black Arrow Cyber Threat Intelligence Briefing 24 October 2025

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week, the head of GCHQ has urged businesses to ensure their boards include members who understand cyber risks and can ask the right questions, while a new report highlights that many organisations are misaligned in their perception of cyber security strength versus actual security.

We also include a reminder about one of the most basic cyber controls: passwords. Millions of users have a single password for multiple accounts, and Microsoft warns of a rise in attacks driven by password theft. Our other insights include attackers exploiting vulnerabilities within days and using AI to scale their impact, the rising threat of ransomware, and the broader consequences of business leaders not recognising the gaps in their defences including the importance of testing incident response plans.

Responding to the above GCHQ call to action, contact us to learn how we support our client boards in their cyber governance and compliance. We join regular board meetings to lead the conversation on progress in building stronger and proportionate cyber security, while upskilling board members to support continuous development.


Top Cyber Stories of the Last Week

GCHQ Says Boards Must Understand Cyber Risks and Prepare for Attacks That Get Through

The head of GCHQ has urged UK companies to prepare for inevitable cyber-attacks by developing contingency plans that include offline crisis protocols. Speaking at a cyber security conference, Anne Keast-Butler stressed that boards must include members who understand cyber risks and can ask the right questions. She highlighted the increasing frequency of significant attacks and the role of AI in lowering the barrier for malicious actors. The National Cyber Security Centre reported a sharp rise in major incidents, and underscored the need for rehearsed response strategies by leadership teams.

Source: https://www.theguardian.com/technology/2025/oct/23/gchq-companies-cyber-crime-threat

Study Reveals Cyber Confidence Often Misaligned with Reality

A new report highlights a gap between perceived cyber security strength and actual readiness. Many organisations believe they are well protected, yet lack basic controls such as multi-factor authentication and incident response testing. The analysis shows that overconfidence can lead to underinvestment in critical areas. Experts urge boards to validate their assumptions through independent assessments and to ensure that cyber security is governed like other enterprise risks. The findings reinforce the need for leadership accountability and continuous improvement.

Source: https://professionalsecurity.co.uk/products/cyber/confidence-and-reality/

Threat Actors Exploiting Faster Than Businesses Can Respond

Threat actors are now exploiting vulnerabilities within days of discovery, leaving businesses with little time to react. The article outlines how attackers use automation and AI to identify and weaponise weaknesses rapidly. Business leaders are urged to shorten patch cycles, improve threat intelligence sharing, and rehearse incident response. The piece emphasises that cyber resilience is no longer just a technical issue but a leadership challenge requiring proactive governance and investment in agility.

Source: https://www.itpro.com/security/cyber-attacks/threat-actors-exploiting-quickly-what-business-leaders-should-do

Millions Still Use One Password Across Multiple Accounts

A new study reveals that millions of users continue to rely on a single password for multiple accounts, despite years of awareness campaigns. The report finds that 31% of respondents reuse passwords across work and personal platforms, creating major risks for credential stuffing and account takeover. The article calls for stronger enforcement of password policies and wider adoption of password managers. It also highlights the need for leadership to model good behaviour and ensure staff receive regular training.

Source: https://cybernews.com/security/millions-use-one-password/

Microsoft Warns of Sharp Rise in Identity Attacks Driven by Password Theft

Microsoft has reported a 32% increase in identity-based cyber attacks in the first half of 2025, with over 97% involving password-based methods. According to its latest Digital Defense Report, attackers are increasingly using stolen credentials to impersonate employees or contractors, often leading to data theft and ransomware deployment. Infostealer malware and help desk scams are key tactics, with groups like Scattered Spider exploiting these methods. Microsoft also highlighted its efforts to disrupt threats such as Lumma Stealer and cracked Cobalt Strike tools. IT firms and government bodies remain top targets, while ransomware actors are increasingly abusing antivirus exclusions to bypass defences.

Source: https://therecord.media/microsoft-warns-of-surge-identity-hacks-passwords

Insider Risks Cause Data Loss in 77% of Organisations

A study finds that 77% of organisations have experienced data loss due to insider risks, including negligent or malicious behaviour. Security leaders cite lack of visibility and poor access controls as key contributors. The report stresses the importance of behavioural monitoring, role-based access, and staff awareness programmes. Insider threats are often overlooked compared to external attacks, yet they pose significant operational and reputational risks. Boards are advised to treat insider risk as a strategic issue requiring cross-functional governance.

Source: https://www.securitymagazine.com/articles/101964-security-leaders-share-why-77-organizations-lose-data-due-to-insider-risks

AI-Driven Threats Are Top Concern for Cyber Professionals in 2026

New research from ISACA finds that AI-driven threats are the biggest concern for cyber security professionals heading into 2026. The survey reveals that 62% of respondents expect AI to increase the volume and sophistication of attacks. Concerns include deepfakes, automated phishing, and AI-powered malware. The report also notes a gap in preparedness, with only 38% of organisations confident in their ability to defend against AI-enabled threats. The findings call for urgent investment in AI-aware defences and leadership engagement on emerging risks.

Source: https://www.businesswire.com/news/home/20251020612551/en/AI-Driven-Cyber-Threats-Are-the-Biggest-Concern-for-Cybersecurity-Professionals-Going-Into-2026-Finds-New-ISACA-Research

Infostealers Are Reshaping the Cyber Security Landscape

Infostealers are a type of malware designed to silently collect credentials, session tokens and sensitive data from infected devices. These tools are increasingly used by attackers to bypass multi-factor authentication and gain persistent access to cloud services. Unlike ransomware, infostealers operate quietly, often going undetected while harvesting data for later use or sale. The rise of malware-as-a-service has made infostealers widely accessible, with criminal groups offering subscription models. Experts urge organisations to monitor for unusual login patterns and to implement stronger endpoint protection. The trend reflects a shift from disruptive attacks to silent data theft.

Source: https://betanews.com/2025/10/22/how-infostealers-have-changed-the-cybersecurity-landscape/

How ClickFix Attackers Trick You to Attack Yourself and Bypass Your Security

ClickFix is an attack method that pretends to be a fix for a broken page or a CAPTCHA, but in reality tricks users into copying and pasting malicious code from their browser clipboard. These attacks bypass email filters and rely on SEO poisoning and malvertising to lure victims. SEO poisoning involves attackers manipulating search engine results so that malicious websites appear high in search rankings, often mimicking legitimate help pages or software fixes. Once executed, the code runs locally and often evades endpoint detection. ClickFix has been linked to ransomware groups and state actors, with recent incidents affecting healthcare and municipal systems. The attack uses obfuscated JavaScript and legitimate-looking sites, making detection difficult.

Source: https://www.thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html

Business Confidence in Ransomware Defence Is High, But Readiness Is Low

A report finds a disconnect between business confidence and actual preparedness for ransomware attacks. While 70% of executives believe their organisations are well protected, only 35% have tested incident response plans. The report shows that attackers are evolving faster than defences, with double extortion and data theft now common tactics. The findings suggest that leadership needs to challenge its own evaluation and invest in practical resilience measures, including tabletop exercises and supplier coordination.

Source: https://www.crowdstrike.com/en-us/blog/ransomware-reality-business-confidence-is-high-preparedness-is-low/

Ransomware Payouts Surge to $36M in Recent Cases

New data shows that ransomware payouts have surged, with recent cases totalling $36M. Attackers use double extortion tactics, demanding payment not only to decrypt data but also to prevent public exposure. The report highlights that many victims are SMEs with limited recovery options. Experts warn that paying ransoms often leads to further demands and does not guarantee full restoration. The findings support calls for stronger backup strategies and rehearsals of how to manage being attacked.

Source: https://www.infosecurity-magazine.com/news/ransomware-payouts-surge-dollar36m/

Third-Party Breaches Escalate as Confidence Gap Widens Among Cyber Leaders

Experts warn that third-party and supply chain breaches are spiralling out of control, with 60% of UK and US leaders admitting the risks are too complex to manage. Despite 97% expressing confidence in breach response, 61% reported suffering a third-party attack in the past year. The IO State of Information Security Report highlights incidents such as those at Jaguar Land Rover and Collins Aerospace, showing how supply chain compromise can cause widespread disruption. Smaller firms are increasingly targeted, yet only 23% of leaders ranked supply chain compromise among their top emerging threats.

Source: https://www.emergingrisks.co.uk/third-party-breaches-out-of-control-experts-warn/ 



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware Payouts Surge to $3.6m Amid Evolving Tactics - Infosecurity Magazine

Ransomware Reality: Business Confidence Is High, Preparedness Is Low

Scattered Lapsus$ Hunters Signal Shift in Tactics - Infosecurity Magazine

Madman Theory Spurs Crazy Scattered Lapsus$ Hunters Playbook

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques | Trend Micro (US)

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense - Help Net Security

Warlock Ransomware: Old Actor, New Tricks? | SECURITY.COM

Japanese companies brace themselves for more attacks as cybercrimes climb | The Straits Times

Ransomware Victims

JLR hack 'is costliest cyber attack in UK history', experts say - BBC News

Jaguar Land Rover cyberattack could cost the UK almost £2B • The Register

UK Ministry of Defense Probes Military Contractor Data Leak

Hackers are now a serious risk to patients' lives as NHS records the first death due to a cyber crime | Daily Mail Online

UK vehicle output drops by 36% following JLR cyber attack | Autocar

From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach - Security Affairs

Japanese retailer Muji halted online sales after a ransomware attack on logistics partner

UK Data Protection Regulator Fines Capita ~$18.8 Million Following a Ransomware Attack | Alston & Bird - JDSupra

Golfwear giant allegedly targeted by Russian hackers | Cybernews

Phishing & Email Based Attacks

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

This new cyberattack tricks you into hacking yourself. Here's how to spot it | ZDNET

How AI is driving email phishing and how to beat the threat [Q&A] - BetaNews

Many IT leaders click phishing links — and some don’t report them | CIO Dive

New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

AWS outage expected to trigger phishing attacks Be prepared: AWS outage likely to trigger surge in phishing attacks | Cybernews

TikTok videos continue to push infostealers in ClickFix attacks

John Bolton charged over classified emails after Iranian hack of his AOL account

PhantomCaptcha ClickFix attack targets Ukraine war relief orgs

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

Other Social Engineering

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

AI Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals - Infosecurity Magazine

Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop

Google and Check Point nuke massive YouTube malware network • The Register

Researchers track surge in high-level Smishing Triad activity | CyberScoop

TikTok videos continue to push infostealers in ClickFix attacks

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

Fraud, Scams and Financial Crime

Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop

Google and Check Point nuke massive YouTube malware network • The Register

Researchers track surge in high-level Smishing Triad activity | CyberScoop

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek

Man caught using suitcase ‘phone tower’ to target Victoria Line commuters with scam texts - My London

First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)

Cifas exposes dozens of email addresses in invite mishap • The Register

Artificial Intelligence

How AI is driving email phishing and how to beat the threat [Q&A] - BetaNews

Executives Fear AI Cyber Threats Could Outpace Defenses

AI-Driven Cyber Threats Are the Biggest Concern for Cybersecurity Professionals Going Into 2026, Finds New ISACA Research

AI-driven cybersecurity threats are now hitting businesses from every angle - here's how to stay safe | TechRadar

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense - Help Net Security

Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US - SecurityWeek

Cyber experts have been warning about AI-powered DDoS attacks – now they’re becoming a reality | IT Pro

Companies want the benefits of AI without the cyber blowback - Help Net Security

OpenAI's new Atlas browser may have some extremely concerning security issues, experts warn - here's what we know | TechRadar

Survey: Cybersecurity Teams Struggling to Keep Pace in the Age of AI - Security Boulevard

It Takes Only 250 Documents to Poison Any AI Model

AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk - SecurityWeek

Malware

How infostealers have changed the cybersecurity landscape - BetaNews

Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer - Infosecurity Magazine

Threat Actors With Stealer Malwares Processing Millions of Credentials a Day - Cyber Security News

Why traditional bot defenses are failing in the age of intelligent automation | TechRadar

Google and Check Point nuke massive YouTube malware network • The Register

TikTok videos continue to push infostealers in ClickFix attacks

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

Vidar Stealer 2.0 adds multi-threaded data theft, better evasion

Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure

Cybercriminals turn to stealth to bypass malware detection - BetaNews

Security Teams Must Deploy Anti-Infostealer Defenses Now - Infosecurity Magazine

Google finds Russian state hackers replacing burned malware with new tools | The Record from Recorded Future News

Google ads for fake Homebrew, LogMeIn sites push infostealers

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

Self-spreading GlassWorm malware hits OpenVSX, VS Code registries

Cyber-criminals turn on each other: the story of Lumma Stealer's collapse | Fortra

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor

Official Xubuntu website compromised to serve malware - Help Net Security

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

Bots/Botnets

Why traditional bot defenses are failing in the age of intelligent automation | TechRadar

Mobile

Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

EU watchdog attacks Britain over iPhone ‘backdoor’ demand

Man caught using suitcase ‘phone tower’ to target Victoria Line commuters with scam texts - My London

Why Some Apps Ask for Contacts (and What They Actually Do With Them)

6 steps to increase Android security in the enterprise | TechTarget

Denial of Service/DoS/DDoS

Cyber experts have been warning about AI-powered DDoS attacks – now they’re becoming a reality | IT Pro

How to Detect and Mitigate Hit and Run DDoS Attacks - Security Boulevard

Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Security patch or self-inflicted DDoS? Microsoft update knocks out key enterprise functions | CSO Online

Internet of Things – IoT

Is Your Car a BYOD Risk? Researchers Demonstrate How

Your smart building isn't so smart without security - Help Net Security

When everything's connected, everything's at risk - Help Net Security

Bombarding Cars With Lasers: Novel Auto Attacks Emerge

Data Breaches/Leaks

Over 266,000 F5 BIG-IP instances exposed to remote attacks

Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023

F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity - Security Boulevard

183 million email accounts just got compromised. Check if you're affected | PCWorld

ICO defends decision not to investigate MoD Afghan data leak • The Register

FinWise data breach shows why encryption is your last defense

John Bolton charged over classified emails after Iranian hack of his AOL account

UK Data Protection Regulator Fines Capita ~$18.8 Million Following a Ransomware Attack | Alston & Bird - JDSupra

MoD probes claims Russian hackers stole files on bases - BBC News

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online

Cifas exposes dozens of email addresses in invite mishap • The Register

American Airlines Subsidiary Envoy Air Hit by Oracle Hack - SecurityWeek

Hundreds of masked ICE agents doxxed by hackers, as personal details posted on Telegram

Organised Crime & Criminal Actors

Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop

Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek

Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily

Russian Government Now Actively Managing Cybercrime Groups: Security Firm - SecurityWeek

Cyber-criminals turn on each other: the story of Lumma Stealer's collapse | Fortra

US Congress committee investigating Musk-owned Starlink over Myanmar scam centres | Myanmar | The Guardian

Not Just Spies: Satellite Operators Say Cybercrime Is Major Threat

Russia Pivots, Cracks Down on Resident Hackers

Ex-Uber CSO talks teen cyber crims, CISO role with The Reg • The Register

Insider Risk and Insider Threats

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks | Security Magazine

Are we human or are we security risk? - BetaNews

Insurance

Cyber war perception hindering capital and market growth: Johansmeyer at Convergence - Artemis.bm

Supply Chain and Third Parties

JLR hack 'is costliest cyber attack in UK history', experts say - BBC News

When Big Doesn’t Mean Bulletproof: The Importance of Third-Party Service Provider Due Diligence | Jackson Lewis P.C. - JDSupra

The next cyber crisis may start in someone else's supply chain - Help Net Security

Third party breaches out of control experts warn

F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity - Security Boulevard

Jaguar Land Rover August hack cost UK economy $2.5 billion: Report | Company News - Business Standard

UK Ministry of Defense Probes Military Contractor Data Leak

Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk - Security Boulevard

Japanese retailer Muji halted online sales after a ransomware attack on logistics partner

American Airlines subsidiary Envoy confirms Oracle data theft attack

Cloud/SaaS

AWS outage crashes Amazon, PrimeVideo, Fortnite, Perplexity and more

AWS Outage: Billions Lost, Multi-Cloud Is Wall Street’s Solution

Cybersecurity expert offers blunt verdict on AWS outage - TheStreet

AWS outage post-mortem fingers DNS as the culprit that took out a chunk of the internet and services for days — automation systems race and crash | Tom's Hardware

AWS outage exposes Achilles heel: central control plane • The Register

What the Huge AWS Outage Reveals About the Internet | WIRED

Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO

CyberCube estimates preliminary AWS outage loss range of $38-581m - Reinsurance News

Inside the messy reality of Microsoft 365 management - Help Net Security

Zoom isn't as private as you think. Here's how to lock it down | PCWorld

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online

Outages

AWS outage crashes Amazon, PrimeVideo, Fortnite, Perplexity and more

Cybersecurity expert offers blunt verdict on AWS outage - TheStreet

AWS outage exposes Achilles heel: central control plane • The Register

What the Huge AWS Outage Reveals About the Internet | WIRED

Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO

Security patch or self-inflicted DDoS? Microsoft update knocks out key enterprise functions | CSO Online

Identity and Access Management

Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords | The Record from Recorded Future News

Encryption

EU watchdog attacks Britain over iPhone ‘backdoor’ demand

FinWise data breach shows why encryption is your last defense

Linux and Open Source

Europe's plan to ditch US tech giants is built on open source - and it's gaining steam | ZDNET

Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO

Official Xubuntu website compromised to serve malware - Help Net Security

Passwords, Credential Stuffing & Brute Force Attacks

Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords | The Record from Recorded Future News

Threat Actors With Stealer Malwares Processing Millions of Credentials a Day - Cyber Security News

Millions rely on just one password for everything | Cybernews

Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk - Security Boulevard

183 million email accounts just got compromised. Check if you're affected | PCWorld

Social Media

Google and Check Point nuke massive YouTube malware network • The Register

Dissecting YouTube’s Malware Distribution Network - Check Point Research

Don't be fooled by this massive YouTube scam network - how to protect yourself | ZDNET

TikTok videos continue to push infostealers in ClickFix attacks

First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)

Training, Education and Awareness

Phishing training needs a new hook — here’s how to rethink your approach | CSO Online

Regulations, Fines and Legislation

UK cyber law delays 'deeply concerning,' say MPs | The Record from Recorded Future News

Experian fined $3.2 million for mass-collecting personal data

EU watchdog attacks Britain over iPhone ‘backdoor’ demand

ICO defends decision not to investigate MoD Afghan data leak • The Register

UK Data Protection Regulator Fines Capita ~$18.8 Million Following a Ransomware Attack | Alston & Bird - JDSupra

US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes | CyberScoop

Behind the struggle for control of the CVE program | CyberScoop

Trump pardons former Binance CEO after guilty plea in letting cybercrime proceeds flow through platform | The Record from Recorded Future News

The US government shutdown is a wake-up call for cyber self-reliance | Computer Weekly

Trump's workforce cuts blamed as America's cyber edge dulls • The Register

Models, Frameworks and Standards

Experian fined $3.2 million for mass-collecting personal data

Careers, Working in Cyber and Information Security

Future Cybersecurity Workforce: Beyond Degrees, Toward Durable Skills

Why ex-military professionals are a good fit for cybersecurity - Help Net Security

Hiring Won’t Fix the Cyber Talent Gap: Building a Self-Improving Workforce Will

Law Enforcement Action and Take Downs

Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop

Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

US Congress committee investigating Musk-owned Starlink over Myanmar scam centres | Myanmar | The Guardian

Man caught using suitcase ‘phone tower’ to target Victoria Line commuters with scam texts - My London

Former Director at US Hacking Tool Provider May Have Sold Secrets to Russia

First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)

Three arrested in UK on suspicion of assisting Russian intelligence service | UK news | The Guardian


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns | Trend Micro (US)

Electronic Warfare Puts Commercial GPS Users on Notice

Cyberespionage campaign PassiveNeuron targets machines running Windows Server | Securelist

The UK military says Russia targets its satellites on a weekly basis. What can be done about it?

Are we already witnessing space warfare in action: 'This is not just posturing' | Space

Cyber war perception hindering capital and market growth: Johansmeyer at Convergence - Artemis.bm

China

Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns | Trend Micro (US)

Microsoft Is Warning That Russia and China Are Increasingly Using AI to Mount Cyberattacks on the U.S.

Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack - Infosecurity Magazine

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

Reconfiguring U.S. Cyber Strategy in the Wake of Salt Typhoon | Lawfare

Researchers track surge in high-level Smishing Triad activity | CyberScoop

China accuses US of cyberattack on national time center | AP News

Russia

Russian Government Now Actively Managing Cybercrime Groups: Security Firm - SecurityWeek

Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US - SecurityWeek

Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure

Google finds Russian state hackers replacing burned malware with new tools | The Record from Recorded Future News

The UK military says Russia targets its satellites on a weekly basis. What can be done about it?

MoD probes claims Russian hackers stole files on bases - BBC News

Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe - Infosecurity Magazine

EU and Ukraine deepen cooperation on cyber security  - EU NEIGHBOURS east

Former Director at US Hacking Tool Provider May Have Sold Secrets to Russia

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

Three arrested in UK on suspicion of assisting Russian intelligence service | UK news | The Guardian

PhantomCaptcha ClickFix attack targets Ukraine war relief orgs

From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach - Security Affairs

Russia-linked hackers claim responsibility for Collins Aerospace cyber attack - Defence Connect

Golfwear giant allegedly targeted by Russian hackers | Cybernews

Iran

John Bolton charged over classified emails after Iranian hack of his AOL account

MuddyWater Targets 100+ MEA Gov Entites With Backdoor

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor

John Bolton indictment says suspected Iranian hackers accessed his emails, issued threats | CyberScoop

North Korea

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

How Lazarus Group used fake job ads to spy on Europe's drone and defense sector - Help Net Security

Lazarus Group Hunts European Drone Manufacturing Data

The Leak That Targeted the Leakers

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

How Business Leaders Can Turn Geopolitical Uncertainty Into Strategic Opportunity



Reports Published in the Last Week

Cyber resilience of UK digital infrastructure - POST



Vulnerability Management

Threat actors are exploiting flaws more quickly – here's what business leaders should do | IT Pro

Network security devices endanger orgs with ’90s era flaws | CSO Online

Behind the struggle for control of the CVE program | CyberScoop

Flawed Vendor Guidance Exposes Orgs to Avoidable Risk

Vulnerabilities

Over 266,000 F5 BIG-IP instances exposed to remote attacks

Flawed Vendor Guidance Exposes Orgs to Avoidable Risk

Microsoft fixes Windows bug breaking localhost HTTP connections

ConnectWise Patches Critical Flaw in Automate RMM Tool - SecurityWeek

Microsoft fixes one of its "highest ever" rated security flaws - here's what happened | TechRadar

Microsoft fixes Windows Server Active Directory sync issues

CISA: High-severity Windows SMB flaw now exploited in attacks

CISA Confirms Exploitation of Latest Oracle EBS Vulnerability  - SecurityWeek

Oracle Releases October 2025 Patches - SecurityWeek

Windows Server emergency patches fix WSUS bug with PoC exploit

BIND Updates Address High-Severity Cache Poisoning Flaws - SecurityWeek

Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Experts warn OpenAI’s ChatGPT Atlas has security flaws that could turn it against users—stealing sensitive data, downloading malware, or worse | Fortune

71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks

Researchers uncover remote code execution flaw in abandoned Rust code library | CyberScoop

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack - Infosecurity Magazine

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

Cursor, Windsurf IDEs riddled with 94+ n-day Chromium vulnerabilities

Microsoft fixes bug preventing users from opening classic Outlook

HP pulls update that broke Microsoft Entra ID auth on some AI PCs


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

Previous
Previous

Black Arrow Cyber Threat Intelligence Briefing 31 October 2025

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 17 October 2025