Black Arrow Cyber Threat Intelligence Briefing 24 October 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
This week, the head of GCHQ has urged businesses to ensure their boards include members who understand cyber risks and can ask the right questions, while a new report highlights that many organisations are misaligned in their perception of cyber security strength versus actual security.
We also include a reminder about one of the most basic cyber controls: passwords. Millions of users have a single password for multiple accounts, and Microsoft warns of a rise in attacks driven by password theft. Our other insights include attackers exploiting vulnerabilities within days and using AI to scale their impact, the rising threat of ransomware, and the broader consequences of business leaders not recognising the gaps in their defences including the importance of testing incident response plans.
Responding to the above GCHQ call to action, contact us to learn how we support our client boards in their cyber governance and compliance. We join regular board meetings to lead the conversation on progress in building stronger and proportionate cyber security, while upskilling board members to support continuous development.
Top Cyber Stories of the Last Week
GCHQ Says Boards Must Understand Cyber Risks and Prepare for Attacks That Get Through
The head of GCHQ has urged UK companies to prepare for inevitable cyber-attacks by developing contingency plans that include offline crisis protocols. Speaking at a cyber security conference, Anne Keast-Butler stressed that boards must include members who understand cyber risks and can ask the right questions. She highlighted the increasing frequency of significant attacks and the role of AI in lowering the barrier for malicious actors. The National Cyber Security Centre reported a sharp rise in major incidents, and underscored the need for rehearsed response strategies by leadership teams.
Source: https://www.theguardian.com/technology/2025/oct/23/gchq-companies-cyber-crime-threat
Study Reveals Cyber Confidence Often Misaligned with Reality
A new report highlights a gap between perceived cyber security strength and actual readiness. Many organisations believe they are well protected, yet lack basic controls such as multi-factor authentication and incident response testing. The analysis shows that overconfidence can lead to underinvestment in critical areas. Experts urge boards to validate their assumptions through independent assessments and to ensure that cyber security is governed like other enterprise risks. The findings reinforce the need for leadership accountability and continuous improvement.
Source: https://professionalsecurity.co.uk/products/cyber/confidence-and-reality/
Threat Actors Exploiting Faster Than Businesses Can Respond
Threat actors are now exploiting vulnerabilities within days of discovery, leaving businesses with little time to react. The article outlines how attackers use automation and AI to identify and weaponise weaknesses rapidly. Business leaders are urged to shorten patch cycles, improve threat intelligence sharing, and rehearse incident response. The piece emphasises that cyber resilience is no longer just a technical issue but a leadership challenge requiring proactive governance and investment in agility.
Millions Still Use One Password Across Multiple Accounts
A new study reveals that millions of users continue to rely on a single password for multiple accounts, despite years of awareness campaigns. The report finds that 31% of respondents reuse passwords across work and personal platforms, creating major risks for credential stuffing and account takeover. The article calls for stronger enforcement of password policies and wider adoption of password managers. It also highlights the need for leadership to model good behaviour and ensure staff receive regular training.
Source: https://cybernews.com/security/millions-use-one-password/
Microsoft Warns of Sharp Rise in Identity Attacks Driven by Password Theft
Microsoft has reported a 32% increase in identity-based cyber attacks in the first half of 2025, with over 97% involving password-based methods. According to its latest Digital Defense Report, attackers are increasingly using stolen credentials to impersonate employees or contractors, often leading to data theft and ransomware deployment. Infostealer malware and help desk scams are key tactics, with groups like Scattered Spider exploiting these methods. Microsoft also highlighted its efforts to disrupt threats such as Lumma Stealer and cracked Cobalt Strike tools. IT firms and government bodies remain top targets, while ransomware actors are increasingly abusing antivirus exclusions to bypass defences.
Source: https://therecord.media/microsoft-warns-of-surge-identity-hacks-passwords
Insider Risks Cause Data Loss in 77% of Organisations
A study finds that 77% of organisations have experienced data loss due to insider risks, including negligent or malicious behaviour. Security leaders cite lack of visibility and poor access controls as key contributors. The report stresses the importance of behavioural monitoring, role-based access, and staff awareness programmes. Insider threats are often overlooked compared to external attacks, yet they pose significant operational and reputational risks. Boards are advised to treat insider risk as a strategic issue requiring cross-functional governance.
AI-Driven Threats Are Top Concern for Cyber Professionals in 2026
New research from ISACA finds that AI-driven threats are the biggest concern for cyber security professionals heading into 2026. The survey reveals that 62% of respondents expect AI to increase the volume and sophistication of attacks. Concerns include deepfakes, automated phishing, and AI-powered malware. The report also notes a gap in preparedness, with only 38% of organisations confident in their ability to defend against AI-enabled threats. The findings call for urgent investment in AI-aware defences and leadership engagement on emerging risks.
Infostealers Are Reshaping the Cyber Security Landscape
Infostealers are a type of malware designed to silently collect credentials, session tokens and sensitive data from infected devices. These tools are increasingly used by attackers to bypass multi-factor authentication and gain persistent access to cloud services. Unlike ransomware, infostealers operate quietly, often going undetected while harvesting data for later use or sale. The rise of malware-as-a-service has made infostealers widely accessible, with criminal groups offering subscription models. Experts urge organisations to monitor for unusual login patterns and to implement stronger endpoint protection. The trend reflects a shift from disruptive attacks to silent data theft.
Source: https://betanews.com/2025/10/22/how-infostealers-have-changed-the-cybersecurity-landscape/
How ClickFix Attackers Trick You to Attack Yourself and Bypass Your Security
ClickFix is an attack method that pretends to be a fix for a broken page or a CAPTCHA, but in reality tricks users into copying and pasting malicious code from their browser clipboard. These attacks bypass email filters and rely on SEO poisoning and malvertising to lure victims. SEO poisoning involves attackers manipulating search engine results so that malicious websites appear high in search rankings, often mimicking legitimate help pages or software fixes. Once executed, the code runs locally and often evades endpoint detection. ClickFix has been linked to ransomware groups and state actors, with recent incidents affecting healthcare and municipal systems. The attack uses obfuscated JavaScript and legitimate-looking sites, making detection difficult.
Source: https://www.thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
Business Confidence in Ransomware Defence Is High, But Readiness Is Low
A report finds a disconnect between business confidence and actual preparedness for ransomware attacks. While 70% of executives believe their organisations are well protected, only 35% have tested incident response plans. The report shows that attackers are evolving faster than defences, with double extortion and data theft now common tactics. The findings suggest that leadership needs to challenge its own evaluation and invest in practical resilience measures, including tabletop exercises and supplier coordination.
Ransomware Payouts Surge to $36M in Recent Cases
New data shows that ransomware payouts have surged, with recent cases totalling $36M. Attackers use double extortion tactics, demanding payment not only to decrypt data but also to prevent public exposure. The report highlights that many victims are SMEs with limited recovery options. Experts warn that paying ransoms often leads to further demands and does not guarantee full restoration. The findings support calls for stronger backup strategies and rehearsals of how to manage being attacked.
Source: https://www.infosecurity-magazine.com/news/ransomware-payouts-surge-dollar36m/
Third-Party Breaches Escalate as Confidence Gap Widens Among Cyber Leaders
Experts warn that third-party and supply chain breaches are spiralling out of control, with 60% of UK and US leaders admitting the risks are too complex to manage. Despite 97% expressing confidence in breach response, 61% reported suffering a third-party attack in the past year. The IO State of Information Security Report highlights incidents such as those at Jaguar Land Rover and Collins Aerospace, showing how supply chain compromise can cause widespread disruption. Smaller firms are increasingly targeted, yet only 23% of leaders ranked supply chain compromise among their top emerging threats.
Source: https://www.emergingrisks.co.uk/third-party-breaches-out-of-control-experts-warn/
Governance, Risk and Compliance
"We Are Very Exposed": Does The UK Need A New Plan For Cyber-Attacks?
Cyber security is business survival - NCSC.GOV.UK
Confidence and reality | Professional Security Magazine
2025 Cyber Incident Trends: What Your Business Needs to Know | Mayer Brown - JDSupra
Why Political Risk Is Now A Top Threat For Companies
62% of Risk Leaders Say Trade Wars Could Trigger Cyberattacks, New Riskonnect Research Finds
Threats
Ransomware, Extortion and Destructive Attacks
Ransomware Payouts Surge to $3.6m Amid Evolving Tactics - Infosecurity Magazine
Ransomware Reality: Business Confidence Is High, Preparedness Is Low
Scattered Lapsus$ Hunters Signal Shift in Tactics - Infosecurity Magazine
Madman Theory Spurs Crazy Scattered Lapsus$ Hunters Playbook
Warlock Ransomware: Old Actor, New Tricks? | SECURITY.COM
Japanese companies brace themselves for more attacks as cybercrimes climb | The Straits Times
Ransomware Victims
JLR hack 'is costliest cyber attack in UK history', experts say - BBC News
Jaguar Land Rover cyberattack could cost the UK almost £2B • The Register
UK Ministry of Defense Probes Military Contractor Data Leak
UK vehicle output drops by 36% following JLR cyber attack | Autocar
Japanese retailer Muji halted online sales after a ransomware attack on logistics partner
Golfwear giant allegedly targeted by Russian hackers | Cybernews
Phishing & Email Based Attacks
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches
This new cyberattack tricks you into hacking yourself. Here's how to spot it | ZDNET
How AI is driving email phishing and how to beat the threat [Q&A] - BetaNews
Many IT leaders click phishing links — and some don’t report them | CIO Dive
New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
TikTok videos continue to push infostealers in ClickFix attacks
John Bolton charged over classified emails after Iranian hack of his AOL account
PhantomCaptcha ClickFix attack targets Ukraine war relief orgs
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Other Social Engineering
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches
AI Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals - Infosecurity Magazine
Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop
Google and Check Point nuke massive YouTube malware network • The Register
Researchers track surge in high-level Smishing Triad activity | CyberScoop
TikTok videos continue to push infostealers in ClickFix attacks
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Fraud, Scams and Financial Crime
Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop
Google and Check Point nuke massive YouTube malware network • The Register
Researchers track surge in high-level Smishing Triad activity | CyberScoop
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek
First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)
Cifas exposes dozens of email addresses in invite mishap • The Register
Artificial Intelligence
How AI is driving email phishing and how to beat the threat [Q&A] - BetaNews
Executives Fear AI Cyber Threats Could Outpace Defenses
Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US - SecurityWeek
Companies want the benefits of AI without the cyber blowback - Help Net Security
Survey: Cybersecurity Teams Struggling to Keep Pace in the Age of AI - Security Boulevard
It Takes Only 250 Documents to Poison Any AI Model
AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk - SecurityWeek
Malware
How infostealers have changed the cybersecurity landscape - BetaNews
Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer - Infosecurity Magazine
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day - Cyber Security News
Why traditional bot defenses are failing in the age of intelligent automation | TechRadar
Google and Check Point nuke massive YouTube malware network • The Register
TikTok videos continue to push infostealers in ClickFix attacks
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
Vidar Stealer 2.0 adds multi-threaded data theft, better evasion
Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure
Cybercriminals turn to stealth to bypass malware detection - BetaNews
Security Teams Must Deploy Anti-Infostealer Defenses Now - Infosecurity Magazine
Google ads for fake Homebrew, LogMeIn sites push infostealers
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Self-spreading GlassWorm malware hits OpenVSX, VS Code registries
Cyber-criminals turn on each other: the story of Lumma Stealer's collapse | Fortra
Iranian hackers targeted over 100 govt orgs with Phoenix backdoor
Official Xubuntu website compromised to serve malware - Help Net Security
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Bots/Botnets
Why traditional bot defenses are failing in the age of intelligent automation | TechRadar
Mobile
Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
EU watchdog attacks Britain over iPhone ‘backdoor’ demand
Why Some Apps Ask for Contacts (and What They Actually Do With Them)
6 steps to increase Android security in the enterprise | TechTarget
Denial of Service/DoS/DDoS
How to Detect and Mitigate Hit and Run DDoS Attacks - Security Boulevard
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition
Internet of Things – IoT
Is Your Car a BYOD Risk? Researchers Demonstrate How
Your smart building isn't so smart without security - Help Net Security
When everything's connected, everything's at risk - Help Net Security
Bombarding Cars With Lasers: Novel Auto Attacks Emerge
Data Breaches/Leaks
Over 266,000 F5 BIG-IP instances exposed to remote attacks
Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023
F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity - Security Boulevard
183 million email accounts just got compromised. Check if you're affected | PCWorld
ICO defends decision not to investigate MoD Afghan data leak • The Register
FinWise data breach shows why encryption is your last defense
John Bolton charged over classified emails after Iranian hack of his AOL account
MoD probes claims Russian hackers stole files on bases - BBC News
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online
Cifas exposes dozens of email addresses in invite mishap • The Register
American Airlines Subsidiary Envoy Air Hit by Oracle Hack - SecurityWeek
Hundreds of masked ICE agents doxxed by hackers, as personal details posted on Telegram
Organised Crime & Criminal Actors
Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek
Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily
Russian Government Now Actively Managing Cybercrime Groups: Security Firm - SecurityWeek
Cyber-criminals turn on each other: the story of Lumma Stealer's collapse | Fortra
Not Just Spies: Satellite Operators Say Cybercrime Is Major Threat
Russia Pivots, Cracks Down on Resident Hackers
Ex-Uber CSO talks teen cyber crims, CISO role with The Reg • The Register
Insider Risk and Insider Threats
Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks | Security Magazine
Are we human or are we security risk? - BetaNews
Insurance
Cyber war perception hindering capital and market growth: Johansmeyer at Convergence - Artemis.bm
Supply Chain and Third Parties
JLR hack 'is costliest cyber attack in UK history', experts say - BBC News
The next cyber crisis may start in someone else's supply chain - Help Net Security
Third party breaches out of control experts warn
F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity - Security Boulevard
UK Ministry of Defense Probes Military Contractor Data Leak
Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk - Security Boulevard
Japanese retailer Muji halted online sales after a ransomware attack on logistics partner
American Airlines subsidiary Envoy confirms Oracle data theft attack
Cloud/SaaS
AWS outage crashes Amazon, PrimeVideo, Fortnite, Perplexity and more
AWS Outage: Billions Lost, Multi-Cloud Is Wall Street’s Solution
Cybersecurity expert offers blunt verdict on AWS outage - TheStreet
AWS outage exposes Achilles heel: central control plane • The Register
What the Huge AWS Outage Reveals About the Internet | WIRED
Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO
CyberCube estimates preliminary AWS outage loss range of $38-581m - Reinsurance News
Inside the messy reality of Microsoft 365 management - Help Net Security
Zoom isn't as private as you think. Here's how to lock it down | PCWorld
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online
Outages
AWS outage crashes Amazon, PrimeVideo, Fortnite, Perplexity and more
Cybersecurity expert offers blunt verdict on AWS outage - TheStreet
AWS outage exposes Achilles heel: central control plane • The Register
What the Huge AWS Outage Reveals About the Internet | WIRED
Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO
Identity and Access Management
Encryption
EU watchdog attacks Britain over iPhone ‘backdoor’ demand
FinWise data breach shows why encryption is your last defense
Linux and Open Source
Europe's plan to ditch US tech giants is built on open source - and it's gaining steam | ZDNET
Amazon cloud outage fuels call for Europe to limit reliance on US tech – POLITICO
Official Xubuntu website compromised to serve malware - Help Net Security
Passwords, Credential Stuffing & Brute Force Attacks
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day - Cyber Security News
Millions rely on just one password for everything | Cybernews
Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk - Security Boulevard
183 million email accounts just got compromised. Check if you're affected | PCWorld
Social Media
Google and Check Point nuke massive YouTube malware network • The Register
Dissecting YouTube’s Malware Distribution Network - Check Point Research
Don't be fooled by this massive YouTube scam network - how to protect yourself | ZDNET
TikTok videos continue to push infostealers in ClickFix attacks
First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)
Training, Education and Awareness
Phishing training needs a new hook — here’s how to rethink your approach | CSO Online
Regulations, Fines and Legislation
UK cyber law delays 'deeply concerning,' say MPs | The Record from Recorded Future News
Experian fined $3.2 million for mass-collecting personal data
EU watchdog attacks Britain over iPhone ‘backdoor’ demand
ICO defends decision not to investigate MoD Afghan data leak • The Register
US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes | CyberScoop
Behind the struggle for control of the CVE program | CyberScoop
The US government shutdown is a wake-up call for cyber self-reliance | Computer Weekly
Trump's workforce cuts blamed as America's cyber edge dulls • The Register
Models, Frameworks and Standards
Experian fined $3.2 million for mass-collecting personal data
Careers, Working in Cyber and Information Security
Future Cybersecurity Workforce: Beyond Degrees, Toward Durable Skills
Why ex-military professionals are a good fit for cybersecurity - Help Net Security
Hiring Won’t Fix the Cyber Talent Gap: Building a Self-Improving Workforce Will
Law Enforcement Action and Take Downs
Europol dismantles cybercrime network linked to $5.8M in financial losses | CyberScoop
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People - SecurityWeek
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
Former Director at US Hacking Tool Provider May Have Sold Secrets to Russia
First conviction for promoting tax fraud on Instagram | HM Revenue & Customs (HMRC)
Three arrested in UK on suspicion of assisting Russian intelligence service | UK news | The Guardian
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns | Trend Micro (US)
Electronic Warfare Puts Commercial GPS Users on Notice
Cyberespionage campaign PassiveNeuron targets machines running Windows Server | Securelist
The UK military says Russia targets its satellites on a weekly basis. What can be done about it?
Are we already witnessing space warfare in action: 'This is not just posturing' | Space
Cyber war perception hindering capital and market growth: Johansmeyer at Convergence - Artemis.bm
China
Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns | Trend Micro (US)
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack - Infosecurity Magazine
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
Reconfiguring U.S. Cyber Strategy in the Wake of Salt Typhoon | Lawfare
Researchers track surge in high-level Smishing Triad activity | CyberScoop
China accuses US of cyberattack on national time center | AP News
Russia
Russian Government Now Actively Managing Cybercrime Groups: Security Firm - SecurityWeek
Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US - SecurityWeek
Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure
The UK military says Russia targets its satellites on a weekly basis. What can be done about it?
MoD probes claims Russian hackers stole files on bases - BBC News
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe - Infosecurity Magazine
EU and Ukraine deepen cooperation on cyber security - EU NEIGHBOURS east
Former Director at US Hacking Tool Provider May Have Sold Secrets to Russia
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Three arrested in UK on suspicion of assisting Russian intelligence service | UK news | The Guardian
PhantomCaptcha ClickFix attack targets Ukraine war relief orgs
Russia-linked hackers claim responsibility for Collins Aerospace cyber attack - Defence Connect
Golfwear giant allegedly targeted by Russian hackers | Cybernews
Iran
John Bolton charged over classified emails after Iranian hack of his AOL account
MuddyWater Targets 100+ MEA Gov Entites With Backdoor
Iranian hackers targeted over 100 govt orgs with Phoenix backdoor
North Korea
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
How Lazarus Group used fake job ads to spy on Europe's drone and defense sector - Help Net Security
Lazarus Group Hunts European Drone Manufacturing Data
The Leak That Targeted the Leakers
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
How Business Leaders Can Turn Geopolitical Uncertainty Into Strategic Opportunity
Tools and Controls
Why traditional bot defenses are failing in the age of intelligent automation | TechRadar
How infostealers have changed the cybersecurity landscape - BetaNews
Executives Fear AI Cyber Threats Could Outpace Defenses
Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily
Cybercriminals turn to stealth to bypass malware detection - BetaNews
Security Teams Must Deploy Anti-Infostealer Defenses Now - Infosecurity Magazine
Securing AI to Benefit from AI
Network security devices endanger orgs with ’90s era flaws | CSO Online
Is EDR Giving You a False Sense of Security? - Infosecurity Magazine
Microsoft disables File Explorer preview for downloads to block attacks
Zero Trust Has a Blind Spot—Your AI Agents
When Your Backups Become the Target: Building Cyber Resilience That Lasts | Dell
Former Director at US Hacking Tool Provider May Have Sold Secrets to Russia
CISOs’ security priorities reveal an augmented cyber agenda | CSO Online
China accuses US of cyberattack on national time center | AP News
Reports Published in the Last Week
Other News
"We Are Very Exposed": Does The UK Need A New Plan For Cyber-Attacks?
Cyber security is business survival - NCSC.GOV.UK
Cyber resilience of UK digital infrastructure - POST
Electronic Warfare Puts Commercial GPS Users on Notice
Not Just Spies: Satellite Operators Say Cybercrime Is Major Threat
IT strategy needs proactive reboot | Professional Security Magazine
Why Political Risk Is Now A Top Threat For Companies
62% of Risk Leaders Say Trade Wars Could Trigger Cyberattacks, New Riskonnect Research Finds
UK launches global cyber standards backed by international partners - UKTN
Vulnerability Management
Threat actors are exploiting flaws more quickly – here's what business leaders should do | IT Pro
Network security devices endanger orgs with ’90s era flaws | CSO Online
Behind the struggle for control of the CVE program | CyberScoop
Flawed Vendor Guidance Exposes Orgs to Avoidable Risk
Vulnerabilities
Over 266,000 F5 BIG-IP instances exposed to remote attacks
Flawed Vendor Guidance Exposes Orgs to Avoidable Risk
Microsoft fixes Windows bug breaking localhost HTTP connections
ConnectWise Patches Critical Flaw in Automate RMM Tool - SecurityWeek
Microsoft fixes one of its "highest ever" rated security flaws - here's what happened | TechRadar
Microsoft fixes Windows Server Active Directory sync issues
CISA: High-severity Windows SMB flaw now exploited in attacks
CISA Confirms Exploitation of Latest Oracle EBS Vulnerability - SecurityWeek
Oracle Releases October 2025 Patches - SecurityWeek
Windows Server emergency patches fix WSUS bug with PoC exploit
BIND Updates Address High-Severity Cache Poisoning Flaws - SecurityWeek
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks
Researchers uncover remote code execution flaw in abandoned Rust code library | CyberScoop
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack - Infosecurity Magazine
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws | CSO Online
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
Cursor, Windsurf IDEs riddled with 94+ n-day Chromium vulnerabilities
Microsoft fixes bug preventing users from opening classic Outlook
HP pulls update that broke Microsoft Entra ID auth on some AI PCs
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.