Black Arrow Cyber Threat Intelligence Briefing 26 December 2025

 Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week we present insights for business leaders assessing their cyber security controls and practices. Attackers exploit the holiday period when security staff are on leave, while others entice employees to provide unauthorised access to their employer’s systems. We also include developments in business email compromise and research findings on the entry point of malware.

Looking to 2026, the UK’s NCSC warns organisations to be prepared to manage a cyber incident, and business leaders have expressed concern about their cyber security especially in the context of AI, while many are planning to increase their cyber security budgets.

Our recommendation for 2026 is for business leaders to take an informed and objective assessment of their risks, and to check that the cyber security controls in place do indeed address those risks. Business leaders are not expected to be cyber security experts, but they should have a firm grip of the fundamentals to take command of their own security. Contact us to discuss how to do this in a proportionate way.

Thank you for reading our weekly summaries, and we wish you a secure and prosperous 2026.


Top Cyber Stories of the Last Week

Why Hackers Love the Holidays

Attackers often target organisations between Christmas and New Year because offices are quieter and security staffing is reduced. A Semperis survey reported that 52% of ransomware attacks in the last year occurred on a weekend or holiday, and 78% of organisations said they reduce security staff over the holidays. Phishing, ransomware and data theft are common holiday-period tactics, with some intrusions not discovered until weeks later.

Source: https://www.axios.com/2025/12/25/holidays-hackers-corporate-security-teams

Threat Actors Are Hiring Insiders in Banks, Telecoms, and Tech from $3,000 to $15,000 for Access or Data

Threat actors are recruiting employees at banks, telecoms and tech firms via darknet forums to obtain access or data. Offers range from $3,000 to $15,000 and include requests for access to corporate networks, devices, and cloud systems. This approach is positioned as an alternative to attacking a range of organisations and sectors from the outside through brute force attacks or social engineering.

Source: https://cybersecuritynews.com/threat-actors-are-hiring-insiders-in-banks-telecoms/

Watch Out - Hackers Are Coming After Your Christmas Bonus, as Paychecks Come Under Threat

Attackers are targeting payroll and end-of-year payments by calling corporate help desks and impersonating employees to trigger password resets or account changes. The goal is to alter details, so salary payments are redirected. Mitigations include stronger identity verification by support staff, avoiding authentication-factor changes on request, and limiting access to sensitive applications with extra scrutiny for unusual logins.

Source: https://www.techradar.com/pro/security/watch-out-hackers-are-coming-after-your-christmas-bonus-as-paychecks-come-under-threat

Scripted Sparrow Sends Millions of BEC Emails Each Month

A business email compromise (BEC) group dubbed Scripted Sparrow is sending an estimated 4 to 6 million bespoke emails per month, posing as executive coaching firms and targeting Accounts Payable teams with spoofed reply chains and invoice-style PDFs. Researchers linked the group to 119 domains, 245 webmail addresses and 256 bank accounts. Recommended actions for organisations include enforcing payment approval steps for all invoices and verifying requests via official internal channels.

Source: https://www.infosecurity-magazine.com/news/scripted-sparrow-millions-bec-each/

Cybercriminals Flock to a New Unrestricted AI Tool: 10,000 Prompts on the First Day

A new AI tool with few built-in safeguards has been found freely available on the dark web. The operators of the tool, called DIG AI, claimed it received 10,000 prompts in the first 24 hours. A security firm reported that testing found it would respond to prompts linked to fraud and creating malicious software.

Source: https://cybernews.com/security/dig-ai-new-cyber-weapon-abused-by-hackers/

Think You Can Beat Ransomware? RansomHouse Just Made It a Lot Harder

RansomHouse is a cyber extortion group that steals sensitive data and extorts money to prevent publication on a leak site. The group has recently added measures that complicate analysis during an incident and can limit the ability to recover without paying. The group introduced a multi-layered encryption update to its double-extortion ransomware-as-a-service (RaaS) model that can hinder incident response timelines and negotiating strategies. Organisations are advised to prioritise behavioural analytics, real-time monitoring, hardened segmentation, and regular backup validation.

Source: https://www.csoonline.com/article/4110472/think-you-can-beat-ransomware-ransomhouse-just-made-it-a-lot-harder.html

Why Businesses Can No Longer Treat Cyber Security as an IT Problem

Cyber security risk is increasingly driven by user behaviour, with research by OpenText finding that over a third of consumer malware is first spotted in the Downloads directory, where users routinely save invoices, installers and documents. These files can look harmless initially, then later pull in ransomware or credential-stealing payloads. AI is also making scams harder to spot by removing the usual warning signs, and deepfakes are being used to approve high-value deals. Security teams are advised to shift from content scanning to behaviour monitoring, unify identity, data and threat signals, and use AI to triage alerts faster.

Source: https://economictimes.indiatimes.com/small-biz/security-tech/security/why-businesses-can-no-longer-treat-cybersecurity-as-an-it-problem/articleshow/126115222.cms

Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

A distributed denial of service (DDoS) attack disrupted France’s national postal service shortly before Christmas, making online services inaccessible and impacting package tracking and online payments. The organisation stated customer data was not affected, but the incident also disrupted its banking arm’s payment approvals, forcing workarounds.

Source: https://www.securityweek.com/cyberattack-disrupts-frances-postal-service-and-banking-during-christmas-rush/

Ministers Confirm Breach at UK Foreign Office but Details Remain Murky

UK ministers confirmed there has been a cyberattack affecting the Foreign Office, with officials stating the investigation began in October and that further detail, including attribution, remains unconfirmed. Media reporting referenced a possible China link and visa-application related data, but ministers did not confirm and said early findings suggest low risk of harm to individuals.

Source: https://www.theregister.com/2025/12/19/uk_foreign_office_hack/

The NCSC’s Warning to UK Firms: How to Boost Incident Response

The UK National Cyber Security Centre (NCSC) is urging organisations to keep incident response plans available offline, including physical copies, because cyberattacks can remove access to email, shared drives, and collaboration tools. Its 2025 Annual Review data shows 429 incidents handled in the first nine months of 2025, with nearly half classed as “nationally significant” versus 89 the year before. The guidance emphasises resilience through offline communications options, tested backups, business leadership preparation, and regular simulation exercises.

Source: https://insight.scmagazineuk.com/the-ncscs-warning-to-uk-firms-how-to-boost-incident-response

From AI to Cyber Risk, Why IT Leaders Are Anxious Heading into 2026

A Veeam survey of 250 senior IT and business decision-makers put cyber security threats as the top expected disruptor for 2026, with nearly half naming security incidents as their main concern. Around 66% ranked AI-generated attacks as the biggest data threat, while roughly half highlighted ransomware. As cloud and Software as a Service (SaaS) spreads, 60% said visibility of where data sits has declined, and only about 29% felt very confident recovering after a zero-day exploit.

Source: https://www.helpnetsecurity.com/2025/12/26/it-planning-cybersecurity-threats-2026/

Cyber Security Budgets Are Going Up

A 2025 KPMG survey found 99% of security leaders plan to increase cyber security budgets over the next two to three years, with 54% expecting increases of 6% to 10%. More than half reported competing internally for funding. Artificial Intelligence (AI) is highlighted as both a driver of risk and investment, with 38% citing AI-powered attacks as a challenge, and organisations reporting use of AI for fraud prevention and detection while skills gaps remain a constraint.

Source: https://securityboulevard.com/2025/12/cybersecurity-budgets-are-going-up-pointing-to-a-boom/



Threats

Ransomware, Extortion and Destructive Attacks

Think you can beat ransomware? RansomHouse just made it a lot harder | CSO Online

RansomHouse upgrades encryption with multi-layered data processing

Former incident responders plead guilty to ransomware attack spree | CyberScoop

Interpol-led action decrypts 6 ransomware strains, arrests hundreds

AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays | TechRadar

Ukrainian national pleads guilty to Nefilim ransomware attacks | CyberScoop

Top Ransomware Trends of 2025 - Infosecurity Magazine

Best of 2025: New Akira Ransomware Decryptor Leans on Nvidia GPU Power - Security Boulevard

Has Ransomware Peaked? FinCEN Data Shows Slight Downward Trend In Incidents. | Ballard Spahr LLP - JDSupra

Ransomware’s New Frontier: How Universities Can Defend Against This Growing Threat | EdTech Magazine

CISA loses key employee behind early ransomware warnings – DataBreaches.Net

Ransomware Victims

‘Sensitive’ data stolen in Westminster City Council cyber attack | Computer Weekly

Club Atlético River Plate ransomware attack | Cybernews

Phishing & Email Based Attacks

Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine

Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts - Security Boulevard

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

Phishing emails and fake adverts flood inboxes this Christmas - and they’re getting harder to detect than ever | TechRadar

Five Phishing Red Flags to Remember This Holiday Season - Security Boulevard

US shutters phisherfolk’s $14.6M password-hoarding platform • The Register

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform

Microsoft's The Top Brand Scammers Use When Phishing For Clicks, Study Shows

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine

Other Social Engineering

Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine

Hackers target your payroll this holiday season with clever social engineering and phone attacks on unsuspecting help desks | TechRadar

Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable

Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard

86% Surge in Fake Delivery Websites Hits Shoppers During Holiday Rush - Infosecurity Magazine

Elusive MI6 wannabe must repay £125k to romance scam victim • The Register

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

Coordinated Scams Target MENA Region With Fake Online Job Ads - Infosecurity Magazine

Microsoft's The Top Brand Scammers Use When Phishing For Clicks, Study Shows

Fraud, Scams and Financial Crime

Hackers target your payroll this holiday season with clever social engineering and phone attacks on unsuspecting help desks | TechRadar

86% Surge in Fake Delivery Websites Hits Shoppers During Holiday Rush - Infosecurity Magazine

Phishing emails and fake adverts flood inboxes this Christmas - and they’re getting harder to detect than ever | TechRadar

US Charges 54 in Massive ATM Jackpotting Conspiracy - Infosecurity Magazine

SEC Charges Crypto Firms in $14m Investment Scam - Infosecurity Magazine

Elusive MI6 wannabe must repay £125k to romance scam victim • The Register

Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks - gHacks Tech News

South Korea to require face scans to buy a SIM • The Register

Identity Fraud Among Home Care Workers Puts Patients at Risk

Greater Manchester Police sackings over homeworking 'key jamming' - BBC News

Artificial Intelligence

From AI to cyber risk, why IT leaders are anxious heading into 2026 - Help Net Security

Cybercriminals flock to new unrestricted AI tool | Cybernews

AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays | TechRadar

Browser agents don't always respect your privacy choices - Help Net Security

When AI Becomes a Weapon: Former Senior Intelligence Executive Reveals Beijing's CyberWar Playbook

Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks - gHacks Tech News

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

UK CEOs Expect AI, Cyberattacks and Cost Cuts to Dominate 2026

Eurostar chatbot security flaws almost left customers exposed to possible security threats | TechRadar

FBI says ‘ongoing’ deepfake impersonation of U.S. gov officials dates back to 2023 | CyberScoop

Pen testers accused of 'blackmail' over Eurostar AI flaws • The Register

AML/CFT/Money Laundering/Terrorist Financing/Sanctions

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek

FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine

2FA/MFA

One-time codes used to hack corporate accounts | CSO Online

Malware

Why businesses can no longer treat cybersecurity as an IT problem - The Economic Times

MacSync macOS Malware Distributed via Signed Swift Application - SecurityWeek

Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits - Help Net Security

These malicious Google Chrome extensions have stolen data from over 170 sites - find out if you're affected | TechRadar

North Korean Beavertail malware sparks attacks across financial sector | SC Media

Fake MAS Windows activation domain used to spread PowerShell malware

WebRAT malware spread via fake vulnerability exploits on GitHub

Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours

Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

ATM jackpotting gang accused of unleashing Ploutus malware • The Register

Bots/Botnets

Massive Android botnet Kimwolf infects millions, strikes with DDoS

DDoS Protection Faces Fresh Challenges As Bot Traffic Reaches New Peak - IT Security Guru

Mobile

Android Attacks—Google Confirms No Fix For 30% Of All Phones

A new Android Trojan can hide inside apps you trust — and this is how it gets to you - PhoneArena

Three things they’re not telling you about mobile app security - SD Times

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

South Korea to require face scans to buy a SIM • The Register

Apple and Google allow alternative app stores in Japan • The Register

Uzbek Users Under Attack by Android SMS Stealers

Denial of Service/DoS/DDoS

Massive Android botnet Kimwolf infects millions, strikes with DDoS

DDoS Protection Faces Fresh Challenges As Bot Traffic Reaches New Peak - IT Security Guru

Cyberattack Disrupts France's Postal Service and Banking During Christmas Rush - SecurityWeek

Pro-Russian hackers claim French postal service cyberattack | Euronews

Wave of cyberattacks expose French failure to protect public digital systems

Internet of Things – IoT

Massive Android botnet Kimwolf infects millions, strikes with DDoS

When everything connects, everything’s at risk | ChannelPro

NIST issues guidance on securing smart speakers - Help Net Security

Intruders Can Use Wi-Fi Jammers To Evade Your Home Security - Here's How

Raspberry Pi used in attempt to take over ferry | CSO Online

Data Breaches/Leaks

Hackers stole data in UK government cyberattack, minister confirms | TechRadar

Britain suspects China of involvement in cyberattack on Foreign Office | УНН

China-backed hacker group Storm 1849 accused of UK government cyber attack - Cryptopolitan

Hacks, thefts, and disruption: The worst data breaches of 2025 | TechCrunch

Minister Confirms UK Foreign Office Hacked | Silicon UK

LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

LastPass Agrees to Reimburse Crypto in Data Breach Settlement

Coupang breach affecting 33.7 million users raises data protection questions

US insurance giant Aflac says hackers stole personal and health data of 22.6 million people | TechCrunch

South Korean firm hit with US investor lawsuit over data breach disclosure failures | CSO Online

‘Sensitive’ data stolen in Westminster City Council cyber attack | Computer Weekly

UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected - Infosecurity Magazine

3.5 Million Affected by University of Phoenix Data Breach - SecurityWeek

Nissan says thousands of customers exposed in Red Hat breach

Coupang says all leaked customer information in data breach has been deleted | The Straits Times

Organised Crime & Criminal Actors

Cybercriminals flock to new unrestricted AI tool | Cybernews

Cybersecurity teams prep for an influx of attacks over the holidays

US Charges 54 in Massive ATM Jackpotting Conspiracy - Infosecurity Magazine

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek

FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine

574 arrests and USD 3 million recovered in coordinated cybercrime operation across Africa

FBI seized ‘web3adspanels.org’ hosting stolen logins

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform

Leader of 764 offshoot pleads guilty, faces up to 60 years in jail | CyberScoop

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

LastPass Agrees to Reimburse Crypto in Data Breach Settlement

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek

FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine

Insider Risk and Insider Threats

Threat Actors are Hiring Insiders in Banks, Telecoms, and Tech from $3,000 to $15,000 for Access or Data

They are offering up to $15k reward for betraying your boss | Cybernews

Supply Chain and Third Parties

Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable

Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard

UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected - Infosecurity Magazine

Nissan says thousands of customers exposed in Red Hat breach

Software Supply Chain

WebRAT malware spread via fake vulnerability exploits on GitHub

Cloud/SaaS

Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable

Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard

Microsoft confirms Teams is down and messages are delayed

State actors are abusing OAuth device codes to get full M365 account access - here's what we know | TechRadar

Cloud security is stuck in slow motion - Help Net Security

Outages

Microsoft confirms Teams is down and messages are delayed

The year the cloud went dark: Inside 2025’s biggest tech outages - The Economic Times

Identity and Access Management

State actors are abusing OAuth device codes to get full M365 account access - here's what we know | TechRadar

The next big IT security battle is all about privileged access - Help Net Security

Five identity-driven shifts reshaping enterprise security in 2026 - Help Net Security

Encryption

Creating apps like Signal or WhatsApp could be 'hostile activity,' claims UK watchdog | TechRadar

Linux and Open Source

Arch Linux Website Hit by DDoS and Temporarily Limited to IPv6

Passwords, Credential Stuffing & Brute Force Attacks

Malicious extensions in Chrome Web store steal user credentials

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

US shutters phisherfolk’s $14.6M password-hoarding platform • The Register

NIS2 Compliance: Maintaining Credential Security - Security Boulevard

Social Media

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

In rare public comments, career DOJ officials offer chilling warnings about online network 764 - ABC News

Regulations, Fines and Legislation

Information Commissioner publishes response to Cyber Security and Resilience (Network and Information Systems) Bill | Practical Law

South Korean firm hit with US investor lawsuit over data breach disclosure failures | CSO Online

SEC Charges Crypto Firms in $14m Investment Scam - Infosecurity Magazine

What CISOs should know about the SolarWinds lawsuit dismissal | CSO Online

CISA loses key employee behind early ransomware warnings – DataBreaches.Net

Trump formally taps Joshua Rudd to lead NSA, Cyber Command - Nextgov/FCW

2025 reshaped federal cybersecurity, from new mandates to tougher compliance rules

Industry Continues to Push Back on HIPAA Security Rule Overhaul

Head of the US Cyber Security Agency Fails Polygraph Test and Fires Subordinates - Militarnyi

Models, Frameworks and Standards

Information Commissioner publishes response to Cyber Security and Resilience (Network and Information Systems) Bill | Practical Law

NIS2 Compliance: Maintaining Credential Security - Security Boulevard

Creating apps like Signal or WhatsApp could be 'hostile activity,' claims UK watchdog | TechRadar

NIST, MITRE announce $20 million research effort on AI cybersecurity | CyberScoop

Britain’s Online Safety Act is reshaping the internet without America’s consent

Industry Continues to Push Back on HIPAA Security Rule Overhaul

NIST issues guidance on securing smart speakers - Help Net Security

Weak enforcement keeps PCI DSS compliance low - Help Net Security

ISACA to lead global credentialing for cyber security maturity model certification framework in the US - TechCentral.ie

Data Protection

Information Commissioner publishes response to Cyber Security and Resilience (Network and Information Systems) Bill | Practical Law

Coupang breach affecting 33.7 million users raises data protection questions

Careers, Roles, Skills, Working in Cyber and Information Security

Building cyber talent through competition, residency, and real-world immersion - Help Net Security

Cybersecurity Interviews Are Risk Assessments in Disguise

Law Enforcement Action and Take Downs

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek

574 arrests and USD 3 million recovered in coordinated cybercrime operation across Africa

Interpol-led action decrypts 6 ransomware strains, arrests hundreds

Former incident responders plead guilty to ransomware attack spree | CyberScoop

US shutters phisherfolk’s $14.6M password-hoarding platform • The Register

FBI seized ‘web3adspanels.org’ hosting stolen logins

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform

Leader of 764 offshoot pleads guilty, faces up to 60 years in jail | CyberScoop

Elusive MI6 wannabe must repay £125k to romance scam victim • The Register

Ukrainian national pleads guilty to Nefilim ransomware attacks | CyberScoop

ATM Jackpotting ring busted: 54 indicted by DoJ


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

The cyberwarfare landscape is changing — here’s how to prepare - Nextgov/FCW

German intelligence may be allowed to conduct cyberattacks and sabotage outside the country | УНН

Cyber spies use fake New Year concert invites to target Russian military | The Record from Recorded Future News

Nation State Actors

CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro

China

Hackers stole data in UK government cyberattack, minister confirms | TechRadar

Britain suspects China of involvement in cyberattack on Foreign Office | УНН

China-backed hacker group Storm 1849 accused of UK government cyber attack - Cryptopolitan

State actors are abusing OAuth device codes to get full M365 account access - here's what we know | TechRadar

CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro

When AI Becomes a Weapon: Former Senior Intelligence Executive Reveals Beijing's CyberWar Playbook

China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager

US adds new models of DJI and other foreign drones to national security risk list | The Independent

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

Russia

State actors are abusing OAuth device codes to get full M365 account access - here's what we know | TechRadar

CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro

Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

UK cannot ignore deep-sea threat from Russia, head of Navy warns

Amazon says Russian-backed threat groups were responsible for five-year-long attacks on edge devices – and it shows a ‘clear evolution in tactics’ | IT Pro

German intelligence may be allowed to conduct cyberattacks and sabotage outside the country | УНН

‘All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires | Russia | The Guardian

Pro-Russian hackers claim French postal service cyberattack | Euronews

Belgian institutions reportedly hit by cyberattacks linked to pro-Russian hackers

Cyber spies use fake New Year concert invites to target Russian military | The Record from Recorded Future News

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek

FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine

Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space

Iran

CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

North Korea

A Good Year for North Korean Cybercriminals

CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro

Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard

North Korean Beavertail malware sparks attacks across financial sector | SC Media





Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 19 December 2025