Black Arrow Cyber Threat Intelligence Briefing 26 December 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
This week we present insights for business leaders assessing their cyber security controls and practices. Attackers exploit the holiday period when security staff are on leave, while others entice employees to provide unauthorised access to their employer’s systems. We also include developments in business email compromise and research findings on the entry point of malware.
Looking to 2026, the UK’s NCSC warns organisations to be prepared to manage a cyber incident, and business leaders have expressed concern about their cyber security especially in the context of AI, while many are planning to increase their cyber security budgets.
Our recommendation for 2026 is for business leaders to take an informed and objective assessment of their risks, and to check that the cyber security controls in place do indeed address those risks. Business leaders are not expected to be cyber security experts, but they should have a firm grip of the fundamentals to take command of their own security. Contact us to discuss how to do this in a proportionate way.
Thank you for reading our weekly summaries, and we wish you a secure and prosperous 2026.
Top Cyber Stories of the Last Week
Why Hackers Love the Holidays
Attackers often target organisations between Christmas and New Year because offices are quieter and security staffing is reduced. A Semperis survey reported that 52% of ransomware attacks in the last year occurred on a weekend or holiday, and 78% of organisations said they reduce security staff over the holidays. Phishing, ransomware and data theft are common holiday-period tactics, with some intrusions not discovered until weeks later.
Source: https://www.axios.com/2025/12/25/holidays-hackers-corporate-security-teams
Threat Actors Are Hiring Insiders in Banks, Telecoms, and Tech from $3,000 to $15,000 for Access or Data
Threat actors are recruiting employees at banks, telecoms and tech firms via darknet forums to obtain access or data. Offers range from $3,000 to $15,000 and include requests for access to corporate networks, devices, and cloud systems. This approach is positioned as an alternative to attacking a range of organisations and sectors from the outside through brute force attacks or social engineering.
Source: https://cybersecuritynews.com/threat-actors-are-hiring-insiders-in-banks-telecoms/
Watch Out - Hackers Are Coming After Your Christmas Bonus, as Paychecks Come Under Threat
Attackers are targeting payroll and end-of-year payments by calling corporate help desks and impersonating employees to trigger password resets or account changes. The goal is to alter details, so salary payments are redirected. Mitigations include stronger identity verification by support staff, avoiding authentication-factor changes on request, and limiting access to sensitive applications with extra scrutiny for unusual logins.
Scripted Sparrow Sends Millions of BEC Emails Each Month
A business email compromise (BEC) group dubbed Scripted Sparrow is sending an estimated 4 to 6 million bespoke emails per month, posing as executive coaching firms and targeting Accounts Payable teams with spoofed reply chains and invoice-style PDFs. Researchers linked the group to 119 domains, 245 webmail addresses and 256 bank accounts. Recommended actions for organisations include enforcing payment approval steps for all invoices and verifying requests via official internal channels.
Source: https://www.infosecurity-magazine.com/news/scripted-sparrow-millions-bec-each/
Cybercriminals Flock to a New Unrestricted AI Tool: 10,000 Prompts on the First Day
A new AI tool with few built-in safeguards has been found freely available on the dark web. The operators of the tool, called DIG AI, claimed it received 10,000 prompts in the first 24 hours. A security firm reported that testing found it would respond to prompts linked to fraud and creating malicious software.
Source: https://cybernews.com/security/dig-ai-new-cyber-weapon-abused-by-hackers/
Think You Can Beat Ransomware? RansomHouse Just Made It a Lot Harder
RansomHouse is a cyber extortion group that steals sensitive data and extorts money to prevent publication on a leak site. The group has recently added measures that complicate analysis during an incident and can limit the ability to recover without paying. The group introduced a multi-layered encryption update to its double-extortion ransomware-as-a-service (RaaS) model that can hinder incident response timelines and negotiating strategies. Organisations are advised to prioritise behavioural analytics, real-time monitoring, hardened segmentation, and regular backup validation.
Why Businesses Can No Longer Treat Cyber Security as an IT Problem
Cyber security risk is increasingly driven by user behaviour, with research by OpenText finding that over a third of consumer malware is first spotted in the Downloads directory, where users routinely save invoices, installers and documents. These files can look harmless initially, then later pull in ransomware or credential-stealing payloads. AI is also making scams harder to spot by removing the usual warning signs, and deepfakes are being used to approve high-value deals. Security teams are advised to shift from content scanning to behaviour monitoring, unify identity, data and threat signals, and use AI to triage alerts faster.
Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush
A distributed denial of service (DDoS) attack disrupted France’s national postal service shortly before Christmas, making online services inaccessible and impacting package tracking and online payments. The organisation stated customer data was not affected, but the incident also disrupted its banking arm’s payment approvals, forcing workarounds.
Ministers Confirm Breach at UK Foreign Office but Details Remain Murky
UK ministers confirmed there has been a cyberattack affecting the Foreign Office, with officials stating the investigation began in October and that further detail, including attribution, remains unconfirmed. Media reporting referenced a possible China link and visa-application related data, but ministers did not confirm and said early findings suggest low risk of harm to individuals.
Source: https://www.theregister.com/2025/12/19/uk_foreign_office_hack/
The NCSC’s Warning to UK Firms: How to Boost Incident Response
The UK National Cyber Security Centre (NCSC) is urging organisations to keep incident response plans available offline, including physical copies, because cyberattacks can remove access to email, shared drives, and collaboration tools. Its 2025 Annual Review data shows 429 incidents handled in the first nine months of 2025, with nearly half classed as “nationally significant” versus 89 the year before. The guidance emphasises resilience through offline communications options, tested backups, business leadership preparation, and regular simulation exercises.
Source: https://insight.scmagazineuk.com/the-ncscs-warning-to-uk-firms-how-to-boost-incident-response
From AI to Cyber Risk, Why IT Leaders Are Anxious Heading into 2026
A Veeam survey of 250 senior IT and business decision-makers put cyber security threats as the top expected disruptor for 2026, with nearly half naming security incidents as their main concern. Around 66% ranked AI-generated attacks as the biggest data threat, while roughly half highlighted ransomware. As cloud and Software as a Service (SaaS) spreads, 60% said visibility of where data sits has declined, and only about 29% felt very confident recovering after a zero-day exploit.
Source: https://www.helpnetsecurity.com/2025/12/26/it-planning-cybersecurity-threats-2026/
Cyber Security Budgets Are Going Up
A 2025 KPMG survey found 99% of security leaders plan to increase cyber security budgets over the next two to three years, with 54% expecting increases of 6% to 10%. More than half reported competing internally for funding. Artificial Intelligence (AI) is highlighted as both a driver of risk and investment, with 38% citing AI-powered attacks as a challenge, and organisations reporting use of AI for fraud prevention and detection while skills gaps remain a constraint.
Source: https://securityboulevard.com/2025/12/cybersecurity-budgets-are-going-up-pointing-to-a-boom/
Governance, Risk and Compliance
Cybersecurity Budgets are Going Up, Pointing to a Boom - Security Boulevard
The NCSC’s Warning To UK Firms: How To Boost Incident Response | SC Media UK
Why businesses can no longer treat cybersecurity as an IT problem - The Economic Times
From AI to cyber risk, why IT leaders are anxious heading into 2026 - Help Net Security
Invest in cybersecurity before it's too late - Verdict
What CISOs should know about the SolarWinds lawsuit dismissal | CSO Online
UK CEOs Expect AI, Cyberattacks and Cost Cuts to Dominate 2026
Threats
Ransomware, Extortion and Destructive Attacks
Think you can beat ransomware? RansomHouse just made it a lot harder | CSO Online
RansomHouse upgrades encryption with multi-layered data processing
Former incident responders plead guilty to ransomware attack spree | CyberScoop
Interpol-led action decrypts 6 ransomware strains, arrests hundreds
Ukrainian national pleads guilty to Nefilim ransomware attacks | CyberScoop
Top Ransomware Trends of 2025 - Infosecurity Magazine
Best of 2025: New Akira Ransomware Decryptor Leans on Nvidia GPU Power - Security Boulevard
Ransomware’s New Frontier: How Universities Can Defend Against This Growing Threat | EdTech Magazine
CISA loses key employee behind early ransomware warnings – DataBreaches.Net
Ransomware Victims
‘Sensitive’ data stolen in Westminster City Council cyber attack | Computer Weekly
Club Atlético River Plate ransomware attack | Cybernews
Phishing & Email Based Attacks
Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine
Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts - Security Boulevard
Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
Five Phishing Red Flags to Remember This Holiday Season - Security Boulevard
US shutters phisherfolk’s $14.6M password-hoarding platform • The Register
Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
Microsoft's The Top Brand Scammers Use When Phishing For Clicks, Study Shows
Business Email Compromise (BEC)/Email Account Compromise (EAC)
Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine
Other Social Engineering
Scripted Sparrow BEC Group Sends Millions of Emails Each Month - Infosecurity Magazine
Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable
Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard
86% Surge in Fake Delivery Websites Hits Shoppers During Holiday Rush - Infosecurity Magazine
Elusive MI6 wannabe must repay £125k to romance scam victim • The Register
Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
Coordinated Scams Target MENA Region With Fake Online Job Ads - Infosecurity Magazine
Microsoft's The Top Brand Scammers Use When Phishing For Clicks, Study Shows
Fraud, Scams and Financial Crime
86% Surge in Fake Delivery Websites Hits Shoppers During Holiday Rush - Infosecurity Magazine
US Charges 54 in Massive ATM Jackpotting Conspiracy - Infosecurity Magazine
SEC Charges Crypto Firms in $14m Investment Scam - Infosecurity Magazine
Elusive MI6 wannabe must repay £125k to romance scam victim • The Register
Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks - gHacks Tech News
South Korea to require face scans to buy a SIM • The Register
Identity Fraud Among Home Care Workers Puts Patients at Risk
Greater Manchester Police sackings over homeworking 'key jamming' - BBC News
Artificial Intelligence
From AI to cyber risk, why IT leaders are anxious heading into 2026 - Help Net Security
Cybercriminals flock to new unrestricted AI tool | Cybernews
Browser agents don't always respect your privacy choices - Help Net Security
When AI Becomes a Weapon: Former Senior Intelligence Executive Reveals Beijing's CyberWar Playbook
Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks - gHacks Tech News
Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
UK CEOs Expect AI, Cyberattacks and Cost Cuts to Dominate 2026
FBI says ‘ongoing’ deepfake impersonation of U.S. gov officials dates back to 2023 | CyberScoop
Pen testers accused of 'blackmail' over Eurostar AI flaws • The Register
AML/CFT/Money Laundering/Terrorist Financing/Sanctions
US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine
2FA/MFA
One-time codes used to hack corporate accounts | CSO Online
Malware
Why businesses can no longer treat cybersecurity as an IT problem - The Economic Times
MacSync macOS Malware Distributed via Signed Swift Application - SecurityWeek
Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits - Help Net Security
North Korean Beavertail malware sparks attacks across financial sector | SC Media
Fake MAS Windows activation domain used to spread PowerShell malware
WebRAT malware spread via fake vulnerability exploits on GitHub
Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours
Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
ATM jackpotting gang accused of unleashing Ploutus malware • The Register
Bots/Botnets
Massive Android botnet Kimwolf infects millions, strikes with DDoS
DDoS Protection Faces Fresh Challenges As Bot Traffic Reaches New Peak - IT Security Guru
Mobile
Android Attacks—Google Confirms No Fix For 30% Of All Phones
A new Android Trojan can hide inside apps you trust — and this is how it gets to you - PhoneArena
Three things they’re not telling you about mobile app security - SD Times
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
South Korea to require face scans to buy a SIM • The Register
Apple and Google allow alternative app stores in Japan • The Register
Uzbek Users Under Attack by Android SMS Stealers
Denial of Service/DoS/DDoS
Massive Android botnet Kimwolf infects millions, strikes with DDoS
DDoS Protection Faces Fresh Challenges As Bot Traffic Reaches New Peak - IT Security Guru
Cyberattack Disrupts France's Postal Service and Banking During Christmas Rush - SecurityWeek
Pro-Russian hackers claim French postal service cyberattack | Euronews
Wave of cyberattacks expose French failure to protect public digital systems
Internet of Things – IoT
Massive Android botnet Kimwolf infects millions, strikes with DDoS
When everything connects, everything’s at risk | ChannelPro
NIST issues guidance on securing smart speakers - Help Net Security
Intruders Can Use Wi-Fi Jammers To Evade Your Home Security - Here's How
Raspberry Pi used in attempt to take over ferry | CSO Online
Data Breaches/Leaks
Hackers stole data in UK government cyberattack, minister confirms | TechRadar
Britain suspects China of involvement in cyberattack on Foreign Office | УНН
China-backed hacker group Storm 1849 accused of UK government cyber attack - Cryptopolitan
Hacks, thefts, and disruption: The worst data breaches of 2025 | TechCrunch
Minister Confirms UK Foreign Office Hacked | Silicon UK
LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds
LastPass Agrees to Reimburse Crypto in Data Breach Settlement
Coupang breach affecting 33.7 million users raises data protection questions
South Korean firm hit with US investor lawsuit over data breach disclosure failures | CSO Online
‘Sensitive’ data stolen in Westminster City Council cyber attack | Computer Weekly
UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected - Infosecurity Magazine
3.5 Million Affected by University of Phoenix Data Breach - SecurityWeek
Nissan says thousands of customers exposed in Red Hat breach
Coupang says all leaked customer information in data breach has been deleted | The Straits Times
Organised Crime & Criminal Actors
Cybercriminals flock to new unrestricted AI tool | Cybernews
Cybersecurity teams prep for an influx of attacks over the holidays
US Charges 54 in Massive ATM Jackpotting Conspiracy - Infosecurity Magazine
US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine
574 arrests and USD 3 million recovered in coordinated cybercrime operation across Africa
FBI seized ‘web3adspanels.org’ hosting stolen logins
Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
Leader of 764 offshoot pleads guilty, faces up to 60 years in jail | CyberScoop
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds
LastPass Agrees to Reimburse Crypto in Data Breach Settlement
US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine
Insider Risk and Insider Threats
They are offering up to $15k reward for betraying your boss | Cybernews
Supply Chain and Third Parties
Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable
Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard
UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected - Infosecurity Magazine
Nissan says thousands of customers exposed in Red Hat breach
Software Supply Chain
WebRAT malware spread via fake vulnerability exploits on GitHub
Cloud/SaaS
Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable
Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard
Microsoft confirms Teams is down and messages are delayed
Cloud security is stuck in slow motion - Help Net Security
Outages
Microsoft confirms Teams is down and messages are delayed
The year the cloud went dark: Inside 2025’s biggest tech outages - The Economic Times
Identity and Access Management
The next big IT security battle is all about privileged access - Help Net Security
Five identity-driven shifts reshaping enterprise security in 2026 - Help Net Security
Encryption
Creating apps like Signal or WhatsApp could be 'hostile activity,' claims UK watchdog | TechRadar
Linux and Open Source
Arch Linux Website Hit by DDoS and Temporarily Limited to IPv6
Passwords, Credential Stuffing & Brute Force Attacks
Malicious extensions in Chrome Web store steal user credentials
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
US shutters phisherfolk’s $14.6M password-hoarding platform • The Register
NIS2 Compliance: Maintaining Credential Security - Security Boulevard
Social Media
Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
Regulations, Fines and Legislation
South Korean firm hit with US investor lawsuit over data breach disclosure failures | CSO Online
SEC Charges Crypto Firms in $14m Investment Scam - Infosecurity Magazine
What CISOs should know about the SolarWinds lawsuit dismissal | CSO Online
CISA loses key employee behind early ransomware warnings – DataBreaches.Net
Trump formally taps Joshua Rudd to lead NSA, Cyber Command - Nextgov/FCW
2025 reshaped federal cybersecurity, from new mandates to tougher compliance rules
Industry Continues to Push Back on HIPAA Security Rule Overhaul
Head of the US Cyber Security Agency Fails Polygraph Test and Fires Subordinates - Militarnyi
Models, Frameworks and Standards
NIS2 Compliance: Maintaining Credential Security - Security Boulevard
Creating apps like Signal or WhatsApp could be 'hostile activity,' claims UK watchdog | TechRadar
NIST, MITRE announce $20 million research effort on AI cybersecurity | CyberScoop
Britain’s Online Safety Act is reshaping the internet without America’s consent
Industry Continues to Push Back on HIPAA Security Rule Overhaul
NIST issues guidance on securing smart speakers - Help Net Security
Weak enforcement keeps PCI DSS compliance low - Help Net Security
Data Protection
Coupang breach affecting 33.7 million users raises data protection questions
Careers, Roles, Skills, Working in Cyber and Information Security
Building cyber talent through competition, residency, and real-world immersion - Help Net Security
Cybersecurity Interviews Are Risk Assessments in Disguise
Law Enforcement Action and Take Downs
US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek
574 arrests and USD 3 million recovered in coordinated cybercrime operation across Africa
Interpol-led action decrypts 6 ransomware strains, arrests hundreds
Former incident responders plead guilty to ransomware attack spree | CyberScoop
US shutters phisherfolk’s $14.6M password-hoarding platform • The Register
FBI seized ‘web3adspanels.org’ hosting stolen logins
Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
Leader of 764 offshoot pleads guilty, faces up to 60 years in jail | CyberScoop
Elusive MI6 wannabe must repay £125k to romance scam victim • The Register
Ukrainian national pleads guilty to Nefilim ransomware attacks | CyberScoop
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
The cyberwarfare landscape is changing — here’s how to prepare - Nextgov/FCW
German intelligence may be allowed to conduct cyberattacks and sabotage outside the country | УНН
Nation State Actors
CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro
China
Hackers stole data in UK government cyberattack, minister confirms | TechRadar
Britain suspects China of involvement in cyberattack on Foreign Office | УНН
China-backed hacker group Storm 1849 accused of UK government cyber attack - Cryptopolitan
CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro
When AI Becomes a Weapon: Former Senior Intelligence Executive Reveals Beijing's CyberWar Playbook
China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager
US adds new models of DJI and other foreign drones to national security risk list | The Independent
FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks
Russia
CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro
Amazon confirms years-long Russian cyberattack against AWS customers' devices | Mashable
Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
UK cannot ignore deep-sea threat from Russia, head of Navy warns
German intelligence may be allowed to conduct cyberattacks and sabotage outside the country | УНН
Pro-Russian hackers claim French postal service cyberattack | Euronews
Belgian institutions reportedly hit by cyberattacks linked to pro-Russian hackers
US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator - SecurityWeek
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime - Infosecurity Magazine
Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space
Iran
CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
North Korea
A Good Year for North Korean Cybercriminals
CRINK attacks: which nation state hackers will be the biggest threat in 2026? | IT Pro
Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread - Security Boulevard
North Korean Beavertail malware sparks attacks across financial sector | SC Media
Tools and Controls
Cybersecurity Budgets are Going Up, Pointing to a Boom - Security Boulevard
The NCSC’s Warning To UK Firms: How To Boost Incident Response | SC Media UK
Invest in cybersecurity before it's too late - Verdict
Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration
Cloud security is stuck in slow motion - Help Net Security
UK CEOs Expect AI, Cyberattacks and Cost Cuts to Dominate 2026
Pen testers accused of 'blackmail' over Eurostar AI flaws • The Register
Formal proofs expose long standing cracks in DNSSEC - Help Net Security
New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR
Greater Manchester Police sackings over homeworking 'key jamming' - BBC News
Other News
Cybersecurity teams prep for an influx of attacks over the holidays
Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration
Raspberry Pi used in attempt to take over ferry | CSO Online
Wave of cyberattacks expose French failure to protect public digital systems
Faith in the internet is fading among young Brits • The Register
The U.K.’s Cybersecurity Refresh | Lawfare
US small businesses are fighting off a wave of cyber attacks | IT Pro
Japan to urge companies to spread cybersecurity costs as attacks mount - Nikkei Asia
Vulnerability Management
LLMs can assist with vulnerability scoring, but context still matters - Help Net Security
Vulnerabilities
Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours
Cisco VPNs, Email Services Hit in Separate Threat Campaigns
Formal proofs expose long standing cracks in DNSSEC - Help Net Security
Android Attacks—Google Confirms No Fix For 30% Of All Phones
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager
High-severity MongoDB flaw CVE-2025-14847 could lead to server takeover
Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls
Over 25,000 FortiCloud SSO devices exposed to remote attacks
Roundcube Vulnerabilities Allow Attackers to Execute Malicious Scripts
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances
Microsoft fixes Message Queuing issue in new update • The Register
Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.