Black Arrow Cyber Threat Intelligence Briefing 28 November 2025

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week we start with an alert on the cyber security risks of mergers and acquisitions: attackers are found to have entered the networks of companies that are later acquired by another organisation, allowing the attackers to enter the acquiring organisation also.

We highlight insider-risks that business leaders should be aware of, including employees who are bribed by attackers, employees using work devices for personal use, and employees using shadow AI. Attacker tactics in this week’s review include attacks via third parties, fake Windows update screens, impersonating the support teams of banks, and using compromised credentials to inflict ransomware attacks. We also see greater collaboration and alliances by attacker groups.

A key part of building stronger cyber security and resilience is understanding how attackers are evolving their tactics. This threat intelligence empowers you to objectively assess how your organisation is susceptible to these tactics and what you need to do to enhance your own security. We strongly recommend that threat intelligence should feature in your leadership training, your incident response exercise and your governance papers; contact us to discuss how we can help you achieve this in a proportionate way.


Top Cyber Stories of the Last Week

M&A Risk: Ransomware Hackers Attack SMBs Being Acquired to Try and Gain Access to Multiple Companies

Research describes how ransomware actors focus on smaller firms that are likely acquisition targets. By compromising SonicWall devices and leaving backdoors in place, the attackers can pivot into larger enterprises once deals complete, often without the parent organisation realising these assets exist. The pattern underlines the importance of thorough asset discovery, credential hygiene and security reviews before and immediately after acquisitions.

Source: https://www.techradar.com/pro/security/ransomware-hackers-attack-smbs-being-acquired-to-try-and-gain-access-to-multiple-companies

CrowdStrike Catches Insider Feeding Information to Hackers

CrowdStrike confirmed that a now terminated insider secretly shared screenshots of internal systems with cyber attackers called the Scattered Lapsus$ Hunters collective. The hackers say they agreed to pay $25,000 and claim they briefly obtained SSO authentication cookies, but CrowdStrike reports no breach of its systems or customer data. The incident is now with law enforcement and highlights the impact of insider risks faced by organisations.

Source: https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/

A Third of Workers Risk Cyber Security Breach by Using Work Devices for Personal Use

A survey of 1,000 Irish office workers finds 31% use work devices for personal tasks, with 32% clicking suspicious links and 22% accessing sensitive documents over public Wi-Fi. High risk behaviour includes 26% entering company data into AI tools, 33% using unauthorised tools and 19% sharing work passwords. Despite this, 73% feel confident spotting cyber threats and 54% in their password security, although 23% of organisations suffered a cyber security breach in the past year and 32% of workers do not receive regular training.

Source: https://businessplus.ie/news/cyber-security-work-devices-personal-use/

Shadow AI Security Breaches Will Hit 40% of All Companies by 2030, Warns Gartner

Gartner warns that 40% of organisations could suffer security breaches through shadow AI by 2030. Staff routinely paste documents or data into unapproved AI tools, risking exposure of customer records, salary information, source code and strategic plans. Surveys cited include one where 90% of security leaders admit using unapproved AI tools and 71% of UK employees do the same. Gartner advises clear AI policies, audits for unsanctioned usage and provision of approved tools with training.

Source: https://www.fortra.com/blog/shadow-ai-security-breaches-will-hit-40-companies-2030-warns-gartner

New (ISC)2 Report Finds That Vendor Security Gaps Threaten Critical Infrastructure and Supply Chains

An (ISC)2 study finds many organisations are worried about supplier risk yet are slow to manage it. Respondents report frequent security deficiencies in vendors, including weak identity controls, lack of compliance certifications and inadequate monitoring. Nearly a third experienced incidents linked to suppliers, yet many only review vendor security annually. The report urges continuous assessment, clearer contractual expectations and closer collaboration across procurement, legal and security teams.

Source: https://www.helpnetsecurity.com/2025/11/25/isc2-vendor-security-gaps-report/

A Fake Windows Update Screen Is Fooling Windows Users into Installing Malware

Researchers uncovered a new ClickFix campaign where full screen fake Windows Update or captcha pages trick users into pasting attacker supplied commands copied to their clipboard. The commands fetch PNG images that hide malware within pixel data, which a .NET Stego Loader decrypts and runs in memory. The attack includes software that runs 10,000 fake functions to hinder analysis by experts.

Source: https://www.howtogeek.com/a-fake-windows-update-screen-is-fooling-windows-users-into-installing-malware/

FBI: Cybercriminals Stole $262 Million by Impersonating Bank Support Teams Since January

The FBI warns that scammers posed as bank support staff in more than 5,100 complaints since January 2025, stealing around $262 million. Criminals convince victims to grant remote access, reveal credentials or approve transactions, then drain accounts or move funds into cryptocurrency. Tactics include spoofed phone numbers, fake support sites and search engine poisoning, prompting the FBI to urge customers to verify contact details and banks to harden customer authentication.

Source: https://www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/

Compromised Credentials Responsible for 50% of Ransomware Attacks

Beazley Security’s Q3 2025 Threat Report shows ransomware surged in August and September, accounting for 26% and 18% of incidents. Akira, Qilin and INC Ransomware made up 65% of cases. The most common entry point was valid compromised credentials used to access VPNs, ahead of exploitation of internet facing systems. SonicWall vulnerabilities were heavily abused, with stolen configuration files expected to fuel future targeted attacks.

Source: https://natlawreview.com/article/compromised-credentials-responsible-50-ransomware-attacks

Russian and North Korean Hackers Form Alliances

Researchers say Russian group Gamaredon and North Korea’s Lazarus Group are collaborating by sharing infrastructure and tools, including command and control servers and the InvisibleFerret malware family. The partnership combines Russian espionage targeting with North Korean financially motivated operations, including past thefts of billions in crypto assets. Analysts warn this alignment could make both campaigns harder to attribute and disrupt.

Source: https://cybersecuritynews.com/russian-and-north-korean-hackers-form-alliances/

Alliances Between Ransomware Groups Tied to Recent Surge in Cybercrime

Data shows a 41% rise in ransomware attacks between September and October, with the ransomware group Qilin responsible for 29% of October incidents, followed by Sinobi and Akira. Ransomware groups such as LockBit 5.0, DragonForce and Qilin are forming alliances that share tools, infrastructure and reputations. North America suffered 62% of attacks, and more than 200 ransomware variants have been seen this year.

Source: https://www.csoonline.com/article/4096263/alliances-between-ransomware-groups-tied-to-recent-surge-in-cybercrime.html



Threats

Ransomware, Extortion and Destructive Attacks

Akira ransomware crew infected enterprise systems during M&A • The Register

Ransomware hackers attack SMBs being acquired to try and gain access to multiple companies | TechRadar

Russia-linked crooks bought themselves a bank for Christmas • The Register

Get ready for 2026, the year of AI-aided ransomware • The Register

Compromised Credentials Responsible for 50% of Ransomware Attacks - Beazley

Alliances between ransomware groups tied to recent surge in cybercrime | CSO Online

Scattered Spider alleged members deny TfL charges

Ransomware Attacks Remaking Cyber as National Priority

Ransomware gangs seize a new hostage: your AWS S3 buckets | CSO Online

Scattered Lapsus$ Hunters stress testing Zendesk weak spots • The Register

Piecing Together the Puzzle: A Qilin Ransomware Investigation

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist

Kaspersky / Press release | Kaspersky and VDC Research reveal over $18B in potential losses from ransomware attacks on the global manufacturing industry in 2025

Hackers come for big British retailers | The Observer

UK car production plummets 24% in wake of JLR cyber attack | Autocar

Should we ban ransom payments to cyber attackers?

Ransomware Victims

Akira ransomware crew infected enterprise systems during M&A • The Register

Scattered Spider alleged members deny TfL charges

UK car production plummets 24% in wake of JLR cyber attack | Autocar

Crisis24 shuts down emergency notification system in wake of ransomware attack | CyberScoop

Canon Says Subsidiary Impacted by Oracle EBS Hack  - SecurityWeek

Asahi Data Breach Impacts 2 Million Individuals - SecurityWeek

Scottish council still reeling from 2023 ransomware attack • The Register

Report warns councils after 2023 Western Isles cyber-attack | The Herald

Security expert warns London councils cyber attack 'could be far more serious than being let on' - My London

NCSC called in as London councils grapple with cyber attacks | IT Pro

London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings

Lessons From the European Airports Ransomware Attack | Lawfare

Phishing & Email Based Attacks

Email blind spots are back to bite security teams - Help Net Security

ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen

Advanced Security Isn't Stopping Old Phishing Tactics

Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials

Microsoft cracks down on malicious meeting invites - Help Net Security

Phishing Breaks More Defenses Than Ever. Here’s the Fix 

Other Social Engineering

ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen

A fake Windows Update screen is fooling Windows users into installing malware

FBI: Cybercriminals stole $262M by impersonating bank support teams

Microsoft cracks down on malicious meeting invites - Help Net Security

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Hackers keep pretending to be TechCrunch reporters and tricking companies into revealing sensitive information across email and call schemes | TechRadar

Fraud, Scams and Financial Crime

FBI: Cybercriminals stole $262M by impersonating bank support teams

Criminal networks industrialize payment fraud operations - Help Net Security

Scammers hacked her phone and stole thousands of pounds - how did they get her details? - BBC News

AI Arms Race: How to Stay Ahead of Generative AI-Powered Fraud | MSSP Alert

New legislation targets scammers that use AI to deceive | CyberScoop

The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED

Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times

Artificial Intelligence

Shadow AI Security Breaches will hit 40% of all Companies by 2030, Warns Gartner | Fortra

Get ready for 2026, the year of AI-aided ransomware • The Register

Underground AI models promise to be hackers ‘cyber pentesting waifu’  | CyberScoop

Vibe coding feels magical, but it can sink your business fast - here's how | ZDNET

'Dark LLMs' Aid Petty Criminals, Underwhelm Technically

How Malware Authors Incorporate LLMs to Evade Detection

Anthropic's new warning: If you train AI to cheat, it'll hack and sabotage too | ZDNET

Emerging threat from deepfakes leads to cybersecurity arms race | SC Media

Think your password is safe? AI could break it before you blink - BetaNews

AI Arms Race: How to Stay Ahead of Generative AI-Powered Fraud | MSSP Alert

New legislation targets scammers that use AI to deceive | CyberScoop

New research finds that Claude breaks bad if you teach it to cheat | CyberScoop

Four charged with plotting to sneak Nvidia chips into China • The Register

Google's AI is now snooping on your emails - here's how to opt out | ZDNET

CISOs Get Real About Hiring in the Age of AI

Prompt Injections Loom Large Over ChatGPT Atlas Browser

2FA/MFA

Germany urges default 2FA for webmail providers | Cybernews

Malware

A fake Windows Update screen is fooling Windows users into installing malware

New ShadowV2 botnet malware used AWS outage as a test opportunity

Botnet takes advantage of AWS outage to smack 28 countries • The Register

Hackers now hide powerful malware in fake Windows updates that look real enough to fool even cautious users easily today | TechRadar

How Malware Authors Incorporate LLMs to Evade Detection

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Cybercriminals Exploit Browser Push Notifications to Deliver Malware - Infosecurity Magazine

BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

Operation Endgame disrupts Rhadamanthys information-stealing malware

DPRK’s FlexibleFerret Tightens macOS Grip

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

WSUS RCE Exploit Used to Deploy ShadowPad Backdoor

Bots/Botnets

New ShadowV2 botnet malware used AWS outage as a test opportunity

Botnet takes advantage of AWS outage to smack 28 countries • The Register

How your dashcam can be hacked, and how to protect yourself from the attack | Kaspersky official blog

Mobile

New CISA alert: encryption isn't what's failing on Signal and WhatsApp | TechSpot

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ | CISA

Scammers hacked her phone and stole thousands of pounds - how did they get her details? - BBC News

Internet of Things – IoT

New ShadowV2 botnet malware used AWS outage as a test opportunity

Botnet takes advantage of AWS outage to smack 28 countries • The Register

How your dashcam can be hacked, and how to protect yourself from the attack | Kaspersky official blog

Aircraft cabin IoT leaves vendor and passenger data exposed - Help Net Security

Data Breaches/Leaks

The breaches everyone gets hit by (and how to stop them) - Help Net Security

JPMorgan, Citi, Morgan Stanley Client Data May Be Exposed by Vendor's Hack, NYT Reports

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

OpenAI data may have been exposed after a cyberattack on analytics firm Mixpanel

Iberia discloses customer data leak after vendor security breach

EU proposes sweeping reforms to the GDPR, cookie rules, Data Act, and breach reporting | McDermott Will & Schulte - JDSupra

Council had ‘gaps in cybersecurity’ before ransomware attack

Cox Enterprises discloses Oracle E-Business Suite data breach

183 Million Credentials Misreported as a Gmail Breach - Security Boulevard

Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan

Canon Says Subsidiary Impacted by Oracle EBS Hack  - SecurityWeek

Asahi Data Breach Impacts 2 Million Individuals - SecurityWeek

Kensington and Chelsea Council cyber attack sees emergency plans initiated - BBC News

Security expert warns London councils cyber attack 'could be far more serious than being let on' - My London

NCSC called in as London councils grapple with cyber attacks | IT Pro

US car parts dealer allegedly hit by massive breach​ | Cybernews

Organised Crime & Criminal Actors

Criminal networks industrialize payment fraud operations - Help Net Security

Ministers send small businesses cyber threat warning - UKTN

Government publishes independent study revealing cost of cyber attacks to UK economy

'Dark LLMs' Aid Petty Criminals, Underwhelm Technically

Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News

The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED

Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times

Insider Risk and Insider Threats

A third of workers risk cybersecurity breach by using work devices for personal use

Cybersecurity giant CrowdStrike fires insider working with hackers - Cryptopolitan

Human risk: don’t blame the victim, fix the system | TechRadar

Why legal firms must confront insider cyber threats - Tech Monitor

Empathy key weapon in cyber fight

Supply Chain and Third Parties

JPMorgan, Citi, Morgan Stanley Client Data May Be Exposed by Vendor's Hack, NYT Reports

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Iberia discloses customer data leak after vendor security breach

BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks

Supply chain sprawl is rewriting security priorities - Help Net Security

Cox Enterprises discloses Oracle E-Business Suite data breach

Google security experts say Gainsight hacks may have left hundreds of companies affected | TechRadar

Canon Says Subsidiary Impacted by Oracle EBS Hack  - SecurityWeek

Software Supply Chain

UK Report Proposes Liability For Software Provider Insecurity - Infosecurity Magazine

Cloud/SaaS

New ShadowV2 botnet malware used AWS outage as a test opportunity

Botnet takes advantage of AWS outage to smack 28 countries • The Register

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Fluent Bit vulnerabilities put billions of containers at risk with exploits that could cripple cloud systems across industries | TechRadar

Ransomware gangs seize a new hostage: your AWS S3 buckets | CSO Online

How has cloud flipped the regular security narrative? – Computerworld

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

Outages

Internet failure highlighted connected risk – Russell

China simulated a Starlink blockade over Taiwan that uses around 2,000 drones with jammers to create an 'electromagnetic shield' — CCP scientists devise potential plan to cut off satellite internet to the island | Tom's Hardware

Encryption

New CISA alert: encryption isn't what's failing on Signal and WhatsApp | TechSpot

Cheap Device Bypasses AMD, Intel Memory Encryption

Quantum encryption is pushing satellite hardware to its limits - Help Net Security

Passwords, Credential Stuffing & Brute Force Attacks

Compromised Credentials Responsible for 50% of Ransomware Attacks - Beazley

DPRK’s FlexibleFerret Tightens macOS Grip

Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials

Social data puts user passwords at risk in unexpected ways - Help Net Security

Think your password is safe? AI could break it before you blink - BetaNews

183 Million Credentials Misreported as a Gmail Breach - Security Boulevard

Social Media

Social data puts user passwords at risk in unexpected ways - Help Net Security

Influencers in the crosshairs: How cybercriminals are targeting content creators

Regulations, Fines and Legislation

Should we ban ransom payments to cyber attackers?

Mounting Cyber-Threats Prompt Calls For Economic Security Bill - Infosecurity Magazine

Key provisions of the UK Cyber Resilience Bill Revealed - Infosecurity Magazine

SolarWinds dismissed: what the SEC’s U-turn signals for cyber enforcement | A&O Shearman - JDSupra

The Internet Is on Fire and the FCC Just Walked Away With the Extinguisher

Rights groups accuse ICO of ‘collapse in enforcement activity’

UK data regulator under pressure after failing to regulate public sector effectively - Neowin

U.K. Cyber Security and Resilience bill set to regulate critical infrastructure suppliers | Article | Compliance Week

NIS2 Directive Explained: Part 2 – Management Bodies Rules | DLA Piper - JDSupra

New legislation targets scammers that use AI to deceive | CyberScoop

Four charged with plotting to sneak Nvidia chips into China • The Register

UK Report Proposes Liability For Software Provider Insecurity - Infosecurity Magazine

Switching to Offense: US Makes Cyber Strategy Changes

Powers to protect us from cyber attacks ‘go too far’

Mobile industry warns patchwork regs are driving up costs • The Register

New York Hospital Cyber Rules to 'Raise the Bar' Nationwide

Models, Frameworks and Standards

Key provisions of the UK Cyber Resilience Bill Revealed - Infosecurity Magazine

EU proposes sweeping reforms to the GDPR, cookie rules, Data Act, and breach reporting | McDermott Will & Schulte - JDSupra

NIS2 Directive Explained: Part 2 – Management Bodies Rules | DLA Piper - JDSupra

U.K. Cyber Security and Resilience bill set to regulate critical infrastructure suppliers | Article | Compliance Week

Data Protection

Civil liberties groups call for inquiry into UK data protection watchdog | Data protection | The Guardian

Rights groups accuse ICO of ‘collapse in enforcement activity’

UK data regulator under pressure after failing to regulate public sector effectively - Neowin

Careers, Working in Cyber and Information Security

Invisible battles: How cybersecurity work erodes mental health | CSO Online

CISOs Get Real About Hiring in the Age of AI

The CISO’s greatest risk? Department leaders quitting | CSO Online

Law Enforcement Action and Take Downs

Operation Endgame disrupts Rhadamanthys information-stealing malware

'Scattered Spider' teens plead not guilty to UK transport hack

Russian Suspected of Cyberattacks on Polish and EU Companies Detained in Krakow - Militarnyi

Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News

The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED

Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks

Polish minister warns of ongoing 'cyberwar' with Russia - TRT World

China simulated a Starlink blockade over Taiwan that uses around 2,000 drones with jammers to create an 'electromagnetic shield' — CCP scientists devise potential plan to cut off satellite internet to the island | Tom's Hardware

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

With Friends Like These: China Spies on Russian IT Orgs

As Space Becomes Warfare Domain, Cyber Is on the Frontlines

Security is not only military—it is societal. Something worth learning from the Scandinavians

Nation State Actors

Political instability is now the defining force behind global business risk | theHRD

Switching to Offense: US Makes Cyber Strategy Changes

China

China simulated a Starlink blockade over Taiwan that uses around 2,000 drones with jammers to create an 'electromagnetic shield' — CCP scientists devise potential plan to cut off satellite internet to the island | Tom's Hardware

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

With Friends Like These: China Spies on Russian IT Orgs

Four charged with plotting to sneak Nvidia chips into China • The Register

TP-Link sues Netgear, claiming misleading statements on national security risks and alleged ties to state-backed cyberattacks | TechRadar

Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News

Russia

Russian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City - SecurityWeek

Polish minister warns of ongoing 'cyberwar' with Russia - TRT World

Russia-linked crooks bought themselves a bank for Christmas • The Register

Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

With Friends Like These: China Spies on Russian IT Orgs

Russian Suspected of Cyberattacks on Polish and EU Companies Detained in Krakow - Militarnyi

Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan

Iran

Iranian APT hacks helped direct missile strikes in Israel and the Red Sea | CSO Online

North Korea

Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide

DPRK’s FlexibleFerret Tightens macOS Grip

Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Political instability is now the defining force behind global business risk | theHRD

Security is not only military—it is societal. Something worth learning from the Scandinavians





Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 21 November 2025