Black Arrow Cyber Threat Intelligence Briefing 28 November 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
This week we start with an alert on the cyber security risks of mergers and acquisitions: attackers are found to have entered the networks of companies that are later acquired by another organisation, allowing the attackers to enter the acquiring organisation also.
We highlight insider-risks that business leaders should be aware of, including employees who are bribed by attackers, employees using work devices for personal use, and employees using shadow AI. Attacker tactics in this week’s review include attacks via third parties, fake Windows update screens, impersonating the support teams of banks, and using compromised credentials to inflict ransomware attacks. We also see greater collaboration and alliances by attacker groups.
A key part of building stronger cyber security and resilience is understanding how attackers are evolving their tactics. This threat intelligence empowers you to objectively assess how your organisation is susceptible to these tactics and what you need to do to enhance your own security. We strongly recommend that threat intelligence should feature in your leadership training, your incident response exercise and your governance papers; contact us to discuss how we can help you achieve this in a proportionate way.
Top Cyber Stories of the Last Week
M&A Risk: Ransomware Hackers Attack SMBs Being Acquired to Try and Gain Access to Multiple Companies
Research describes how ransomware actors focus on smaller firms that are likely acquisition targets. By compromising SonicWall devices and leaving backdoors in place, the attackers can pivot into larger enterprises once deals complete, often without the parent organisation realising these assets exist. The pattern underlines the importance of thorough asset discovery, credential hygiene and security reviews before and immediately after acquisitions.
CrowdStrike Catches Insider Feeding Information to Hackers
CrowdStrike confirmed that a now terminated insider secretly shared screenshots of internal systems with cyber attackers called the Scattered Lapsus$ Hunters collective. The hackers say they agreed to pay $25,000 and claim they briefly obtained SSO authentication cookies, but CrowdStrike reports no breach of its systems or customer data. The incident is now with law enforcement and highlights the impact of insider risks faced by organisations.
A Third of Workers Risk Cyber Security Breach by Using Work Devices for Personal Use
A survey of 1,000 Irish office workers finds 31% use work devices for personal tasks, with 32% clicking suspicious links and 22% accessing sensitive documents over public Wi-Fi. High risk behaviour includes 26% entering company data into AI tools, 33% using unauthorised tools and 19% sharing work passwords. Despite this, 73% feel confident spotting cyber threats and 54% in their password security, although 23% of organisations suffered a cyber security breach in the past year and 32% of workers do not receive regular training.
Source: https://businessplus.ie/news/cyber-security-work-devices-personal-use/
Shadow AI Security Breaches Will Hit 40% of All Companies by 2030, Warns Gartner
Gartner warns that 40% of organisations could suffer security breaches through shadow AI by 2030. Staff routinely paste documents or data into unapproved AI tools, risking exposure of customer records, salary information, source code and strategic plans. Surveys cited include one where 90% of security leaders admit using unapproved AI tools and 71% of UK employees do the same. Gartner advises clear AI policies, audits for unsanctioned usage and provision of approved tools with training.
Source: https://www.fortra.com/blog/shadow-ai-security-breaches-will-hit-40-companies-2030-warns-gartner
New (ISC)2 Report Finds That Vendor Security Gaps Threaten Critical Infrastructure and Supply Chains
An (ISC)2 study finds many organisations are worried about supplier risk yet are slow to manage it. Respondents report frequent security deficiencies in vendors, including weak identity controls, lack of compliance certifications and inadequate monitoring. Nearly a third experienced incidents linked to suppliers, yet many only review vendor security annually. The report urges continuous assessment, clearer contractual expectations and closer collaboration across procurement, legal and security teams.
Source: https://www.helpnetsecurity.com/2025/11/25/isc2-vendor-security-gaps-report/
A Fake Windows Update Screen Is Fooling Windows Users into Installing Malware
Researchers uncovered a new ClickFix campaign where full screen fake Windows Update or captcha pages trick users into pasting attacker supplied commands copied to their clipboard. The commands fetch PNG images that hide malware within pixel data, which a .NET Stego Loader decrypts and runs in memory. The attack includes software that runs 10,000 fake functions to hinder analysis by experts.
FBI: Cybercriminals Stole $262 Million by Impersonating Bank Support Teams Since January
The FBI warns that scammers posed as bank support staff in more than 5,100 complaints since January 2025, stealing around $262 million. Criminals convince victims to grant remote access, reveal credentials or approve transactions, then drain accounts or move funds into cryptocurrency. Tactics include spoofed phone numbers, fake support sites and search engine poisoning, prompting the FBI to urge customers to verify contact details and banks to harden customer authentication.
Compromised Credentials Responsible for 50% of Ransomware Attacks
Beazley Security’s Q3 2025 Threat Report shows ransomware surged in August and September, accounting for 26% and 18% of incidents. Akira, Qilin and INC Ransomware made up 65% of cases. The most common entry point was valid compromised credentials used to access VPNs, ahead of exploitation of internet facing systems. SonicWall vulnerabilities were heavily abused, with stolen configuration files expected to fuel future targeted attacks.
Source: https://natlawreview.com/article/compromised-credentials-responsible-50-ransomware-attacks
Russian and North Korean Hackers Form Alliances
Researchers say Russian group Gamaredon and North Korea’s Lazarus Group are collaborating by sharing infrastructure and tools, including command and control servers and the InvisibleFerret malware family. The partnership combines Russian espionage targeting with North Korean financially motivated operations, including past thefts of billions in crypto assets. Analysts warn this alignment could make both campaigns harder to attribute and disrupt.
Source: https://cybersecuritynews.com/russian-and-north-korean-hackers-form-alliances/
Alliances Between Ransomware Groups Tied to Recent Surge in Cybercrime
Data shows a 41% rise in ransomware attacks between September and October, with the ransomware group Qilin responsible for 29% of October incidents, followed by Sinobi and Akira. Ransomware groups such as LockBit 5.0, DragonForce and Qilin are forming alliances that share tools, infrastructure and reputations. North America suffered 62% of attacks, and more than 200 ransomware variants have been seen this year.
Governance, Risk and Compliance
UK cyber attacks will inevitably increase, HP boss warns
A third of workers risk cybersecurity breach by using work devices for personal use
Cybersecurity Is Now a Core Business Discipline - SecurityWeek
Ministers send small businesses cyber threat warning - UKTN
SolarWinds dismissed: what the SEC’s U-turn signals for cyber enforcement | A&O Shearman - JDSupra
Government publishes independent study revealing cost of cyber attacks to UK economy
Political instability is now the defining force behind global business risk | theHRD
Empathy key weapon in cyber fight
We must protect our society against tomorrow's cyber threats - GOV.UK
Root causes of security breaches remain elusive — jeopardizing resilience | CSO Online
Cyber demand grows following high-profile attacks - Insurance Post
UK Budget 2025: Reactions From Tech Leaders - TechRepublic
3 ways CISOs can win over their boards this budget season | CSO Online
The CISO’s greatest risk? Department leaders quitting | CSO Online
Selling to the CISO: An open letter to the cybersecurity industry | CSO Online
Threats
Ransomware, Extortion and Destructive Attacks
Akira ransomware crew infected enterprise systems during M&A • The Register
Russia-linked crooks bought themselves a bank for Christmas • The Register
Get ready for 2026, the year of AI-aided ransomware • The Register
Compromised Credentials Responsible for 50% of Ransomware Attacks - Beazley
Alliances between ransomware groups tied to recent surge in cybercrime | CSO Online
Scattered Spider alleged members deny TfL charges
Ransomware Attacks Remaking Cyber as National Priority
Ransomware gangs seize a new hostage: your AWS S3 buckets | CSO Online
Scattered Lapsus$ Hunters stress testing Zendesk weak spots • The Register
Piecing Together the Puzzle: A Qilin Ransomware Investigation
Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist
Hackers come for big British retailers | The Observer
UK car production plummets 24% in wake of JLR cyber attack | Autocar
Should we ban ransom payments to cyber attackers?
Ransomware Victims
Akira ransomware crew infected enterprise systems during M&A • The Register
Scattered Spider alleged members deny TfL charges
UK car production plummets 24% in wake of JLR cyber attack | Autocar
Crisis24 shuts down emergency notification system in wake of ransomware attack | CyberScoop
Canon Says Subsidiary Impacted by Oracle EBS Hack - SecurityWeek
Asahi Data Breach Impacts 2 Million Individuals - SecurityWeek
Scottish council still reeling from 2023 ransomware attack • The Register
Report warns councils after 2023 Western Isles cyber-attack | The Herald
NCSC called in as London councils grapple with cyber attacks | IT Pro
London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings
Lessons From the European Airports Ransomware Attack | Lawfare
Phishing & Email Based Attacks
Email blind spots are back to bite security teams - Help Net Security
ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen
Advanced Security Isn't Stopping Old Phishing Tactics
Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
Microsoft cracks down on malicious meeting invites - Help Net Security
Phishing Breaks More Defenses Than Ever. Here’s the Fix
Other Social Engineering
ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen
A fake Windows Update screen is fooling Windows users into installing malware
FBI: Cybercriminals stole $262M by impersonating bank support teams
Microsoft cracks down on malicious meeting invites - Help Net Security
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
Fraud, Scams and Financial Crime
FBI: Cybercriminals stole $262M by impersonating bank support teams
Criminal networks industrialize payment fraud operations - Help Net Security
Scammers hacked her phone and stole thousands of pounds - how did they get her details? - BBC News
AI Arms Race: How to Stay Ahead of Generative AI-Powered Fraud | MSSP Alert
New legislation targets scammers that use AI to deceive | CyberScoop
The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED
Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times
Artificial Intelligence
Shadow AI Security Breaches will hit 40% of all Companies by 2030, Warns Gartner | Fortra
Get ready for 2026, the year of AI-aided ransomware • The Register
Underground AI models promise to be hackers ‘cyber pentesting waifu’ | CyberScoop
Vibe coding feels magical, but it can sink your business fast - here's how | ZDNET
'Dark LLMs' Aid Petty Criminals, Underwhelm Technically
How Malware Authors Incorporate LLMs to Evade Detection
Anthropic's new warning: If you train AI to cheat, it'll hack and sabotage too | ZDNET
Emerging threat from deepfakes leads to cybersecurity arms race | SC Media
Think your password is safe? AI could break it before you blink - BetaNews
AI Arms Race: How to Stay Ahead of Generative AI-Powered Fraud | MSSP Alert
New legislation targets scammers that use AI to deceive | CyberScoop
New research finds that Claude breaks bad if you teach it to cheat | CyberScoop
Four charged with plotting to sneak Nvidia chips into China • The Register
Google's AI is now snooping on your emails - here's how to opt out | ZDNET
CISOs Get Real About Hiring in the Age of AI
Prompt Injections Loom Large Over ChatGPT Atlas Browser
2FA/MFA
Germany urges default 2FA for webmail providers | Cybernews
Malware
A fake Windows Update screen is fooling Windows users into installing malware
New ShadowV2 botnet malware used AWS outage as a test opportunity
Botnet takes advantage of AWS outage to smack 28 countries • The Register
How Malware Authors Incorporate LLMs to Evade Detection
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
Cybercriminals Exploit Browser Push Notifications to Deliver Malware - Infosecurity Magazine
BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
Operation Endgame disrupts Rhadamanthys information-stealing malware
DPRK’s FlexibleFerret Tightens macOS Grip
RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
WSUS RCE Exploit Used to Deploy ShadowPad Backdoor
Bots/Botnets
New ShadowV2 botnet malware used AWS outage as a test opportunity
Botnet takes advantage of AWS outage to smack 28 countries • The Register
Mobile
New CISA alert: encryption isn't what's failing on Signal and WhatsApp | TechSpot
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications | CISA
Scammers hacked her phone and stole thousands of pounds - how did they get her details? - BBC News
Internet of Things – IoT
New ShadowV2 botnet malware used AWS outage as a test opportunity
Botnet takes advantage of AWS outage to smack 28 countries • The Register
Aircraft cabin IoT leaves vendor and passenger data exposed - Help Net Security
Data Breaches/Leaks
The breaches everyone gets hit by (and how to stop them) - Help Net Security
JPMorgan, Citi, Morgan Stanley Client Data May Be Exposed by Vendor's Hack, NYT Reports
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
OpenAI data may have been exposed after a cyberattack on analytics firm Mixpanel
Iberia discloses customer data leak after vendor security breach
Council had ‘gaps in cybersecurity’ before ransomware attack
Cox Enterprises discloses Oracle E-Business Suite data breach
183 Million Credentials Misreported as a Gmail Breach - Security Boulevard
Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan
Canon Says Subsidiary Impacted by Oracle EBS Hack - SecurityWeek
Asahi Data Breach Impacts 2 Million Individuals - SecurityWeek
Kensington and Chelsea Council cyber attack sees emergency plans initiated - BBC News
NCSC called in as London councils grapple with cyber attacks | IT Pro
US car parts dealer allegedly hit by massive breach | Cybernews
Organised Crime & Criminal Actors
Criminal networks industrialize payment fraud operations - Help Net Security
Ministers send small businesses cyber threat warning - UKTN
Government publishes independent study revealing cost of cyber attacks to UK economy
'Dark LLMs' Aid Petty Criminals, Underwhelm Technically
Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News
The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED
Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times
Insider Risk and Insider Threats
A third of workers risk cybersecurity breach by using work devices for personal use
Cybersecurity giant CrowdStrike fires insider working with hackers - Cryptopolitan
Human risk: don’t blame the victim, fix the system | TechRadar
Why legal firms must confront insider cyber threats - Tech Monitor
Empathy key weapon in cyber fight
Supply Chain and Third Parties
JPMorgan, Citi, Morgan Stanley Client Data May Be Exposed by Vendor's Hack, NYT Reports
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Iberia discloses customer data leak after vendor security breach
BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks
Supply chain sprawl is rewriting security priorities - Help Net Security
Cox Enterprises discloses Oracle E-Business Suite data breach
Google security experts say Gainsight hacks may have left hundreds of companies affected | TechRadar
Canon Says Subsidiary Impacted by Oracle EBS Hack - SecurityWeek
Software Supply Chain
UK Report Proposes Liability For Software Provider Insecurity - Infosecurity Magazine
Cloud/SaaS
New ShadowV2 botnet malware used AWS outage as a test opportunity
Botnet takes advantage of AWS outage to smack 28 countries • The Register
ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Ransomware gangs seize a new hostage: your AWS S3 buckets | CSO Online
How has cloud flipped the regular security narrative? – Computerworld
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Outages
Internet failure highlighted connected risk – Russell
Encryption
New CISA alert: encryption isn't what's failing on Signal and WhatsApp | TechSpot
Cheap Device Bypasses AMD, Intel Memory Encryption
Quantum encryption is pushing satellite hardware to its limits - Help Net Security
Passwords, Credential Stuffing & Brute Force Attacks
Compromised Credentials Responsible for 50% of Ransomware Attacks - Beazley
DPRK’s FlexibleFerret Tightens macOS Grip
Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
Social data puts user passwords at risk in unexpected ways - Help Net Security
Think your password is safe? AI could break it before you blink - BetaNews
183 Million Credentials Misreported as a Gmail Breach - Security Boulevard
Social Media
Social data puts user passwords at risk in unexpected ways - Help Net Security
Influencers in the crosshairs: How cybercriminals are targeting content creators
Regulations, Fines and Legislation
Should we ban ransom payments to cyber attackers?
Mounting Cyber-Threats Prompt Calls For Economic Security Bill - Infosecurity Magazine
Key provisions of the UK Cyber Resilience Bill Revealed - Infosecurity Magazine
SolarWinds dismissed: what the SEC’s U-turn signals for cyber enforcement | A&O Shearman - JDSupra
The Internet Is on Fire and the FCC Just Walked Away With the Extinguisher
Rights groups accuse ICO of ‘collapse in enforcement activity’
UK data regulator under pressure after failing to regulate public sector effectively - Neowin
NIS2 Directive Explained: Part 2 – Management Bodies Rules | DLA Piper - JDSupra
New legislation targets scammers that use AI to deceive | CyberScoop
Four charged with plotting to sneak Nvidia chips into China • The Register
UK Report Proposes Liability For Software Provider Insecurity - Infosecurity Magazine
Switching to Offense: US Makes Cyber Strategy Changes
Powers to protect us from cyber attacks ‘go too far’
Mobile industry warns patchwork regs are driving up costs • The Register
New York Hospital Cyber Rules to 'Raise the Bar' Nationwide
Models, Frameworks and Standards
Key provisions of the UK Cyber Resilience Bill Revealed - Infosecurity Magazine
NIS2 Directive Explained: Part 2 – Management Bodies Rules | DLA Piper - JDSupra
Data Protection
Rights groups accuse ICO of ‘collapse in enforcement activity’
UK data regulator under pressure after failing to regulate public sector effectively - Neowin
Careers, Working in Cyber and Information Security
Invisible battles: How cybersecurity work erodes mental health | CSO Online
CISOs Get Real About Hiring in the Age of AI
The CISO’s greatest risk? Department leaders quitting | CSO Online
Law Enforcement Action and Take Downs
Operation Endgame disrupts Rhadamanthys information-stealing malware
'Scattered Spider' teens plead not guilty to UK transport hack
Russian Suspected of Cyberattacks on Polish and EU Companies Detained in Krakow - Militarnyi
Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News
The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED
Did Myanmar’s Junta Demolish Scam Centers Just for Show? - The New York Times
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks
Polish minister warns of ongoing 'cyberwar' with Russia - TRT World
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
With Friends Like These: China Spies on Russian IT Orgs
As Space Becomes Warfare Domain, Cyber Is on the Frontlines
Security is not only military—it is societal. Something worth learning from the Scandinavians
Nation State Actors
Political instability is now the defining force behind global business risk | theHRD
Switching to Offense: US Makes Cyber Strategy Changes
China
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
With Friends Like These: China Spies on Russian IT Orgs
Four charged with plotting to sneak Nvidia chips into China • The Register
Alice Guo: Philippines jails 'Chinese spy mayor' for life - BBC News
Russia
Polish minister warns of ongoing 'cyberwar' with Russia - TRT World
Russia-linked crooks bought themselves a bank for Christmas • The Register
Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
With Friends Like These: China Spies on Russian IT Orgs
Russian Suspected of Cyberattacks on Polish and EU Companies Detained in Krakow - Militarnyi
Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan
Iran
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea | CSO Online
North Korea
Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide
DPRK’s FlexibleFerret Tightens macOS Grip
Russian and North Korean hackers steal 2TB of data from South Korean banks - Cryptopolitan
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Political instability is now the defining force behind global business risk | theHRD
Security is not only military—it is societal. Something worth learning from the Scandinavians
Tools and Controls
Advanced Security Isn't Stopping Old Phishing Tactics
Root causes of security breaches remain elusive — jeopardizing resilience | CSO Online
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Vibe coding feels magical, but it can sink your business fast - here's how | ZDNET
Recognizing and responding to cyber threats: What differentiates NDR, EDR and XDR | CSO Online
3 ways CISOs can win over their boards this budget season | CSO Online
Security teams want automation but 96 percent face problems implementing it - BetaNews
Other News
Vehicle Hackers Continue Outpacing Cybersecurity Efforts, Expert Says
This tiny Windows shortcut file is a bigger security threat than you think
Ex-CISA officials, CISOs aim to stop the spread of hacklore • The Register
This campaign aims to tackle persistent security myths in favor of better advice | CyberScoop
We must protect our society against tomorrow's cyber threats - GOV.UK
Legacy web forms are the weakest link in government data security | CyberScoop
Vulnerability Management
Around 500 million PCs are holding off upgrading to Windows 11, says Dell | The Verge
Fragmented tooling slows vulnerability management - Help Net Security
What happens when vulnerability scores fall apart? - Help Net Security
Vulnerabilities
SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance - SecurityWeek
Akira's SonicWall Hacks Are Taking Down Large Enterprises
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges
Critical Oracle Identity Manager Flaw Under Attack
WSUS RCE Exploit Used to Deploy ShadowPad Backdoor
Prompt Injections Loom Large Over ChatGPT Atlas Browser
ASUS warns of new critical auth bypass flaw in AiCloud routers
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Microsoft: Out-of-band update fixes Windows 11 hotpatch install loop
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.