Threat Intelligence Blog

Contact us to discuss any insights from our Blog, and how we can support you in a tailored threat intelligence report.

Contact our Experts Now
Subscribe to our Weekly Cyber Threat Intelligence Briefing
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 09 May 2025

Black Arrow Cyber Threat Intelligence Briefing 09 May 2025:

-Email-Based Attacks Top Cyber Insurance Claims

-Hackers Pose as Staff in UK Retail Cyber Strikes

-High Profile UK Cyber Attacks Underscore the Case for Resilience over Reactivity

-Cyber Attacks Are Costing UK Firms Billions Every Year: Ransom Payments, Staff Overtime, and Lost Business Are Crippling Victims

-Don’t Plug Phones into Chinese Electric Cars, Defence Firms Warn

-94% of Leaked Passwords Are Not Unique

-Personal Data of Top Executives Easily Found Online

-The SMB Cyber Security Gap: High Awareness, Low Readiness

-How Cyber Criminals Exploit Psychological Triggers in Social Engineering Attacks

-Darcula Phishing as a Service Operation Snares 800,000+ Victims

-Cyber Criminals Hold Britain’s Boardrooms to Ransom

-UK at Risk of Russian Cyber and Physical Attacks as Ukraine Seeks Peace Deal

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Our review of threat intelligence this week reports that business email compromise and funds transfer fraud now account for 60% of cyber insurance claims, and that social engineering now accounts for the majority of cyber threats faced by individuals. Attackers continue to exploit human factors, for example posing as staff to manipulate help desks to grant access to systems as seen in the recent wave of cyber attacks in the UK retail sector. These incidents reinforce the critical importance of layered identity verification, rigorous staff awareness and crisis planning across all sectors.

The growing scale and cost of cyber attacks, now exceeding £64 billion annually for UK firms, highlights a pressing need for resilience over reactivity as a high percentage of affected companies enter insolvency proceedings or file for bankruptcy. Ransomware, social engineering, and password reuse result in operational and reputational harm. Organisations need dedicated cyber leadership, and to avoid a compliance-led approach. Proactive governance and stronger board accountability must become standard practice.

From boardroom data exposure to state-sponsored espionage risks linked to Chinese electric vehicles, the threat landscape is increasingly complex. We continue to warn that both SMEs and large enterprises face escalating risks from persistent attackers, many leveraging phishing-as-a-service platforms or exploiting geopolitical tensions. Now more than ever, cyber security must be embedded in leadership thinking, supply chain oversight, and incident readiness.

Top Cyber Stories of the Last Week

Email-Based Attacks Top Cyber Insurance Claims

Coalition’s 2025 Cyber Claims Report found that business email compromise and funds transfer fraud (FTF) made up 60% of all claims in 2024, with BEC incidents alone averaging $35,000 per event. While ransomware losses were far higher at $292,000 on average, their severity dropped by 7%. Email-based attacks remain the most persistent risk, with nearly a third of BEC incidents also leading to FTF.

Hackers Pose as Staff in UK Retail Cyber Strikes

The UK’s National Cyber Security Centre (NCSC) has issued a critical alert following a wave of cyber attacks targeting major retailers, including M&S, Co-op and Harrods. Criminals posed as IT staff or locked-out employees to manipulate help desk staff into resetting passwords, allowing unauthorised access to internal systems. The attackers, identifying as “DragonForce”, claimed responsibility for data breaches and appear to use methods similar to those of other financially motivated threat groups. The NCSC is urging firms to tighten authentication for help desk processes, particularly for senior staff, and to adopt multi-factor checks and identity code words.

High Profile UK Cyber Attacks Underscore the Case for Resilience over Reactivity

The series of recent cyber attacks on major UK retailers highlights the growing complexity and impact of digital threats. Disruption has ranged from payment failures and warehouse shutdowns to reputational damage, underscoring that cyber resilience is now critical to business continuity. Experts stress that traditional, compliance-led approaches are no longer enough; organisations must adopt Zero Trust principles, enforce multi-factor authentication, and monitor third-party access. With techniques such as credential theft and ransomware increasingly used, cyber security must be treated as a board-level issue embedded in governance, operations and crisis planning.

Cyber Attacks Are Costing UK Firms Billions Every Year: Ransom Payments, Staff Overtime, and Lost Business Are Crippling Victims

Cyber attacks are costing UK businesses £64 billion annually, with over half suffering at least one attack in the past year. Phishing, malware, and online banking threats were the most common, and nearly two-thirds cited staff overtime as a major cost. Direct losses totalled £37 billion, with indirect impacts like increased cyber security budgets and lost clients adding over £26 billion more. Alarmingly, 1 in 8 affected firms entered administration. Despite this, 15% of businesses have no cyber security budget, and nearly half manage risks entirely in-house, underscoring the urgent need for proactive investment in cyber resilience.

Don’t Plug Phones into Chinese Electric Cars, Defence Firms Warn

Defence and intelligence firms are warning staff not to connect phones via cable or Bluetooth to Chinese-made electric vehicles due to fears of state-sponsored espionage. The UK Ministry of Defence has already restricted EV access on military sites, citing findings from the Defence Science and Technology Laboratory that EVs may pose national security risks. Defence suppliers including BAE Systems and Rolls-Royce are advising precautions as all connected vehicles potentially expose sensitive data to foreign interception.

94% of Leaked Passwords Are Not Unique

A new study of over 19 billion leaked passwords has found that 94% are reused or duplicated, leaving users highly vulnerable to cyber attacks. Common entries like “123456”, “admin”, and “password” remain prevalent, with over 700 million instances of “1234” alone. Many systems still rely on default credentials, which users often fail to change. Only 6% of passwords were found to be unique and relatively secure. The report highlights the urgent need for organisations to enforce strong password policies, promote the use of password managers and multi-factor authentication, and regularly monitor for credential leaks.

Personal Data of Top Executives Easily Found Online

Incogni has found that over 75% of corporate board members have personal information including home addresses and family links readily available on people search websites. Exposure is highest in consumer staples (84%), industrials (81%), and technology (77%) sectors, with 26% of board members appearing on more than 20 such sites. Notably, exposure is unrelated to company size, affecting firms with revenues both above $50 billion and below $10 billion equally. The report warns that any organisation, regardless of profile, could face reputational or security risks if senior leaders’ private data remains unprotected online.

The SMB Cyber Security Gap: High Awareness, Low Readiness

CrowdStrike’s latest survey reveals that while 90% of small and midsize business (SMB) leaders recognise cyber threats as a business risk, only 42% provide regular cyber security training. Cost remains the top barrier to better protection, with two-thirds citing it as their primary challenge, yet cutting corners often results in ineffective defences. Smaller firms are disproportionately vulnerable, with 75% of micro-businesses admitting a ransomware attack could shut them down. The report urges stronger vendor support and practical guidance to help SMBs close this growing readiness gap.

How Cyber Criminals Exploit Psychological Triggers in Social Engineering Attacks

Avast reports that social engineering now accounts for the majority of cyber threats faced by individuals in 2024. These attacks exploit human psychology using authority, urgency, and familiarity to bypass technical controls, with tactics ranging from phishing and fake system prompts to deepfake video calls. One such attack resulted in the theft of over $25 million from a global firm. Even security experts are being caught out, highlighting the sophistication of these scams. The report underscores the need for strong identity verification, multi-factor authentication, and regular staff training to mitigate the growing risks posed by these increasingly deceptive methods.

Darcula Phishing as a Service Operation Snares 800,000+ Victims

A sophisticated phishing-as-a-service operation known as Darcula has enabled cyber criminals to compromise over 880,000 payment cards in just seven months. Targeting mobile users globally through SMS, RCS and iMessage, the operation impersonates trusted brands to deceive victims into submitting sensitive information. Researchers uncovered a toolkit named “Magic Cat” at the core of the operation, designed to support non-technical actors with ready-made templates and real-time data streaming. With an estimated 600 cyber crime groups using the platform, law enforcement agencies across multiple jurisdictions have been alerted to the growing threat.

Cyber Criminals Hold Britain’s Boardrooms to Ransom

Cyber attacks have impacted over half of UK firms with ransomware the most damaging threat. High-profile breaches, such as the one affecting M&S, highlight how attacks can cripple operations for weeks and damage share value: M&S alone saw a billion wiped from its market cap. Experts warn that hybrid working, third-party suppliers, and boardroom inexperience are compounding risks, as only 26% of company boards now include a director with cyber responsibility. Despite rising adoption of cyber insurance, it is no substitute for robust cyber security controls.

UK at Risk of Russian Cyber and Physical Attacks as Ukraine Seeks Peace Deal

The UK faces an increasing threat from Russian cyber and physical sabotage as Ukraine moves closer to a peace deal, according to the head of the National Cyber Security Centre. Over 200 cyber incidents have been managed since September 2024, with twice as many nationally significant cases compared to the previous year. Russian intelligence is reportedly using criminal proxies to carry out sabotage, while Iranian, North Korean, and Chinese actors also pose growing risks. The UK government warns that hostile states are using cyber attacks to pursue strategic objectives, often operating in the “grey zone” with plausible deniability.

Sources:

https://www.darkreading.com/cyber-risk/email-based-attacks-cyber-insurance-claims

https://www.scworld.com/brief/hackers-pose-as-it-staff-in-uk-retail-cyber-strikes

https://www.emergingrisks.co.uk/uk-retail-cyber-attacks-underscore-the-case-for-resilience-over-reactivity/

https://www.itpro.com/security/cyber-attacks/cyber-attacks-cost-uk-firms-64-billion-each-year

https://www.telegraph.co.uk/news/2025/04/28/dont-plug-phones-chinese-electric-cars-defence-firms-warn/

https://www.zdnet.com/article/a-whopping-94-of-leaked-passwords-are-not-unique-will-you-people-ever-learn/

https://www.helpnetsecurity.com/2025/05/07/corporate-directors-personal-information-online/

https://www.msspalert.com/news/the-smb-cybersecurity-gap-high-awareness-low-readiness

https://www.helpnetsecurity.com/2025/05/06/social-engineering-human-behavior/

https://www.infosecurity-magazine.com/news/darcula-phishing-as-a-service/

https://www.thisismoney.co.uk/money/markets/article-14674809/Cyber-criminals-hold-Britains-boardrooms-ransom.html

https://www.computerweekly.com/news/366623547/UK-at-risk-of-Russian-cyber-and-physical-attacks-as-Ukraine-seeks-peace-deal



Threats

Ransomware, Extortion and Destructive Attacks

Cyber attacks are costing UK firms billions every year – ransom payments, staff overtime, and lost business are crippling victims | IT Pro

UK businesses lost £64bn to cyber-attacks over a three-year period - UKTN

Ransomware attacks on food and agriculture industry have doubled in 2025 | The Record from Recorded Future News

Ransomware at Record Highs: Cyber Attacks Surge in 2025—and HR Emails Are the New Bait - ClearanceJobs

Don't pay hackers: Cyber Security chief's warning after major retail attacks | ITV News

Cyber Attacks on Critical Infrastructures Makes Us Very Vulnerable - Security Boulevard

Why Ransomware Isn’t Just a Technology Problem (It’s Worse) - Security Boulevard

Ransomware spike exposes cracks in cloud security - Help Net Security

Have Cyber Insurance? The Preferred Victims Of Ransomware Attackers - Above the Law

New "Bring Your Own Installer" EDR bypass used in ransomware attack

Play ransomware exploited Windows logging flaw in zero-day attacks

Govt to inject £16m into retail cyber security

LockBit ransomware gang hacked, victim negotiations exposed

Qilin Has Emerged as The Top Ransomware Group in April with 74 Cyber Attacks

Nearly three-quarters of businesses were hit by ransomware in 2024: why the worst could still be coming | TechRadar

Ransomware Attackers Leveraged Privilege Escalation Zero-day | Symantec Enterprise Blogs

Coalition 2025 Cyber Claims Report Finds Ransomware Stabilized but Remains Costly for Businesses

Ukrainian Nefilim Ransomware Affiliate Extradited to US - SecurityWeek

US Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

Kickidler employee monitoring software abused in ransomware attacks

470 Ransomware Attacking in 2025, Qilin Remains Dominant Followed by Silent & Crypto24

Ransomware Victims

Despite Arrests, Scattered Spider Continues Hacking

M&S 'had no plan' for cyber attacks, insider reveals, with staff left sleeping in the office amid 'paranoia' and 'chaos' | UK News | Sky News

Britain to warn companies cyber security must be 'absolute priority' - The Economic Times

Cyber criminals hold Britain's boardrooms to ransom | This is Money

M&S hackers tricked IT help desk workers to access company systems, says report | The Independent

Inside DragonForce, the Group Tied to M&S, Co-op and Harrods Hacks - Infosecurity Magazine

Co-op cyber attack: supermarket cuts off store deliveries amid food shortage fears

UK retailers under attack: why hackers hit household names

The M&S cyber attack has created chaos – Britain’s enemies will be watching and learning | The Independent

Co-op admits cyber attack hackers stole 'significant number' of shoppers' data | News UK | Metro News

Why Are So Many UK Supermarkets Getting Hacked? | HuffPost UK Life

IT warning after hackers close 160-year-old firm in Kettering - BBC News

Ransomware attacks on food and agriculture industry have doubled in 2025 | The Record from Recorded Future News

Banking Customer Data Exposed Following Ransomware Attack on Vendor | MSSP Alert

Co-op left with empty shelves as it battles cyber attack

Marks & Spencer losses hit £1bn in wake of devastating cyber attacks | This is Money

Rhysida Ransomware gang claims the hack of the Government of Peru

West Lothian schools hit by ransomware cyber attack - BBC News

Lessons Learned from the Blackbaud Hack and Legal Fallout

German drinks group Oettinger confirms cyber attack - Just Drinks

After Hacking 60M Kids for Ransom, PowerSchool Attackers Extort Teachers

TDSB says it got ransom demand over stolen student data not destroyed in cyber security incident

Masimo Manufacturing Facilities Hit by Cyber Attack - SecurityWeek

Phishing & Email Based Attacks

Gen AI is great at phishing, pig butchering scams • The Register

Ransomware at Record Highs: Cyber Attacks Surge in 2025—and HR Emails Are the New Bait - ClearanceJobs

'Venom Spider' Targets Hiring Managers in Phishing Scheme

Beyond the hook: How phishing is evolving in the world of AI | Computer Weekly

94% of Fortune 50 Companies Have Employee Identity Data Exposed by Phishing Attacks | Security Magazine

Darcula Phishing as a Service Operation Snares 800,000+ Victims - Infosecurity Magazine

Microsoft enforces strict rules for bulk emails on Outlook - gHacks Tech News

Ransomware costs ease but email-based attacks dominate, Coalition reports - Reinsurance News

'CoGUI' Phishing Kit Helps Chinese Hackers Target Japan

Sophisticated Phishing Attack Abuses Discord & Attacked 30,000 Users

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Majority of cyber insurance ransomware claims are due to BEC

Email-Based Attacks Top Cyber Insurance Claims

Other Social Engineering

How cyber criminals exploit psychological triggers in social engineering attacks - Help Net Security

Hackers pose as IT staff in UK retail cyber strikes | SC Media

Marks & Spencer losses hit £1bn in wake of devastating cyber attacks | This is Money

Cyber attack on M&S should be 'wake-up call', minister warns | Politics News | Sky News

Personal data of top executives easily found online - Help Net Security

Darcula PhaaS steals 884,000 credit cards via phishing texts

North Korean hackers show telltale signs, researchers say | SC Media

The many variants of the ClickFix social engineering tactic - Help Net Security

Wave of tech layoffs leads to more job scams - Help Net Security

How to spot and expose fraudulent North Korean IT workers | TechTarget

Crypto scammers abuse X ads with spoofed links | Cybernews

Fraud, Scams and Financial Crime

Gen AI is great at phishing, pig butchering scams • The Register

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable - Help Net Security

Robert Hervajec Reveals How He Got Scammed By His Own Sales Manager: 'Look Out For Yourself In Business' | IBTimes UK

Darcula PhaaS steals 884,000 credit cards via phishing texts

Wave of tech layoffs leads to more job scams - Help Net Security

Artificial Intelligence

Gen AI is great at phishing, pig butchering scams • The Register

UK Warns of AI-Based Attacks Against Critical Infrastructure

UK critical systems at risk from ‘digital divide’ created by AI threats | Computer Weekly

1 in 3 workers keep AI use a secret - Help Net Security

Beyond the hook: How phishing is evolving in the world of AI | Computer Weekly

Cisco sounds the alarm over AI security threats

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development - Security Boulevard

Global cyber security readiness remains critically low - Help Net Security

AI vs. AI: Both Friend and Foe in Cyber Security - EE Times

Most CEOs find their C-suite lacks much-needed 'AI-savvy' | ZDNET

2FA/MFA

Nation-State Actors Continue to Exploit Weak Passwords, MFA

Malware

Hackers Using Weaponized PDF To Deliver Remcos RAT Malware on Windows

StealC malware enhanced with stealth upgrades and data theft tools

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks

Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times

Linux wiper malware hidden in malicious Go modules on GitHub

Activated Magento Backdoor Hits Up to 1,000 Online Stores

Google identifies new malware linked to Russia-based hacking group | Reuters

Macs under threat from thousands of hacked sites spreading malware — how to stay safe | Tom's Guide

The many variants of the ClickFix social engineering tactic - Help Net Security

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

Supply chain attack hits npm package with 45,000 weekly downloads

Crypto scammers abuse X ads with spoofed links | Cybernews

Your USB Cable Or Device Could Be Hiding Malicious Hardware: Here's How To Stay Safe

Disney Slack hacker was Californian, not Russian: DoJ • The Register

Bots/Botnets

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet - SecurityWeek

Mobile

Apple issues mercenary spyware threat notifications | Security Magazine

Why Android users should care more about monthly security updates

Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google fixes actively exploited FreeType flaw on Android

Google Confirms Android Attack Warnings — Powered By AI

Denial of Service/DoS/DDoS

Europol Take Down DDoS-for-Hire Empire & Arrested 4 Admins

Europol Announces More DDoS Service Takedowns, Arrests - SecurityWeek

Internet of Things – IoT

Don’t plug phones into Chinese electric cars, defence firms say

Hackers Manage To Take Control of Nissan Leaf's Steering Remotely

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Please stop exposing your IoT devices on the internet; your smart light might betray you

Data Breaches/Leaks

Over 19 billion passwords have been leaked in security ‘crisis’ – here’s how to check if yours is vulnerable | The Independent

Dating app Raw exposed users' location data and personal information | TechCrunch

Signal clone used by Trump official stops operations after report it was hacked - Ars Technica

The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats | WIRED

UK Legal Aid Agency investigates cyber security incident

VC firm Insight Partners confirms personal data stolen during January hack | TechCrunch

Education giant Pearson hit by cyber attack exposing customer data

Hegseth bypassed Pentagon security with dirty line

Over 400,000 hit in massive employee benefits data breach — Social Security numbers and more exposed | Tom's Guide

Texas School District Notifies Over 47,000 People of Major Data Breach - Infosecurity Magazine

Organised Crime & Criminal Actors

Despite Arrests, Scattered Spider Continues Hacking

War on cyber crime: why disrupting attacker infrastructure is critical for security

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

Crypto scammers abuse X ads with spoofed links​ | Cybernews

Insider Risk and Insider Threats

How cyber criminals exploit psychological triggers in social engineering attacks - Help Net Security

North Korean hackers show telltale signs, researchers say | SC Media

How to spot and expose fraudulent North Korean IT workers | TechTarget

The Most Pressing Security Threat to Business is Hidden in Plain Sight - Security Boulevard

Insurance

Email-Based Attacks Top Cyber Insurance Claims

UK Cyber Insurance Claims Second Highest on Record - Infosecurity Magazine

Have Cyber Insurance? The Preferred Victims Of Ransomware Attackers - Above the Law

A guide to cyber liability insurance for a small business

ABA & Cyber Insurance: Essential IT Requirements for Small Law Firms - LexBlog

Supply Chain and Third Parties

Magento supply chain attack compromises hundreds of e-stores

EY Survey Reveals Rising Cyber Threats from Third-Party Supply Chain Risks

Banking Customer Data Exposed Following Ransomware Attack on Vendor | MSSP Alert

Supply chain attack hits npm package with 45,000 weekly downloads

Activated Magento Backdoor Hits Up to 1,000 Online Stores

Cloud/SaaS

Ransomware spike exposes cracks in cloud security - Help Net Security

New Microsoft 365 outage impacts Teams and other services

Outages

New Microsoft 365 outage impacts Teams and other services

Encryption

After Signal controversy, do private conversations online exist anymore? | CyberScoop

WhatsApp provides no cryptographic management for group messages - Ars Technica

Just 5% of Enterprises Have Deployed Quantum-Safe Encryption - Infosecurity Magazine

Linux and Open Source

Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US | WIRED

Linux wiper malware hidden in malicious Go modules on GitHub

DoD announces overhaul of 'outdated' software procurement • The Register

Passwords, Credential Stuffing & Brute Force Attacks

A whopping 94% of leaked passwords are not unique - will you people ever learn? | ZDNET

Over 19 billion passwords have been leaked in security ‘crisis’ – here’s how to check if yours is vulnerable | The Independent

A review of 19 billion passwords reveals people are still bad at them | Mashable

Third of Online Users Hit by Account Hacks Due to Weak Passwords - Infosecurity Magazine

Nation-State Actors Continue to Exploit Weak Passwords, MFA

Microsoft sets all new accounts passwordless by default

If we don’t take cyber security seriously, maybe AI will | Cybernews

Your password manager is under attack, and this new threat makes it worse: How to defend yourself | ZDNET

Social Media

Crypto scammers abuse X ads with spoofed links | Cybernews

Ireland's DPC fined TikTok €530M for sending EU user data to China

Trump promises protection for TikTok as sale deadline nears • The Register

TikTok Fined €530 Million Over Chinese Access to EU Data

Regulations, Fines and Legislation

UK firms have ‘alarming gaps’ in cyber security readiness | The Standard

UK given cyber wake-up call as government looks to act

UK Government to unveil new cyber security measures after wave of attacks | The Standard

What NY's New Security Rules Mean for Finance Firms

What a future without CVEs means for cyber defence - Help Net Security

Ireland's DPC fined TikTok €530M for sending EU user data to China

The nation’s cyber community is quietly rebelling against Trump’s changes - POLITICO

Cut CISA & Everyone Pays for It

Offensive cyber security to be emphasized by Trump admin, official says | SC Media

TikTok Fined €530 Million Over Chinese Access to EU Data

Signal app clone used by Trump's administration was hacked in less than 30 mins - SiliconANGLE

White House Proposal Slashes Half-Billion From CISA Budget - SecurityWeek

Sen. Murphy: Trump administration has ‘illegally gutted funding for cyber security’ | CyberScoop

The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats | WIRED

The Trump Administration Sure Is Having Trouble Keeping Its Comms Private | WIRED

Models, Frameworks and Standards

Strengthening Software Security Under the EU Cyber Resilience Act: A High-Level Guide for Security Leaders and CISOs - Security Boulevard

UK Cyber Essentials Certification Numbers Falling Short - Infosecurity Magazine

Data Protection

Ireland's DPC fined TikTok €530M for sending EU user data to China

Careers, Working in Cyber and Information Security

The 14 most valuable cyber security certifications | CSO Online

Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring | Computer Weekly

Law Enforcement Action and Take Downs

Despite Arrests, Scattered Spider Continues Hacking

War on cyber crime: why disrupting attacker infrastructure is critical for security

Israel Nabs Suspect Sought by US Over $190M Nomad Bridge Exploit: Report - Decrypt

Polish authorities arrested 4 people behind DDoS-for-hire platforms

Europol Take Down DDoS-for-Hire Empire & Arrested 4 Admins

Three Brits charged over US, Canada swattings • The Register

Ukrainian Nefilim Ransomware Affiliate Extradited to US - SecurityWeek

US Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

Disney Slack hacker was Californian, not Russian: DoJ • The Register


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Cyber threats: Government defences have been outpaced by hostile states and criminals - Committees - UK Parliament

Cyber Warfare's Limitations: Lessons for Future Conflicts

41 Countries Taking Part in NATO's Locked Shields 2025 Cyber Defence Exercise - SecurityWeek

Cyber Warfare Funding Accelerates and Everyone is at Risk - Security Boulevard

Nuclear warheads and cyber attacks: How UK must react to Russia threat

Could striking first in cyber be new Pentagon policy? - Defense One

Countries Begin NATO's Locked Shields Cyber-Defence Exercise

Nation State Actors

Cyber threats: Government defences have been outpaced by hostile states and criminals - Committees - UK Parliament

Nation-State Actors Continue to Exploit Weak Passwords, MFA

Hostile nation states are ramping up cyber attacks on UK, warns GCHQ | This is Money

China

Don’t plug phones into Chinese electric cars, defence firms say

White House Warns China of Cyber Retaliation Over Infrastructure Hacks - Infosecurity Magazine

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

'CoGUI' Phishing Kit Helps Chinese Hackers Target Japan

China is now America's biggest cyber threat, more dangerous than Russia and North Korea | Cryptopolitan

Ireland's DPC fined TikTok €530M for sending EU user data to China

TikTok Fined €530 Million Over Chinese Access to EU Data

Trump promises protection for TikTok as sale deadline nears • The Register

Russia

UK at risk of Russian cyber and physical attacks as Ukraine seeks peace deal

Nuclear warheads and cyber attacks: How UK must react to Russia threat

Romania reportedly holds hard evidence of Russian interference in 2024 presidential elections | Romania Insider

Google identifies new malware linked to Russia-based hacking group | Reuters

Poland says Russia is trying to interfere in presidential election | Reuters

Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US | WIRED

Pro-Russian hackers claim to have targeted several UK websites | Cybercrime | The Guardian

Convicted Russian spies attended Brexit event in Parliament - BBC News

The number of attacks on the security sector increased by 82% in the second half of last year - State Special Communications Service | УНН

North Korea

North Korean hackers show telltale signs, researchers say | SC Media

How to spot and expose fraudulent North Korean IT workers | TechTarget


Tools and Controls

Email-Based Attacks Top Cyber Insurance Claims

UK retail cyber-attacks underscore the case for resilience over reactivity

Building a resilient mindset | The Independent

Cyber resilience is the strategy: Why business and security must align now | SC Media

Security Tools Alone Don't Protect You — Control Effectiveness Does

Microsoft has no plans to fix Windows RDP bug that lets you log in with old passwords | Tom's Hardware

Personal data of top executives easily found online - Help Net Security

Are You Too Reliant on Third-Party Vendors for Cyber Security?  - Security Boulevard

Strengthening Software Security Under the EU Cyber Resilience Act: A High-Level Guide for Security Leaders and CISOs - Security Boulevard

41 Countries Taking Part in NATO's Locked Shields 2025 Cyber Defence Exercise - SecurityWeek

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development - Security Boulevard

Hacker Finds New Technique to Bypass SentinelOne EDR Solution - Infosecurity Magazine

How CISOs can talk cyber security so it makes sense to executives - Help Net Security

CIOs pay too much for not enough IT security | CIO Dive

CISO vs CFO: why are the conversations difficult? | CSO Online

What it really takes to build a resilient cyber program - Help Net Security

A guide to cyber liability insurance for a small business

How OSINT supports financial crime investigations - Help Net Security

Microsoft enforces strict rules for bulk emails on Outlook - gHacks Tech News

81% of High-Uncertainty Middle-Market Firms Delay Tech Initiatives

How to use PC sandbox apps to test dubious files safely | PCWorld

Your password manager is under attack, and this new threat makes it worse: How to defend yourself | ZDNET

Cisco's annual index sees little progress in cyber security readiness as threats rise - Mobile Europe

Countries Begin NATO's Locked Shields Cyber-Defence Exercise

ABA & Cyber Insurance: Essential IT Requirements for Small Law Firms - LexBlog




Vulnerability Management

Why Android users should care more about monthly security updates

What a future without CVEs means for cyber defence - Help Net Security

Cut CISA & Everyone Pays for It

White House Proposal Slashes Half-Billion From CISA Budget - SecurityWeek

Life Without CVEs? It's Time to Act

Vulnerabilities

Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

PoC Published for Exploited SonicWall Vulnerabilities - SecurityWeek

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

Microsoft has no plans to fix Windows RDP bug that lets you log in with old passwords | Tom's Hardware

Hackers Selling SS7 0-Day Vulnerability on Hacker Forums for $5000

Second Wave of Attacks Targets SAP NetWeaver | MSSP Alert

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

Cisco Patches 35 Vulnerabilities Across Several Products - SecurityWeek

Yet another SonicWall SMA100 vulnerability exploited in the wild (CVE-2025-32819) - Help Net Security

FBI: End-of-life routers hacked for cyber crime proxy networks

Researcher Says Fixed Commvault Bug Still Exploitable

SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet - SecurityWeek

Apache Parquet exploit tool detect servers vulnerable to critical flaw

Microsoft Warns of Attackers Exploiting Misconfigured Apache Pinot Installations - SecurityWeek

'Easily Exploitable' Langflow Flaw Requires Patching


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 02 May 2025

Black Arrow Cyber Threat Intelligence Briefing 02 May 2025:

-M&S ‘Had No Plan’ for Cyber Attacks, with Staff Sleeping in the Office Amid ‘Paranoia’ and ‘Chaos’

-More than 60% of Organisations Are Insufficiently Prepared to Address Urgent Geopolitical, Cyber Security, and Regulatory Risks

-Fake Payments, Receipts and Invoices on the Rise

-Account Takeovers: A Growing Threat to Your Business and Customers

-North Korean Operatives Have Infiltrated Hundreds of Fortune 500 Companies

-Phone Theft Is Turning into a Serious Cyber Security Risk

-Why Cyber Resilience Must be Part of Every Organisation’s DNA

-Compliance Management In 2025: Ensuring Your Security Strategy Meets Regulatory Demands

-Ransomware Attacks are Getting Smarter, Harder to Stop

-People Know Password Reuse Is Risky but Keep Doing It Anyway

-A Cyber Security Paradox: Even Resilient Organisations Are Blind to AI Threats

-Securing the Invisible: Supply Chain Security Trends

-Don’t Overlook the BISO Role When it Comes to Growth and Continuity

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Cyber Resilience stamp image

Exec Summary

Our review this week starts with the high-profile breach at UK retailer Marks & Spencer, which has severely impacted operations and employees for over a week, with reports that the organisation had not tested their cyber incident plan. Similar issues are evident across other sectors, with over 60% of firms globally reporting poor readiness for cyber, geopolitical, and AI-related threats.

Cyber resilience is a recurring theme in this week’s threat intelligence review. At Black Arrow Cyber, we recommend organisations test their response plan, such as through our simulation exercises where impartial experts help the leadership team to uncover and address misconceptions regarding IT provision or operational resilience. Such exercises are required by many cyber frameworks and regulations, including the UK’s Cyber Governance Code of Practice.

We also report on attack types including ransomware, account takeover, and AI-fuelled scams that produce fake receipts indistinguishable from the real thing. These developments strain traditional defences and expose critical gaps in resilience. The growing concern around insider risk, particularly the infiltration of major firms by North Korean operatives, reminds business leaders that threats are not always external.

Encouragingly, board-level awareness is growing, with more organisations recognising that cyber resilience must be embedded into company culture and governance. Black Arrow believes the growing prominence of roles like the Business Information Security Officer (BISO), which many of our services emulate, signals a necessary shift toward strategic, business-aligned security leadership and greater resilience against cyber incidents.


Top Cyber Stories of the Last Week

M&S ‘Had No Plan’ for Cyber Attacks, with Staff Sleeping in the Office Amid ‘Paranoia’ and ‘Chaos’

UK retailer Marks & Spencer continues to grapple with a severe cyber attack that has disrupted online orders and recruitment for over a week, with insiders warning full recovery may take months. Reports indicate the retailer lacked a cyber attack or business continuity plan, leaving staff to respond reactively, with some staff describing sleeping in offices and using personal devices amid confusion and shifting internal guidance. The situation has led to significant operational disruption and employee concern over whether hackers remain inside the system. Harrods and the Co-op Group have also been targeted in recent days, highlighting a broader wave of attacks. The Cabinet Office has warned that such incidents should serve as a wake-up call for all UK businesses to prioritise cyber security.

More than 60% of Organisations Are Insufficiently Prepared to Address Urgent Geopolitical, Cyber Security, and Regulatory Risks

AlixPartners’ 2025 Global Risk Survey reveals that over 60% of organisations feel underprepared to manage rising geopolitical, cyber security, and regulatory risks. Nearly three quarters are not ready for international regulatory changes, while 68% are unprepared for AI-related threats despite widespread adoption. Although 63% are investing in technology to combat financial crime, only 44% find it highly effective. Most also lack readiness for cyber security incidents and data privacy breaches. With nearly 70% anticipating increased corporate litigation, many are boosting legal budgets, highlighting a growing need for strategic risk management amid ongoing global volatility.

Fake Payments, Receipts and Invoices on the Rise

The rise of generative AI and poorly implemented automation is fuelling a surge in fake payments, receipts and invoices, putting businesses, particularly SMEs, at greater risk of financial loss. A third of firms were hit by invoice fraud in 2024, often due to weak controls around payment matching. New scams range from fake banking apps, to AI-generated receipts indistinguishable from genuine ones. While government initiatives like the Cyber Governance Code of Practice and the forthcoming Cyber Security and Resilience Bill offer promise, there remains a gap between awareness and action, especially among smaller organisations.

Account Takeovers: A Growing Threat to Your Business and Customers

Account takeovers are rapidly emerging as one of the most costly and damaging cyber threats facing businesses today, with annual losses exceeding $5 billion in the US alone. These attacks occur when criminals gain unauthorised access to legitimate user accounts, often through tactics like credential stuffing, phishing, and SIM swapping. Once inside, attackers can steal funds and personal data, or lock out genuine users. Despite their growing sophistication, many organisations remain underprepared. The financial and reputational fallout can be severe, but proactive steps such as multi-factor authentication, behavioural analytics, and continuous monitoring can significantly reduce the risk.

North Korean Operatives Have Infiltrated Hundreds of Fortune 500 Companies

Security experts from Mandiant and Google Cloud have warned that hundreds of Fortune 500 firms have unknowingly hired North Korean IT workers, with most CISOs admitting to at least one such hire. These operatives, embedded as full-time staff, are earning six-figure salaries, generating an estimated $100 million annually for North Korea’s regime. While initially a financial operation, this threat has evolved, with some dismissed workers resorting to extortion. There is growing concern that these individuals could disrupt services or leak sensitive data, particularly as some have been linked to North Korea’s intelligence services and previous destructive cyber operations.

Phone Theft Is Turning into a Serious Cyber Security Risk

Phone theft is evolving into a significant cyber security risk, with the UK’s Metropolitan Police seizing 1,000 devices a week and Europol uncovering a network affecting over 480,000 victims worldwide. Many organisations still underestimate the risk posed by mobile devices, with only 63% able to track both BYOD and corporate phones. Poor controls and misplaced trust in default security features leave gaps that attackers can exploit to access corporate systems. Without clear response plans or robust mobile device management, stolen smartphones, often more data-rich than laptops, can become a gateway to wider breaches, especially when used for multi-factor authentication.

Why Cyber Resilience Must be Part of Every Organisation’s DNA

LevelBlue’s 2025 Futures Report highlights that while AI adoption is accelerating, only 29% of executives feel prepared for AI-powered threats, despite 42% expecting them. Deepfake attacks are anticipated by 44%, yet just 32% say they’re ready. Nearly half admit they must improve defences against AI-driven adversaries, and 41% are already seeing a significant rise in attacks. Encouragingly, 45% now view cyber resilience as a company-wide priority, up from 27% last year, with 68% noting increased C-suite focus due to media coverage of major breaches. The report urges leaders to embed resilience at board level, invest early, and foster a cyber-aware culture.

Compliance Management In 2025: Ensuring Your Security Strategy Meets Regulatory Demands

Compliance management in 2025 has become more complex and critical, with organisations facing heightened regulatory scrutiny and rising cyber threats. New laws across data privacy, ESG, and third-party risk demand proactive, data-driven compliance. Real-time monitoring and integration of AI and automation are increasingly used to detect risks and improve reporting accuracy. The cost of non-compliance is growing, making alignment between cyber security and regulatory strategy essential. Frameworks and certifications like NIST and ISO 27001, along with RegTech solutions, are now key to building resilient, scalable systems. Organisations must prioritise cross-functional collaboration and continuous improvement to remain secure and compliant.

Ransomware Attacks are Getting Smarter, Harder to Stop

Ransomware remains a critical threat, with 69% of organisations hit in the past year despite growing collaboration between IT and security teams. Yet only 10% of victims recovered over 90% of their data, while more than half recovered less than 50%. The shift toward data exfiltration and double extortion is accelerating, with attackers striking within hours. While ransom payments are declining and 36% of victims refused to pay, recovery gaps persist. Firms investing in data resilience recover up to seven times faster, but only 44% verify backups regularly. These findings underscore the need for proactive, well-practised cyber resilience strategies across the business.

People Know Password Reuse Is Risky but Keep Doing It Anyway

Bitwarden’s research reveals a concerning disconnect between awareness and behaviour when it comes to password security. While 79% of Gen Z acknowledge the risks of password reuse, 59% still recycle passwords after a breach. Over half of respondents have abandoned accounts to avoid password resets, and only 10% always update compromised credentials. Despite this, younger generations are more inclined to enable multi-factor authentication (MFA). Insecure sharing practices persist, with 25% of Gen Z using text messages to share passwords. The report highlights a clear need for targeted education across all age groups, especially among decision-makers.

A Cyber Security Paradox: Even Resilient Organisations Are Blind to AI Threats

LevelBlue’s latest report reveals a growing gap in AI risk awareness among otherwise cyber-resilient organisations. While 94% of these firms invest in software supply chain security, compared to just 62% overall, they remain largely blind to the risks introduced by rapid AI adoption. Only 30% of executives acknowledged increased AI-related supply chain threats. Many resilient organisations may be overlooking how underregulated AI tools expand their attack surface. The report stresses that cyber resilience now demands shared leadership responsibility, proactive risk management, and readiness for both incident response and business continuity.

Securing the Invisible: Supply Chain Security Trends

Supply chain attacks are evolving, with adversaries exploiting trusted software, hardware, and vendor relationships to bypass traditional defences. Continuous monitoring of third-party risk is replacing one-off assessments, as CISOs extend visibility across the extended enterprise. Real-time data, blockchain traceability, and AI-driven threat detection are now essential tools. Software Bills of Materials (SBOMs) have become operational necessities, helping firms assess exposure during emerging threats. Regulatory pressure is growing, with the EU’s DORA and NIS2 setting new expectations. Yet, only a third of supply chain leaders use GenAI tools designed for their domain despite 97% already using the technology in some form.

Don’t Overlook the BISO Role When it Comes to Growth and Continuity

The role of the Business Information Security Officer (BISO) is gaining traction as organisations recognise cyber risk as a critical business risk. BISOs act as a bridge between security teams and the C-suite, helping drive investment in proactive, cost-effective cyber strategies. With ransomware and extortion attacks on the rise, and the average cost of an incident now around $677 million, BISOs help quantify risk, improve resilience, and align security with broader business goals. Though adoption is still growing, more firms are realising the BISO’s value in fostering innovation, operational continuity, and modern cyber hygiene across the enterprise. Many of the services provided by Black Arrow fulfil the function of an internal BISO; talk to us to see how we can help you achieve your objectives in a cost effective and impartial manner.

Sources:

https://news.sky.com/story/mands-had-no-plan-for-cyber-attacks-insider-reveals-with-staff-left-sleeping-in-the-office-amid-paranoia-and-chaos-13361359

https://www.prnewswire.com/news-releases/more-than-60-of-organizations-are-insufficiently-prepared-to-address-urgent-geopolitical-cybersecurity-and-regulatory-risks-according-to-a-new-survey-of-1-000-executives-302441975.html

https://www.icaew.com/insights/viewpoints-on-the-news/2025/apr-2025/cyber-security-fake-payments-receipts-and-invoices-on-the-rise

https://securityboulevard.com/2025/05/account-takeovers-a-growing-threat-to-your-business-and-customers/

https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/

https://www.helpnetsecurity.com/2025/05/02/phone-theft-cybersecurity-threat/

https://www.helpnetsecurity.com/2025/04/30/rethink-cyber-resilience/

https://cybersecuritynews.com/compliance-management-in-2025/

https://www.helpnetsecurity.com/2025/04/28/companies-impacted-ransomware-attacks/

https://www.helpnetsecurity.com/2025/05/02/passwords-update-security-risks/

https://www.darkreading.com/cyber-risk/even-resilient-organizations-bind-ai-threats

https://www.helpnetsecurity.com/2025/04/30/supply-chain-security-trends/

https://www.techradar.com/pro/dont-overlook-the-biso-role-when-it-comes-to-growth-and-continuity



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware attacks are getting smarter, harder to stop - Help Net Security

Ransomware Group Hacks Webcam to Evade Endpoint Defences

The 5 Emerging Cyber Attack Techniques Poised to Disrupt

The organisational structure of ransomware threat actor groups is evolving before our eyes - Security Boulevard

6 major supply chain cyber security risks in 2025| Cybernews

DragonForce expands ransomware model with white-label branding scheme

Law Enforcement Crackdowns Drive Novel Ransomware Affiliate Schemes - Infosecurity Magazine

Prolific RansomHub Operation Goes Dark

Emerging Threat Actor Hellcat Exemplifies Continued Innovation in Ransomware TPPs | MSSP Alert

The 5,365 Ransomware Attack Rampage — What You Need To Know

Ransomware Attacks on Critical Infrastructure Surge, Reports FBI | Tripwire

Ransomware Victims

Marks & Spencer breach linked to Scattered Spider ransomware attack

M&S market value falls £700m amid cyber attack

Some M&S stores left with empty shelves after cyber attack - BBC News

M&S report warned of cyber threats year before hack

How ‘native English’ Scattered Spider group linked to M&S attack operate | Cybercrime | The Guardian

Co-op hit by cyber attack as back-office systems disrupted

'After M&S cyber attack, these are the security questions retailers must ask themselves' | Retail Week

M&S stops hiring after systems taken offline due to cyber attack

Top security body urges retailers to act following Marks & Spencer cyber attack | Retail Week

M&S: WFH staff locked out of systems amid cyber attack fallout - Retail Gazette

Harrods is latest retailer to be hit by cyber-attack | Harrods | The Guardian

Co-op cyber attack: Staff told to keep cameras on in meetings - BBC News

M&S cyber attack: Retailer working 'day and night' to manage impact - BBC News

M&S and Co-op: UK retailers brace for cyber attacks

Retail cyber attacks sound alarm for food manufacturing supply chains

Warning hackers may ‘try their luck’ with other retailers as M&S issues update | The Independent

Almost a million patients hit by Frederick Health data breach | TechRadar

Phishing & Email Based Attacks

Low-tech phishing attacks are gaining ground - Help Net Security

Same Inbox, New Tricks: A Look At The Email Threat Landscape In Q1 2025

This Email Sounds Like It Came From Your Boss. But It Didn’t. | Symantec Enterprise Blogs

Phishers Take Advantage of Iberian Power Outage

Why MFA is getting easer to bypass and what to do about it - Ars Technica

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks | TechRadar

A large-scale phishing campaign targets WordPress WooCommerce users

Large-Scale Phishing Campaigns Target Russia and Ukraine - Infosecurity Magazine

Other Social Engineering

North Koreans Still Working Hard to Take Your IT Job: 'Any Organisation Is a Target' | PCMag

There's one question that stumps North Korean fake workers • The Register

Mobile security is a frontline risk. Are you ready? - Help Net Security

North Korean operatives have infiltrated hundreds of Fortune 500 companies | CyberScoop

Fraud, Scams and Financial Crime

Cyber security: fake payments, receipts and invoices on the rise | ICAEW

Government Set to Ban SIM Farms in European First - Infosecurity Magazine

WhatsApp, Signal scam leads to Microsoft account hacks [April 2025] | Mashable

PayPal Red Alert Issued After 600% Increase In Scams Recorded in 2025: What You Need To Know

Online fraud peaks as breaches rise - Help Net Security

Mystery Box Scams Deployed to Steal Credit Card Data - Infosecurity Magazine

Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers

Third-party applications for online banking give fraudsters access to your money - Cyberpolice | УНН

Artificial Intelligence

The 5 Emerging Cyber Attack Techniques Poised to Disrupt

Enterprises Need to Beware of These 5 Threats

AI and automation shift the cyber security balance toward attackers - Help Net Security

Even Cyber Resilient Organisations Struggle to Comprehend AI Risks

AI, Automation & Dark Web Fuel Evolving Threat Landscape

The Next Two Years In AI Cyber Security For Business Leaders

4 lessons in the new era of AI-enabled cyber crime | TechTarget

Agentic AI Systems Pose Alarming API Security Risks

Ex-NSA cyber boss: AI will soon be a great exploit dev • The Register

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

Forthcoming NIST profile to address growing AI-cyber challenges - Nextgov/FCW

South Korea says DeepSeek transferred user data, prompts without consent | Reuters

Microsoft’s AI Starts Secretly Copying And Saving Your Messages

60% of AI agents are embedded in IT departments - here's what they're doing | ZDNET

End users can code with AI, but IT must be wary | TechTarget

Drones may strike targets with no human input, says minister

2FA/MFA

Why MFA is getting easer to bypass and what to do about it - Ars Technica

Malware

CEO of cyber security firm charged with installing malware on hospital systems

Infosec pro blabs about alleged malware mishap on LinkedIn • The Register

New WordPress Malware Masquerades as Plugin - Infosecurity Magazine

Novel Gremlin Stealer malware emerges | SC Media

WordPress plugin disguised as a security tool injects backdoor

Malware Steals 1.7 Billion Passwords — Publishes Them To Dark Web

Hackers abuse IPv6 networking feature to hijack software updates

DarkWatchman cyber crime malware returns on Russian networks | The Record from Recorded Future News

Hive0117 group targets Russian firms with new variant of DarkWatchman malware

Mobile

Mobile security is a frontline risk. Are you ready? - Help Net Security

Phone theft is turning into a serious cyber security risk - Help Net Security

Mobile Applications: A Cesspool of Security Issues

Government Set to Ban SIM Farms in European First - Infosecurity Magazine

Half of Mobile Devices Run Outdated Operating Systems - Infosecurity Magazine

iOS and Android juice jacking defences have been trivial to bypass for years - Ars Technica

Google’s Play Store lost nearly half its apps | The Verge

Denial of Service/DoS/DDoS

DDoS attacks jump 358% compared to last year - Help Net Security

DDoS attacks in 2025 have already surpassed the 2024 total | TechRadar

Pro-Russian hackers strike Dutch municipalities with coordinated DDoS attack | NL Times

Internet of Things – IoT

‘Source of data’: are electric cars vulnerable to cyber spies and hackers? | Electric, hybrid and low-emission cars | The Guardian

Vehicles Face 45% More Attacks, 4 Times More Hackers

UK unveils ‘smart ready’ heat pump regulations, new utility flexibility rules – pv magazine International

Data Breaches/Leaks

SAS names and ranks reportedly available online for a decade - BBC News

Malware Steals 1.7 Billion Passwords — Publishes Them To Dark Web

Signalgate: Security culture? America's screwed • The Register

27 million French electronics giant’s customer records leaked online | Cybernews

Commvault says recent breach didn't impact customer backup data

Ascension discloses second major cyber attack in a year • The Register

Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers

African multinational telco giant MTN disclosed a data breach

Banking details of thousands of Aussies stolen by cyber criminals

ANY.RUN warns free-tier users of data exposure | Cybernews

Almost a million patients hit by Frederick Health data breach | TechRadar

Employee monitoring app exposes 21M work screens | Cybernews

Nova Scotia Power cyber attack impacts customer billing accounts | Cybernews

Organised Crime & Criminal Actors

Cyber criminals switch up their top initial access vectors of choice | CSO Online

Europol Creates “Violence-as-a-Service” Taskforce - Infosecurity Magazine

Cyber defenders need to remember their adversaries are human, says Trellix research head | IT Pro

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Solana DeFi protocol Loopscale hit with $5.8 million exploit two weeks after launch | The Block

Insider Risk and Insider Threats

People know password reuse is risky but keep doing it anyway - Help Net Security

Infosec pro blabs about alleged malware mishap on LinkedIn • The Register

Ex-Disney employee gets three years in prison for menu hacks • The Register

North Koreans Still Working Hard to Take Your IT Job: 'Any Organisation Is a Target' | PCMag

North Korean operatives have infiltrated hundreds of Fortune 500 companies | CyberScoop

Insurance

Reducing Cyber Insurance Costs - CISO Proactive Measures

How Organisations Can Leverage Cyber Insurance Effectively

Supply Chain and Third Parties

6 major supply chain cyber security risks in 2025| Cybernews

Half of red flags in third-party deals never reach compliance teams - Help Net Security

Securing the invisible: Supply chain security trends - Help Net Security

Cloud/SaaS

Over 90% of Cyber Security Leaders Worldwide Encountered Cyber Attacks Targeting Cloud Environments

JPMorgan CISO Warns of SaaS Security Risks - Infosecurity Magazine

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Dropbox, OneDrive Abused In Massive Southeast Asia Cyber-Espionage Operation

Outages

Oracle engineers caused dayslong software outage at U.S. hospitals

Identity and Access Management

Identity and Access Management (IAM) - The CISO’s Core Focus in Modern Cyber Security

Encryption

Quantum computer threat spurring quiet overhaul of internet security | CyberScoop

Passwords, Credential Stuffing & Brute Force Attacks

People know password reuse is risky but keep doing it anyway - Help Net Security

Some of you still use these awful passwords today

Account Takeovers: A Growing Threat to Your Business and Customers - Security Boulevard

Law Enforcement Can Break 77% Of ‘Three Random Word’ Passwords

Malware Steals 1.7 Billion Passwords — Publishes Them To Dark Web

Microsoft Confirms Password Spraying Attack — What You Need To Know

46% of the most trusted US companies' employees reuse

CISOs should re-consider using Microsoft RDP due to password flaw, says expert | CSO Online

Cyber criminals have stolen almost 100 staff logins at Australia's Big Four banks, experts say | RNZ News

The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes | CSO Online

Regulations, Fines and Legislation

Government Set to Ban SIM Farms in European First - Infosecurity Magazine

Compliance Management In 2025: Ensuring Your Security Strategy Meets Regulatory Demands

CISOs Call for Streamlined Global Cyber Rules | MSSP Alert

The CISO’s Role In Ensuring Compliance Amid Evolving Cyber Threats

Tariffs could slow replacement of telecom networks, according to industry official | CyberScoop

UK and Canadian Regulators Demand Robust Data Protection Amid 23andMe - Infosecurity Magazine

Former CISA head slams Trump for 'dangerously degrading' US cyber defences | Cybernews

Signalgate: Security culture? America's screwed • The Register

What Trump’s tariff reversal (and escalation on China) means for the future of cyber security | Biometric Update

House passes bill to study routers’ national security risks | CyberScoop

FBI steps in amid rash of politically charged swattings • The Register

8 in 10 Brits support biometrics, personal data collection for national security | Biometric Update

The risks of standing down: Why halting US cyber ops against Russia erodes deterrence | CSO Online

CVE board 'kept in the dark' on funding, members say • The Register

UK unveils ‘smart ready’ heat pump regulations, new utility flexibility rules – pv magazine International

Models, Frameworks and Standards

Will UK Cyber Reforms Keep Step with NIS2? | DLA Piper - JDSupra

Forthcoming NIST profile to address growing AI-cyber challenges - Nextgov/FCW

MoD publishes Secure by Design problem book to bolster cyber resilience | UKAuthority

Backup and Recovery

Commvault says recent breach didn't impact customer backup data

Data Protection

UK and Canadian Regulators Demand Robust Data Protection Amid 23andMe - Infosecurity Magazine

Law Enforcement Action and Take Downs

Ex-Disney employee gets three years in prison for menu hacks • The Register

Europol Creates “Violence-as-a-Service” Taskforce - Infosecurity Magazine

Leaders of 764, global child sextortion group, arrested and charged | CyberScoop

Law Enforcement Can Break 77% Of ‘Three Random Word’ Passwords

Misinformation, Disinformation and Propaganda

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

China

China is America's No.1 cyber threat and the US must react • The Register

‘China has almost doubled their aggression in cyber’: Kevin Mandia and Nicole Perlroth warn organisations aren’t waking up to growing APT threats | IT Pro

House passes bill to study routers’ national security risks | CyberScoop

Chinese Hacking Competitions Fuel the Country’s Broad Cyber Ambitions - Bloomberg

China's Secret Weapon? How EV Batteries Could Be Weaponized to Disrupt America - SecurityWeek

Chinese APT's Adversary-in-the-Middle Tool Dissected - SecurityWeek

How Space Force Plans To Protect The US From Chinese & Russian Spy Satellites

Tariffs could slow replacement of telecom networks, according to industry official | CyberScoop

South Korea says DeepSeek transferred user data, prompts without consent | Reuters

Russia

Russia-linked group Nebulous Mantis targets NATO-related defence organisations

France ties Russian APT28 hackers to 12 cyber attacks on French orgs

Putin's Attacks on Ukraine Rise 70%, With Little Effect

Trump cuts US cyber aid to Ukraine, opening doors to Russian attacks | Cryptopolitan

How Space Force Plans To Protect The US From Chinese & Russian Spy Satellites

The risks of standing down: Why halting US cyber ops against Russia erodes deterrence | CSO Online

Pro-Russian hackers strike Dutch municipalities with coordinated DDoS attack | NL Times

Poland’s state registry temporarily blocked by cyber incident | The Record from Recorded Future News

Large-Scale Phishing Campaigns Target Russia and Ukraine - Infosecurity Magazine

DarkWatchman cyber crime malware returns on Russian networks | The Record from Recorded Future News

Hive0117 group targets Russian firms with new variant of DarkWatchman malware

Iran

Iran claims to have repelled 'one of the most extensive and complex' cyber attacks on infrastructure | The Times of Israel

North Korea

North Koreans Still Working Hard to Take Your IT Job: 'Any Organisation Is a Target' | PCMag

There's one question that stumps North Korean fake workers • The Register

North Korean operatives have infiltrated hundreds of Fortune 500 companies | CyberScoop

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Dropbox, OneDrive Abused In Massive Southeast Asia Cyber-Espionage Operation


Tools and Controls

No longer optional: Cyber risk oversight for boards | American Banker

Why cyber resilience must be part of every organisation's DNA - Help Net Security

Over 90% of Cyber Security Leaders Worldwide Encountered Cyber Attacks Targeting Cloud Environments

Identity and Access Management (IAM) - The CISO’s Core Focus in Modern Cyber Security

How Organisations Can Leverage Cyber Insurance Effectively

How the hybrid work boom reshapes corporate security | TechRadar

SentinelOne says security vendors are under attack | Cybernews

The CISO’s Guide to Managing Cyber Risk in Hybrid Workplaces

CISOs should re-consider using Microsoft RDP due to password flaw, says expert | CSO Online

CISOs Take Note: Is Needless Cyber Security Strangling Your Business?

What is a Risk Map (Risk Heat Map)? | Definition from TechTarget

How CISOs Can Leverage Threat Intelligence to Stay Proactive

Why CISOs Are Key to Integrating ESG and Cyber Security - Cyber Security News

Commvault says recent breach didn't impact customer backup data

The Hidden Risks of Over-Relying on AI in Cyber Security | MSSP Alert

21 million employee screenshots leaked in bossware breach blunder

Cloud Security Essentials - CISO Resource Toolkit

Employee monitoring app exposes 21M work screens | Cybernews

Amazon, CrowdStrike leaders say private threat intel can quickly bring cyber criminals to justice | CyberScoop

USAID decides not to collect former workers’ abandoned devices | The Verge

End users can code with AI, but IT must be wary | TechTarget

CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage - IT Security Guru

MoD publishes Secure by Design problem book to bolster cyber resilience | UKAuthority




Vulnerability Management

Most critical vulnerabilities aren't worth your attention - Help Net Security

Hackers exploited 75 zero-days last year – Google​ | Cybernews

44% of the zero-days exploited in 2024 were in enterprise solutions - Help Net Security

Google: Governments are using zero-day hacks more than ever - Ars Technica

The Impact of Politics on Cyber Security: CVE’s and the Chris Krebs Executive Order - Security Boulevard

Vulnerability Statistics Report in 2024 by Edgescan - Click to See vulnerability data and cyber security trends

How Breaches Start: Breaking Down 5 Real Vulns

CVE board 'kept in the dark' on funding, members say • The Register

Solana DeFi protocol Loopscale hit with $5.8 million exploit two weeks after launch | The Block

CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage - IT Security Guru

Vulnerabilities

Google Issues Emergency Chrome Security Update — Act Now

Experts forecast Ivanti VPN attacks as endpoint scans surge • The Register

SAP fixes suspected Netweaver zero-day exploited in attacks

Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities - SecurityWeek

SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

Airplay-enabled devices open to attack via "AirBorne" vulnerabilities - Help Net Security

CISOs should re-consider using Microsoft RDP due to password flaw, says expert | CSO Online

A worrying stealthy Linux security bug could put your systems at risk - here's what we know | TechRadar

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

Craft CMS RCE exploit chain used in zero-day attacks to steal data

Coinbase fixes 2FA log error making people think they were hacked


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 25 April 2025

Black Arrow Cyber Threat Intelligence Briefing 25 April 2025:

-Cyber Security Is Now Critical for Business Growth, CEOs Say

-Cyber Threats Now a Daily Reality for One in Three Businesses

-66% of CISOs Are Worried Cyber Security Threats Surpass Their Defences

-M&S: Shares at FTSE 100 Retailer Fall as Cyber Attack Hits Customers

-Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks

-Cyber Attacks Surged in 2025, with Third Party Attacks Seeing a Huge Rise

-Nation-State Threats Put SMBs in Their Sights

-Global Firms Succumb to Ransomware: 86% Pay Up Despite Having Advanced Backup Tools

-Dutch Intelligence Report: Russia’s Sabotage in Europe Borders on State Terrorism

-Cyber Crime Syndicates Expand Beyond Southeast Asia, UN Warns of Global Threat

-159 Vulnerabilities Exploited in Q1 2025 — 28% Within 24 Hours of Disclosure

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Exec Summary

Black Arrow Cyber’s review of specialist and general media has observed a significant shift in executive mindsets, with cyber security now seen as essential to business growth, not just a defensive measure. This includes reports of CEOs increasingly recognising the strategic value of robust security practices, particularly amid rising concerns over AI-driven threats. However, there remains a concerning gap between CISOs and the wider C-suite regarding the severity of risks, underlining the need for stronger alignment at leadership level.

This week’s reporting also highlights that cyber threats have become a daily operational reality, with small and medium-sized businesses bearing a disproportionate share of ransomware and nation-state attacks. Third-party vulnerabilities and supply chain compromises are escalating rapidly, exposing organisations to breaches through trusted partners. Black Arrow Cyber believes this growing complexity demands that businesses urgently reassess their resilience strategies and third-party risk management.

Finally, we note that ransomware attacks continue to overwhelm organisations, with high ransom payment rates despite advanced backup tools. Rapid exploitation of newly disclosed vulnerabilities, particularly in widely used systems, further compounds the threat landscape. Black Arrow believes that operational readiness, strong identity management, and swift vulnerability patching are now critical pillars for cyber resilience.

Top Cyber Stories of the Last Week

Cyber Security Is Now Critical for Business Growth, CEOs Say

A Gartner study has found that 85% of CEOs now view cyber security as critical to business growth in today’s digital and connected world. Three in five (61%) are concerned about cyber security threats, particularly with the rise of artificial intelligence influencing the threat landscape. The report highlights a shift in risk thresholds and underlines that cyber security has become a core business priority rather than simply a protective measure. CEOs are urged to champion the role of security leaders, while security leaders must demonstrate how effective cyber security strategies can safeguard assets and drive strategic growth.

Cyber Threats Now a Daily Reality for One in Three Businesses

FIS and Oxford Economics report that one in three businesses face daily cyber threats, 74% encounter critical incidents monthly and 88% of leaders cited cyber threats as a major disruption. Despite prioritising fraud risk management, over half of firms were dissatisfied with their fraud response plans, and nearly half do not regularly train employees on fraud and cyber awareness, leaving them exposed to greater risk.

66% of CISOs Are Worried Cyber Security Threats Surpass Their Defences

EY has found a growing disconnect between CISOs and the wider C-suite when it comes to cyber security threats. Two-thirds of CISOs fear threats now surpass their defences, compared to just over half of their C-suite peers. The report highlights that CISOs are more concerned than the rest of the C-suite about senior leaders at their organisation underestimating the dangers of cybersecurity threats (68% vs. 57%) and note a higher incidence of attacks from both cyber criminals and insider threats. Encouragingly, 75% of CISOs reported fewer incidents following investment in AI. C-suite leaders expect cyber security budgets to double next year, from 21% to 38% of total IT spend.

M&S: Shares at FTSE 100 Retailer Fall as Cyber Attack Hits Customers

Marks & Spencer (M&S) has confirmed it is managing a cyber attack that has disrupted contactless payments and forced the retailer to stop taking online orders amid a payments meltdown. As a result, shares have fallen by more than 4%. While stores remain open, M&S has temporarily moved some operations offline to protect customers and partners. Online orders have been suspended, but cash payments are still being accepted. The retailer is working with industry experts to restore full services and minimise further disruption.

Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks

Verizon’s latest Data Breach Investigations Report (DBIR) highlights that small businesses are bearing the brunt of ransomware attacks, with extortion malware found in 88% of breaches compared to 39% at larger firms. Ransomware was involved in 44% of all breaches, a 37% rise from the previous year with attack volumes increasing globally. State-sponsored actors are also increasingly deploying ransomware, with financial motives present in 28% of their incidents. Industries such as administration, wholesale trade, and transportation remain key targets for financially motivated cyber attacks.

Cyber Attacks Surged in 2025, with Third Party Attacks Seeing a Huge Rise

Verizon’s latest Data Breach Investigations Report also found that third-party involvement in cyber attacks has doubled, now featuring in 30% of cases. Based on over 22,000 security incidents and 12,195 confirmed data breaches, the research highlights a sharp rise in supply chain and partner ecosystem compromises. Cyber criminals increasingly target open-source code repositories to push malicious updates or impersonate legitimate software packages. The findings underline the growing risk third parties pose to organisations’ cyber security, with trust in external partners becoming a significant vulnerability.

Nation-State Threats Put SMBs in Their Sights

Nation-state cyber threat groups are increasingly targeting small and medium-sized businesses (SMBs), particularly those linked to larger organisations. Broadcom warns that most nation-state attacks now impact the private sector and midmarket firms, with identity providers among common targets. Many SMBs remain unaware of their role in the broader supply chain, making them attractive entry points. Nation-state actors are also seen moonlighting, switching between espionage and financially motivated cyber attacks. Experts stress that SMBs must strengthen their cyber defences, as they face the same sophisticated threats once reserved for larger enterprises.

Global Firms Succumb to Ransomware: 86% Pay Up Despite Having Advanced Backup Tools

Rubrik’s latest research shows that 86% of global organisations paid ransom demands last year, despite having access to advanced backup tools. The report highlights that 74% of firms experienced partial compromise of their backup systems, with 35% suffering complete compromise, often due to attackers disabling recovery infrastructure before encrypting data. Nearly 80% of breaches were driven by stolen identities, particularly exploiting legacy systems like Active Directory. Average ransom payments globally are around $479,000. The findings stress that true resilience requires not just technology, but operational readiness and leadership commitment to recovery preparedness. 

Dutch Intelligence Report: Russia’s Sabotage in Europe Borders on State Terrorism

The Dutch Intelligence services (AIVD) have reported a sharp rise in Russian aggression across Europe in 2024, including espionage, cyber attacks, and disinformation campaigns described as bordering on state terrorism. A Dutch public facility was targeted by Russian hackers, and overall national threats increased, with 73 official reports issued - up from 56 in 2023. The report also flagged escalating extremist threats, including right-wing and jihadist violence, some involving very young individuals. China was identified as another major threat, targeting Dutch military research and supplying military goods to Russia. The AIVD warned that international conflicts are increasingly fuelling domestic instability.

Cyber Crime Syndicates Expand Beyond Southeast Asia, UN Warns of Global Threat

The United Nations has warned that cybercrime syndicates originating in Southeast Asia are now operating on a global scale, generating billions in scam profits each year. Despite law enforcement crackdowns, these groups have expanded into Africa, South America, and South Asia, moving operations to regions with weak governance. The UN reports that these networks use online platforms and cryptocurrency to scale operations, targeting victims in over 50 countries. In 2023 alone, the US reported losses of over $5.6 billion to cryptocurrency scams. Without international collaboration, the scale and impact of cyber fraud will continue to escalate.

159 Vulnerabilities Exploited in Q1 2025 — 28% Within 24 Hours of Disclosure

VulnCheck has reported that 159 vulnerabilities were exploited in the first quarter of 2025, with 28% targeted within just one day of disclosure. Most affected systems were content management platforms, network edge devices, and operating systems. Microsoft Windows, Broadcom VMware, and TOTOLINK routers were among the most impacted products. Verizon’s 2025 Data Breach Investigations Report noted a 34% rise in breaches initiated through vulnerability exploitation, now accounting for 20% of all incidents.

Sources:

https://www.techradar.com/pro/security/cybersecurity-is-now-critical-for-business-growth-ceos-say

https://www.helpnetsecurity.com/2025/04/21/businesses-fraud-consequence/

https://www.securitymagazine.com/articles/101557-66-of-cisos-are-worried-cybersecurity-threats-surpass-their-defenses

https://www.cityam.com/ms-shares-at-ftse-100-retailer-fall-as-cyber-attack-hits-customers/

https://www.infosecurity-magazine.com/news/verizon-dbir-smb-ransomware-attacks/

https://www.techradar.com/pro/security/cyberattacks-surged-in-2025-with-third-party-attacks-seeing-a-huge-rise

https://www.darkreading.com/threat-intelligence/nation-state-threats-smb

https://www.csoonline.com/article/3968299/global-firms-succumb-to-ransomware-86-pay-up-despite-having-advanced-backup-tools.html

https://nltimes.nl/2025/04/24/dutch-intelligence-report-russias-sabotage-europe-borders-state-terrorism

https://coinedition.com/cyber-crime-syndicates-expand-beyond-southeast-asia-un-warns-of-global-threat/

https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html



Threats

Ransomware, Extortion and Destructive Attacks

Verizon discovers spike in ransomware and exploited vulnerabilities | CyberScoop

Ransomware, espionage and data breaches? Yep – Verizon just dropped a 117-page thriller - PhoneArena

Over $16 billion in losses reported to FBI in 2024 tied to computer crime | The Record from Recorded Future News

Ransomware groups test new business models to hit more victims, increase profits | The Record from Recorded Future News

Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported | IT Pro

Ransomware now plays a role in nearly half of all breaches, new research finds | The Record from Recorded Future News

Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks - Infosecurity Magazine

Could Ransomware Survive Without Cryptocurrency?

Ransomware Gangs Innovate With New Affiliate Models

Global firms succumb to ransomware: 86% pay up despite having advanced backup tools | CSO Online

The Ransomware Business Model: The State of Cyber Crime | Silicon UK Tech News

Ransomware activity trends | Professional Security Magazine

Interlock ransomware gang pushes fake IT tools in ClickFix attacks

Teach young people about ransomware risks before they enter work, expert urges | The Standard

Credential theft outpaces ransomware as cyber threat landscape evolves, report claims

Ransomware Gang Takes Page From Elon's 'What Did You Do This Week' DOGE Emails

Ransomware the most pervasive threat to US critical infrastructure in 2024, says FBI | CSO Online

Emulating the Hellish Helldown Ransomware - Security Boulevard

What is Ransomware? Definition and Complete Guide | Informa TechTarget

Ransomware Victims

Ransomware Gang Claims Attack On Manchester Credit Union

3 More Healthcare Orgs Hit by Ransomware Attacks

Interlock ransomware claims DaVita attack, leaks stolen data

M&S takes systems offline as 'cyber incident' lingers • The Register (unconfirmed)

Money blog: M&S forced to stop taking online orders amid payment meltdown | Money News | Sky News (unconfirmed)

Phishing & Email Based Attacks

Cyber crime set to rise as phishing-as-a-service could make hacking and identity theft go mainstream | TechRadar

Over $16 billion in losses reported to FBI in 2024 tied to computer crime | The Record from Recorded Future News

Emails delivering infostealers rose by 84% year-over-year | Security Magazine

The dark side of YouTube: Malicious links, phishing, and deepfakes - Help Net Security

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Windows NTLM Hash Flaw Targeted in Global Phishing Attacks | MSSP Alert

Beware, hackers can apparently now send phishing emails from “no-reply@google.com” | TechRadar

Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows | Volexity

Pope Francis’ Passing Triggers Surge Of Phishing, SEO Poisoning, And Fake Images

A new kind of phishing attack is fooling Gmail’s security. Here’s how it works | Laptop Mag

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Cover-Up Culture? 95% of Phishing Attacks Go Unreported in Healthcare, New Paubox Report Reveals

Who needs phishing when your login's already in the wild? • The Register

Business Email Compromise (BEC)/Email Account Compromise (EAC)

FBI: Cybercrime cost victims 'staggering' $16.6B last year • The Register

Over $16 billion in losses reported to FBI in 2024 tied to computer crime | The Record from Recorded Future News

Other Social Engineering

Cyber criminals blend AI and social engineering to bypass detection - Help Net Security

The dark side of YouTube: Malicious links, phishing, and deepfakes - Help Net Security

State-sponsored hackers embrace ClickFix social engineering tactic

'Elusive Comet' Attackers Use Zoom to Swindle Victims

Deepfake Impersonations: Your CEO’s Voice as a Threat Vector | MSSP Alert

State-sponsored actors spotted using ClickFix hacking tool developed by criminals | TechRadar

Pope Francis’ Passing Triggers Surge Of Phishing, SEO Poisoning, And Fake Images

North Korean Operatives Use Deepfakes in IT Job Interviews

Fraud, Scams and Financial Crime

FBI: Cyber Crime cost victims 'staggering' $16.6B last year • The Register

Deepfake Impersonations: Your CEO’s Voice as a Threat Vector | MSSP Alert

$40bn Southeast Asian Scam Sector Growing “Like a Cancer” - Infosecurity Magazine

Attackers, Defenders Lean on AI in Identity Fraud Battle

New payment-card scam involves a phone call, some malware and a personal tap | The Record from Recorded Future News

'Elusive Comet' Attackers Use Zoom to Swindle Victims

Japan ’s FSA warns of unauthorized trades via stolen credentials from fake security firms' sites

WordPress ad-fraud plugins generated 1.4 billion ad requests per day

“Scallywag” Scheme Monetizing Piracy Through Browser Extensions

Pope Francis’ Passing Triggers Surge Of Phishing, SEO Poisoning, And Fake Images

Microsoft warns users about AI-Driven scams that target Quick Assist - gHacks Tech News

This Android malware drains cards with a single tap | Cybernews

UK Romance Scams Spike 20% as Online Dating Grows - Infosecurity Magazine

The Evolution of Cyber Crime: How to Stay Safe from AI-Driven Fraud | StoneTurn - JDSupra

Microsoft warns of AI-powered scam surge

Billions of views weaponized: how cybercriminals use stolen YouTube and Instagram accounts and malicious sponsorships to launch mass-scale scams | TechRadar

The Cyber Criminals Who Organized a $243 Million Crypto Heist - The New York Times

Scammers Are Impersonating the FBI. Here's How To Spot Them - CNET

Artificial Intelligence

Cyber criminals blend AI and social engineering to bypass detection - Help Net Security

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation - SecurityWeek

DeepSeek Breach Opens Floodgates to Dark Web

The AI market does not understand AI safety | TechTarget

Rethinking Resilience for the Age of AI-Driven Cyber Crime - Infosecurity Magazine

Attackers, Defenders Lean on AI in Identity Fraud Battle

Why CISOs are watching the GenAI supply chain shift closely - Help Net Security

Microsoft warns users about AI-Driven scams that target Quick Assist - gHacks Tech News

Identity is under siege as AI and cyber exploits evolve and outpace defenses | Biometric Update

The Evolution of Cyber Crime: How to Stay Safe from AI-Driven Fraud | StoneTurn - JDSupra

Microsoft warns of AI-powered scam surge

Slopsquatting: The worrying AI hallucination bug that could be spreading malware | Tom's Guide

The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools - SecurityWeek

Anthropic finds alarming 'emerging trends' in Claude misuse report | ZDNET

Microsoft Resumes Recall Feature Rollout After Privacy Backlash, Adds Security Functions | TechRepublic

2FA/MFA

'SessionShark' ToolKit Evades Microsoft Office 365 MFA

Malware

Emails delivering infostealers rose by 84% year-over-year | Security Magazine

Russian Bulletproof Hosting Provider Proton66 Linked To Global Cyber Attack Surge

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Chinese APT Mustang Panda Debuts 4 New Attack Tools

Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

The dark side of YouTube: Malicious links, phishing, and deepfakes - Help Net Security

The Zoom attack you didn't see coming - Help Net Security

Hackers are impersonating banks to infect your Android phone with credit card-stealing malware | Tom's Guide

'Elusive Comet' Attackers Use Zoom to Swindle Victims

Criminals are impersonating a popular online PDF converter service to trick users into downloading malware | TechRadar

Slopsquatting: The worrying AI hallucination bug that could be spreading malware | Tom's Guide

Rootkit bypasses most Linux security detection​ | Cybernews

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Chinese hackers target Russian govt with upgraded RAT malware

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

Korean Telco Giant SK Telecom Hacked - SecurityWeek

Your cat’s microchip could carry malware | Cybernews

Bots/Botnets

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation - SecurityWeek

Unmasking the Dead Internet: How bots and propaganda hijacked online discourse

Mobile

New Android malware steals your credit cards for NFC relay attacks

Leaking Apps: The Hidden Data Risks On Your Phone

Hackers are impersonating banks to infect your Android phone with credit card-stealing malware | Tom's Guide

New Android Warning — This TOAD Malware Attack Steals Cash From ATMs

Flexible working models fuel surge in device theft - Help Net Security

Russian army targeted by new Android malware hidden in mapping app

Denial of Service/DoS/DDoS

Dutch payment processor Adyen hit by three DDoS attacks | NL Times

Internet of Things – IoT

Opt out: how to protect your data and privacy if you own a Tesla | Tesla | The Guardian

Data Breaches/Leaks

Thousands of UK users of Vinted, Candy Crush and Tinder were hit in global hack

DeepSeek Breach Opens Floodgates to Dark Web

US Data Breach Victim Count Surges 26% Annually - Infosecurity Magazine

Data breach class action costs mount up | Computer Weekly

CISA Weighs In on Alleged Oracle Cloud Breach

Pete Hegseth shared Yemen attack details in second Signal chat – report | Trump administration | The Guardian

3 More Healthcare Orgs Hit by Ransomware Attacks

5.5 Million Patients Affected by Data Breach at Yale New Haven Health  - SecurityWeek

Blue Shield shared 4.7M people's health info with Google Ads • The Register

Hackers claim TikTok breach, 927,000 passwords might hit the internet | Cybernews

Korean Telco Giant SK Telecom Hacked - SecurityWeek

Organised Crime & Criminal Actors

Russian Bulletproof Hosting Provider Proton66 Linked To Global Cyberattack Surge

Cyber Crime Syndicates Expand Globally From Southeast Asia: UN

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

$40bn Southeast Asian Scam Sector Growing “Like a Cancer” - Infosecurity Magazine

Russian Infrastructure Plays Crucial Role in North Korean Cyber Crime Operations | Trend Micro (US)

Hacking groups are now increasingly in it for the money, not the chaos | TechRadar

When confusion becomes a weapon: How cyber criminals exploit economic turmoil - Help Net Security

The Evolution of Cyber Crime: How to Stay Safe from AI-Driven Fraud | StoneTurn - JDSupra

Microsoft warns of AI-powered scam surge

Scattered Spider Hacking Suspect Extradited to US From Spain

'Cyber crime ranks as No 1 risk in SA, overtaking long-standing issues': expert

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

More Than a Quarter of Bybit's Hacked Crypto Is Now Untraceable

Could Ransomware Survive Without Cryptocurrency?

The Cybercriminals Who Organized a $243 Million Crypto Heist - The New York Times

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Web3, cryptocurrency sectors targeted by North Korean hackers | SC Media

North Korean cyber spies created U.S. firms to dupe crypto developers | Reuters

Insider Risk and Insider Threats

Teach young people about ransomware risks before they enter work, expert urges | The Standard

The Foundations of a Resilient Cyber Workforce

Supply Chain and Third Parties

Cyber attacks surged in 2025, with third party attacks seeing a huge rise | TechRadar

Security snafus caused by third parties up from 15% to 30% • The Register

Why CISOs are watching the GenAI supply chain shift closely - Help Net Security

Cloud/SaaS

Microsoft Purges Millions of Cloud Tenants After Storm-0558

Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows | Volexity

Enterprises are facing a ‘cloud security crisis’ | IT Pro

Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts

'SessionShark' ToolKit Evades Microsoft Office 365 MFA

Widespread Microsoft Entra lockouts tied to new security feature rollout

CISA Weighs In on Alleged Oracle Cloud Breach

Outages

Widespread Microsoft Entra lockouts tied to new security feature rollout

Wait, how did a decentralized service like Bluesky go down? | TechCrunch

Identity and Access Management

Identity is under siege as AI and cyber exploits evolve and outpace defenses | Biometric Update

Widespread Microsoft Entra lockouts tied to new security feature rollout

Encryption

Hackers Weaponizing Certificates & Stolen Private Keys to Infiltrate Organizations

Hackers are impersonating banks to infect your Android phone with credit card-stealing malware | Tom's Guide

New Android Warning — This TOAD Malware Attack Steals Cash From ATMs

Perspectives on privacy, AI, and cybersecurity from the front lines of FinTech and Blockchain - A&O Shearman

Proposed Swiss encryption laws may have a severe impact on VPNs – what you need to know | Tom's Guide

Telegram vows to exit markets over encryption backdoor demands

Linux and Open Source

Open Source and Container Security Are Fundamentally Broken - The New Stack

Rootkit bypasses most Linux security detection​ | Cybernews

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Passwords, Credential Stuffing & Brute Force Attacks

Credential theft outpaces ransomware as cyber threat landscape evolves, report claims

Vulnerability Exploitation and Credential Theft Now Top Initial Access - Infosecurity Magazine

Who needs phishing when your login's already in the wild? • The Register

7 Steps to Take After a Credential-Based cyberattack

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

Social Media

The dark side of YouTube: Malicious links, phishing, and deepfakes - Help Net Security

Billions of views weaponized: how cybercriminals use stolen YouTube and Instagram accounts and malicious sponsorships to launch mass-scale scams | TechRadar

Wait, how did a decentralized service like Bluesky go down? | TechCrunch

LinkedIn adds new verification tool to ensure security across the internet | TechRadar

Hackers claim TikTok breach, 927,000 passwords might hit the internet | Cybernews

Training, Education and Awareness

Teach young people about ransomware risks before they enter work, expert urges | The Standard

The Foundations of a Resilient Cyber Workforce

Regulations, Fines and Legislation

Compliance weighs heavily on security and GRC teams - Help Net Security

Ofcom takes world-leading action to crack down on exploitation of mobile networks by criminals - Ofcom

Cyber Security Controls: What Do Regulators Expect Nowadays? | Alston & Bird - JDSupra

Challenges persist as UK’s Cyber Security and Resilience Bill moves forward | Computer Weekly

Assessing The Impact Of The UK's Proposed Cyber Resilience Bill

EU Bolsters Cybersecurity With NIS2 Directive

Governance code of practice | Professional Security Magazine

The Wiretap: Trump’s Cyber Security Agency Avoided A Near Disaster

US cyber defences are being dismantled from the inside • The Register

Holyrood | Ofcom closes legal loophole that allowed criminals to track your location

Leasing of Global Titles banned | Professional Security Magazine

Why international alignment of cybersecurity regulations needs to be a priority  - Microsoft On the Issues

The splintering of a standard bug tracking system has begun • The Register

Why the MITRE CVE Database Scare Proves Multi-Source Vulnerability Intelligence Is Essential

Pete Hegseth shared Yemen attack details in second Signal chat – report | Trump administration | The Guardian

Proposed Swiss encryption laws may have a severe impact on VPNs – what you need to know | Tom's Guide

Bill introduced to extend the Cybersecurity Information Sharing Act | Security Magazine

Two top cyber officials resign from CISA | The Record from Recorded Future News

2025 State Cybersecurity Legislation Focuses on Financial Services | Alston & Bird - JDSupra

Zambia's Updated Cyber Laws Prompt Surveillance Warnings

Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Nextgov/FCW

Telegram vows to exit markets over encryption backdoor demands

Models, Frameworks and Standards

Assessing The Impact Of The UK's Proposed Cyber Resilience Bill

EU Bolsters Cybersecurity With NIS2 Directive

Governance code of practice | Professional Security Magazine

Get ready for a new era in cyber security: what the UK's forthcoming cyber law means for you, Giles Pratt, Rhodri Thomas, Christine Simpson, Adam Gillert

MITRE Launches New D3FEND CAD Tool to Create Precise Cybersecurity Scenarios

Mapping The Cyber Kill Chain Using Correlated Security Logs And Timeline Tools

Careers, Working in Cyber and Information Security

Switching to Cyber Security: Advice for Midcareer Professionals

Two ways AI hype is worsening the cyber security skills crisis | CSO Online

Cyber ‘agony aunts’ launch guidebook for women in security | Computer Weekly

Law Enforcement Action and Take Downs

Scattered Spider Hacking Suspect Extradited to US From Spain

Misinformation, Disinformation and Propaganda

Unmasking the Dead Internet: How bots and propaganda hijacked online discourse


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Ransomware, espionage and data breaches? Yep – Verizon just dropped a 117-page thriller - PhoneArena

Dutch intelligence report: Russia’s sabotage in Europe borders on state terrorism | NL Times

Cyber threats target F-35 in new era of military defense risks

Senior Pentagon Official Says Cyber Warfare Poses Significant Threat to Joint Force > U.S. Department of Defense > Defense Department News

The state of cyberwar in Ukraine — and how CISOs can help | CSO Online

Countries shore up digital defenses as tensions raise the threat of cyberwarfare - ABC News

Nation State Actors

Nation-State Threats Put SMBs in Their Sights

State-sponsored actors spotted using ClickFix hacking tool developed by criminals | TechRadar

China

China “has completed its journey to cyber superpower” - and Google security expert explains why threats could get even worse in years to come | TechRadar

Chinese APT Mustang Panda Debuts 4 New Attack Tools

How Chinese hacking got so good

Chinese Ghost Hackers Hit Hospitals And Factories In America And U.K.

Microsoft Purges Millions of Cloud Tenants After Storm-0558

Chinese hackers target Russian govt with upgraded RAT malware

Earth Kurma APT Campaign Targets Southeast Asian Government Telecom Sectors | Trend Micro (US)

DeepSeek Breach Opens Floodgates to Dark Web

Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Nextgov/FCW

Russia

Dutch intelligence report: Russia’s sabotage in Europe borders on state terrorism | NL Times

State-sponsored hackers embrace ClickFix social engineering tactic

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)

Russia is ramping up hybrid attacks against Europe, Dutch intelligence says | Reuters

Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows | Volexity

Dutch Warn of “Whole of Society” Russian Cyber-Threat - Infosecurity Magazine

The state of cyberwar in Ukraine — and how CISOs can help | CSO Online

Russia’s Arming For Space War I, Targeting SpaceX Satellite Systems

Chinese hackers target Russian govt with upgraded RAT malware

Russian Bulletproof Hosting Provider Proton66 Linked To Global Cyberattack Surge

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Trojanized Alpine Quest app geolocates Russian soldiers • The Register

Russian army targeted by new Android malware hidden in mapping app

Iran

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

Israel subjected to persistent targeting by Iranian hackers | SC Media

North Korea

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)

North Korean Operatives Use Deepfakes in IT Job Interviews

Kimsuky APT exploited BlueKeep RDP flaw in attacks against South Korea and Japan

More Than a Quarter of Bybit's Hacked Crypto Is Now Untraceable

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Web3, cryptocurrency sectors targeted by North Korean hackers | SC Media

Lazarus hackers breach six companies in watering hole attacks

Senior Pentagon Official Says Cyber Warfare Poses Significant Threat to Joint Force > U.S. Department of Defense > Defense Department News

North Korean cyber spies created U.S. firms to dupe crypto developers | Reuters


Tools and Controls

66% of CISOs are worried cyber security threats surpass their defenses | Security Magazine

The Role of Threat Intelligence in Proactive Defense

Cyber security Controls: What Do Regulators Expect Nowadays? | Alston & Bird - JDSupra

Cyber security Metrics That Matter for Board-Level Reporting

Enterprises change how they manage cyber risk

What is Risk Exposure in Business? | Definitions from TechTarget

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

Chinese APT Mustang Panda Debuts 4 New Attack Tools

Two ways AI hype is worsening the cyber security skills crisis | CSO Online

Rethinking Resilience for the Age of AI-Driven Cybercrime - Infosecurity Magazine

Open Source and Container Security Are Fundamentally Broken - The New Stack

Hackers Weaponizing Certificates & Stolen Private Keys to Infiltrate Organizations

Digital Forensics In 2025: How CSOs Can Lead Effective Investigations

Stronger Cloud Security in Five: How To Protect Your Cloud Workloads - Security Boulevard

Criminals target APIs as web attacks skyrocket globally | IT Pro

Widespread Microsoft Entra lockouts tied to new security feature rollout

7 Steps to Take After a Credential-Based cyberattack

The Foundations of a Resilient Cyber Workforce

From Reactive to Predictive - The Next Frontier for Security Leaders

5 Reasons Device Management Isn't Device Trust

Staying Ahead of Cyber Threats with Cyber Resilience | Dell USA

Not if, but when -- Why every organization needs a cyber resilience strategy

Traditional Networks Are Leaving Organizations Exposed

Coaching AI agents: Why your next security hire might be an algorithm - Help Net Security

Executives think AI can supercharge cyber security teams – analysts aren’t convinced | IT Pro

Exposure validation emerges as critical cyber defense component - Help Net Security

5 Major Concerns With Employees Using The Browser

Microsoft Claims Steady Progress Revamping Security Culture

Cyber Security Indicators: How IOCs, IOBs, and IOAs Empower Threat Detection and Prevention

Mapping The Cyber Kill Chain Using Correlated Security Logs And Timeline Tools

MITRE Launches New D3FEND CAD Tool to Create Precise Cybersecurity Scenarios


Reports Published in the Last Week

2025 Data Breach Investigations Report | Verizon


Other News

66% of CISOs are worried cybersecurity threats surpass their defenses | Security Magazine

Cyber threats now a daily reality for one in three businesses - Help Net Security

UK utility cyberattacks rose 586% from 2022 to 2023 | Security Magazine

Nine of 10 global firms hit by cyber attacks – report | Insurance Business America

M&S apologises after ‘cyber incident’ hits contactless payments and online orders | Marks & Spencer | The Guardian

Cyber in financial services study | Professional Security Magazine

The Biggest Security Risks With Public Wi-Fi | HuffPost Life

Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks - Infosecurity Magazine

A new era of cyber threats is approaching for the energy sector - Help Net Security

New KnowBe4 Report Exposes Critical Cyber Threats in European Energy Sector

Why cyber security matters for small and medium-sized businesses – Computerworld

Exclusive: Small businesses under-prepared amid restructuring push

Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact  - Security Boulevard

Two-thirds of cops find NATO summit in The Hague irresponsible | NL Times

Cyber attack hits drinking water supplier in Spanish town near Barcelona | The Record from Recorded Future News

Cyber threats escalate against energy sector | SC Media

Understanding 2024 cyber attack trends - Help Net Security

Microsoft Claims Steady Progress Revamping Security Culture

5 Most Common Security Attack Methods in 2024: Mandiant’s M-Trends Report

Cyber attacks Soar 47% Globally – Attacks On Education Increase By 73%

Perspectives on privacy, AI, and cyber security from the front lines of FinTech and Blockchain - A&O Shearman

What school IT admins are up against, and how to help them win - Help Net Security

Cyber security in 2025- Real-World Threats and Lessons Learned

Is the automotive industry on the cusp of a cyber war? | Automotive World

Phishing Attacks Lead to Theft in the Shipping Industry | Manufacturing.net

Are maritime hackers pushing at an open door? - Ship Technology


Vulnerability Management

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Enterprises change how they manage cyber risk

Microsoft Security Vulnerabilities Set Record High in 2024: BeyondTrust

Vulnerability Exploitation and Credential Theft Now Top Initial Access - Infosecurity Magazine

Attackers hit security device defects hard in 2024 | CyberScoop

Businesses Failing to Prevent Cyber Attacks, Says Report

Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation - Infosecurity Magazine

The Wiretap: Trump’s Cyber Security Agency Avoided A Near Disaster

Open Source and Container Security Are Fundamentally Broken - The New Stack

The splintering of a standard bug tracking system has begun • The Register

Exposed and unaware: The state of enterprise security in 2025 - Help Net Security

Why the MITRE CVE Database Scare Proves Multi-Source Vulnerability Intelligence Is Essential

Vulnerabilities

Cisco Webex bug lets hackers gain code execution via meeting links

SonicWall SMA VPN devices targeted in attacks since January

Windows NTLM Hash Flaw Targeted in Global Phishing Attacks | MSSP Alert

Eight days from patch to exploitation for Microsoft flaw • The Register

Apple Zero Days Under 'Sophisticated Attack,' but Details Lacking

Rootkit bypasses most Linux security detection | Cybernews

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Zyxel RCE Vulnerability Allows Arbitrary Query Execution Without any Authentication

Highest-Risk Security Flaw Found in Commvault Backup Solutions - Infosecurity Magazine

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) - Help Net Security

VulnCheck spotted 159 actively exploited vulnerabilities in first few months of 2025 | CyberScoop

TP-Link Router Vulnerabilities Let Attackers Inject Malicious SQL Commands

Patch Now: NVIDIA Flaws Expose AI Models, Critical Infrastructure

ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

Active! Mail RCE flaw exploited in attacks on Japanese orgs


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 18 April 2025

Black Arrow Cyber Threat Intelligence Briefing 18 April 2025:

-Fraud in Your Inbox: Email Is Still the Weakest Link

-Firm Fined After Stolen Client Details Leaked onto Dark Web

-Financial Fraud, with a Third-Party Twist, Dominates Cyber Claims

-Cyber Risks in M&A: When Companies Merge, So Do Their Cyber Threats

-CISOs Turn to Cyber Risk Quantification to Bridge the Gap Between Security and Business

-UK Financial Services Under Pressure from Cyber Security Challenges and Mounting Regulatory Requirements

-Organisations Can’t Afford to Be Non-Compliant

-C-Suite Divides on Cyber Security Threats Pose Organisational Risks, Study Finds

-Cyber Security Threats and Geopolitical Risks Top Business Travel Concerns

-Rising Cyber Threats Fuel 12.2% Growth in Global Cyber Security Spending

-Understanding Credential Stuffing: A Growing Cyber Security Threat

-30% of Charities Experienced Cyber Security Breaches or Attacks Last Year

-The UK’s Phone Theft Crisis Is a Wake-Up Call for Digital Security

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Exec Summary

Black Arrow’s look at threat intelligence from the last week highlights that email-based fraud is still rampant, accounting for 83% of financial fraud claims, highlighting how easily employees can be deceived by impersonation and AI-generated scams. Similarly, credential stuffing and phishing campaigns persistently exploit insufficient password practices and user behaviour, with financial and insurance firms reporting average losses of over $500,000 per incident.

We report on the reprimand and fine imposed by the UK’s information security authority, the ICO, on a law firm with Cyber Essentials that had failed to prevent a breach of its systems that resulted in significant data loss. Other insights include the risks posed by third parties, mergers, and even basic mobile device theft. These underscore the need for tighter internal controls, stronger governance, and proactive risk assessments.

That risk assessment should include Cyber Risk Quantification which, as we report, is increasingly used to align cyber priorities with financial goals. As regulatory pressures mount and geopolitical tensions rise, Black Arrow recommends embedding cyber risk assessment and management into board-level strategy to enable a justified investment in long-term cyber resilience to withstand the evolving threat landscape.

cyber egg

Top Cyber Stories of the Last Week

Fraud in Your Inbox: Email Is Still the Weakest Link

At-Bay’s latest report reveals that 83% of financial fraud claims originate from email-based attacks, with tactics such as executive impersonation and AI-generated scams increasingly used to deceive employees. Email remains the weakest link, particularly for mid-sized firms. Financial and insurance sectors reported average losses exceeding $500,000 per incident. As a result, cyber insurers are now demanding stronger controls such as multifactor authentication and email security protocols before issuing cover. The findings highlight a growing need to tackle human error and social engineering in everyday digital communication.

Firm Fined After Stolen Client Details Leaked onto Dark Web

DPP Law Ltd has been fined £60,000 following a cyber attack in which over 32GB of sensitive client data, including court files and police bodycam footage, was stolen and leaked on the dark web. The Information Commissioner’s Office found significant lapses in the firm’s cyber security, including failure to report the breach within the required 72 hours and reliance on an outdated administrator account with full access rights. Despite being certified under Cyber Essentials, DPP was found to lack sufficient internal IT oversight, highlighting the ongoing risk of relying solely on third-party providers without conducting proper risk assessments.

Financial Fraud, with a Third-Party Twist, Dominates Cyber Claims

Cyber insurers report that financial fraud, often sparked by phishing and third-party breaches, was the most frequent cause of claims in 2024, while ransomware remained the costliest. Claims rose by 16% overall. Attacks linked to third parties surged, with indirect ransomware claims rising 72% to $241,000 per incident. One insurer found third-party breaches drove nearly a third of all claims. Experts stress that organisations must now treat third-party risk as their own, investing in visibility, detection tools, and security partnerships to stay ahead in an increasingly interconnected threat landscape.

Cyber Risks in M&A: When Companies Merge, So Do Their Cyber Threats  

Mergers and acquisitions bring growth opportunities but also expose firms to significant cyber security risks. Inherited vulnerabilities, misaligned systems, and inconsistent compliance standards are common challenges, particularly in cross-border deals. Over 150 small business assessments revealed most operate below the ‘cyber poverty line’, lacking basic controls like asset inventories and incident response plans. Experts stress that cultural mismatches, not just technical gaps, pose the greatest risk. Successful integration demands early due diligence, strong identity and access management, and a collaborative approach to governance and risk alignment, with CISOs playing a central role in bridging operational differences and building long-term resilience.

CISOs Turn to Cyber Risk Quantification to Bridge the Gap Between Security and Business

CISOs are increasingly adopting Cyber Risk Quantification (CRQ) to help business leaders understand cyber risks in financial terms. By calculating potential monetary losses from cyber incidents, CRQ enables more informed, board-level decision-making. The approach supports alignment between security investments and business objectives, helping organisations prioritise resources based on financial risk tolerance. A recent report highlights that CRQ can show, for example, how a $1 million investment in security controls may reduce expected annual losses by $5 million. As regulatory scrutiny grows, CRQ is proving essential for demonstrating accountability and embedding cyber risk into wider business strategy.

UK Financial Services Under Pressure from Cyber Security Challenges and Mounting Regulatory Requirements

Bridewell’s latest research highlights regulation as both the biggest challenge and key driver of cyber security maturity in UK financial services, with 44% of firms citing compliance as their top concern. Response times to ransomware remain static at over 6.7 hours, while supply chain attacks take nearly 16 hours to resolve. Remote working (39%) and cloud security (35%) continue to pose risks, and AI-powered phishing is now the most feared emerging threat (89%). Despite strong confidence in infrastructure security, over half plan to outsource due to ongoing skills shortages, and 63% expect to increase cyber security investment in the year ahead.

Organisations Can’t Afford to Be Non-Compliant

Secureframe has found that non-compliance can cost organisations up to 2.71 times more than maintaining a proper compliance programme. European regulators alone have issued €4.48 billion in fines across over 2,000 cases, with GDPR violations such as Meta’s €1.2 billion penalty topping the list. In the US, SOX and HIPAA enforcement continues to intensify, with executives facing personal liability and healthcare breaches driving $144.9 million in fines. Failure to comply also threatens contracts and revenue, as seen when Health Net Federal Services paid $11.2 million and lost a key defence contract. Proactive compliance is now essential for risk reduction and resilience.

C-Suite Divides on Cyber Security Threats Pose Organisational Risks, Study Finds

EY’s latest study reveals that 84% of C-suite leaders in the US experienced a cyber security incident in the past three years, with firms seeing an average 1.5% drop in stock price within 90 days of an event. The research highlights a critical disconnect, with CISOs significantly more concerned about threats than their executive peers. Just 21% of leaders currently allocate more than 10% of their IT budget to cyber security, though this is expected to rise to 38% next year. EY urges firms to treat cyber security as a strategic investment, not a cost, to improve resilience and reduce financial risk.

Cyber Security Threats and Geopolitical Risks Top Business Travel Concerns

A recent survey of 500 UK business travellers reveals rising concern around the safety of corporate travel, with nearly half feeling less safe than in the past. Key risks for 2025 include travel disruption (74%), loss of essential items (72%), crime (65%), cyber security threats (62%), and geopolitical instability (59%). Emergency evacuations rose 17% last year, while severe weather disruptions surged by nearly 50%. The findings underscore the need for real-time risk mitigation and tailored support for diverse traveller profiles.

Rising Cyber Threats Fuel 12.2% Growth in Global Cyber Security Spending

Global cyber security spending is set to rise by 12.2% by 2025, reaching $377 billion by 2028, as organisations respond to increasingly sophisticated cyber threats and the rapid uptake of digital technologies. The U.S. and Europe will drive this growth, accounting for 70% of global spend, though the fastest increases are expected in Latin America, Central and Eastern Europe, and the Middle East and Africa. Banking, government, and healthcare will lead investment, while capital markets and life sciences show the sharpest growth. Firms are prioritising proactive security strategies as both a protective measure and long-term competitive advantage.

Understanding Credential Stuffing: A Growing Cyber Security Threat

Credential stuffing is a fast-growing cyber security threat that exploits users’ tendency to reuse passwords. Attackers use stolen credentials and automated tools to test them across websites, often breaching thousands of accounts despite a low success rate. Businesses face average annual losses of $6 million due to fraud, legal action, and customer churn. The attacks are difficult to detect, mimicking legitimate login activity using rotating IPs and global bot networks.

30% of Charities Experienced Cyber Security Breaches or Attacks Last Year

UK Government figures reveal that 30% of UK charities – around 61,000 – experienced a cyber security breach or attack in the past year, with phishing remaining the most common and disruptive threat. Of those affected, 86% faced phishing incidents, while a fifth reported attacks on a weekly basis. Despite this, only 35% have formal cyber security policies, and just 21% of larger charities reviewed immediate supplier risks. While 68% of senior leadership view cyber security as a high priority, board-level expertise remains limited, raising concerns about effective governance and decision-making in this increasingly targeted sector.

The UK’s Phone Theft Crisis Is a Wake-Up Call for Digital Security

Phone theft has surged across the UK, with over 83,000 incidents reported annually and 1,000 stolen phones recovered weekly in London alone. This growing criminal trade, valued at £50 million, is more than a loss of devices: it’s a gateway to financial fraud, identity theft, and corporate data breaches. Thieves exploit weak PINs and stored credentials to bypass biometrics, access accounts, and lock out victims. As personal and work data converge on mobile devices, businesses must adopt stricter mobile security controls and user awareness campaigns. This crisis highlights the urgent need for stronger digital hygiene and coordinated action across sectors.

Sources:

https://www.bankinfosecurity.com/fraud-in-your-inbox-email-still-weakest-link-a-27997

https://www.lawgazette.co.uk/news/firm-fined-after-stolen-client-details-leaked-onto-dark-web/5123026.article

https://www.darkreading.com/threat-intelligence/financial-fraud-third-party-cyber-claims

https://www.helpnetsecurity.com/2025/04/16/mergers-and-acquisitions-cybersecurity/

https://cybersecuritynews.com/cyber-risk-quantification/

https://www.itsecurityguru.org/2025/04/15/bridewell-research-finds-uk-financial-services-under-pressure-from-cyber-security-challenges-and-mounting-regulatory-requirements/

https://www.helpnetsecurity.com/2025/04/14/regulatory-non-compliance-penalties/

https://www.techmonitor.ai/news/c-suite-divides-cybersecurity-threats-pose-organisational-risks

https://www.travolution.com/news/technology/cybersecurity-threats-and-geopolitical-risks-top-business-travel-concerns/

https://petri.com/businesses-increase-cybersecurity-spending-12-2/

https://securityboulevard.com/2025/04/understanding-credential-stuffing-a-growing-cybersecurity-threat/

https://www.civilsociety.co.uk/news/30-of-charities-experienced-cybersecurity-breaches-or-attacks-last-year-stats-show.html

https://www.helpnetsecurity.com/2025/04/18/uk-phone-theft-crisis/  



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware crooks search for 'insurance' 'policy' right away • The Register

Unpacking IABs: The Middlemen Fuelling Ransomware Attacks

More Resilient Organisations Successfully Battled Ransomware in 2024: BakerHostetler

Black Basta-like Microsoft Teams phishing leads to novel backdoor | SC Media

HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments

RansomHouse Ransomware: What You Need To Know | Fortra

The CISO's Guide to Managing Ransomware Threats in 2025

Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats  - Security Boulevard

Ransomware Reaches A Record High, But Payouts Are Dwindling | Tripwire

Ransomware Attacks Rose by 126% Attacking Consumer Goods & Services Companies

Coalition’s Cyber Threat Index 2025 Finds Most Ransomware Incidents Start with Compromised VPN Devices

Ransomware Victims

Cyber Attack Impacting Oregon Environmental Department

Ransomware attack cost IKEA operator in Eastern Europe $23 million

Kidney dialysis firm DaVita hit by weekend ransomware attack

Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial - SecurityWeek

Airport retailer agrees to $6.9 million settlement over ransomware data breach | The Record from Recorded Future News

Ahold Delhaize confirms data theft after INC ransomware claims attack

Phishing & Email Based Attacks

Fraud in Your Inbox: Email Is Still the Weakest Link

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Tycoon2FA phishing kit targets Microsoft 365 with new tricks

Black Basta-like Microsoft Teams phishing leads to novel backdoor | SC Media

Cozy Bear Strikes Again: Sophisticated Phishing Campaign Hits EU Foreign Ministries

AI Presentation Tool Leveraged in Phishing Attacks

Watch Out for This Sophisticated Phishing Email That Looks Like It's From Google

Other Social Engineering

Cozy Bear Strikes Again: Sophisticated Phishing Campaign Hits EU Foreign Ministries

Russian state hackers target European diplomats — with fake wine-tasting events – POLITICO

Minister’s hacked X account promotes ‘House of Commons cryptocurrency’ scam | The Standard

Fraud, Scams and Financial Crime

Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims

Romance As A Weapon: The New Face Of Cyberattacks

Google blocked over 5 billion ads in 2024 amid rise in AI-powered scams

Microsoft Thwarts $4bn in Fraud Attempts - Infosecurity Magazine

Holyrood Article | UK minister's X account hacked to promote fake cryptocurrency

Man who helped scammers swindle at least £100m from victims is jailed | UK News | Sky News

The Most Dangerous Hackers You’ve Never Heard Of | WIRED

Artificial Intelligence

Artificial Intelligence Fuels Rise of Hard-to-Detect Bots That Now Make up More Than Half of Global Internet Traffic, According to the 2025 Imperva Bad Bot Report

The quiet data breach hiding in AI workflows - Help Net Security

"Slopsquatting" attacks are using AI-hallucinated names resembling popular libraries to spread malware | TechRadar

Google blocked over 5 billion ads in 2024 amid rise in AI-powered scams

AI Presentation Tool Leveraged in Phishing Attacks

Report: Cyber Security, Not AI, Is Top Concern for Businesses

Widely available AI tools signal new era of malicious bot activity - Help Net Security

CISOs Respond to Surge in AI-Powered Attacks with Advanced Defence Strategies

When AI agents go rogue, the fallout hits the enterprise - Help Net Security

House investigation into DeepSeek teases out funding, security realities around Chinese AI tool | CyberScoop

Organisations Found to Address Only 21% of GenAI-Related Flaws - Infosecurity Magazine

Comprehensive framework addresses AI cyber threats

10 Bugs Found in Perplexity AI's Chatbot Android App

Meta Resumes EU AI Training Using Public User Data After Regulator Approval

2FA/MFA

Don't just lock your door: MFA alone is not enough in today's cyber security climate | TechRadar

Tycoon2FA phishing kit targets Microsoft 365 with new tricks

Malware

European Companies Infected With New Chinese-Nexus Backdoor

"Slopsquatting" attacks are using AI-hallucinated names resembling popular libraries to spread malware | TechRadar

New malware ‘ResolverRAT’ targets healthcare, pharmaceutical firms

Cozy Bear Strikes Again: Sophisticated Phishing Campaign Hits EU Foreign Ministries

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

DPRK Hackers Exploit LinkedIn to Infect Developers with Infostealers - Infosecurity Magazine

Emulating the Stealthy StrelaStealer Malware - Security Boulevard

Over 16,000 Fortinet devices compromised with symlink backdoor

Midnight Blizzard deploys new GrapeLoader malware in embassy phishing

Researchers warn about ‘Goffee’ spilling onto Russian flash drives | The Record from Recorded Future News

Paper Werewolf Targets Flash Drives With New Malware

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

Bots/Botnets

Artificial Intelligence Fuels Rise of Hard-to-Detect Bots That Now Make up More Than Half of Global Internet Traffic, According to the 2025 Imperva Bad Bot Report

Widely available AI tools signal new era of malicious bot activity - Help Net Security

Mobile

The UK’s phone theft crisis is a wake-up call for digital security - Help Net Security

5 warning signs that your phone's been hacked - and how to fight back | ZDNET

Biometrics vs. passcodes: What lawyers recommend if you're worried about warrantless phone searches | ZDNET

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

35 countries use Chinese networks for transporting mobile user traffic, posing cyber risks | CyberScoop

‘China Is Everywhere’—Your iPhone, Android Phone Now At Risk

How This Simple Phone Security Boost From Google Could Be Good for Your Business

Building mobile security awareness training for end users | TechTarget

Google adds Android auto-reboot to block forensic data extractions

Your Android phone is getting a new security secret weapon - how it works | ZDNET

10 Bugs Found in Perplexity AI's Chatbot Android App

Internet of Things – IoT

The EU’s Cyber Resilience Act: New Cyber Security Requirements for Connected Products and Software | Pillsbury Winthrop Shaw Pittman LLP - JDSupra

Securing digital products under the Cyber Resilience Act - Help Net Security

Data Breaches/Leaks

From likes to leaks: How social media presence impacts corporate security - Help Net Security

Hacked law firm 'didn't think it was a data breach' – the ICO disagreed | IT Pro

The quiet data breach hiding in AI workflows - Help Net Security

Sector by sector: How data breaches are wrecking bottom lines - Help Net Security

1.6 million hit in massive insurance data breach — full names, addresses, SSNs and more exposed | Tom's Guide

Lessons from the cyber attacks on Brydens Lawyers, Aussie super funds - Lawyers Weekly

Hertz confirms customer info, drivers' licenses stolen in data breach

Govtech giant Conduent confirms client data stolen in January cyberattack

Hertz says personal, sensitive data stolen in Cleo attacks • The Register

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers - SecurityWeek

Landmark Admin now says info on 1.6M people stolen from it • The Register

Western Sydney University discloses security breaches, data leak

Laboratory Services Cooperative data breach impacts 1.6M People

Entertainment venue management firm Legends International disclosed a data breach

Whistleblower org says DOGE may have caused 'significant cyber breach' at US labor watchdog | Reuters

Private Jet Hack Surfaces Guide to Serving Elon Musk on Flights

Airport retailer agrees to $6.9 million settlement over ransomware data breach | The Record from Recorded Future News

Organised Crime & Criminal Actors

Cyber criminal groups embrace corporate structures to scale, sustain operations - Help Net Security

The Most Dangerous Hackers You’ve Never Heard Of | WIRED

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

TraderTraitor: The Kings of the Crypto Heist | WIRED

Holyrood Article | UK minister's X account hacked to promote fake cryptocurrency

The Most Dangerous Hackers You’ve Never Heard Of | WIRED

Binance Users Targeted by New Phishing SMS Scam

Insider Risk and Insider Threats

Cyber Security by Design: When Humans Meet Technology 

Insurance

Ransomware crooks search for 'insurance' 'policy' right away • The Register

Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims

What insurers should know about today’s cyber threats - Insurance Post

You’re always a target, so it pays to review your cyber security insurance | CSO Online

Supply Chain and Third Parties

Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims

Building Cyber Resilience into Supply Chains | Manufacturing.net

From Third-Party Vendors to US Tariffs: The New Cyber Risks Facing Supply Chains

Govtech giant Conduent confirms client data stolen in January cyber attack

Landmark Admin now says info on 1.6M people stolen from it • The Register

Cloud/SaaS

Microsoft blocks ActiveX by default in Microsoft 365, Office 2024

Black Basta-like Microsoft Teams phishing leads to novel backdoor | SC Media

Identity and Access Management

Identity Attacks Now Comprise a Third of Intrusions - Infosecurity Magazine

Encryption

Why businesses must prepare for a post-quantum future | TechRadar

Government's privacy dispute with Apple 'really strange', expert says

Linux and Open Source

HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments

Chinese espionage group leans on open-source tools to mask intrusions | CyberScoop

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

Passwords, Credential Stuffing & Brute Force Attacks

Credential theft escalates as threat actors use stealthier tactics

Understanding Credential Stuffing: A Growing Cyber Security Threat - Security Boulevard

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Identity Attacks Now Comprise a Third of Intrusions - Infosecurity Magazine

Biometrics vs. passcodes: What lawyers recommend if you're worried about warrantless phone searches | ZDNET

Social Media

From likes to leaks: How social media presence impacts corporate security - Help Net Security

Holyrood Article | UK minister's X account hacked to promote fake cryptocurrency

Regulations, Fines and Legislation

Hacked law firm 'didn't think it was a data breach' – the ICO disagreed | IT Pro

ICO fines law firm £60,000 after dark web publishes client data - Legal Futures

Law biz appeals £60K ICO fine over 32 GB digital burglary • The Register

The EU’s Cyber Resilience Act: New Cyber Security Requirements for Connected Products and Software | Pillsbury Winthrop Shaw Pittman LLP - JDSupra

UK: Will UK Cyber Reforms Keep Step with NIS2? | DLA Piper - JDSupra

Whiplash: The (Brief and Tragic?) Life of the SEC’s Cyber Disclosure Rules | Woodruff Sawyer - JDSupra

CVE Program Funding Reinstated—What It Means And What To Do Next

Cutting NIST’s Workforce Threatens American Tech Innovation and Leadership

Pall Mall Process Progresses but Leads to More Questions

Cybersecurity act: European Commission prepares revision | Practical Law

The US almost let the CVE system die - the cyber security world's universal bug tracker | TechSpot

Chris Krebs resigns from SentinelOne to focus on fighting Trump’s executive order | CyberScoop

Zambian cyber-security law: US embassy issues alert - BBC News

CVE Foundation Launched to Ensure the Long-term Vulnerability Tracking

Will politicization of security clearances make US cyber security firms radioactive? | CSO Online

Meta Resumes EU AI Training Using Public User Data After Regulator Approval

Securing digital products under the Cyber Resilience Act - Help Net Security

Models, Frameworks and Standards

UK: Will UK Cyber Reforms Keep Step with NIS2? | DLA Piper - JDSupra

Top Security Frameworks Used by CISOs in 2025

NIST Updates Privacy Framework, Tying It to Recent Cyber Security Guidelines | NIST

Pall Mall Process Progresses but Leads to More Questions

Cyber Security act: European Commission prepares revision | Practical Law

Holyrood | Cutting Through the Framework Fog: Building Real Cyber Resilience in Scotland

Securing digital products under the Cyber Resilience Act - Help Net Security

Data Protection

Hacked law firm 'didn't think it was a data breach' – the ICO disagreed | IT Pro

Law firm fined after hackers leak client files on dark web following cyber attack | Law Gazette

Law biz appeals £60K ICO fine over 32 GB digital burglary • The Register

Careers, Working in Cyber and Information Security

Self-Motivation: The Key to Working in Cyber Security - Infosecurity Magazine

The cyber security job market is complicated: 3 key insights - Security Boulevard

From classrooms to command posts: The cyber education crisis | SC Media

CISOs rethink hiring to emphasize skills over degrees and experience | CSO Online

The Top Company Names for a Cyber Security Résumé - Business Insider

Veterans are an obvious fit for cyber security, but tailored support ensures they succeed | CSO Online

Law Enforcement Action and Take Downs

Man who helped scammers swindle at least £100m from victims is jailed | UK News | Sky News

Met brings leader of fraud platform to justice   | Metropolitan Police


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Cyber resilience key to UK defence says Minister

Are they really hacktivists or state-backed goons in masks? • The Register

Nation State Actors

China

China can flick EU 'kill switch' -- Europe mulls cyberattack risk - Nikkei Asia

China admits behind closed doors it was involved in Volt Typhoon attacks | TechRadar

European Companies Infected With New Chinese-Nexus Backdoor

Chinese APT Mustang Panda Updates, Expands Arsenal - SecurityWeek

Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage

Chinese espionage group leans on open-source tools to mask intrusions | CyberScoop

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

35 countries use Chinese networks for transporting mobile user traffic, posing cyber risks | CyberScoop

‘China Is Everywhere’—Your iPhone, Android Phone Now At Risk

Shadow War: US-China Cyber Tensions and the Taiwan Fault Line

House investigation into DeepSeek teases out funding, security realities around Chinese AI tool | CyberScoop

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects - SecurityWeek

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

Ransomware gang 'CrazyHunter' Targets Taiwan Orgs

Russia

Cozy Bear Strikes Again: Sophisticated Phishing Campaign Hits EU Foreign Ministries

Possible Russian Hackers Targeted UK Ministry of Defence

Russian state hackers target European diplomats — with fake wine-tasting events – POLITICO

Hacking group Anonymous unleashes huge cyber attack on Russia - World News - LADbible

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine | WIRED

Midnight Blizzard deploys new GrapeLoader malware in embassy phishing

Centre Party website under attack on Election Day; suspicions point toward Russia | Yle News | Yle

Paper Werewolf Targets Flash Drives With New Malware

Poland Says Russian Cyberattacks Intensify Ahead of Vote

Researchers warn about ‘Goffee’ spilling onto Russian flash drives | The Record from Recorded Future News

Iran

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide | WIRED

North Korea

Are they really hacktivists or state-backed goons in masks? • The Register

TraderTraitor: The Kings of the Crypto Heist | WIRED

DPRK Hackers Exploit LinkedIn to Infect Developers with Infostealers - Infosecurity Magazine

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

Cyber Threats Against Energy Sector Surge as Global Tensions Mount

Cyber security threats and geopolitical risks top business travel concerns | Travolution

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know - Security Boulevard

‘We’re coming for Elon Musk’: Hacker group reportedly plans cyberattacks on Tesla, SpaceX and more | Mint

Are they really hacktivists or state-backed goons in masks? • The Register

Hacking group Anonymous unleashes huge cyberattack on Russia - World News - LADbible


Tools and Controls

Global cyber security spending is set to rise 12% in 2025 – here are the industries ramping up investment | IT Pro

Cyber Risk Quantification - Turning Security into Business Language

Hackers Exploiting Windows .RDP Files For Rogue Remote Desktop Connections

Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage

Building Cyber Resilience into Supply Chains | Manufacturing.net

94% of firms say pentesting is essential, but few are doing it right - Help Net Security

Hackers are duping developers with malware-laden coding challenges | IT Pro

DPRK Hackers Exploit LinkedIn to Infect Developers with Infostealers - Infosecurity Magazine

Cyber Security by Design: When Humans Meet Technology 

Network Edge Devices the Biggest Entry Point for Attacks on SMBs - Infosecurity Magazine

Active Directory Recovery Can't Be an Afterthought

Understanding and threat hunting for RMM software misuse | Intel 471

How This Simple Phone Security Boost From Google Could Be Good for Your Business

How Threat Intelligence Can Identify Chinks in the Armor

What is Vulnerability Exposure Management? - Security Boulevard

Demystifying Security Posture Management - SecurityWeek

Your Network Is Showing - Time to Go Stealth - Security Boulevard

Why 78% of Security Leaders Are Rethinking Their Entire Cyber Strategy in 2025

Why Every CISO Needs a Crisis Communications Plan in 2025

Why shorter SSL/TLS certificate lifespans matter - Help Net Security

Secure by design: what we can learn from the financial services sector | TechRadar

Organisations Lack Incident Response Plans, but Answers Are on the Way

AI in Cyber Security: Double-Edged Sword or Game-Changer? | Silicon UK Tech News

Cyber resilience key to UK defence says Minister

CISOs Face 2025 Cyber Threats with Shrinking Budgets and High Demands

You’re always a target, so it pays to review your cyber security insurance | CSO Online

Cyber threats are inevitable - Is your board ready? - Businessday NG




Vulnerability Management

NVD Revamps Operations as Vulnerability Reporting Surges - Infosecurity Magazine

69% of Critical & High Severity Vulnerabilities Not Patched by Organisations

94% of firms say pentesting is essential, but few are doing it right - Help Net Security

Microsoft: Exchange 2016 and 2019 reach end of support in six months

CVE Program Funding Reinstated—What It Means And What To Do Next

What is Vulnerability Exposure Management? - Security Boulevard

Screw gov’t funding, we’re going nonprofit, CVE Board declares after database debacle | Cybernews

CVE Foundation Launched to Ensure the Long-term Vulnerability Tracking

TP-Link becomes a CVE Numbering Authority to improve cyber security

Vulnerabilities

Microsoft vulnerabilities: What's improved, what's at risk - Help Net Security

Microsoft: New Windows updates fix Active Directory policy issues

Hackers lurk in over 14K Fortinet devices | Cybernews

Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution

Is Ivanti the problem or a symptom of a systemic issue with network devices? | CyberScoop

Attackers Maintaining Access to Fully Patched Fortinet Gear

New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs

Fresh Windows NTLM Vulnerability Exploited in Attacks - SecurityWeek

SonicWall Patches High-Severity Vulnerability in NetExtender - SecurityWeek

Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle - SecurityWeek

Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks

Hackers Exploiting Windows .RDP Files For Rogue Remote Desktop Connections

Major WordPress Plugin Flaw Exploited in Under 4 Hours - Infosecurity Magazine

Chrome 136 fixes 20-year browser history privacy risk

CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities - SecurityWeek

Apple Quashes Two Zero-Days With iOS, MacOS Patches - SecurityWeek

Max Severity Bug in Apache Roller Enabled Persistent Access

Critical flaws fixed in Nagios Log Server - Help Net Security

Oracle Patches 180 Vulnerabilities With April 2025 CPU - SecurityWeek

Vulnerabilities Patched in Atlassian, Cisco Products - SecurityWeek

NVIDIA and Docker Flaws Raise Container Security Concerns | MSSP Alert

Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now

10 Bugs Found in Perplexity AI's Chatbot Android App


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 11 April 2025

Black Arrow Cyber Threat Intelligence Briefing 11 April 2025:

-Why Organisations Are Doubling Down on Cyber Crisis Simulations

-UK SMEs Losing Over £3bn a Year to Cyber Incidents

-Over 40% of UK Businesses Faced Cyber Security Breaches in 2024

-Boards Urged to Follow New Cyber Code of Practice

-Two-Thirds of Financial Services Firms Hit by Cyber Breach in Past Year

-AI Is Now Better Than Humans at Phishing

-Europol Warns: AI Is Turbocharging Organised Crime

-Is HR Running Your Employee Security Training? Here’s Why That’s Not Always the Best Idea

-Precision-Validated Phishing Elevates Credential Theft Risks

-Why Remote Work Is a Security Minefield (and What You Can Do About It)

-Why Cyber Security Should Be a Top Priority in Fintech

-Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Exec Summary

Black Arrow’s look at threat intelligence from the last week highlights that attackers are now leveraging artificial intelligence to craft highly convincing phishing scams and precision-targeted campaigns. Businesses must prioritise cyber awareness among employees and leadership teams to address this. Our experience shows that even well-resourced firms are at risk if cyber training is generic, outdated, or not led by informed security teams.

This week’s developments also reinforce the importance of engaging executive leadership in cyber resilience. The rise in cyber crisis simulations reflects a growing recognition that incident response is not just an IT issue but a board-level imperative. Black Arrow Cyber is seeing increased demand for tailored tabletop exercises and governance workshops that empower leadership teams to manage risk more effectively and demonstrate proportionate control. The UK government's new Cyber Governance Code and troubling statistics, such as 65% of financial services firms experiencing breaches, only strengthen the case for structured, executive-led cyber readiness.

Finally, the rapid adoption of AI in both legitimate operations and criminal activity signals a shifting threat landscape. From fintech to remote working environments, firms are now grappling with security challenges that extend beyond technical controls. In today’s environment, cyber resilience starts with people, not just technology.

Top Cyber Stories of the Last Week

Why Organisations Are Doubling Down on Cyber Crisis Simulations

Driven by a surge in high-profile cyber attacks, 74% of CISOs plan to increase budgets for cyber crisis simulations this year. These exercises are no longer IT-only; they now involve executives across legal, finance, and communications, helping organisations coordinate more effectively under pressure. Simulations highlight gaps in processes, decision-making, and communication, offering a controlled space to strengthen response. They also address team resilience, with some firms embedding mental health checks into crisis planning. As regulatory expectations grow, simulations are proving essential in helping firms move from theoretical risk planning to practical readiness, and from chaos to coordinated response.

At Black Arrow, we are seeing an increase in clients requesting support in designing and preparing for managing a cyber security incident; this includes an incident response plan and an educational tabletop exercise for the leadership team that highlights proportionate controls to help the organisation prevent and mitigate an incident. Contact us for details.

UK SMEs Losing Over £3bn a Year to Cyber Incidents

UK SMEs are losing £3.4bn annually due to inadequate cyber security, with over 30% lacking any protection and more than a quarter facing repeated attacks each year, according to Vodafone Business. The average cost of a cyber attack is £3,400, rising to £5,000 for firms with over 50 staff. Despite the growing threat, over a third of SMEs provide no staff training, most spend under £100 annually on cyber security, and nearly two-thirds allow home working on personal devices.

Over 40% of UK Businesses Faced Cyber Security Breaches in 2024

The UK government’s latest Cyber Security Breaches Survey reveals that 43% of businesses and 30% of charities suffered a cyber breach or attack in the past year, with phishing the leading cause. Criminals are increasingly using artificial intelligence to craft convincing scams, making them harder to detect. Despite these threats, board-level oversight of cyber resilience is declining, raising concerns about organisational readiness. Experts are calling for urgent legal reform, warning that outdated legislation is hindering efforts to defend against over 8.5 million annual attacks.

Boards Urged to Follow New Cyber Code of Practice

The UK government has launched a new Cyber Governance Code of Practice to help boards strengthen their organisation’s cyber resilience. Aimed at medium and large-sized firms, the initiative responds to the growing threat landscape, with 74% of large and 70% of medium firms hit by cyber attacks or breaches in the past year. These incidents have previously cost the UK economy nearly £22bn annually. Backed by the UK’s National Cyber Security Centre (NCSC) and industry bodies, the code outlines key actions for boards, supported by training and a toolkit, helping leaders embed cyber risk management alongside financial and legal oversight.

Black Arrow’s board-level cyber security workshops enable leadership teams to implement and demonstrate proportionate governance of cyber risk management. Contact us for details.

Two-Thirds of Financial Services Firms Hit by Cyber Breach in Past Year

A recent survey of 200 senior financial services leaders revealed that nearly two-thirds (65%) of firms suffered a cyber breach in the past year, with smaller firms hit slightly harder than larger ones. Despite widespread AI adoption, with 90% of organisations using it and 84% of senior managers relying on it, almost a third of respondents lacked confidence in their ability to prevent future data breaches. Top security concerns for the year ahead include trust in AI (47%), ransomware (45%) and data mismanagement (44%). While many see AI as key to better cyber security and operational gains, training and transparency gaps remain a notable risk.

AI Is Now Better Than Humans at Phishing

A new report from AI training firm Hoxhunt has found as of March 2025, AI-generated phishing attacks were 24% more successful than those crafted by human experts. This shift is attributed to advanced AI models that tailor phishing messages to individual users, significantly increasing click rates. The findings highlight an urgent need for organisations to adopt AI-driven defences and enhance user behaviour training to stay ahead of increasingly sophisticated cyber threats.

Europol Warns: AI Is Turbocharging Organised Crime

Europol has warned that AI is transforming the landscape of organised crime, making criminal operations faster, more scalable, and harder to detect. The European Serious Organised Crime Threat Assessment reveals that AI is being exploited to automate cyber attacks, enhance social engineering, and enable large-scale fraud and identity theft. Criminals now use AI to generate convincing deepfakes and craft multilingual phishing campaigns with minimal expertise. Within financial services, AI and cryptocurrencies are increasingly used for money laundering and fraud, with Europol highlighting that the very structure of organised crime is evolving into a tech-driven enterprise.

Is HR Running Your Employee Security Training? Here’s Why That’s Not Always the Best Idea

A growing number of security leaders are warning that relying solely on HR to deliver employee security training leaves organisations exposed. While HR plays a key role in logistics and compliance, it lacks the up-to-date threat intelligence and technical insight required to effectively address phishing, social engineering, and evolving cyber attacks. Experts agree that training content must be led by security teams and tailored to sector-specific risks. Without this, organisations risk generic, outdated programmes that fail to drive real-world awareness. A collaborative approach across HR, security, IT, and legal is essential to ensure training is both relevant and effective.

Precision-Validated Phishing Elevates Credential Theft Risks

A new phishing tactic, known as precision-validated credential theft, is raising concern due to its ability to bypass traditional defences by targeting only verified, high-value email accounts. Unlike broad phishing attempts, this method uses real-time validation via JavaScript scripts or email verification APIs to ensure only active users see malicious content. In one case, attackers even redirected invalid users to legitimate sites to avoid detection. This selective targeting makes threat detection and intelligence sharing more difficult, with experts urging firms to adopt behavioural analytics and anomaly detection to identify threats before they take hold.

Why Remote Work Is a Security Minefield (and What You Can Do About It)

Remote work has become a long-term strategy for many organisations, but it brings significant cyber security risks. Key concerns include unsecured home networks, personal device use lacking enterprise protections, and increased exposure to phishing and social engineering attacks. Isolation and relaxed home environments heighten risk-taking behaviours. Organisations should look at adopting a zero trust model, mandatory use of VPNs, encrypted Wi-Fi, and regular employee training. Balancing security with employee privacy is also critical, with transparency around monitoring practices essential for trust. As AI tools evolve, so too do cyber threats, making a proactive, security-first culture more important than ever.

Why Cyber Security Should Be a Top Priority in Fintech

Fintech’s rapid growth has made it a prime target for cyber attacks, with platforms handling high volumes of sensitive personal and financial data in real time. High-profile breaches have impacted millions, highlighting the risks of underinvesting in security. Fast-moving startups, third-party integrations, and misconfigured cloud environments widen the attack surface. Yet, forward-thinking firms view cyber security as a strategic enabler, building trust, driving compliance, and attracting investment. Core priorities now include zero trust architectures, AI-driven threat detection, and secure development practices. In digital finance, security is not optional; it’s the foundation on which trust, growth, and resilience are built.

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Armis has found that nearly half of UK organisations have paused or delayed digital transformation projects due to rising fears of state-sponsored cyber attacks. Concern around nation-state threats has surged by 32% since last year, with 88% of IT decision-makers voicing alarm and 47% having already reported incidents to authorities. The report highlights further strain on firms, as 52% cite regulatory complexity and 48% admit to lacking in-house expertise to manage AI-powered security tools. With China, Russia and North Korea seen as top cyber threats, businesses are being urged to shift to a proactive cyber security stance to mitigate growing risks.

Sources:

https://www.helpnetsecurity.com/2025/04/09/ciso-cyber-crisis-simulations/

https://www.computerweekly.com/news/366622019/UK-SMEs-losing-over-3bn-a-year-to-cyber-incidents

https://www.infosecurity-magazine.com/news/40-uk-businesses-face-breaches/

https://www.infosecurity-magazine.com/news/bords-urged-follow-new-cyber-code/

https://www.techcentral.ie/two-thirds-of-financial-services-firms-hit-by-cyber-breach-in-past-year-report/

https://betanews.com/2025/04/04/ai-is-now-better-that-humans-at-phishing/

https://informationsecuritybuzz.com/europol-ai-is-turbocha-organized-crime/

https://www.csoonline.com/article/3856404/is-hr-running-your-employee-security-training-heres-why-thats-not-always-the-best-idea.html

https://www.infosecurity-magazine.com/news/precision-validated-phishing/

https://www.helpnetsecurity.com/2025/04/11/remote-work-cybersecurity-challenges/

https://www.finextra.com/blogposting/28257/why-cybersecurity-should-be-a-top-priority-in-fintech

https://www.infosecurity-magazine.com/news/half-firms-stall-digital-projects/



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware Attacks Hit All-Time High as Payoffs Dwindle - Infosecurity Magazine

Ransomware 2025: gangs hunt for Fortune 500 companies | Cybernews

Ban ransomware payments? UK pitches new cyber rules

Ransomware Incidents On the Rise in the UK - DataBreachToday

Medusa Rides Momentum From Ransomware-as-a-Service Pivot

Ransomware Underground Faces Declining Relevance

Ransomware groups push negotiations to new levels of uncertainty - Help Net Security

Everest ransomware group’s Tor leak site offline after a defacement

Everest ransomware's dark web leak site defaced, now offline

US businesses are the top target for ransomware in 2025 so far | TechRadar

Ransomware Victims

Food giant WK Kellogg discloses data breach linked to Clop ransomware

Clop Ransomware Hack Of WK Kellogg Shows Growing Threat To Your Data

Beyond The Breach: The Ongoing Impact Of The Change Healthcare Attack

Port of Seattle says ransomware breach impacts 90,000 people

Medway Community Healthcare still recovering from 'cyber-attack' - BBC News

Ransomware Gang Claims Hack Of NASCAR

Phishing & Email Based Attacks

AI is now better than humans at phishing

Phishing kits now vet victims in real-time before stealing credentials

Precision-Validated Phishing Elevates Credential Theft Risks - Infosecurity Magazine

Why defensive AI alone is not enough: the crucial role of a strong security culture | TechRadar

How Cyber Criminals Are Exploiting QR Codes for Phishing Attacks - ClearanceJobs

Phishing, fraud, and the financial sector's crisis of trust - Help Net Security

Scattered Spider adds new phishing kit, malware to its web • The Register

Attackers Use 'Spam Bombing' to Hide Malicious Motives

iOS devices face twice the phishing attacks of Android - Help Net Security

New PoisonSeed Attacking CRM & Bulk Email Providers in Supply Chain Phishing Attack

Cyber security company alarmed by ease of scam creation with Lovable website builder | Cybernews

E-ZPass toll payment texts return in massive phishing wave

Over 100 million malicious emails blocked by HMRC | TechRadar

Other Social Engineering

Smishing Triad Fuels Surge in Toll Payment Scams in US, UK - Infosecurity Magazine

Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch

Hackers are pretending to be drone companies and state agencies to spy on Ukrainian victims | The Record from Recorded Future News

Fraud, Scams and Financial Crime

Identity Fraud Costs Orgs Average of $7m Annually - IT Security Guru

Trump’s justice department to disband unit investigating crypto fraud | Trump administration | The Guardian

Phishing, fraud, and the financial sector's crisis of trust - Help Net Security

Smishing Triad Fuels Surge in Toll Payment Scams in US, UK - Infosecurity Magazine

Cyber criminals are trying to loot Australian pension accounts in new campaign | The Record from Recorded Future News

Australian pension funds hit by wave of credential stuffing attacks

This Is How Hackers Target Everyday People With AI Chatbots

SIM-swapper must repay $13.2M to 59 victims • The Register

Cyber security company alarmed by ease of scam creation with Lovable website builder | Cybernews

Artificial Intelligence

AI is now better than humans at phishing

Why defensive AI alone is not enough: the crucial role of a strong security culture | TechRadar

Europol Warns: AI Is Turbocharging Organised Crime

AI is Reshaping Cyber Threats: Here’s What CISOs Must Do Now - Security Boulevard

Key Cyber Security Challenges In 2025—Trends And Observations

The rise of compromised LLM attacks - Help Net Security

This Is How Hackers Target Everyday People With AI Chatbots

DDoS attacks added to cyberwarfare toolkit amid AI, botnet enhancements | SC Media

AI-Powered AkiraBot Evades CAPTCHA to Spam 80,000 Websites - Infosecurity Magazine

Cyber security company alarmed by ease of scam creation with Lovable website builder | Cybernews

How to find out if your AI vendor is a security risk - Help Net Security

Malware

Network-based malware detections increase 94 percent

Police detains Smokeloader malware customers, seizes servers

An APT group exploited ESET flaw to execute malware

Scattered Spider adds new phishing kit, malware to its web • The Register

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

Threat Actors Weaponize Windows Screensavers Files to Deliver Malware

PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party

Open Source Poisoned Patches Infect Local Software

Bots/Botnets

New Mirai botnet behind surge in TVT DVR exploitation

Europol Targets Customers of Smokeloader Pay-Per-Install Botnet - SecurityWeek

Russian bots hard at work spreading political unrest on Romania's internet

DDoS attacks added to cyberwarfare toolkit amid AI, botnet enhancements | SC Media

AI-Powered AkiraBot Evades CAPTCHA to Spam 80,000 Websites - Infosecurity Magazine

Mobile

Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

iOS devices face twice the phishing attacks of Android - Help Net Security

Is your Android smartphone at risk? Here’s what you need to know - Talk Android

Call Records of Millions Exposed by Verizon App Vulnerability - SecurityWeek

iPhone vault app exposed passwords, photos | Cybernews

Denial of Service/DoS/DDoS

DDoS Attacks on the Rise, but How Can You Prevent One?

Fastly DDoS Attack Insights helps reveal and explain the unfolding of a DDoS attack - Help Net Security

DDoS attacks added to cyberwarfare toolkit amid AI, botnet enhancements | SC Media

Internet of Things – IoT

New Mirai botnet behind surge in TVT DVR exploitation

Will IoT Downtime Be the Biggest Risk of the Next Decade?

Study Identifies 20 Most Vulnerable Connected Devices of 2025 - SecurityWeek

'Cyber security likely to become key feature in next-gen connected vehicles' | Auto - Business Standard

Nissan Leaf Hacked for Remote Spying, Physical Takeover - SecurityWeek

Data Breaches/Leaks

Oracle tells customers its public cloud was compromised • The Register

Over 200 German politician email addresses appear on dark web | Proton

Food giant WK Kellogg discloses data breach linked to Clop ransomware

Beyond The Breach: The Ongoing Impact of the Change Healthcare Attack

The Reg translates Oracle's weak breach confession letter • The Register

Hackers accessed 150,000 emails of 100 US bank regulators at OCC | SC Media

Europcar GitLab breach exposes data of up to 200,000 customers

Signalgate solved? Reports claim accidental contact mix-up • The Register

Call Records of Millions Exposed by Verizon App Vulnerability - SecurityWeek

iPhone vault app exposed passwords, photos | Cybernews

Morocco's social security database breached by hackers in an unprecedented cyber attack - Washington Times

Organised Crime & Criminal Actors

Europol Warns: AI Is Turbocharging Organised Crime

EDR-as-a-Service makes the headlines in the cyber crime landscape

Operation Endgame Continues with Smokeloader Customer Arrests - Infosecurity Magazine

Europol Targets Customers of Smokeloader Pay-Per-Install Botnet - SecurityWeek

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Trump’s justice department to disband unit investigating crypto fraud | Trump administration | The Guardian

PoisonSeed phishing campaign behind emails with wallet seed phrases

New PoisonSeed Attacking CRM & Bulk Email Providers in Supply Chain Phishing Attack

Jack Dorsey's Block fined $40M for compliance failures

Insurance

Cyber insurance set to boom but so are the threats – Munich Re

The Big Question: Are we at the dawn of fundamental change in the cyber insurance market? - Emerging Risks Media Ltd

New cyber threats demand new model report warns

Supply Chain and Third Parties

PoisonSeed phishing campaign behind emails with wallet seed phrases

New PoisonSeed Attacking CRM & Bulk Email Providers in Supply Chain Phishing Attack

Cloud/SaaS

Oracle tells customers its public cloud was compromised • The Register

Hackers target SSRF flaws to steal AWS credentials | CSO Online

The Reg translates Oracle's weak breach confession letter • The Register

Oracle confirms the hack of two obsolete servers hacked. No Oracle Cloud systems or customer data were affected

Identity and Access Management

The shift to identity-first security and why it matters - Help Net Security

Encryption

Secure Communications Evolve Beyond End-to-End Encryption

UK Home Office loses attempt to keep legal battle with Apple secret | Home Office | The Guardian

Passwords, Credential Stuffing & Brute Force Attacks

Phishing kits now vet victims in real-time before stealing credentials

Sophisticated credential exfiltrating phishing kits with real-time validation emerge | SC Media

Hackers target SSRF flaws to steal AWS credentials | CSO Online

Social Media

Senate hears Meta dangled US data in bid to enter China • The Register

Training, Education and Awareness

Is HR running your employee security training? Here’s why that’s not always the best idea | CSO Online

Regulations, Fines and Legislation

Is the ICO Ready for the Resilience Bill's Requirements? | SC Media UK

DORA Compliance Part 2: Addressing Compliance Across Critical Operational Areas | Integreon - JDSupra

Boards Urged to Follow New Cyber Code of Practice - Infosecurity Magazine

UK says company boards need to worry more about cyber security risks | News Brief | Compliance Week

Ban ransomware payments? UK pitches new cyber rules

UK Court Rejects Government Secrecy in Apple's Fight Against Backdoor Request - MacRumors

The Cyber Resilience Act: Consultation on the Technical Description Opens

Rebranding of SEC Cyber Unit Reflects Shift in Enforcement Priorities | King & Spalding - JDSupra

CISA braces for more cuts, threat-intel efforts are doomed • The Register

Trump’s justice department to disband unit investigating crypto fraud | Trump administration | The Guardian

CISA reevaluating its critical infrastructure public-private partnership | Hogan Lovells - JDSupra

Trump orders DOJ to investigate pair who disputed his allegation of election fraud - SiliconANGLE

Cyber experts offer lukewarm praise for voluntary code governing use of commercial hacking tools | CyberScoop

Three key federal cyber regulations to watch under Trump

What You Don’t Disclose Can Hurt You: The Power of Proactive Risk Factor Disclosures | Woodruff Sawyer - JDSupra

Trump Fires NSA, Cyber Command Chief, Fuelling Security Fears

President Trump fired the head of U.S. Cyber Command and NSA

Cyber attacks to thrive amid Trump tariffs, says expert | SC Media

Jack Dorsey's Block fined $40M for compliance failures

Models, Frameworks and Standards

DORA Compliance Part 2: Addressing Compliance Across Critical Operational Areas | Integreon - JDSupra

Business leaders supported to bolster online defences to safeguard growth - GOV.UK

The Cyber Resilience Act: Consultation on the Technical Description Opens

Backup and Recovery

Do backups mean little when incident response dawdles? • The Register

How to work backups into your cyber hygiene routine

Data Protection

Malicious cyber actors using spyware to target individuals’ personal data | Cyber.gov.au

Why Data Privacy Isn't the Same as Data Security

Careers, Working in Cyber and Information Security

A continuous learning strategy | Professional Security Magazine

Neurodiversity in Cyber Security: A Strategic Advantage Beyond DEI | SC Media UK

Cyber Security Career Resilience: Certs + Experience =

CISA Releases NICE Workforce Framework Version 2.0.0 Released - What’s New

Law Enforcement Action and Take Downs

UK Home Office loses attempt to keep legal battle with Apple secret | Home Office | The Guardian

Trump’s justice department to disband unit investigating crypto fraud | Trump administration | The Guardian

Police detains Smokeloader malware customers, seizes servers

Operation Endgame Continues with Smokeloader Customer Arrests - Infosecurity Magazine

Europol Targets Customers of Smokeloader Pay-Per-Install Botnet - SecurityWeek

SIM-swapper must repay $13.2M to 59 victims • The Register

Misinformation, Disinformation and Propaganda

Russian bots hard at work spreading political unrest on Romania's internet


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

DDoS attacks added to cyberwarfare toolkit amid AI, botnet enhancements | SC Media

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges - Infosecurity Magazine

Nation State Actors

China

Google Cloud: China Achieves “Cyber Superpower” Status - Infosecurity Magazine

China unveils underwater ‘kill switch’ for the internet: How this tech could sever global connectivity - The Economic Times

Russia, China target SpaceX's Starlink in escalating space electronic warfare - SpaceNews

What Should the US Do About Salt Typhoon?

Chinese claimed behind closed doors, PRC played role in US cyber attacks: Report | Fox News

China Admits Conducting Cyber Attacks Against US | Newsmax.com

NCSC issues warning over Chinese Moonshine and BadBazaar spyware | Computer Weekly

An APT group exploited ESET flaw to execute malware

Security experts say US-China trade war could hit cyber space • The Register

Smishing Triad Fuels Surge in Toll Payment Scams in US, UK - Infosecurity Magazine

Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch

Senate hears Meta dangled US data in bid to enter China • The Register

Russia

Weekly cyber attacks on UK by pro-Russian and pro-Palestinian hackers

Russia, China target SpaceX's Starlink in escalating space electronic warfare - SpaceNews

Germany suspects Russian cyber attack on research group – DW – 04/08/2025

Russian hackers attack Western military mission using malicious drive

Gamaredon targeted the military mission of a Western country based in Ukraine

Hackers are pretending to be drone companies and state agencies to spy on Ukrainian victims | The Record from Recorded Future News

Ukraine subjected to new cyberespionage campaign | SC Media

Germany links cyber attack on research group to Russian state-backed hackers | The Record from Recorded Future News

Russian bots hard at work spreading political unrest on Romania's internet

North Korea

North Korea Becomes The World's Third-largest Bitcoin Holder Thanks To The Activities Of The Hacker Group Lazarus - FinanceFeeds

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

The need for collaborative global cyber diplomacy is growing - Nextgov/FCW

Capacity is Critical in Riskier Threat Landscape | Trend Micro (US)

Court document reveals locations of WhatsApp victims targeted by NSO spyware | TechCrunch




Vulnerability Management

The Ultimate Guide to Vulnerability Assessment - Security Boulevard

10 best practices for vulnerability management according to CISOs | CSO Online

NIST Declares CVE Cutoff: Pre-2018 Vulnerabilities Now ‘Deferred’

It’s time to stop the victim-blaming and insist on safer software | Computer Weekly

Microsoft delays WSUS driver sync deprecation indefinitely

Vulnerabilities

Hackers are targeting Ivanti VPN users again – here’s what you need to know | IT Pro

Microsoft patches zero-day actively exploited in string of ransomware attacks | CyberScoop

Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability

Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

WinRAR flaw bypasses Windows Mark of the Web security alerts

Chrome preps fix for browser history spying • The Register

Still using WinRAR? It has a worrying security flaw that could let hackers hijack your Windows device | TechRadar

ESET Vulnerability Exploited for Stealthy Malware Execution - SecurityWeek

Vulnerabilities Patched by Ivanti, VMware, Zoom  - SecurityWeek

Critical FortiSwitch flaw lets hackers change admin passwords remotely

VMware Patches Multiple 47 Vulnerabilities VMware Tanzu Greenplum Backup & Components

SAP Patches Critical Code Injection Vulnerabilities - SecurityWeek

Adobe Patches 11 Critical ColdFusion Flaws Amid 30 Total Vulnerabilities Discovered

WhatsApp Flaw Exposes Users To Malicious Attacks

Juniper Networks Patches Dozens of Junos Vulnerabilities - SecurityWeek

Hackers exploit WordPress plugin auth bypass hours after disclosure

Zero-Day Vulnerability in CentreStack Exploited to Breach Enterprise File Servers | MSSP Alert

Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes

Call Records of Millions Exposed by Verizon App Vulnerability - SecurityWeek


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Advisory 09 April 2025 – Key Security Updates from Microsoft, Fortinet, Adobe, Ivanti, and Google Chrome

Black Arrow Cyber Advisory 09 April 2025 – Key Security Updates from Microsoft, Fortinet, Adobe, Ivanti, and Google Chrome

Executive Summary

Microsoft’s Patch Tuesday for April 2025 delivered security updates addressing 134 vulnerabilities across its product line, including an actively exploited zero-day vulnerability (CVE-2025-29824) in the Windows Common Log File System Driver. This month, several other major software and hardware vendors also released critical security updates to address vulnerabilities that could be exploited by attackers.​

Fortinet issued security advisories addressing multiple vulnerabilities across various products, including a critical flaw (CVE-2024-48887) in FortiSwitch that could allow unauthorised password changes.

Adobe released updates addressing 30 vulnerabilities across multiple products, including 11 critical issues in ColdFusion that could lead to arbitrary code execution and unauthorised file system access. ​

Ivanti disclosed a critical vulnerability (CVE-2025-22457) in its Connect Secure, Policy Secure, and ZTA gateways, which has been exploited in the wild, allowing remote code execution. ​Ivanti also released a security advisory addressing several medium and high vulnerabilities in Ivanti Endpoint Manager.

Google released a security update for Chrome, addressing a high-severity use-after-free vulnerability (CVE-2025-3066) in the Site Isolation component, which could allow remote code execution. ​

What’s the risk to me or my business?

The actively exploited vulnerabilities could allow an attacker to compromise the confidentiality, integrity, and availability of the affected applications and the organisation's data on the affected systems.​

What can I do?

Black Arrow recommends applying the available security updates for all supported versions of products that have been impacted by the various vulnerabilities. The updates should be applied as soon as possible for actively exploited vulnerabilities and all other vulnerabilities that have critical or high severity ratings.

Microsoft

Further details on specific updates within this Microsoft patch Tuesday can be found here:

https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr

Forinet, Adobe, Ivanti, Google

Further details of the vulnerabilities in affected Apple, Adobe, Fortinet and SAP:

https://helpx.adobe.com/security/security-bulletin.html

https://fortiguard.fortinet.com/psirt

https://www.ivanti.com/blog/april-security-update

https://www.ivanti.com/blog/security-update-pulse-connect-secure-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways

https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_8.html

#threatadvisory #threatintelligence #cybersecurity

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 04 April 2025

Black Arrow Cyber Threat Intelligence Briefing 04 April 2025:

-Why Global Tensions Are a Cyber Security Problem for Every Business

-When Disaster Strikes, Proper Preparation Prevents Poor Performance

-GenAI Turning Employees into Unintentional Insider Threats

-Cyber Scams Cost Businesses $1.7 Million Per Year, Claims Report

-The Human Side of Insider Threats: People, Pressure, and Payback

-North Korean IT Worker Army Expands Operations in Europe

-The UK’s Cyber Security and Resilience Bill Will Boost Standards and Increase Costs

-Why Multi-Factor Authentication Is Still Absolutely Essential in 2025

-Bridging the Gap Between the CISO and the Board of Directors

-Enterprises Beef Up Cyber Security Plans to Mitigate AI Risks

-Prioritising an Enterprise-wide Cyber Culture in 2025

-Surge of Swatting Attacks Targets Corporate Executives and Board Members

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Summary

Our review of threat intelligence this week looks at the increase in state-linked cyber attacks driven by geopolitical tensions, increasingly targeting sectors like energy, manufacturing, and healthcare. This includes reports of the North Korean Army posing as remote IT freelancers to infiltrate organisations in Europe. The UK Government is progressing its Cyber Security and Resilience Bill to improve security against these and other threats.

Also, research shows that the rise of generative AI apps has led to a significant increase in data sharing risks, despite policies being in place, while insider threats, potentially driven by personal stress and dissatisfaction, remain a critical concern. To mitigate these risks, organisations must enhance both technical controls and cultural improvements.

Businesses are reported to be struggling with disaster recovery, even those with incident response plans, highlighting the need for regular testing and secure backups. Regular testing, third-party involvement, and up-to-date network mapping are crucial for effective response. Backup systems often fail due to misconfiguration or lack of testing, and attackers increasingly target backups, making their security vital.

Black Arrow believes that resilient organisations will be those that treat cyber security not as an IT function, but as a strategic, people-led business priority.

Top Cyber Stories of the Last Week

Why Global Tensions Are a Cyber Security Problem for Every Business

A surge in geopolitical tensions is fuelling a rise in state-linked cyber attacks, which are becoming more frequent, sophisticated, and difficult to attribute. Businesses are increasingly being targeted, especially in sectors like energy, manufacturing, and healthcare, with attacks now blending espionage, sabotage, and financially motivated cyber crime. A PwC report confirms that board-level attention is growing, as CEOs reassess supplier risks and operational exposure in politically unstable regions. With traditional defences struggling to keep pace, experts recommend a shift towards cyber-informed engineering and stronger industry collaboration. In this volatile climate, cyber security has become a core strategic issue, not just a technical concern.

When Disaster Strikes, Proper Preparation Prevents Poor Performance

Many firms remain underprepared for disaster recovery, and that includes those that have incident response plans in place. Experts stress that regular testing, ideally involving third parties, and up-to-date network mapping are critical to effective response. Tools like chaos engineering software and automation scripts can help simulate and handle real-world failures. Yet, many organisations still rely on manual methods, risking delays during a crisis. Backup systems, although common, often fail due to misconfiguration or lack of testing. With attackers increasingly targeting backups, ensuring their security is vital. Ultimately, consistent preparation and practice are key to avoiding chaos during high-pressure incidents.

GenAI Turning Employees into Unintentional Insider Threats

Netskope has found that enterprise data sharing with generative AI (GenAI) apps has surged 30-fold in a year, with the average organisation now transferring over 7.7GB of data per month. This includes sensitive material such as source code, regulated data, and passwords. While 90% of organisations have users directly accessing GenAI apps, 72% of users do so via personal accounts, creating a growing risk from unintentional insider threats. With GenAI now embedded across both dedicated tools and backend systems, firms are struggling with visibility and governance, despite 99% having policies in place to reduce the associated cyber security risks.

Cyber Scams Cost Businesses $1.7 Million Per Year, Claims Report

According to BrandShield’s 2025 CyberScam Report, 98% of businesses experienced a cyber attack in 2024, with 94% suffering financial losses, averaging $1.7 million annually. The most common threats included supply chain attacks, brand impersonation, and advanced persistent threats. As a result, 76% of CISOs expect increased budgets for threat monitoring in 2025. Concern around AI risks rose significantly among those impacted, particularly where losses exceeded $1 million. The report underscores the growing scale of online threats, with cyber criminals increasingly leveraging AI faster than organisations can respond, prompting calls for real-time, AI-driven defences.

The Human Side of Insider Threats: People, Pressure, and Payback

Insider threats remain a critical but often overlooked cyber security risk, driven not just by malicious intent but by personal stress, dissatisfaction, and opportunity. Studies highlight motivations ranging from financial pressure and mental health issues to ideological beliefs and career frustration. Notably, breaches at Capital One and Tesla affected over 180 million individuals combined, with insiders exploiting trusted access. The FBI has also warned of remote work abuse by North Korean operatives. Organisations are urged to combine technical controls with cultural improvements limiting access, offering mental health support, and addressing grievances early, to reduce the likelihood of insiders turning against their employers.

North Korean IT Worker Army Expands Operations in Europe

North Korean IT workers are expanding their operations into Europe, posing as remote freelancers to infiltrate organisations and generate revenue for the DPRK regime. A recent Google Threat Intelligence report highlights activity in Germany, Portugal, and the UK, with workers using fake identities and encrypted payment methods like cryptocurrency. Roles range from AI and blockchain to CMS development, including targeting defence and government sectors. Up to 90% of wages are reportedly funnelled to the regime. The UK has issued an advisory, warning that hiring such workers could breach financial sanctions and expose firms to data theft and extortion.

The UK’s Cyber Security and Resilience Bill Will Boost Standards and Increase Costs

The UK government’s upcoming Cyber Security and Resilience Bill will significantly expand regulation to cover up to 1,100 managed service providers and 64 data centre operators, driving higher security standards but also increasing service costs. Providers will be required to report serious incidents, including supply chain attacks, to the National Cyber Security Centre within 24 hours. The Information Commissioner’s Office will take on a new regulatory role, prompting concerns over scope and resourcing. With over half of UK businesses facing cyber attacks last year and one NHS supplier breach alone costing £32.7 million, the bill aims to drive long-term resilience across critical digital infrastructure.

Why Multi-Factor Authentication Is Still Absolutely Essential in 2025

Passwords alone are not sufficient to protect online accounts, especially as data breaches and phishing attacks continue to rise. Multi-factor authentication (MFA) adds an essential layer of security by requiring a second form of identification, typically a code sent to or generated by a smartphone. Even if a password is stolen, an attacker is unlikely to gain access without this second factor. Research shows MFA stops the vast majority of unauthorised sign-in attempts, making it one of the most effective and accessible defences available. Enabling MFA is a simple but critical step for safeguarding sensitive accounts in 2025. No control is bulletproof of course, and attackers are increasingly finding ways around MFA but it still an essential control.

Bridging the Gap Between the CISO and the Board of Directors

A recent CISO report highlights a communication gap between security leaders and board members, with only 29% of boards feeling adequately informed about security milestones, compared to 44% of CISOs. This disconnect risks real financial and reputational harm, including regulatory non-compliance and data breaches. The report recommends CISOs build stronger ties across departments, improve communication by translating technical risks into business outcomes, and align clearly on compliance responsibilities. As CISOs evolve into strategic advisers, their ability to demonstrate cyber security as a business enabler is key to bridging the gap and gaining lasting influence within the C-suite.

Enterprises Beef Up Cyber Security Plans to Mitigate AI Risks

Gallagher’s latest report finds that over 2 in 5 business leaders have strengthened cyber security and data protection practices in response to growing risks linked to AI use. Concerns cited include inaccurate outputs, data breaches, privacy violations and legal exposure. Despite rising investment in AI integration and talent, fewer leaders are now communicating these risks to staff, down from 84% to 78% year on year. While 70% of cyber leaders plan to adopt AI tools in the next year, fewer than 2 in 5 believe the benefits of generative AI outweigh its risks, highlighting the need for sustained, organisation-wide resilience efforts.

Prioritising an Enterprise-wide Cyber Culture in 2025

In 2025, organisations face increasingly complex cyber threats, including AI-driven risks such as deepfakes and advanced phishing attacks. A resilient cyber culture, underpinned by strong leadership commitment and clear expectations, is critical. Employee behaviour is the key vulnerability, which can be enhanced by integrating cyber security into performance reviews, rewarding vigilance, and using plain language in training and communication driven by strong leadership commitment. Regularly tracking indicators like breach numbers, phishing test results and compliance rates supports continuous improvement ensuring innovation isn’t stifled while maintaining a secure environment in the face of evolving risks.

Surge of Swatting Attacks Targets Corporate Executives and Board Members

Swatting attacks, where criminals make fake emergency calls to prompt armed police responses, are increasingly targeting C-suite executives and board members in the US. Over the past four months, threat intelligence has identified a surge in such incidents, especially in healthcare, pharma, and esports sectors, with hotspots in Boston, Chicago, San Francisco, and LA. Attackers exploit personal data from company websites, data brokers, and breached records to locate victims. Experts warn this marks a shift to coordinated campaigns against corporate leadership. Reducing digital footprints and limiting personal details in public filings are key steps to reduce risk.

Sources:

https://www.helpnetsecurity.com/2025/04/01/global-tensions-cybersecurity-problem/

https://www.theregister.com/2025/04/03/disaster_planning_preparation/

https://www.helpnetsecurity.com/2025/03/31/genai-apps-risks-organizations/

https://www.itpro.com/security/cyber-scams-cost-businesses-1-7-million-per-year-report

https://www.helpnetsecurity.com/2025/04/01/insider-threats-why-people-turn-on-their-employers/

https://www.bleepingcomputer.com/news/security/north-korean-it-worker-army-expands-operations-in-europe/

https://www.csoonline.com/article/3951957/the-uks-cyber-security-and-resilience-bill-will-boost-standards-and-increase-costs.html

https://www.zdnet.com/article/why-multi-factor-authentication-is-absolutely-essential-in-2025/

https://www.darkreading.com/cybersecurity-operations/bridging-gap-between-ciso-board

https://www.ciodive.com/news/enterprise-cybersecurity-AI-risk-strategy-shift-report/743755/

https://federalnewsnetwork.com/commentary/2025/03/prioritizing-an-enterprisewide-cyber-culture-in-2025/

https://www.csoonline.com/article/574491/surge-of-swatting-attacks-targets-corporate-executives-and-board-members.html



Threats

Ransomware, Extortion and Destructive Attacks

Cyber Criminals exfiltrate data in just three days - Help Net Security

Hunters International shifts from ransomware to pure data extortion

Hunters International said ransomware now ‘too risky’ • The Register

Hunters International Overlaps Hive Ransomware Attacking Windows, Linux, and ESXi Systems

Why paying the ransom is not the answer | TechRadar

HellCat Ransomware: What You Need To Know | Tripwire

VanHelsing Ransomware: What You Need To Know | Tripwire

Ransomware crews add EDR killers to their arsenal • The Register

Hackers Used Weaponized Zoom Installer to Gain RDP Access & Deploy BlackSuit Ransomware

Resilience in the face of ransomware: A key to business survival

Prince Ransomware - An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub

New phishing scam outsmarts security codes to steal your info - CyberGuy

US, Australia, Canada warn of ‘fast flux’ scheme used by ransomware gangs | The Record from Recorded Future News

Ransomware Payments Ban: What it Means for Businesses | SC Media UK

Ransomware Victims

Malaysia PM Refuses to Pay $10M Ransomware Demand

Sam’s Club Investigates Alleged Cl0p Ransomware Breach

Retail giant Sam’s Club investigates Clop ransomware breach claims

Ransomware Group Takes Credit for National Presto Industries Attack - SecurityWeek

Phishing & Email Based Attacks

This new phishing campaign can tailor its messages to target you with your favourite businesses | TechRadar

11 ways cyber criminals are making phishing more potent than ever | CSO Online

KnowBe4 Report Finds Polymorphic Phishing Features Present In 76.4% Of Campaigns

How to Recognize and Defend Against 7 Specific Phishing Attacks - ClearanceJobs

New Phishing Attack Combines Vishing and DLL Sideloading Techniques - Infosecurity Magazine

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion

Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks

Cyber Criminals Expand Use of Lookalike Domains in Email Attacks - Infosecurity Magazine

Only 1% of malicious emails that reach inboxes deliver malware - Help Net Security

Surge in Smishing Fuelled by Lucid PhaaS Platform

AI phishing hits its Skynet moment as agents outperform human red teams - SiliconANGLE

Watch out - those PDFs lurking in your inbox could be a major security risk | TechRadar

Phishing Emails Aren't as Obvious Anymore. Here's How to Spot Them - CNET

Help! I clicked on a phishing link - now what? | ZDNET

Over 500 Phishing Domains Emerge Following Bybit Heist - Infosecurity Magazine

Phishers are increasingly impersonating electronic toll collection companies - Help Net Security

New phishing scam outsmarts security codes to steal your info - CyberGuy

Other Social Engineering

North Korean IT worker army expands operations in Europe

New Phishing Attack Combines Vishing and DLL Sideloading Techniques - Infosecurity Magazine

Qakbot Resurfaces in Fresh Wave of ClickFix Attacks

Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks

Surge in Smishing Fueled by Lucid PhaaS Platform

Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

Social Engineering Just Got Smarter

Artificial Intelligence

GenAI turning employees into unintentional insider threats - Help Net Security

Enterprises beef up cyber security plans to mitigate AI risks | CIO Dive

How to recognize and prevent deepfake scams - Help Net Security

How AI Is Opening New Doors for Hackers to Cause Chaos - Business Insider

What Cyber Security Guardrails Do CIOs and CISOs Want for AI?

Does AI leave security teams struggling? | TechRadar

Cyber Security’s Greatest Threat Isn’t AI—It’s Us

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor - SecurityWeek

Hackers Exploit Microsoft Teams in Multi-Stage AI Cyber Attack

What You Should Know About the UK's New Cyber Standard

UK public expresses strong support for AI regulation | Computer Weekly

Generative AI Is reshaping financial fraud. Can security keep up? - Help Net Security

AI phishing hits its Skynet moment as agents outperform human red teams - SiliconANGLE

Law enforcement needs to fight fire with fire on AI threats | ITPro

Gray Bots Surge as Generative AI Scraper Activity Increases - Infosecurity Magazine

2FA/MFA

Why multi-factor authentication is absolutely essential in 2025 | ZDNET

'Evilginx' Tool (Still) Bypasses MFA

Microsoft secretly stopped actors from snooping on your MFA codes | CSO Online

Malware

CoffeeLoader Malware Is Stacked With Vicious Evasion Tricks

Hackers Used Weaponized Zoom Installer to Gain RDP Access & Deploy BlackSuit Ransomware

Watch out - those PDFs lurking in your inbox could be a major security risk | TechRadar

Infostealer malware: What’s the threat to businesses? | ITPro

Rootkit, Backdoor and Tunneler: Ivanti Malware Does It All

Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe - SecurityWeek

9-Year-Old NPM Crypto Package Hijacked for Information Theft - SecurityWeek

These Hackers Use Your GPU To Load Password-Stealing Malware

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

Threats Actors Hide Malware in Wordpress Websites to Execute Code Remotely

Qakbot Resurfaces in Fresh Wave of ClickFix Attacks

We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain

Trojan.Arcanum — a new trojan targeting tarot experts, esotericists, and magicians | Kaspersky official blog

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Only 1% of malicious emails that reach inboxes deliver malware - Help Net Security

'Evilginx' Tool (Still) Bypasses MFA

Ransomware crews add EDR killers to their arsenal • The Register

Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

Beware fake AutoCAD, SketchUp sites dropping malware - Help Net Security

Open-source malware doubles, data exfiltration attacks dominate - Help Net Security

Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware

Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances  - SecurityWeek

Suspected Chinese snoops hijacking buggy Ivanti gear — again • The Register

Amateur Hacker Leverages Bulletproof Hosting Server to Spread Malware - Infosecurity Magazine

Russia-linked Gamaredon targets Ukraine with Remcos RAT

Mobile

'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft - SecurityWeek

An old Android RAT has returned with some new tricks - here is what to look out for | TechRadar

Russian authorities arrest three suspects behind Mamont Android banking trojan

Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices

Five VPN apps in the App Store had links to Chinese military - 9to5Mac

This sneaky Android spyware needs a password to uninstall. Here's how to remove it without one. | TechCrunch

Hacker Leaks Samsung Customer Data - SecurityWeek

Denial of Service/DoS/DDoS

DDoS attacks now a dominant means of waging political cyber-warfare

Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks - SecurityWeek

The Baby Rattlesnake of Cyber Attacks: Why Layer 7 DDoS Can Be More Dangerous Than Larger Threats - Security Boulevard

Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers | CSO Online

Surging DDoS attack rates show no sign of slowing down – here’s why | ITPro

Internet of Things – IoT

7 Tips to Keep Your Smart Home Safer and More Private, From a NIST Cyber Security Researcher | NIST

Connected cars drive into a cyber security crisis - Help Net Security

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cyber security | CyberScoop

Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs - SecurityWeek

89% of Healthcare Organisations Use the Most Vulnerable IoT Devices - Infosecurity Magazine

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware - SecurityWeek

Unpatched Manufacturing Camera Could Allow Industrial Spying

Data Breaches/Leaks

Cyber criminals exfiltrate data in just three days - Help Net Security

Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online | WIRED

Trump Officials Exposed by NatSec Advisor’s Unsecured Venmo Account | MSSP Alert

FBI investigating cyber attack at Oracle, Bloomberg News reports | Reuters

Britain Follows Signalgate With Its Own Jaw-Dropping Military Leak

Check Point confirms breach, but says crim posted old data • The Register

Oracle Reportedly Targeted in Two Distinct Cyber Attacks, Resulting in Two Possible Data Breaches | Console and Associates, P.C. - JDSupra

5 Companies That Have Suffered Data Breaches – & Paid the Price

Critical Cyber Security Lessons from the Recent Exposure of US Military Plans - Security Boulevard

Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports | Reuters

Evolve Bank Reaches $11.8M Deal Over 2024 Data Breach - Law360

Customer info allegedly stolen from Royal Mail, Samsung • The Register

Pentagon launches investigation into Pete Hegseth’s use of Signal app after sensitive information leak | US national security | The Guardian

Oracle privately confirms Cloud breach to customers

Cyber Security Experts Slam Oracle's Handling of Big Breach

What the Signal Leak Revealed About Washington - The New York Times

Senior Trump officials ordered to preserve Signal group chat - BBC News

Using Signal to discuss war plans is even dumber than it sounds

Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms  - Security Boulevard

How Oracle took a security breach claim and made it worse • The Register

Hacker Leaks Samsung Customer Data - SecurityWeek

T-Mobile Bug Reveals Names, Images, and Locations of Random Children

Thousands Of Driver’s Licenses, Bank Records, And PII Exposed In Australian Fintech Data Leak

Former GCHQ intern admits top secret data breach risking national security – DataBreaches.Net

200 Million X User Records Released — 2.8 Billion Twitter IDs Leaked

The Ultimate Overshare: 1.5M Private Photos Left Exposed On Dating Apps

Intimate images from kink and LGBTQ+ dating apps left exposed online | Malwarebytes

39 Million Secrets Leaked on GitHub in 2024 - SecurityWeek

National Security Adviser Waltz now accused of using Gmail • The Register

Organised Crime & Criminal Actors

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor - SecurityWeek

NSA and partners Issue Guidance on Fast Flux as a National Security Threat > National Security Agency/Central Security Service > Press Release View

Amateur Hacker Leverages Bulletproof Hosting Server to Spread Malware - Infosecurity Magazine

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

New Crocodilus malware steals Android users’ crypto wallet keys

Over $1.5 billion of crypto was lost to scams or theft in just three months of 2025 | TechRadar

Over 500 Phishing Domains Emerge Following Bybit Heist - Infosecurity Magazine

Insider Risk and Insider Threats

GenAI turning employees into unintentional insider threats - Help Net Security

The human side of insider threats: People, pressure, and payback - Help Net Security

Cyber Security’s Greatest Threat Isn’t AI—It’s Us

Man charged over Network Rail terror message hack - BBC News

Insurance

Small Businesses Continue to Be Underserved by Cyber Insurers: CyberCube

Supply Chain and Third Parties

Evolve Bank Reaches $11.8M Deal Over 2024 Data Breach - Law360

Customer info allegedly stolen from Royal Mail, Samsung • The Register

Royal Mail probes possible breach after cyber criminal posts customer data

Cloud/SaaS

Hackers Exploit Microsoft Teams in Multi-Stage AI Cyber Attack

Oracle Cloud Users Urged to Take Action

SaaS Is Broken: Why Bring Your Own Cloud (BYOC) Is the Future - The New Stack

Independent tests show why orgs should use third-party cloud security services | CyberScoop

Amazon refuses Microsoft 365 deployment because of lax cyber security | CSO Online

Outages

ChatGPT is down worldwide with something went wrong error

Identity and Access Management

Identity lapses ensnared organisations at scale in 2024 | CyberScoop

Encryption

EU: These are scary times – let's backdoor encryption! • The Register

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order | Computer Weekly

Beyond encryption: Why quantum computing might be more of a science boom than a cyber security bust | VentureBeat

Linux and Open Source

New Ubuntu Linux security bypasses require manual mitigations

Qualys Finds Three Security Bypasses In Ubuntu's Unprivileged User Namespace Restrictions

Passwords, Credential Stuffing & Brute Force Attacks

These Hackers Use Your GPU To Load Password-Stealing Malware

Top 10 Most-Used RDP Passwords Are Not Complex Enough

Social Media

Qakbot Resurfaces in Fresh Wave of ClickFix Attacks

The Ultimate Overshare: 1.5M Private Photos Left Exposed On Dating Apps

Intimate images from kink and LGBTQ+ dating apps left exposed online | Malwarebytes

Training, Education and Awareness

When blaming the user for a security breach is unfair – or just wrong | CSO Online

Regulations, Fines and Legislation

UK sets out new cyber reporting requirements for critical infrastructure | The Record from Recorded Future News

UK threatens £100K-a-day fines under new cyber bill • The Register

UK GDPR Regulator Fines Data Processor After Ransomware Attack | Skadden, Arps, Slate, Meagher & Flom LLP - JDSupra

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms - Infosecurity Magazine

What NIS2 implementation means for enterprises [Q&A]

Legal impact on cyber security in 2025: new developments and challenges in the EU | CSO Online

Anti-scam campaign groups urge UK police forces to get tougher on fraudsters | Scams | The Guardian

EU: These are scary times – let's backdoor encryption! • The Register

EU to invest $1.4 billion in artificial intelligence, cyber security and digital skills | Reuters

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order | Computer Weekly

Cyber attacks to remain a national emergency event in the US | SC Media

Russia formally declared national security threat to Britain

Europe Hits The Brakes On GDPR: Plans To Slash Red Tape In The Works

Trump CISA Cuts Threaten US Election Integrity, Experts Warn - Infosecurity Magazine

Trump’s ‘preparedness’ executive order would shift cyber defence burden where it doesn’t belong, experts say | CyberScoop

Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online | WIRED

Trump Officials Exposed by NatSec Advisor’s Unsecured Venmo Account | MSSP Alert

Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

Japan Bolsters Cyber Safeguards, Passes Cyber Defense Bill

DOGE official at DOJ bragged about hacking, distributing pirated software - CNA

National Security Adviser Waltz now accused of using Gmail • The Register

Models, Frameworks and Standards

Legal impact on cyber security in 2025: new developments and challenges in the EU | CSO Online

The UK’s Cyber Security and Resilience Bill will boost standards – and increase costs | CSO Online

UK threatens £100K-a-day fines under new cyber bill • The Register

New cyber laws to safeguard UK economy and secure long-term growth - GOV.UK

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms - Infosecurity Magazine

New ‘pivotal’ legislation to force businesses to boost cyber defences

UK GDPR Regulator Fines Data Processor After Ransomware Attack | Skadden, Arps, Slate, Meagher & Flom LLP - JDSupra

What NIS2 implementation means for enterprises [Q&A]

New bill requires IT firms to bolster safeguards amid rising cyber threats

Europe Hits The Brakes On GDPR: Plans To Slash Red Tape In The Works

New PCI DSS Rules Say Merchants on Hook for Compliance, Not Providers

ICO Apologizes After Data Protection Response Snafu - Infosecurity Magazine

Data Protection

Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

Careers, Working in Cyber and Information Security

The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge - Security Boulevard

Cyber skills: How to become a digital detective

Why cyber security needs more neurodivergent thinkers and diverse talent | Capacity Media

Law Enforcement Action and Take Downs

Interpol-Led International Cyber Crime Operation Arrests 300

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

Major Online Platform for Child Exploitation Dismantled - Infosecurity Magazine

US Seizes $8.2m from Romance Baiting Scammers - Infosecurity Magazine

DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme

Man charged over Network Rail terror message hack - BBC News

FBI raids home of prominent computer scientist who has gone incommunicado - Ars Technica

Indiana security prof and wife vanish after FBI raid • The Register

Former GCHQ intern admits top secret data breach risking national security – DataBreaches.Net

Student pleads guilty to smuggling software out of GCHQ • The Register


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

The Espionage Toolkit of Earth Alux A Closer Look at its Advanced Techniques | Trend Micro (US)

The War Room newsletter: How Chinese hackers hunt American secrets

Countering nation-state cyber espionage: A CISO field guide | Computer Weekly

DDoS attacks now a dominant means of waging political cyber-warfare

US and its allies are undergoing a digital Pearl Harbor attack - Asia Times

How Cyber Espionage Threatens Democracy in the Age of Trump (The Agenda) - The Citizen Lab

Why global tensions are a cyber security problem for every business - Help Net Security

Nation State Actors

Why no business is safe from state-sponsored cyber attacks | TechRadar

Countering nation-state cyber espionage: A CISO field guide | Computer Weekly

NSA and partners Issue Guidance on Fast Flux as a National Security Threat > National Security Agency/Central Security Service > Press Release View

China

Why no business is safe from state-sponsored cyber attacks | TechRadar

The War Room newsletter: How Chinese hackers hunt American secrets

US and its allies are undergoing a digital Pearl Harbor attack - Asia Times

Salt Typhoon may have upgraded backdoors for efficiency and evasion | CSO Online

The Espionage Toolkit of Earth Alux A Closer Look at its Advanced Techniques | Trend Micro (US)

Trump’s ‘preparedness’ executive order would shift cyber defence burden where it doesn’t belong, experts say | CyberScoop

NSA and partners Issue Guidance on Fast Flux as a National Security Threat > National Security Agency/Central Security Service > Press Release View

Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances  - SecurityWeek

Suspected Chinese snoops hijacking buggy Ivanti gear — again • The Register

American cyber brass calls for retaliatory strikes against China, but is the US really ready? | TechRadar

Five VPN apps in the App Store had links to Chinese military - 9to5Mac

Cyber Security Professor Faced China-Funding Inquiry Before Disappearing, Sources Say | WIRED

Indiana security prof and wife vanish after FBI raid • The Register

China cracks down on personal information collection • The Register

Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs - SecurityWeek

Russia

Over 50 European Hybrid-Attacks Attributed to Russia, Journalists Find

US and its allies are undergoing a digital Pearl Harbor attack - Asia Times

A Deep Dive into Water Gamayun's Arsenal and Infrastructure | Trend Micro (US)

Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

Russia formally declared national security threat to Britain

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia - SecurityWeek

Russia-linked Gamaredon targets Ukraine with Remcos RAT

'89 hours of non-stop work' — Ukrainian Railways' battle against a cyber attack by 'the enemy'

Ukraine Blames Russia for Railway Hack, Labels It “Act of Terrorism” - Infosecurity Magazine

Russian secret services' tactics used in cyber attack on Ukrainian Railways | Ukrainska Pravda

Russian Hackers Using Russia-Based Bulletproof Network to Switch Network Infrastructure

Why you should replace your Kaspersky antivirus | TechRadar

Russian authorities arrest three suspects behind Mamont Android banking trojan

Russia tightens cyber security measures as financial fraud hits record high | The Record from Recorded Future News

Amateur Hacker Leverages Bulletproof Hosting Server to Spread Malware - Infosecurity Magazine

North Korea

North Korean IT worker army expands operations in Europe

North Korean hackers adopt ClickFix attacks to target crypto firms

Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

Over $1.5 billion of crypto was lost to scams or theft in just three months of 2025 | TechRadar


Tools and Controls

Top 10 Most-Used RDP Passwords Are Not Complex Enough

When disaster hits, preparation prevents poor performance • The Register

Resilience in the face of ransomware: A key to business survival

How Cyber Risk Quantification Bridges Security-Board Gap

Hackers Exploit Microsoft Teams in Multi-Stage AI Cyber Attack

SaaS Is Broken: Why Bring Your Own Cloud (BYOC) Is the Future - The New Stack

Independent tests show why orgs should use third-party cloud security services | CyberScoop

Ransomware crews add EDR killers to their arsenal • The Register

Identity lapses ensnared organisations at scale in 2024 | CyberScoop

Hackers Used Weaponized Zoom Installer to Gain RDP Access & Deploy BlackSuit Ransomware

The Reality Behind Security Control Failures—And How to Prevent Them

7 ways to get C-suite buy-in on that new cyber security tool - Help Net Security

Why you should replace your Kaspersky antivirus | TechRadar

Suspected Chinese snoops hijacking buggy Ivanti gear — again • The Register

Five VPN apps in the App Store had links to Chinese military - 9to5Mac

Visibility, Monitoring Key to Enterprise Endpoint Strategy

Law enforcement needs to fight fire with fire on AI threats | ITPro

How an Interdiction Mindset Can Help Win War on Cyber Attacks

Expert Insights: Strengthening Business Continuity And Disaster Recovery Strategies With AI

Agentic AI might take years to transform security, but cyber defenders must prepare now

Amazon refuses Microsoft 365 deployment because of lax cyber security | CSO Online

Google DeepMind Unveils Framework to Exploit AI's Cyber Weaknesses - SecurityWeek

Benefits from privacy investment are greater than the cost - Help Net Security


Other News

Why no small business is too small for hackers - and 8 security best practices for SMBs | ZDNET

CyberCube Releases New Report Highlighting Cyber Risk Exposure for Small Businesses

Why no business is too small for the cyber criminals – The Irish News

Small Businesses Continue to Be Underserved by Cyber Insurers: CyberCube

When it comes to security, public Wi-Fi could be a risky choice for commuters worldwide | TechRadar

As CISA Downsizes, Where Can Enterprises Get Support?

Cyber security report advocates an offence-driven approach ...

Over Half of Attacks on Electricity and Water Firms Are Destructive - Infosecurity Magazine

How an Interdiction Mindset Can Help Win War on Cyber Attacks

Almost 90% of Irish companies hit by disruption or financial loss due to cyber attacks – The Irish Times

Solar Power System Vulnerabilities Could Result in Blackouts - Infosecurity Magazine

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

Tradespeople warned to be vigilant against cyber-crime | Dorset Echo

The Cyber Security Confidence Paradox in Law Firms: Trends, Threats and Best Practices

Cyber attacks on utilities pose risk to public safety

The hidden cyber threats lurking in critical infrastructure

Safeguarding Student and Faculty Data: Cyber Security in Higher Education - Security Boulevard

63.5% Of Manufacturers Surveyed Rank Strengthening Cyber Security Posture as the Most Important Investment - Up 41 Percentage Points from 2024

Cyber criminals target auto industry with sophisticated hacks | SC Media


Vulnerability Management

Follow Patch Tuesday best practices for optimal results | TechTarget

How Linux Kernel Deals With Tracking CVE Security Issues - The New Stack

Why delaying software updates is a terrible idea | ZDNET

Cyber Security Leaders Share Three Challenges Exposure Management Helps Them Solve - Security Boulevard

What are business logic vulnerabilities? | ITPro

Vulnerabilities

Unknown scanners probing Juniper and Palo Alto products • The Register

Hackers Actively Targeting SonicWall, Zoho, F5 & Ivanti Systems to Exploit Vulnerabilities 

Rootkit, Backdoor and Tunneler: Ivanti Malware Does It All

Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks - SecurityWeek

Suspected Chinese snoops hijacking buggy Ivanti gear — again • The Register

Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware

A Deep Dive into Water Gamayun's Arsenal and Infrastructure | Trend Micro (US)

Qualys Finds Three Security Bypasses In Ubuntu's Unprivileged User Namespace Restrictions

Don't wait to update: iOS 18.4 introduces key security fixes

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

Apple issues fixes for vulnerabilities in both old and new OS versions | CyberScoop

Spike in Palo Alto Networks scanner activity suggests imminent cyber threats

Hackers Scanning From 24,000 IP’s to Gain Access to Palo Alto Networks

Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439) - Help Net Security

Max severity RCE flaw discovered in widely used Apache Parquet

New Ubuntu Linux security bypasses require manual mitigations

VMware Workstation auto-updates broken after Broadcom URL redirect

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia - SecurityWeek

Critical RCE flaws put Kubernetes clusters at risk of takeover | CSO Online

Microsoft warns of critical flaw in Canon printer drivers

Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities - SecurityWeek

Questions Remain Over Attacks Causing DrayTek Router Reboots - SecurityWeek

Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability  - SecurityWeek


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 28 March 2025

Black Arrow Cyber Threat Intelligence Briefing 28 March 2025:

-Third-Party Security Issues Could Be the Biggest Threat Facing Your Business

-New Morphing Meerkat Phishing Kit Mimics 114 Brands

-NCA Warns of Sadistic Online “Com” Networks

-Threat Actors Abuse Trust in Cloud Collaboration Platforms

-Report Reveals How Breaches Are Fuelling Hyper-Personalised Email Attacks

-No MFA? Expect Hefty Fines, UK’s ICO Warns

-Mobsters Now Overlap with Cyber Crime Gangs and Use AI for Evil, Europol Warns

-Ransomware Attacks Surge Despite Payments Being Down

-High-Severity Cloud Security Alerts Tripled in 2024

-If You Think You’re Immune to Phishing Attempts, You’re Wrong!

-UK Expanding Cyber Capabilities Amid US Pause

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Summary

Our summary of threat intelligence this week highlights how attackers exploit your trust in third parties, well-known brands, or cloud collaboration platforms, including Dropbox, SharePoint and DocuSign, to gain access to your information or systems including in ransomware attacks. Criminals are innovating through new social engineering and phishing-as-a-service platforms, combined with voice-phishing and AI. Organisations can help reduce these risks through enhanced employee training and multi-factor-authentication (MFA), and stronger defences against ransomware.

Also this week, the UK’s Information Commissioner’s Office (ICO) imposed a fine of £3m on an IT provider who experienced a cyber incident because they did not have basic cyber security in place such as MFA and vulnerability management. The ICO has warned that it will impose higher fines for similar cases in future.

There has been a continued increase in cyber threats from both domestic and state-aligned actors, including criminal gangs now operating with the speed and sophistication of nation states. The UK government is expanding its cyber capabilities in response, but for organisations, the message is clear: the threat landscape is evolving faster than ever, and both vigilance and adaptability are essential.

Top Cyber Stories of the Last Week

Third-Party Security Issues Could Be the Biggest Threat Facing Your Business

New research has revealed that over a third (35%) of all breaches in 2024 were linked to third-party suppliers; a figure likely to be understated due to underreporting. The report highlights a shift in attack surfaces, with fewer breaches involving traditional technology products and services. More than two in five ransomware attacks now originate through third parties. Experts warn that organisations must move beyond periodic vendor assessments and adopt real-time monitoring to stay ahead of evolving third-party cyber security threats.

New Morphing Meerkat Phishing Kit Mimics 114 Brands

A new phishing-as-a-service platform, dubbed Morphing Meerkat, has been uncovered, targeting users across the globe by mimicking login pages for 114 well-known brands. The phishing kit uses victims’ mail exchange records to tailor fake login pages to their email providers, making the attack more convincing. Thousands of phishing emails have been distributed using compromised websites and advertising redirects to bypass security filters. The kit also supports over a dozen languages and includes anti-analysis features, making detection and investigation more difficult. Stolen credentials are exfiltrated using tools like Telegram, increasing the speed and scale of data theft.

NCA Warns of Sadistic Online “Com” Networks

The UK’s National Crime Agency has warned of a sharp rise in “Com” networks: online groups of sadistic teenage boys engaged in cyber attacks, fraud, extremism and serious abuse. Reports of these threats increased six-fold in the UK between 2022 and 2024. These English-speaking groups operate openly on mainstream platforms and have been linked to ransomware, phishing, SIM swapping and social engineering. While most threats still originate abroad, the NCA highlights a growing domestic risk. The groups target young girls in particular, often coercing them into serious self-harm, with motivations ranging from profit and notoriety to status within these networks.

Threat Actors Abuse Trust in Cloud Collaboration Platforms

Cofense Intelligence has reported a sharp rise in phishing attacks that abuse trusted online document platforms to bypass secure email gateways and steal credentials. In 2024, these platforms were linked to 8.8% of all credential phishing campaigns, with 79% aiming to harvest user credentials. Dropbox was the most exploited at 25%, followed by Adobe, SharePoint and DocuSign. Features like automatic email notifications and delayed takedowns help attackers evade detection. The report recommends organisations enhance user awareness, apply behavioural analysis tools, and adopt multi-factor authentication to better defend against these increasingly sophisticated phishing threats.

Report Reveals How Breaches Are Fuelling Hyper-Personalised Email Attacks

Fortra’s latest report highlights a sharp rise in highly personalised email attacks, with 99% of threats in 2024 involving social engineering or phishing without malware. Over 1 billion records were breached last year, enabling cyber criminals to combine stolen and publicly available data to make scams more convincing. Abuse of legitimate platforms surged by 200%, particularly targeting e-signature services like DocuSign and free developer tools. Hybrid vishing, combining phishing with phone-based deception, emerged as the most common scam, with one in three impersonating PayPal in late 2024. The report warns that generative AI will intensify these threats in 2025.

No MFA? Expect Hefty Fines, UK’s ICO Warns

The UK Information Commissioner’s Office (ICO) has warned that failing to implement basic cyber security measures like multi-factor authentication (MFA) could result in significant fines. This follows a £3.07m penalty issued to IT provider Advanced after a 2022 ransomware attack exposed sensitive data of over 79,000 individuals and severely disrupted NHS services. Hackers exploited a customer account without MFA, highlighting broader failings in patching and vulnerability management. While the fine was reduced from an initial £6.1m due to the firm’s cooperation, the ICO stressed that future penalties may be higher for similar incidents where fundamental protections are missing.

Mobsters Now Overlap with Cyber Crime Gangs and Use AI for Evil, Europol Warns

Europol’s latest threat assessment reveals that organised crime groups are increasingly adopting digital technologies, with AI now central to their operations. These networks are using AI to scale criminal activities, evade detection, and exploit digital platforms and illicit financial systems. Europol warns that organised crime is now deeply embedded online, with the internet serving as its primary arena and data becoming its most valuable asset. The report also highlights growing collaboration between criminal groups and state-aligned hybrid threat actors, amplifying the threat to the EU’s institutions and social cohesion through shared tools, expertise, and protection.

Ransomware Attacks Surge Despite Payments Being Down

Ontinue’s latest threat intelligence report reveals a 132% rise in ransomware attacks, despite ransom payments falling by 35%, indicating a shift in attacker tactics. Vishing (voice enabled phishing) attacks have surged by 1,633% in just one quarter, now fuelled by AI-powered voice cloning to impersonate trusted individuals. Adversary-in-the-Middle attacks are also on the rise, enabling cyber criminals to bypass multi-factor authentication. Meanwhile, the misuse of legitimate tools such as Microsoft Quick Assist and the targeting of Windows Hello authentication keys highlight an evolving threat landscape. The report urges firms to strengthen defences against ransomware, phishing, and credential theft.

High-Severity Cloud Security Alerts Tripled in 2024

Palo Alto Networks reported a 235% surge in high-severity cloud security alerts in 2024, contributing to a 388% overall rise in incidents across the year. Organisations now face an average of 20 serious daily alerts, with the most common linked to suspicious identity use and disabled data protections. Notably, suspicious large downloads rose by 305% and abnormal user activity by over 100%. The focus of cloud security is shifting from misconfigurations to threats occurring in real-time as systems operate, highlighting the growing need for runtime visibility to detect and respond to active threats more effectively.

If You Think You’re Immune to Phishing Attempts, You’re Wrong!

Cyber security expert Troy Hunt has publicly admitted falling victim to a convincing phishing attack that compromised his Mailchimp account and exposed the email addresses, IPs, and geolocation data of newsletter subscribers. Despite recognising warning signs in hindsight, Hunt’s experience highlights how sophisticated and automated such attacks have become. Notably, the attack bypassed two-factor authentication via one-time passcodes, underlining the limitations of commonly used security controls. Hunt stressed the importance of phishing-resistant authentication and the need for stronger default protections from service providers. His transparency serves as a timely reminder that no individual is immune, regardless of expertise.

UK Expanding Cyber Capabilities Amid US Pause

The UK government has reaffirmed its commitment to expanding cyber capabilities in response to the growing threat landscape and a shift in US policy on offensive cyber operations. Armed Forces Minister Luke Pollard confirmed increased investment in both defensive and offensive cyber forces, including a new direct entry pathway for cyber specialists. The 77th Brigade remains central to countering Russian disinformation in Eastern Europe. In 2024, the UK’s National Cyber Security Centre received 1,957 cyber attack reports, including 89 nationally significant incidents and 12 severe cases, underscoring the urgency of strengthening the UK’s cyber resilience.

Sources:

https://www.techradar.com/pro/security/third-party-security-issues-could-be-the-biggest-threat-facing-your-business

https://thehackernews.com/2025/03/new-morphing-meerkat-phishing-kit.html

https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/

https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/

https://informationsecuritybuzz.com/fortra-report-reveals-how-breaches/

https://www.infosecurity-magazine.com/news/mfa-expect-hefty-fines-uk-ico/

https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/

https://betanews.com/2025/03/25/ransomware-attacks-surge-despite-payments-being-down/

https://www.darkreading.com/cyber-risk/high-severity-cloud-security-alerts-tripled-2024

https://www.helpnetsecurity.com/2025/03/26/troy-hunt-mailchimp-phishing-email/

https://ukdefencejournal.org.uk/uk-expanding-cyber-capabilities-amid-us-pause/



Threats

Ransomware, Extortion and Destructive Attacks

Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame

Ransomware attacks surge despite payments being down

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs - SecurityWeek

Half of firms have been hit by a cyber attack - Digital Journal

Albabat Ransomware Evolves to Target Linux and macOS - Infosecurity Magazine

One-third of CNI organisations admit to paying ransomware according to new report from Bridewell - IT Security Guru

Building ransomware resilience to avoid paying out | ITPro

Ransomware hackers are desperate lying liars | Cybernews

Russian Ransomware Gang Exploited Windows Zero-Day Before Patch - SecurityWeek

Ransomware Groups Increasingly Adopting EDR Killer Tools - SecurityWeek

Medusa Ransomware Uses Malicious Driver to Disable Security Tools - SecurityWeek

New VanHelsing ransomware targets Windows, ARM, ESXi systems

VMware Vulnerabilities Exploited Actively to Deploy Ransomware

RedCurl cyber spies create ransomware to encrypt Hyper-V servers

BlackLock Ransomware Targeted by Cyber Security Firm

Russian Espionage Group Using Ransomware in Attacks - SecurityWeek

VSCode extensions found downloading early-stage ransomware

Resecurity turns the table on BlackLock ransomware • The Register

Vampire Cosplay and Brand Revival: Ransomware in 2025

Winning the war on ransomware with multi-layer security | TechRadar

Ransomware Victims

One-third of CNI organisations admit to paying ransomware according to new report from Bridewell - IT Security Guru

UK fines software provider £3.07 million for 2022 ransomware breach

UK ICO fines Advanced Computer £3.07m after NHS data breach

WoW! A Ransomware Gang Just Took Over One Of America’s Largest ISPs

Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover - SecurityWeek

Cloak ransomware group hacked the Virginia Attorney General’s Office

New Ransomware Group Claims Attack on US Telecom Firm WideOpenWest - SecurityWeek

Phishing & Email Based Attacks

Half of firms have been hit by a cyber attack - Digital Journal

If you think you're immune to phishing attempts, you're wrong! - Help Net Security

Microsoft Teams Phishing Attacks: What to Know and What to Do | MSSP Alert

Cloud collaboration platforms exploited in phishing attacks

Threat Actors Abuse Trust in Cloud Collaboration Platforms - Infosecurity Magazine

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims' DNS Email Records

Fortra Report Reveals How Breaches Are Fuelling Hyper-Personalized Email Attacks

Intro to Deceptionology: Why Falling for Scams is Human Nature - Security Boulevard

The Rise of Mobile Phishing and How to Prevent Mobile Phishing - Security Boulevard

These phishing attacks are now targeting Mac browsers - how to protect yourself | ZDNET

Why are the young so vulnerable to phishing scams? Blame fomo | BusinessDesk

Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!

Famous Data Breaches & Phishing Attacks: What We Can Learn - Security Boulevard

New phishing campaign uses scareware to steal Apple credentials | CSO Online

'Lucid' Phishing Tool Exploits Faults in iMessage, RCS

Cyber Security Gaps Leave Doors Wide Open

Business Email Compromise (BEC)/Email Account Compromise (EAC)

DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union

Other Social Engineering

Intro to Deceptionology: Why Falling for Scams is Human Nature - Security Boulevard

Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness - Infosecurity Magazine

T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit - SecurityWeek

New phishing campaign uses scareware to steal Apple credentials | CSO Online

Artificial Intelligence

Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame

How AI, corruption and digital tools fuel Europe's criminal underworld - Help Net Security

Mobsters now overlap with cyber crime gangs, says Europol • The Register

Enterprises walk a tightrope between AI innovation and security - Help Net Security

89% of Enterprises GenAI Usage Is Untracked, Posing Security Risks - Security Boulevard

Dark Web Mentions of Malicious AI Tools Spike 200% - Infosecurity Magazine

3 in 4 Enterprise Users Upload Data to GenAI Including passwords and keys

NIST Warns of Significant Limitations in AI/ML Security Mitigations - Infosecurity Magazine

AI Agents Will Cut Account Exploitation Time By 50%

The Human Factor: Redefining Cyber Security In The Age Of AI

A CISO’s guide to securing AI models - Help Net Security

Overcoming Cyber Security Challenges In Agentic AI

AI vs. Cyber Criminals: Who Wins the Race in Next-Gen Threat Detection? - Security Boulevard

North Korea launches new unit with a focus on AI hacking, per report | TechCrunch

How governments can strengthen cyber security in the age of AI and hybrid threats  - e-Estonia

WhatsApp's Meta AI is now rolling out in Europe, and it can't be turned off

Fake DeepSeek Ads Spread Malware to Google Users

2FA/MFA

Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame

No MFA? Expect Hefty Fines, UK’s ICO Warns - Infosecurity Magazine

NCSC taps influencers to make 2FA go viral • The Register

Malware

Cyber Criminals Exploit CheckPoint Driver Flaws in Malicious Campaign - Infosecurity Magazine

How Businesses Can Protect Themselves Against Infostealers

Windows users targeted with CoffeeLoader | Cybernews

SpyX Breach Shows Apple Users Aren’t Invulnerable And Silence Is Deafening

New macOS Malware 'ReaderUpdate' Upgraded Arsenal With Nim and Rust Variants

Fake DeepSeek Ads Spread Malware to Google Users

CoffeeLoader Malware Loader Linked to SmokeLoader Operations - Infosecurity Magazine

Valve just pulled a malicious game demo spreading info-stealing malware from Steam | Tom's Guide

Malware strikes again. I'm starting to worry about Steam's lax security | PCWorld

New Linux Kernel Rust Module Unveiled to Detect Rootkits

Mobile

The Rise of Mobile Phishing and How to Prevent Mobile Phishing - Security Boulevard

Research: Rooting Tools Vs The Mobile Security Industry

Microsoft’s .NET MAUI Tool Leveraged for Android Malware Deployment | MSSP Alert

'Lucid' Phishing Tool Exploits Faults in iMessage, RCS

Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection

Android financial threats: What businesses need to know to protect themselves and their customers - Help Net Security

T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit - SecurityWeek

Do you use Android? This secret Google technique could protect you - Talk Android

Denial of Service/DoS/DDoS

How to protect your site from DDoS attacks - before it's too late | ZDNET

Internet of Things – IoT

IoT Security Gaps Put Enterprises at Risk - DataBreachToday

Data Breaches/Leaks

Leak of US military plans on Signal is a classic case of ‘shadow IT’. It shows why security systems need to be easy to use

Inside the CIA's use of Signal and how America's enemies try to hack it - Washington Times

OPSEC Nightmare: Leaking US Military Plans to a Reporter

Here Are the Attack Plans That Trump’s Advisers Shared on Signal - The Atlantic

The Atlantic releases screenshots of timing, weapons used in Yemen war plans Signal chat - POLITICO

How does your data end up on the dark web? - Help Net Security

Famous Data Breaches & Phishing Attacks: What We Can Learn - Security Boulevard

Oracle’s Data Breach Denial Unravels As Leaked Info Checks Out

Coinbase was primary target of recent GitHub Actions breaches

23andMe files for bankruptcy protection • The Register

Three rules potentially broken by Trump team's Signal group chat leak - BBC News

Dark Web Intelligence: A Critical Layer in Modern Cyber Security Strategy | MSSP Alert

Widespread Keenetic Router Data Breach Uncovered | MSSP Alert

Organised Crime & Criminal Actors

2025 Risk Survey: Cyber Security, Fraud at the Forefront  | Bank Director

How AI, corruption and digital tools fuel Europe's criminal underworld - Help Net Security

Mobsters now overlap with cyber crime gangs, says Europol • The Register

Ransomware hackers are desperate lying liars | Cybernews

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cyber Crime Bust

How Scammers Launder Money and Get Away With It - The New York Times

New Cyber Crime Tool 'Atlantis AIO' Amps Up Credential Stuffing Attacks

NCA Warns of Sadistic Online “Com” Networks - Infosecurity Magazine

Alleged Snowflake hacker agrees to be extradited to the US | The Verge

Furry Hackers Fear Leader Raided by FBI

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

US Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

Fewer than 500 people are responsible for $3.2 trillion of artificial crypto trading - Fast Company

Coinbase was primary target of recent GitHub Actions breaches

Insider Risk and Insider Threats

The Human Factor: Redefining Cyber Security In The Age Of AI

Cyber security Gaps Leave Doors Wide Open

Insurance

Threat of state-sponsored cyber attacks could make UK terror insurer ‘obsolete’

Cyber insurance isn't always what it seems - Help Net Security

Supply Chain and Third Parties

Third-party security issues could be the biggest threat facing your business | TechRadar

SecurityScorecard Observes Surge in Third-Party Breaches - Infosecurity Magazine

UK ICO fines Advanced Computer £3.07m after NHS data breach

Will your supply chain stand up to a nation-state hack? • The Register

SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks

US defence contractor settles whistleblower suit for $4.6M • The Register

Defence contractor to pay $4.6 million over third-party provider’s security weakness | The Record from Recorded Future News

Coinbase was primary target of recent GitHub Actions breaches

Cloud/SaaS

String of defects in popular Kubernetes component puts 40% of cloud environments at risk | CyberScoop

Cloud providers aren’t delivering on security promises - Help Net Security

Microsoft Teams Phishing Attacks: What to Know and What to Do | MSSP Alert

Cloud collaboration platforms exploited in phishing attacks

Threat Actors Abuse Trust in Cloud Collaboration Platforms - Infosecurity Magazine

High-Severity Cloud Security Alerts Tripled in 2024

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks

MailChimp Under Attack: How Cyber Criminals Are Exploiting Email Marketing Platforms - Security Boulevard

Hijacked Microsoft Stream classic domain "spams" SharePoint sites

Oracle Cloud denies claims of server intrusion • The Register

Outages

Lessons from CrowdStrike – a particular focus on financial services

Identity and Access Management

The rise of identity and access management: How IAM evolved to being the new perimeter of cyber security - Security Boulevard

Encryption

Prepping for post-quantum: a beginner’s guide to lattice cryptography

Ex-UK cyber chief says asking Apple to break encryption was 'naive' | New Scientist

A Win for Encryption: France Rejects Backdoor Mandate | Electronic Frontier Foundation

Linux and Open Source

Albabat Ransomware Evolves to Target Linux and macOS - Infosecurity Magazine

Cyber security and open-source software in products with digital elements

New Linux Kernel Rust Module Unveiled to Detect Rootkits

EU OS takes a 'layered' approach to its new Linux distro for the public sector | ZDNET

Passwords, Credential Stuffing & Brute Force Attacks

How to Balance Password Security Against User Experience

New Cyber Crime Tool 'Atlantis AIO' Amps Up Credential Stuffing Attacks

Google Account Hijackers Target Victims Via Semrush Ads - Infosecurity Magazine

New phishing campaign uses scareware to steal Apple credentials | CSO Online

Social Media

How to protect your phone and data privacy at the US border | US immigration | The Guardian

What travelers should know about their rights when entering the U.S. - The Washington Post

Travelers fear social media and photos may now trigger deportation

Malvertising

Google Account Hijackers Target Victims Via Semrush Ads - Infosecurity Magazine

Training, Education and Awareness

70% of South African businesses lack basic cyber security awareness

Regulations, Fines and Legislation

UK fines software provider £3.07 million for 2022 ransomware breach

UK ICO fines Advanced Computer £3.07m after NHS data breach

No MFA? Expect Hefty Fines, UK’s ICO Warns - Infosecurity Magazine

Analysis: ‘We’re Choosing to Blind Ourselves’ – US Backs Off Russian Threats, PART I

Analysis: Cyber Security as a Bargaining Chip in Ukraine Talks – US Backs Off Russian Threats, PART II

Ex-UK cyber chief says asking Apple to break encryption was 'naive' | New Scientist

EU Cyber Resilience Act: What You Need to Know - Security Boulevard

Monitoring preparedness and governance under EU cyber security legislation

The importance of cyber security compliance – an overview of the EU regulatory framework

Digital resilience and cyber security reporting requirements in the UK and EU

Our Leaders Don't Take Information Security Seriously | National Review

UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats - Infosecurity Magazine

Adapting the UK’s cyber ecosystem | TechRadar

Inside the CIA's use of Signal and how America's enemies try to hack it - Washington Times

OPSEC Nightmare: Leaking US Military Plans to a Reporter

Senators criticize Trump officials’ discussion of war plans over Signal, but administration answers don’t come easily  | CyberScoop

Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US - SecurityWeek

Here Are the Attack Plans That Trump’s Advisers Shared on Signal - The Atlantic

What CISA's Red Team Disarray Means for US Cyber Defences

Proof of Concept: Is the US Losing Its Cyber Grip?

Ex-NSA boss: Election security focus helped dissuade Russia • The Register

Cyber security and open-source software in products with digital elements

Lessons from CrowdStrike – a particular focus on financial services

Marco Rubio Says Someone in Signal Chat Made ‘Big Mistake’ in Adding Journalist - The New York Times

How DORA compliance future-proofs your organisation: By Steven Rackham

Leak of US military plans on Signal is a classic case of ‘shadow IT’. It shows why security systems need to be easy to use

The EU AI Act: A Critical Overview Of A Necessary Act?

Preparing for Cyber Security Disclosure as a Public Company | WilmerHale - JDSupra

US lifts sanctions on Tornado Cash cryptocurrency mixer • The Register

China poses biggest military threat to US: intel report - Digital Journal

US Cyber Security Weakness Benefits China – Foreign Policy

DOGE staffer calling himself 'big balls' provided tech support to cyber crime ring, records show - ABC News

A Win for Encryption: France Rejects Backdoor Mandate | Electronic Frontier Foundation

DORA Readiness: Skillcast Uncovers Deficiencies in Fintech Sector's Risk Management and Resilience | The Fintech Times

Models, Frameworks and Standards

EU Cyber Resilience Act: What You Need to Know - Security Boulevard

Monitoring preparedness and governance under EU cyber security legislation

The importance of cyber security compliance – an overview of the EU regulatory framework

Digital resilience and cyber security reporting requirements in the UK and EU

How DORA compliance future-proofs your organisation: By Steven Rackham

NIST 2.0 Demands Strategic Reset, Not a Compliance Patch

Backup and Recovery

Data Protection: Top Trends In Backup And Recovery

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks

Careers, Working in Cyber and Information Security

60% of cyber security pros looking to change employers | CSO Online

Which Top Cyber Security Role of 2024 Was Featured in 64,000+ Job Postings? | TechRepublic

A closer look at The Ultimate Cyber Security Careers Guide - Help Net Security

11 hottest IT security certs for higher pay today | CSO Online

These cyber security specialists are the most sought-after, according to a report | Cybernews

Law Enforcement Action and Take Downs

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cyber Crime Bust

Alleged Snowflake hacker agrees to be extradited to the US | The Verge

DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union

Furry Hackers Fear Leader Raided by FBI

Misinformation, Disinformation and Propaganda

UK expanding cyber capabilities amid US pause


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

RedCurl cyber spies create ransomware to encrypt Hyper-V servers

'We are in a state of war': The UK needs to prepare for a future without Nato

Nation State Actors

Threat of state-sponsored cyber attacks could make UK terror insurer ‘obsolete’

Will your supply chain stand up to a nation-state hack? • The Register

China

Chinese hackers are getting bigger, better and stealthier

China, Beijing's ties with Russia main threats to US: intel report - Digital Journal

US Intelligence identifies China as top military, cyber threat

China's FamousSparrow flies back, breaches US org • The Register

Chinese APT Weaver Ant infiltrated a telco for over four years

Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US - SecurityWeek

Cyber Threats Jeopardize US Military Mobility, Report Warns

Chinese Hacker Group Tracked Back to iSoon APT Operation

China poses biggest military threat to US: intel report - Digital Journal

US Cyber Security Weakness Benefits China – Foreign Policy

China bans facial recognition in hotels, bathrooms • The Register

Commerce limits 19 Chinese, Taiwanese companies from buying U.S. tech | CyberScoop

Chinese Hackers Exploit Unpatched Servers in Taiwan

Russia

UK expanding cyber capabilities amid US pause

Analysis: ‘We’re Choosing to Blind Ourselves’ – US Backs Off Russian Threats, PART I

Analysis: Cyber Security as a Bargaining Chip in Ukraine Talks – US Backs Off Russian Threats, PART II

Russian Espionage Group Using Ransomware in Attacks - SecurityWeek

China, Beijing's ties with Russia main threats to US: intel report - Digital Journal

US Intelligence identifies China as top military, cyber threat

Our Leaders Don't Take Information Security Seriously | National Review

What CISA's Red Team Disarray Means for US Cyber Defences

Proof of Concept: Is the US Losing Its Cyber Grip?

Ex-NSA boss: Election security focus helped dissuade Russia • The Register

Ukraine to establish national cyber attack response system

Ukrainian Railways Faced Massive Cyber Attack Over the Weekend

Top Trump aide in Signal chat was in Russia while the text stream was active—but denies he had personal or government-issued phone with him | Fortune

Russian hackers shut down major Belgian websites | Cybernews

Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers

Poland raises defences against cyber attacks before the vote | Stars and Stripes

Widespread Keenetic Router Data Breach Uncovered | MSSP Alert

Russia subjected to suspected joint Head Mare, Twelve attacks | SC Media

Iran

Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen

North Korea

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

North Korea launches new unit with a focus on AI hacking, per report | TechCrunch

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Russia subjected to suspected joint Head Mare, Twelve attacks | SC Media

Furry Hackers Fear Leader Raided by FBI


Tools and Controls

Cloud providers aren’t delivering on security promises - Help Net Security

Cyber security spending set to jump 12.2% in 2025 - Help Net Security

Cyber criminals Exploit CheckPoint Driver Flaws in Malicious Campaign - Infosecurity Magazine

Prepping for post-quantum: a beginner’s guide to lattice cryptography

How to Balance Password Security Against User Experience

Data Protection: Top Trends In Backup And Recovery

Spring clean your security data: The case for cyber security data hygiene - Help Net Security

10 Critical Network Pentest Findings IT Teams Overlook

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks

Ransomware Groups Increasingly Adopting EDR Killer Tools - SecurityWeek

What is Infrastructure Intelligence? - Security Boulevard

Threat Intelligence: Are UK Organisations Flying Blind? | SC Media UK

8 Expert Tips and Resources to Stay Ahead of Security Threats - DevX

How Cyber Security Pros Stay Ahead of the Curve – Insights from Experts - DevX

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

The hidden costs of security tool bloat and how to fix it - Help Net Security

53% of security teams lack continuous and up-to-date visibility - Help Net Security

The rise of identity and access management: How IAM evolved to being the new perimeter of cyber security - Security Boulevard

AI vs. Cyber Criminals: Who Wins the Race in Next-Gen Threat Detection? - Security Boulevard

Dark Web Intelligence: A Critical Layer in Modern Cyber Security Strategy | MSSP Alert

Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch

Cyber security specialists are drowning in a sea of software vulnerabilities. AI may be able to help | Fortune




Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

E&OE

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 21 March 2025

Black Arrow Cyber Threat Intelligence Briefing 21 March 2025:

-Why Cyber Security Needs More Business-Minded Leaders

-Cyberwashing Exposes Businesses and Consumers to Cyber Risks, Study Warns

-New KnowBe4 Report Reveals a Spike in Phishing Campaigns

-Over 400 million Unwanted and Malicious Emails Were Received by Businesses in 2024

-The Psychology of Scams: How Cyber Criminals Are Exploiting the Human Brain

-Many Workers Are Overconfident at Spotting Phishing Attacks

-Russia Using Criminal Networks to Drive Increase in Sabotage Acts, Says Europol

-AI Will Make Ransomware Even More Dangerous

-Third of UK Supply Chain Relies on ‘Chinese Military’ Companies

-How Economic Headwinds Influence the Ransomware Ecosystem

-Malicious Android ‘Vapor’ Apps on Google Play Installed 60 million Times

-Moving Beyond Checkbox Security for True Resilience

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Summary

There is a clear trend this week that the human element in cyber attacks is being consistently underestimated. Many organisations are overlooking how psychological manipulation, poor user awareness, and leadership blind spots continue to drive successful attacks – even as technical defences evolve.

Reports reveal a concerning rise in phishing and social engineering, with AI now enabling convincing scams that bypass traditional detection. Despite employee confidence, over half of workers fall victim to these tactics. Malicious email campaigns are becoming more deceptive, targeting hiring processes and using compromised accounts to breach defences. Meanwhile, research highlights concerns that ‘cyberwashing’ (the overstating of security capabilities) is creating a false sense of safety, exposing organisations and consumers to avoidable risk.

From a leadership perspective, there’s a growing recognition that cyber security must be a business-wide priority, not just a technical one. Black Arrow Cyber believes that moving beyond checkbox compliance towards risk-led, strategic resilience is essential. Rising ransomware threats, politically motivated sabotage, and complex supply chain risks all demand a unified approach that integrates robust cyber governance with board-level engagement, independent oversight, and ongoing investment in both technology and human readiness.

Top Cyber Stories of the Last Week

Why Cyber Security Needs More Business-Minded Leaders

Cyber security leadership is undergoing a fundamental shift as organisations move beyond compliance towards true resilience. Increasingly, leaders with backgrounds in finance, law, and corporate strategy are taking the helm, bringing a risk-first mindset to security. Rather than focusing solely on technical defences, today’s leaders must align cyber security with wider business objectives, ensuring it supports operational continuity and mitigates financial and reputational risks. This evolution reflects a growing understanding that cyber threats disrupt entire enterprises, not just IT systems. By embedding security into core business strategy, organisations can drive efficiency, secure executive buy-in, and build long-term resilience.

Cyberwashing Exposes Businesses and Consumers to Cyber Risks, Study Warns

A new study from Monash University in Australia warns that many organisations are overstating their cyber security capabilities, a practice dubbed ‘cyberwashing’. This creates a false sense of safety, leaving businesses and consumers exposed to data breaches. The report highlights that vague security claims, lack of independent verification, and failure to disclose past incidents undermine trust and resilience. High-profile breaches at firms like Optus and Medibank illustrate the reputational and legal risks. The study calls for independent audits, clearer reporting, and stronger board oversight as regulatory scrutiny and shareholder lawsuits increase in response to misleading cyber security assurances.

New KnowBe4 Report Reveals a Spike in Phishing Campaigns

KnowBe4’s latest Phishing Threat Trends Report reveals a 17% rise in phishing emails over six months, with 82% of them using AI. Attacks are increasingly bypassing traditional defences, with phishing hyperlinks up 36%, malware up 20%, and social engineering tactics up 14%. Ransomware payloads rose by 22%, including a sharp 57% increase in the last three months. Notably, 76% of campaigns now use polymorphic techniques to avoid detection, and attacks from compromised accounts are up 57%. The report also warns of growing threats targeting hiring processes: 64% focused on engineering roles to gain access to sensitive systems and data.

Over 400 million Unwanted and Malicious Emails Were Received by Businesses in 2024

Hornetsecurity’s latest research reveals that in 2024, over 427 million malicious emails were received by businesses, with phishing accounting for a third of all cyber attacks. Malicious URLs surged to 22% of attack methods, as cyber criminals shifted tactics away from attachments toward more deceptive strategies like reverse proxy attacks that can bypass two-factor authentication. Despite a slight drop in the overall threat index, industries such as mining, entertainment, and manufacturing remain high-risk. The report stresses the need for advanced email filtering, robust multi-layered authentication, and company-wide cyber security awareness to defend against increasingly sophisticated threats.

The Psychology of Scams: How Cyber Criminals Are Exploiting the Human Brain

Cyber criminals stole over £11.4 billion from UK victims last year, increasingly exploiting human psychology rather than just technical weaknesses. With AI lowering barriers to entry, even unsophisticated attackers can craft convincing scams using deepfakes, fake websites, and personalised phishing emails. In fact, 70% of over 30 million phishing emails detected bypassed standard authentication checks. Under stress and decision fatigue, employees are more likely to fall for social engineering tactics that manipulate trust and urgency. While training helps, organisations must combine human awareness with AI-enabled cyber security systems to detect threats traditional tools may miss.

Many Workers Are Overconfident at Spotting Phishing Attacks

A report from KnowBe4 highlights the risks of overconfidence among employees when it comes to spotting phishing attacks. Despite 86% of employees feeling confident in their ability to identify phishing emails, more than half (53%) have fallen victim to social engineering scams. This includes phishing, social media scams, and deepfakes. The report stresses the importance of employee training and fostering a transparent security culture to combat these threats. Even in regions with historically high confidence, such as the UK, vulnerability to these attacks is rising, highlighting the need for ongoing awareness and education.

Russia Using Criminal Networks to Drive Increase in Sabotage Acts, Says Europol

Europol’s latest threat assessment warns of a rise in politically motivated cyber attacks and sabotage across the EU, driven by state actors like Russia working through organised criminal networks. These proxies engage in cyber attacks, arson, data theft and infrastructure sabotage, often using a “woodpecker” approach of frequent, low-level incidents that cumulatively undermine public trust and stability. The report highlights over 150 migrant-smuggling incidents daily on Poland’s border, as well as recent attacks on hospitals and retail centres linked to Russian intelligence. Europol also flags AI-driven online fraud and youth recruitment into cyber crime as growing concerns.

AI Will Make Ransomware Even More Dangerous

Ivanti’s latest research warns that ransomware, already the top predicted threat for 2025, is expected to become even more dangerous with AI; a concern shared by 38% of security professionals yet only 29% feel very prepared to face such attacks. Despite 49% of leaders understanding exposure management, a more strategic approach to cyber security, just 22% plan to increase investment in it. Blind spots remain across shadow IT and vendor risk, while tech debt is a growing concern, with 43% citing increased breach risk and 71% reporting slowed growth. Boards are engaged, but alignment on risk appetite is often lacking.

Third of UK Supply Chain Relies on ‘Chinese Military’ Companies

Bitsight’s latest report reveals that UK firms have digital supply chains 10% larger than the global average, making them more exposed to cyber threats. A key concern is that 30% of UK supply chain relationships involve companies linked to the Chinese military. Additionally, many organisations depend on ‘hidden pillar’ providers (small vendors with an outsized impact) raising the risk of cascading disruption. Suppliers themselves are often more vulnerable than their clients, using 2.5 times more products and having 10 times more internet-facing assets, while also lagging in critical areas like patching and securing systems.

How Economic Headwinds Influence the Ransomware Ecosystem

Ransomware attacks continue to place severe financial strain on organisations, with median ransom demands reaching $2.54 million and total recovery costs often exceeding $3 million. Economic pressures such as inflation, volatile cryptocurrency markets, and security budget cuts are compounding the issue. Threat actors are increasingly adjusting their demands based on inflation and crypto trends, while financial hardship is breeding more attackers and weakening organisational defences. Encouragingly, only 25% of victims paid ransoms in late 2024, an all-time low, but experts warn that even basic cyber defences are being neglected due to budget constraints, increasing the likelihood of compromise.

Malicious Android ‘Vapor’ Apps on Google Play Installed 60 million Times

A recent campaign dubbed ‘Vapor’ saw over 300 malicious Android apps downloaded 60 million times from Google Play, posing as legitimate utilities like health trackers and QR scanners. Though harmless at first glance, these apps activated malicious functions after installation to commit large-scale ad fraud generating 200 million fake ad requests daily, and in some cases attempted to steal user credentials and credit card details. The apps bypassed Google’s security checks by delaying malicious behaviour, remaining hidden from users. While Google has since removed the apps, experts warn the threat actors could return using similar techniques to evade detection.

Moving Beyond Checkbox Security for True Resilience

Many organisations still rely on a ‘checkbox’ approach to cyber security, meeting regulatory requirements without addressing broader risks. MITRE highlights the need for CISOs to align compliance with a threat-informed, risk-based strategy focused on protecting core business assets. Shadow IT and software supply chain vulnerabilities are key blind spots, often left unaddressed. With cloud-focused attacks and advanced ransomware tactics on the rise, investment in continuous testing and managed services is recommended. Large firms like Microsoft have made sizeable investments in security, demonstrating that security must be treated as an evolving discipline, with regular reviews and proactive enhancements to build true resilience.

Sources:

https://www.darkreading.com/cybersecurity-operations/why-cybersecurity-needs-more-business-minded-leaders

https://www.techmonitor.ai/technology/cybersecurity/cyberwashing-exposes-businesses-consumers-cyber-risks

https://www.itsecurityguru.org/2025/03/20/new-knowbe4-report-reveals-a-spike-in-phishing-campaigns/

https://www.techradar.com/pro/security/over-400-million-unwanted-and-malicious-emails-were-received-by-businesses

https://www.techradar.com/pro/the-psychology-of-scams-how-cybercriminals-are-exploiting-the-human-brain

https://www.techradar.com/pro/security/many-workers-are-overconfident-at-spotting-phishing-attacks

https://www.theguardian.com/technology/2025/mar/18/russia-criminal-networks-drive-increase-sabotage-europol

https://www.helpnetsecurity.com/2025/03/21/exposure-management-understanding-among-security-leaders/

https://www.infosecurity-magazine.com/news/third-uk-supply-chain-relies/

https://www.darkreading.com/cyberattacks-data-breaches/how-economic-headwinds-influence-ransomware-ecosystem

https://www.bleepingcomputer.com/news/security/malicious-android-vapor-apps-on-google-play-installed-60-million-times/

https://www.helpnetsecurity.com/2025/03/19/william-booth-mitre-proactive-security-measures/



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware is the top predicted threat for 2025

Now Ransomware Attackers Can Brute Force Your VPNs And Firewalls

How Economic Headwinds Affect Ransomware

Europol Warns of “Shadow Alliance” Between States and Criminals - Infosecurity Magazine

Fraudsters Impersonate Clop Ransomware to Extort Businesses - Infosecurity Magazine

Report: Ransomware attacks soared to new heights last month | SC Media

BlackLock Ransomware Hacked 40+ Organisation Within Two Months

Cyber Security Officials Warn Against Potentially Costly Medusa Ransomware Attacks

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The state of ransomware: Fragmented but still potent despite takedowns | CSO Online

Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns - Infosecurity Magazine

Clop resurgence drives ransomware attacks in February | Computer Weekly

FBI: A Simple Email Could Make You a Target for Extortion

BlackLock Ransomware: What You Need To Know | Tripwire

AI will make ransomware even more dangerous - Help Net Security

Extortion crew to victim: Pay or we tell ... Edward Snowden? • The Register

Update: LockBit Ransomware | Intel 471

RansomHub affiliate leverages multi-function Betruger backdoor - Help Net Security

LockBit Developer Extradited to US

Suspected LockBit ransomware dev extradited to United States

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia

Ransomware attacks are costing Government offices a month of downtime on average | TechRadar

One of the most powerful ransomware hacks around has been cracked using some serious GPU power | TechRadar

Phishing & Email Based Attacks

Many workers are overconfident at spotting phishing attacks | TechRadar

Over 400 million unwanted and malicious emails were received by businesses in 2024 | TechRadar

False confidence leaves businesses at risk of phishing scams

427.8 Million Dangerous Emails Confirmed—One Rule Can Protect You All

Achilles Email: Defending the Eternal Attack Surface - Infosecurity Magazine

Phishing: A Persistent Threat in the Age of AI - Security Boulevard

How to avoid and prevent social engineering attacks | TechTarget

What do watering holes, pharming and evil twins have in common?

New KnowBe4 Report Reveals a Spike in Phishing Campaigns - IT Security Guru

The psychology of scams: how cyber criminals are exploiting the human brain | TechRadar

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks - SecurityWeek

Cyber criminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

Mac users are now in danger of a well-known Windows phishing attack | Digital Trends

New Mac phishing attack causes fake freezes to nab your Apple ID password | Macworld

FBI: A Simple Email Could Make You a Target for Extortion

Targeted Microsoft 365 Tenants: Attackers Exploit Billing Emails For Phishing

Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge - Infosecurity Magazine

Scareware Combined With Phishing in Attacks Targeting macOS Users - SecurityWeek

752,000 Browser Phishing Attacks Mark 140% Increase YoY - Infosecurity Magazine

Julius Caesar Linked To 890,000 New Phishing Attacks

How phishing attacks are hitting the supply chain – and how to fight back | TechRadar

Why No-Reply Emails Are a Cyber Security Hazard - Security Boulevard

Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing - SecurityWeek

Malicious Android 'Vapor' apps on Google Play installed 60 million times

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Mandatory Coinbase wallet migration? It's a phishing scam!

Other Social Engineering

How to avoid and prevent social engineering attacks | TechTarget

What do watering holes, pharming and evil twins have in common?

The psychology of scams: how cyber criminals are exploiting the human brain | TechRadar

£1M Lost as UK Social Media and Email Account Hacks Skyrocket - Infosecurity Magazine

Artificial Intelligence

AI Can Crack Your Passwords Fast—6 Tips To Stay Secure

AI Use in Cyber Attacks Raises Worker Cyber Security Concerns

Google Report Reveals How Threat Actors Are Currently Using Generative AI - InfoQ

Invisible C2 — thanks to AI-powered techniques - Security Boulevard

Tackling The Threat Of Cyber Risk During AI Adoption

AI will make ransomware even more dangerous - Help Net Security

How AI agents help hackers steal your confidential data - and what to do about it | ZDNET

Gartner Warns Agentic AI Will Accelerate Account Takeovers - Infosecurity Magazine

Hackers are turning to AI tools to reverse engineer millions of apps – and it’s causing havoc for security professionals | ITPro

Hackers target AI and crypto as software supply chain risks grow - Help Net Security

Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing - SecurityWeek

Cyber criminals Taking Advantage Of AI, 'Shadow' Alliances

Higher Profile and AI are Putting More Pressure on GRC Teams: Drata | MSSP Alert

Security Researcher Proves GenAI Tools Can Develop Chrome Infostealers - Infosecurity Magazine

Rethinking vendor risk management in the age of AI and automation | TechRadar

How Schools Can Prepare for Artificial Intelligence-Backed Cyber Attacks | EdTech Magazine

3 types of deepfake detection technology and how they work | TechTarget

2FA/MFA

Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware | ITPro

Malware

ClickFix Widely Adopted by Cyber Criminals, APT Groups - SecurityWeek

Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease | TechRadar

Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware | ITPro

Microsoft Uncovers New XCSSET MacOS Malware Variant Targeting Xcode Projects

Why Infostealer Malware Is My New Biggest Malware Worry

AsyncRAT Surges In Global Malware Rankings

Free file converter malware scam "rampant" claims FBI

Microsoft 365 accounts are under attack from new malware spoofing popular work apps | TechRadar

Invisible Windows Rootkit Hides Dangerous Files Using This Prefix

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft - SecurityWeek

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Malware Increasingly Spread By Fraudulent CAPTCHA Checks | MSSP Alert

Password Warning As 2.1 Billion Credentials Hit By Infostealer Attacks

Beware the coming Mac malware season – Computerworld

RansomHub affiliate leverages multi-function Betruger backdoor - Help Net Security

Malware campaign 'DollyWay' breached 20,000 WordPress sites

Security Researcher Proves GenAI Tools Can Develop Chrome Infostealers - Infosecurity Magazine

Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware | TechRadar

Be Careful What You Search For—New Attack Could Cost You Dearly

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

CERT-UA warns of cyber espionage against the Ukrainian defence industry using Dark Crystal RAT

100 Car Dealerships Hit by Supply Chain Attack - SecurityWeek

Mobile

Rooted Devices 250 Times More Vulnerable to Compromise - Infosecurity Magazine

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Apple says EU interoperability requirements enable unfettered access to the iPhone, risks customer security and privacy - 9to5Mac

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK - Help Net Security

Denial of Service/DoS/DDoS

Who was really behind the massive X cyber attack? Here’s what experts say about Elon Musk’s claims | TechRadar

European Cyber Report 2025: 137% more DDoS attacks than

Internet of Things – IoT

The Silent Infiltration:  How Powerful CPS Devices Are Amplifying Cyber Risks for Businesses - Security Boulevard

All your Alexa recordings will go to the cloud soon, as Amazon sunsets Echo privacy | ZDNET

Data Breaches/Leaks

Over 16.8 Billion Records Exposed as Data Breaches Increase 6% - Infosecurity Magazine

How to calculate the cost of a data breach | TechTarget

Massive Cyber Attack in France: 12 Million Identities at Risk - Protect Yourself Now

GitHub supply chain attack spills secrets from 23K projects • The Register

Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts

Jaguar Land Rover Breach Highlights Growing Cyber Security Risks in Automotive Sector | HaystackID - JDSupra

Personal info feared stolen from sperm bank • The Register

Half a million people impacted by Pennsylvania State Education Association data breach | The Record from Recorded Future News

Top California sperm bank suffers embarrassing leak | TechRadar

Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach - SecurityWeek

Western Alliance Bank notifies 21,899 customers of data breach

Organised Crime & Criminal Actors

Why Cyber Crime Forum Collaboration Is Making Attacks More Efficient, And How To Stay Ahead

Russia using criminal networks to drive increase in sabotage acts, says Europol | Cybercrime | The Guardian

Russia Escalated Sabotage to Pressure U.S. and Allies on Ukraine, Study Says - The New York Times

Europol Warns of “Shadow Alliance” Between States and Criminals - Infosecurity Magazine

UK Police Arrest 422 in Major Fraud Crackdown - Infosecurity Magazine

20,000 Hacked WordPress Sites Used in Redirect Scheme

What Trump 2.0 Might Mean for Russian Cyber Crime - New Lines Magazine

Capital One hacker Paige Thompson got too light a sentence, appeals court rules | CyberScoop

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Blockchain gaming platform WEMIX hacked to steal $6.1 million

Widespread Coinbase phishing attack uncovered | SC Media

Hackers target AI and crypto as software supply chain risks grow - Help Net Security

Bybit: 89% of stolen $1.4B crypto still traceable post-hack

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

Mandatory Coinbase wallet migration? It's a phishing scam!

Insider Risk and Insider Threats

The psychology of scams: how cyber criminals are exploiting the human brain | TechRadar

43% of office workers say they could cause a cyber security breach this year

Many workers are overconfident at spotting phishing attacks | TechRadar

False confidence leaves businesses at risk of phishing scams

DoD engineer took home top-secret docs, booked a trip to MX • The Register

Supply Chain and Third Parties

Third of UK Supply Chain Relies on “Chinese Military” Companies - Infosecurity Magazine

Supply Chain Attack Exposes Enterprise Secrets: A Wake-Up Call for Enterprise Security Professionals

How phishing attacks are hitting the supply chain – and how to fight back | TechRadar

Hackers target AI and crypto as software supply chain risks grow - Help Net Security

Rethinking vendor risk management in the age of AI and automation | TechRadar

GitHub supply chain attack spills secrets from 23K projects • The Register

Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach - SecurityWeek

100 Car Dealerships Hit by Supply Chain Attack - SecurityWeek

Cloud/SaaS

UK Businesses Face Growing Cloud Security Crisis – Are You Prepared? | SC Media UK

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks - SecurityWeek

Microsoft 365 accounts are under attack from new malware spoofing popular work apps | TechRadar

Hackers Use OAuth Apps to Steal Microsoft 365 Credentials

Targeted Microsoft 365 Tenants: Attackers Exploit Billing Emails For Phishing

The biggest security flaw of every cloud service that no one talks about -- until it's too late

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

Week-long Exchange Online outage causes email failures, delays

Outages

Week-long Exchange Online outage causes email failures, delays

Encryption

New Akira ransomware decryptor cracks encryptions keys using GPUs

US lawmakers urge public hearing on UK Apple encryption • The Register

A New Era of Attacks on Encryption Is Starting to Heat Up | WIRED

US Legislators Demand Transparency in Apple's UK Backdoor Court Fight - Infosecurity Magazine

NCSC Sets 2035 Deadline for Post-Quantum Cryptography Migration - Infosecurity Magazine

UK cyber security watchdog warns on future risk of quantum computer hacking

The UK’s Apple backdoor demand

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK - Help Net Security

Filing: DOGE broke Treasury policy with unencrypted email • The Register

Linux and Open Source

Open source security in the spotlight as UK gov publishes fresh guidance | ITPro

Security issue in open source software leaves businesses concerned for systems | TechRadar

Passwords, Credential Stuffing & Brute Force Attacks

AI Can Crack Your Passwords Fast—6 Tips To Stay Secure

Now Ransomware Attackers Can Brute Force Your VPNs And Firewalls

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks - SecurityWeek

New Mac phishing attack causes fake freezes to nab your Apple ID password | Macworld

The poor the bad and the terrible -- popular passwords around the world

Hackers Use OAuth Apps to Steal Microsoft 365 Credentials

Gartner Warns Agentic AI Will Accelerate Account Takeovers - Infosecurity Magazine

Password Warning As 2.1 Billion Credentials Hit By Infostealer Attacks

70% of leaked secrets remain active two years later - Help Net Security

Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts

"China's Amazon" JD.com passwords allegedly stolen​ | Cybernews

Social Media

Who was really behind the massive X cyber attack? Here’s what experts say about Elon Musk’s claims | TechRadar

£1M Lost as UK Social Media and Email Account Hacks Skyrocket - Infosecurity Magazine

Social media platforms face huge fines under UK’s new digital safety laws | Social media | The Guardian

UK’s Online Safety Act: Ofcom Can Now Issue Sanctions - Infosecurity Magazine

Stay safe from online hate with these five tips

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

Malvertising

Malvertising Explained: How To Spot And Steer Clear Of It

Why It's So Hard to Stop Rising Malicious TDS Traffic

Malicious Android 'Vapor' apps on Google Play installed 60 million times

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Large-Scale Malicious App Campaign Bypassing Android Security - Infosecurity Magazine

Training, Education and Awareness

43% of office workers say they could cause a cyber security breach this year

Many workers are overconfident at spotting phishing attacks | TechRadar

False confidence leaves businesses at risk of phishing scams

Regulations, Fines and Legislation

UK ICO warns biometric tools may pose privacy, compliance risks | Biometric Update

A New Era of Attacks on Encryption Is Starting to Heat Up | WIRED

US Legislators Demand Transparency in Apple's UK Backdoor Court Fight - Infosecurity Magazine

MS-ISAC, EI-ISAC Funding Cuts Threaten National Security, Officials Say | MSSP Alert

Trump Administration Orders Federal Agencies To Avoid Cyber Staff Layoffs | MSSP Alert

US lawmakers urge public hearing on UK Apple encryption • The Register

Social media platforms face huge fines under UK’s new digital safety laws | Social media | The Guardian

UK’s Online Safety Act: Ofcom Can Now Issue Sanctions - Infosecurity Magazine

The UK’s Apple backdoor demand

NIST’s vulnerability database logjam is still growing despite attempts to clear it - Nextgov/FCW

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK - Help Net Security

Open source security in the spotlight as UK gov publishes fresh guidance | ITPro

CISA works to contact probationary employees for reinstatement after court order - Nextgov/FCW

DOGE staffer violated security policies at Treasury Department, court filing shows | CyberScoop

Filing: DOGE broke Treasury policy with unencrypted email • The Register

What Trump 2.0 Might Mean for Russian Cyber Crime - New Lines Magazine

12 Hours or Else: Hong Kong’s Cyber Security Explained - Security Boulevard

Careers, Working in Cyber and Information Security

Wellbeing in the Cyber Security Sector: A Call for Participation - IT Security Guru

How to hack a career in cyber security through perseverance, mentorship, and learning on the job   | Fortune

3 AI-Driven Roles in Cyber Security

Law Enforcement Action and Take Downs

The state of ransomware: Fragmented but still potent despite takedowns | CSO Online

UK Police Arrest 422 in Major Fraud Crackdown - Infosecurity Magazine

LockBit Developer Extradited to US

Telegram CEO leaves France temporarily as criminal probe continues

Suspected LockBit ransomware dev extradited to United States


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Denmark warns of increased state-sponsored campaigns targeting the European telcos

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft - SecurityWeek

Windows shortcut exploit used as zero-day in global cyber espionage campaigns

How CISOs can counter the threat of nation state espionage | Computer Weekly

Nation State Actors

Europol Warns of “Shadow Alliance” Between States and Criminals - Infosecurity Magazine

Denmark warns of increased state-sponsored campaigns targeting the European telcos

What is an APT and how are they tracked? | ITPro

ClickFix Widely Adopted by Cyber Criminals, APT Groups - SecurityWeek

New Windows zero-day exploited by 11 state hacking groups since 2017

Microsoft isn't fixing 8-year-old zero day used for spying • The Register

How CISOs can counter the threat of nation state espionage | Computer Weekly

Cyber criminals Taking Advantage Of AI, 'Shadow' Alliances

China

Third of UK Supply Chain Relies on “Chinese Military” Companies - Infosecurity Magazine

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Chinese Hacking Group MirrorFace Targeting Europe - SecurityWeek

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum - SecurityWeek

Emulating the Sophisticated Chinese Adversary Salt Typhoon - Security Boulevard

FishMonger APT Group Linked to I-SOON in Espionage Campaigns - Infosecurity Magazine

"China's Amazon" JD.com passwords allegedly stolen​ | Cybernews

12 Hours or Else: Hong Kong’s Cyber Security Explained - Security Boulevard

Russia

Russia using criminal networks to drive increase in sabotage acts, says Europol | Cybercrime | The Guardian

Russia Escalated Sabotage to Pressure U.S. and Allies on Ukraine, Study Says - The New York Times

BlackBasta Ransomware Ties to Russian Authorities Uncovered - Infosecurity Magazine

Europol Warns of “Shadow Alliance” Between States and Criminals - Infosecurity Magazine

UK under-prepared for catastrophic cyber attack

Three years after Russia’s invasion, a global online army is still fighting for Ukraine

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia

Black Basta Leader in League With Russian Officials

What Trump 2.0 Might Mean for Russian Cyber Crime - New Lines Magazine

CERT-UA warns of cyber espionage against the Ukrainian defence industry using Dark Crystal RAT

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

North Korea

Bybit: 89% of stolen $1.4B crypto still traceable post-hack

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it | The Record from Recorded Future News

Six additional countries identified as suspected Paragon spyware customers | CyberScoop


Tools and Controls

Now Ransomware Attackers Can Brute Force Your VPNs And Firewalls

Moving beyond checkbox security for true resilience - Help Net Security

Not all cuts are equal: Security budget choices disproportionately impact risk | CSO Online

A strategic approach to security is key for cyber resilience | World Economic Forum

The API Security Illusion: IT Leaders May Be Overconfident

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks

What Is Cyber Security Risk? A Guide to Protect Your Business - Security Boulevard

Is it time to retire 'one-off' pen tests for continuous testing?

Why So Many Employee Phishing Training Initiatives Fall Short

What If Prevention Was the Key to Cyber Security Success? | Entrepreneur

Quantifying cyber risk strategies to resonate with CFOs and boards - Help Net Security

Choosing the Right Cloud Security Provider: Five Non-Negotiables for Protecting Your Cloud - Security Boulevard

43% of office workers say they could cause a cyber security breach this year

Leveraging AI in Security: What MSSPs Need to Know Before They Commit | MSSP Alert

Many workers are overconfident at spotting phishing attacks | TechRadar

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

55% of COOs Use GenAI to Improve Data Security

False confidence leaves businesses at risk of phishing scams

13 API security best practices to protect your business

3 types of deepfake detection technology and how they work | TechTarget

How financial institutions can minimize their attack surface - Help Net Security

Unifying Threat Operations: An Integrated Cyber Security Strategy



Other News

1 in 10 people do nothing to stay secure and private on vacation | Malwarebytes

New KnowBe4 Report Finds Education Sector Unprepared for Escalating Cyber Attacks

Denmark warns of increased state-sponsored campaigns targeting the European telcos

CNI Security Leaders Express Cyber Confidence Despite 95% Breach Rate - Infosecurity Magazine

Cyber Security Challenges in the Telecom Sector: Protecting Data and Infrastructure  - Security Boulevard

Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director - Infosecurity Magazine

Cyber security in healthcare: getting the basics right as bigger threats loom - Medical Device Network

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks

Government probes ‘national security risks’ of data brokers – PublicTechnology

Why 2025’s Cyber Security Landscape Demands a Complete Overhaul of Your IT Infrastructure

Breaches Often Start Where You Least Expect | Grip Security - Security Boulevard

Danish govt raises telecoms sector cyber risk assessment to 'high' - Telecompaper

UK under-prepared for catastrophic cyber attack

Global Education Report Says Some Schools Endure Over 2,500 Attempted Cyber Attacks A Day

Why betting on Mac security could put your organisation at risk | TechRadar

What is a buffer overflow? How do these types of attacks work?| Definition from TechTarget

What Would a Decentralized Internet Look Like? | HackerNoon

The DoD's Cyber Wake-Up Call: Why Playing It Safe Won't Keep Us Safe - ClearanceJobs

Cyber Security Concerns Arise After Announcement To Scrap NHS England

Five ways to protect university data from cyber security threats | EdScoop


Vulnerability Management

Cyber security vulnerabilities and their financial impact | CEPR

How Security Teams Should Respond To The Rise In Vulnerability Disclosures

NIST’s vulnerability database logjam is still growing despite attempts to clear it - Nextgov/FCW

The Microsoft patch management guide for admins | TechTarget

Vulnerabilities

Hackers Use OAuth Apps to Steal Microsoft 365 Credentials

A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease | TechRadar

Windows shortcut exploit used as zero-day in global cyber espionage campaigns

Veeam RCE bug lets domain users hack backup servers, patch now

Infoseccers flame Veeam over RCE bug, failing blacklist • The Register

Cisco IOS XR vulnerability lets attackers crash BGP on routers

8,000 New WordPress Vulnerabilities Reported in 2024 - SecurityWeek

Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns - Infosecurity Magazine

ChatGPT SSRF bug quickly becomes a favorite attack vector

Microsoft isn't fixing 8-year-old zero day used for spying • The Register

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

Critical Fortinet Vuln Draws Fresh Attention

Hackers are ramping up attacks using year-old ServiceNow security bugs to target unpatched systems | TechCrunch

IBM urges quick patching of critical AIX bugs • The Register

WordPress security plugin WP Ghost vulnerable to remote code execution bug

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

iOS 18.3.2 patches gateway for ‘extremely sophisticated attack' - Tech Advisor

HellCat hackers go on a worldwide Jira hacking spree

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

CISA tags NAKIVO backup flaw as actively exploited in attacks

Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440 - SANS Internet Storm Center


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 14 March 2025

Black Arrow Cyber Threat Intelligence Briefing 14 March 2025:

-95% of Data Breaches Tied to Human Error in 2024

-Hackers Using Advanced Social Engineering Techniques with Phishing Attacks

-Confidence Gap in Cyber Security Leaves Businesses at Risk

-Over Half of UK Organisations Experienced a Security Breach Resulting from Third-Party Access in the Past Year

-Ransomware Gang Encrypted Network from a Webcam to Bypass Security Controls

-Microsoft Reveals Over a Million PCs Hit by Malvertising Campaign

-How Cyber Attacks Affect Your Staff

-UK Government Officials: The UK Is Unprepared and Vulnerable to Russian Cyber Attacks.

-Navigating AI-Powered Cyber Threats in 2025: 4 Expert Security Tips for Businesses

-86% of Financial Firms are Still Not Fully Compliant With DORA

-The CISO as Business Resilience Architect

-Data Breach at Japanese Telecom Giant NTT Hits 18,000 Companies

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Summary

Black Arrow Cyber’s review of threat intelligence this week highlights that human error and susceptibility to social engineering remain at the heart of cyber security failures. A new report reveals that 95% of data breaches in 2024 were due to human mistakes, with just 8% of employees responsible for 80% of incidents. Despite widespread training efforts, a confidence gap persists: 86% of employees believe they can detect phishing scams, yet many still fall victim. Meanwhile, cyber criminals are deploying more sophisticated pretexting techniques, such as fake job offers, to exploit trust before launching attacks. The financial impact of phishing-related breaches now averages $4.88 million per incident.

Third-party access and unmonitored IoT devices also present major risks, with over half of UK firms experiencing a breach due to supplier access. The Akira ransomware gang recently exploited an unsecured webcam to bypass endpoint defences, highlighting the need for a more layered approach to cyber security. Additionally, AI-driven threats are accelerating, enabling criminals to automate cyber attacks and create deepfake scams, such as one that resulted in a $25 million theft.

Looking ahead, regulatory compliance pressures are mounting, with 86% of financial firms still unprepared for the EU’s DORA framework. Meanwhile, UK government officials warn of national cyber security vulnerabilities due to outdated systems and staffing shortages. Black Arrow Cyber believes that businesses must take a proactive stance, adopting zero-trust security, strengthening third-party risk management, and ensuring human resilience against evolving cyber threats.

Top Cyber Stories of the Last Week

95% of Data Breaches Tied to Human Error in 2024

A new report by Mimecast has found that human error was the primary cause of 95% of data breaches in 2024, with insider threats, credential misuse and user mistakes playing a major role. Just 8% of employees were responsible for 80% of incidents, highlighting a concentrated risk. Despite 87% of organisations providing regular cyber security training, concerns remain over employee fatigue and errors, particularly in handling email threats. While 95% of firms use AI for cyber defence, over half admit they are unprepared for AI-driven threats. Collaboration tools are an emerging risk, with 79% citing security gaps and 61% expecting a business impact from an attack in 2025.

Hackers Using Advanced Social Engineering Techniques with Phishing Attacks

Cyber criminals are refining their phishing tactics, moving beyond basic scams to sophisticated social engineering that builds trust before delivering malicious payloads. A report by security provider ESET highlights North Korea-aligned groups using elaborate pretexting, such as fake job offers, to lure victims. Verizon’s 2024 report found that 68% of breaches involved human error, with pretexting now surpassing traditional phishing in impact. IBM’s latest study estimates the average cost of a phishing-related breach at $4.88 million. Businesses must adopt a prevention-first approach, combining employee awareness training with multilayered security solutions to mitigate these increasingly deceptive cyber threats.

Confidence Gap in Cyber Security Leaves Businesses at Risk

New research by KnowBe4 highlights a concerning gap between employee confidence and actual ability to detect cyber threats. While 86% of employees believe they can spot phishing emails, nearly a quarter have fallen victim, with South Africa reporting the highest scam victimisation rate at 68%. The study of 12,000 employees across six countries found that confidence is often misplaced, leaving organisations vulnerable to evolving threats like AI-driven scams and deepfakes. Experts stress the need for scenario-based training and simulated phishing tests to close this gap, ensuring security awareness efforts translate into real-world cyber resilience.

Over Half of UK Organisations Experienced a Security Breach Resulting from Third-Party Access in the Past Year

More than half of UK organisations suffered a security breach linked to third-party access in the past year, surpassing the global average. A new study by Imprivata and the Ponemon Institute highlights that 47% see third-party remote access as their biggest attack surface. Despite growing awareness, weak security strategies persist, with only 58% implementing best practices. The most common consequences include data loss (54%), regulatory fines (49%), and severed vendor relationships (47%). With 65% expecting these breaches to increase, businesses must prioritise robust third-party risk management to mitigate ongoing threats.

Ransomware Gang Encrypted Network from a Webcam to Bypass Security Controls

The Akira ransomware gang exploited an unsecured webcam to bypass the victim’s endpoint detection and response (EDR) and encrypt the network. After initial access via a compromised remote access solution, the attackers deployed AnyDesk, stole data, and attempted to deploy ransomware, only to be blocked by EDR. They then pivoted to a vulnerable Linux-based webcam, to access and encrypt resources that were shared across the victim’s network undetected. The incident highlights the risks posed by unmonitored IoT devices and the need for strict network segmentation, regular firmware updates, and a layered security approach beyond EDR to mitigate evolving cyber threats.

Microsoft Reveals Over a Million PCs Hit by Malvertising Campaign

Microsoft has uncovered a large-scale malvertising campaign that has compromised over a million PCs, deploying infostealers to harvest sensitive data. The attack originated from illegal streaming sites, where users were redirected to malicious GitHub repositories hosting malware. Once installed, the malware gathered system details and exfiltrated login credentials, banking data, and cryptocurrency information. Microsoft took action by removing a number of repositories, but the malware was also hosted on other platforms like Dropbox and Discord. The attack affected a broad range of industries, demonstrating the indiscriminate nature of the threat.

How Cyber Attacks Affect Your Staff

Cyber attacks are now the leading cause of data loss and IT downtime for businesses, with over half of organisations surveyed in the 2024 Data Health Check reporting incidents in the past year. 37% of these cases led to job losses, highlighting the significant human impact. High-profile breaches have resulted in redundancies, pay freezes, and financial instability. Beyond financial losses, employees face uncertainty, stress, and reputational concerns. A robust cyber resilience strategy, combining training, incident response exercises, and clear crisis communication, is essential to minimising disruption and protecting staff, ensuring businesses can navigate cyber threats while maintaining operational stability.

UK Government Officials: The UK Is Unprepared and Vulnerable to Russian Cyber Attacks.

The UK Government is at critical risk of cyber attack due to years of underfunding, recruitment shortfalls, and outdated IT systems, senior officials have warned. A parliamentary probe found that one in three cyber security roles in government remains vacant, while nearly a quarter of legacy IT systems are at high risk of attack. Hostile states, particularly Russia and China, have intensified cyber warfare tactics, posing a substantial risk to government and critical services. Experts stress the urgent need for investment in cyber resilience, warning that failure to act could have severe national security and operational consequences.

Navigating AI-Powered Cyber Threats in 2025: 4 Expert Security Tips for Businesses

AI-powered cyber threats are evolving rapidly, with criminals using generative AI to create hyper-personalised phishing attacks, deepfake scams, and automated malware that adapts to defences in real-time. A recent case saw deepfake technology used to steal $25 million via fraudulent video conferencing. AI-driven cyber attacks operate autonomously, probing networks for weaknesses and bypassing traditional security measures. Experts stress the need for zero-trust security, training employees on AI driven threats, monitoring and regulating employee AI use and collaborating with AI and cyber security experts. Without proactive defences, organisations risk being outpaced by increasingly sophisticated attacks in 2025 and beyond.

86% of Financial Firms are Still Not Fully Compliant With DORA

The majority of financial firms are not compliant with the EU’s Digital Operational Resilience Act (DORA). 86% are yet to achieve full compliance despite the regulation coming into force in January 2025, and only 5% are fully confident in their compliance. Managing third-party vendors, a key part of DORA, is a challenge with 54% citing a lack of transparency as a significant risk. Without proper oversight, firms risk regulatory penalties and operational vulnerabilities. Organisations subject to the regulations should take immediate action through policy development, gap analysis, and targeted remediation plans.

The CISO as Business Resilience Architect

The role of the CISO is evolving beyond cyber defence to encompass business resilience. Regulatory scrutiny is intensifying, with personal accountability for breaches and increasing compliance demands stretching CISOs. Gartner predicts 45% will see their responsibilities expand beyond cyber security by 2027. Technical challenges persist, with 44% of CISOs unable to detect breaches using current tools, and AI integration adding complexity. Rather than fragmenting, the role is set to converge with enterprise architecture, embedding resilience into business strategy. With 24% of CISOs considering resignation, adapting to this shift is key to maintaining boardroom influence.

Data Breach at Japanese Telecom Giant NTT Hits 18,000 Companies

NTT Communications Corporation has disclosed a cyber security breach affecting nearly 18,000 corporate customers. Hackers infiltrated its Order Information Distribution System, exposing contract details, contact information, and service usage data. The breach was discovered on 5 February 2025, with access blocked the next day. However, further investigation revealed attackers had pivoted within the network, prompting containment actions. NTT has assured that personal customers were not impacted. This follows previous cyber security incidents, including a major DDoS attack in January and a 2020 breach, highlighting the persistent threats facing critical telecoms infrastructure.

Sources:

https://www.infosecurity-magazine.com/news/data-breaches-human-error/

https://cybersecuritynews.com/hackers-using-advanced-social-engineering-techniques/

https://informationsecuritybuzz.com/confidence-gap-in-cybersecurity-risk/

https://www.globenewswire.com/news-release/2025/03/11/3040313/0/en/Over-Half-of-UK-Organisations-Experienced-a-Security-Breach-Resulting-from-Third-Party-Access-in-the-Past-Year-Imprivata-Study-Finds.html

https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/

https://www.techradar.com/pro/security/microsoft-reveals-over-a-million-pcs-hit-by-malvertising-campaign

https://www.darkreading.com/cyberattacks-data-breaches/how-cyberattacks-affect-your-staff

https://inews.co.uk/news/uk-unprepared-vulnerable-russian-cyber-attacks-heres-why-3580126

https://www.zdnet.com/article/navigating-ai-powered-cyber-threats-in-2025-4-expert-security-tips-for-businesses/

https://thefintechtimes.com/86-of-financial-firms-are-still-not-fully-compliant-with-dora-clear-junction-highlights-hurdles/

https://www.darkreading.com/vulnerabilities-threats/ciso-business-resilience-architect

https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware gang encrypted network from a webcam to bypass EDR

Travelers reports rise in ransomware activity in Q4'24 Cyber Threat Report - Reinsurance News

Medusa Ransomware: FBI and CISA Urge Organisations to Act Now to Mitigate Threat | Tripwire

Medusa ransomware infects 300+, uses 'triple extortion' • The Register

Microsoft: North Korean hackers join Qilin ransomware gang

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Ransomware poseurs are trying to extort businesses through physical letters | CyberScoop

'Spearwing' RaaS Group Ruffles Cyber Threat Feathers

Ransomware Groups Favour Repeatable Access Over Mass Exploits - Infosecurity Magazine

Imposter Scam With A Twist

North Korea-linked APT Moonstone used Qilin ransomware in limited attacks

Ragnar Loader Toolkit Evolves Amid Increased Traction Among Threat Operations | MSSP Alert

New SuperBlack ransomware exploits Fortinet auth bypass flaws

Russian crypto exchange Garantex seized in international law enforcement operation | CyberScoop

Ransomware Victims

Many Schools Report Data Breach After Retirement Services Firm Hit by Ransomware - SecurityWeek

Two Rhysida healthcare attacks pwned 300K patients' data • The Register

82% of K-12 schools recently experienced a cyber incident | K-12 Dive

RansomHouse gang claims the hack of the Loretto Hospital in Chicago

More than 300,000 US healthcare patients impacted in suspected Rhysida cyber attacks | ITPro

Phishing & Email Based Attacks

Hackers Using Advanced Social Engineering Techniques With Phishing Attacks

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Phishing campaign impersonating Booking.com targeting UK hospitality | The Standard

ICANN regains control of X account after phishing attack - Domain Name Wire | Domain Name News

US cities warn of wave of unpaid parking phishing texts

Other Social Engineering

Hackers Using Advanced Social Engineering Techniques With Phishing Attacks

Most AI voice cloning tools aren't safe from scammers, Consumer Reports finds | ZDNET

Consumer Reports calls out poor AI voice-cloning safeguards • The Register

AI-Powered Fraud: How Cyber Criminals Target Finance Teams—and How To Stop Them

How to spot and avoid AI-generated scams - Help Net Security

'Threat actor' has registered over 10k domains for smishing scams, cyber security firm says

How to Steer Clear of Smishing Scams | TIME

Trump Coins Used as Lure in Malware Campaign - SecurityWeek

Lazarus Group deceives developers with 6 new malicious npm packages | CyberScoop

US cities warn of wave of unpaid parking phishing texts

New YouTube Windows Attack Warning—Three Strikes And You’re Hacked

Artificial Intelligence

Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags - Infosecurity Magazine

New Mimecast Research Reveals 55% of global organisations are not fully prepared with strategies to combat AI-driven threats

Most AI voice cloning tools aren't safe from scammers, Consumer Reports finds | ZDNET

The Invisible Battlefield Behind LLM Security Crisis - Security Boulevard

AI-Powered Fraud: How Cyber Criminals Target Finance Teams—and How To Stop Them

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers - SecurityWeek

4 expert security tips for navigating AI-powered cyber threats | ZDNET

How to spot and avoid AI-generated scams - Help Net Security

DeepSeek spits out malware code with a little persuasion • The Register

Worried about DeepSeek? Turns out, Gemini and other US AIs collect more user data | ZDNET

UK AI Research Under Threat From Nation-State Hackers - Infosecurity Magazine

Signal President Meredith Whittaker calls out agentic AI as having 'profound' security and privacy issues | TechCrunch

Even premium AI tools distort the news and fabricate links - these are the worst | ZDNET

Malware

A ‘significant increase’ in infostealer malware attacks left 3.9 billion credentials exposed to cyber criminals last year – and experts worry this is a ticking time bomb for enterprises | ITPro

Another huge new botnet is infecting thousands of webcams and video recorders for DDoS attacks | TechRadar

Update your Wi-Fi cameras, else malware could infect your network | PCWorld

Microsoft Says One Million Devices Impacted by Infostealer Campaign  - SecurityWeek

Another top security camera maker is seeing devices hijacked into botnet | TechRadar

New threat uses fake CAPTCHA to infect systems with malware | TechSpot

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Steganography Explained: How XWorm Hides Inside Images

Gone In 120 Seconds: TRUMP Coin Phishing Lure Delivers RAT

Binance Spoofers Compromise PCs in 'TRUMP' Crypto Scam

DeepSeek spits out malware code with a little persuasion • The Register

Lazarus Group deceives developers with 6 new malicious npm packages | CyberScoop

1,600 Victims Hit by South American APT's Malware - SecurityWeek

Bots/Botnets

Another huge new botnet is infecting thousands of webcams and video recorders for DDoS attacks | TechRadar

Another top security camera maker is seeing devices hijacked into botnet | TechRadar

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 - SecurityWeek

Update your Wi-Fi cameras, else malware could infect your network | PCWorld

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Edimax Says No Patches Coming for Zero-Day Exploited by Botnets - SecurityWeek

Mobile

'Threat actor' has registered over 10k domains for smishing scams, cyber security firm says

How to Steer Clear of Smishing Scams | TIME

SIM Swapping Fraud Surges in the Middle East - Infosecurity Magazine

US cities warn of wave of unpaid parking phishing texts

Is your phone eavesdropping on you? Try NordVPN's simple test to find out | ZDNET

Denial of Service/DoS/DDoS

DNS DDoS: Downtime is just the tip of the iceberg | Total Telecom

Another huge new botnet is infecting thousands of webcams and video recorders for DDoS attacks | TechRadar

Another top security camera maker is seeing devices hijacked into botnet | TechRadar

How to Survive Fast-and-Furious DDoS Microbursts

Update your Wi-Fi cameras, else malware could infect your network | PCWorld

Musk blames Ukrainians for cyber attack on X. Experts aren’t convinced. – POLITICO

X’s Attackers Hit Servers Faulted for Lacking Key Protection

Cyber Attack on X Hit Insecure Servers

The Real Reason Twitter Went Down Actually Sounds Pretty Embarrassing

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

X hit by ‘massive cyber attack’ amid Dark Storm’s DDoS claims

What Really Happened With the DDoS Attacks That Took Down X | WIRED

X Outage Exposes Musk's Poor Digital Hygiene | HackerNoon

Elon Musk blaming Ukraine after Twitter cyber attack is ‘dangerous’, expert says | The Independent

Internet of Things – IoT

Hackers spotted using unsecured webcam to launch cyber attack | TechRadar

Another huge new botnet is infecting thousands of webcams and video recorders for DDoS attacks | TechRadar

Update your Wi-Fi cameras, else malware could infect your network | PCWorld

‘Ban These Chinese Routers NOW,’ Cries House Committee - Security Boulevard

Another top security camera maker is seeing devices hijacked into botnet | TechRadar

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 - SecurityWeek

Car Exploit Allows You to Spy on Drivers in Real Time

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Edimax Says No Patches Coming for Zero-Day Exploited by Botnets - SecurityWeek

Cyber Security Vulnerabilities with Certain Patient Monitors from Contec and Epsimed: FDA Safety Communication | FDA

CISOs, are your medical devices secure? Attackers are watching closely - Help Net Security

Data Breaches/Leaks

95% of Data Breaches Tied to Human Error in 2024 - Infosecurity Magazine

Data breach at Japanese telecom giant NTT hits 18,000 companies

43% of Healthcare Email Breaches Tied to Microsoft 365—New Report Uncovers the Major Cyber Security Gaps | Business Wire

Over Half of UK Organisations Experienced a Security Breach Resulting from Third-Party Access in the Past Year, Imprivata Study Finds

Two Rhysida healthcare attacks pwned 300K patients' data • The Register

New York sues Allstate and subsidiaries for back-to-back data breaches | CyberScoop

'Uber for nurses' exposes 86K+ medical records, PII • The Register

Australian financial firm hit with lawsuit after massive data breach | CSO Online

Software bug meant NHS information was potentially “vulnerable to hackers” | TechRadar

More than 23.7 Million Hardcoded Secrets Publicly Exposed In GitHub Last Year | MSSP Alert

Does the NHS have a security culture problem? • The Register

Organised Crime & Criminal Actors

Cyber Crime's Cobalt Strike Use Plummets 80% Worldwide

Texas Developer Convicted After Kill Switch Sabotage Plot - Infosecurity Magazine

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

The Violent Rise of ‘No Lives Matter’ | WIRED

Russian crypto exchange Garantex seized in international law enforcement operation | CyberScoop

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Ripple CEO Chris Larsen lost $150M in XRP after LastPass hack

US seizes $23 million in crypto stolen via password manager breach

EU investigates OKX for its role in Lazarus' $1.5 billion Bybit hack | Cryptopolitan

North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack - BBC News

Why CFOs Considering Stablecoins, Crypto Need Cyber Security

Russian crypto exchange Garantex seized in international law enforcement operation | CyberScoop

North Korean hackers cash out $300 million from ByBit heist

MassJacker malware uses 778,000 wallets to steal cryptocurrency

Gone In 120 Seconds: TRUMP Coin Phishing Lure Delivers RAT

Insider Risk and Insider Threats

95% of Data Breaches Tied to Human Error in 2024 - Infosecurity Magazine

Employee charged with stealing unreleased movies, sharing them online

Developer sabotaged ex-employer IT systems with kill switch • The Register

Developer Convicted for Hacking Former Employer's Systems - SecurityWeek

Man found guilty of planting infinite loop logic bomb on ex-employer's system

Insurance

Cyber insurance becoming a key safeguard for SMEs: Report | Insurance Business America

Supply Chain and Third Parties

Data breach at Japanese telecom giant NTT hits 18,000 companies

Over Half of UK Organisations Experienced a Security Breach Resulting from Third-Party Access in the Past Year, Imprivata Study Finds

Who’s in your digital house? The truth about third-party access - Help Net Security

The state of procurement: tackling inflation, supply chain disruptions, and cyber security risks | The Independent

Cyber criminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets | TechRadar

Cloud/SaaS

43% of Healthcare Email Breaches Tied to Microsoft 365—New Report Uncovers the Major Cyber Security Gaps | Business Wire

Cloud security gains overshadowed by soaring storage fees - Help Net Security

Hiding In Plain Sight: Cyber Criminals Take Advantage Of US Cloud Providers - Above the Law

'Uber for nurses' exposes 86K+ medical records, PII • The Register

Identity and Access Management

Machine Identities Outnumber Humans Increasing Risk Seven-Fold - Infosecurity Magazine

Encryption

UK quietly scrubs encryption advice from government websites | TechCrunch

France rejects controversial encryption backdoor provision | TechRadar

Legislative push for child online safety runs afoul of encryption advocates (again) | CyberScoop

Apple To Appeal Government Backdoor Order Friday | Silicon UK

Linux and Open Source

PoC Exploit Released for Actively Exploited Linux Kernel Write Vulnerability

UK Government Report Calls for Stronger Open Source Supply Chain Security Practices - SecurityWeek

Passwords, Credential Stuffing & Brute Force Attacks

A ‘significant increase’ in infostealer malware attacks left 3.9 billion credentials exposed to cyber criminals last year – and experts worry this is a ticking time bomb for enterprises | ITPro

Ripple CEO Chris Larsen lost $150M in XRP after LastPass hack

US seizes $23 million in crypto stolen via password manager breach

Social Media

Musk blames Ukrainians for cyber attack on X. Experts aren’t convinced. – POLITICO

X’s Attackers Hit Servers Faulted for Lacking Key Protection

The Real Reason Twitter Went Down Actually Sounds Pretty Embarrassing

X hit by ‘massive cyber attack’ amid Dark Storm’s DDoS claims

What Really Happened With the DDoS Attacks That Took Down X | WIRED

X Outage Exposes Musk's Poor Digital Hygiene | HackerNoon

ICANN regains control of X account after phishing attack - Domain Name Wire | Domain Name News

New YouTube Windows Attack Warning—Three Strikes And You’re Hacked

Malvertising

Microsoft reveals over a million PCs hit by malvertising campaign | TechRadar

GitHub-Hosted Malware Infects 1M Windows Users

Training, Education and Awareness

95% of Data Breaches Tied to Human Error in 2024 - Infosecurity Magazine

4 expert security tips for navigating AI-powered cyber threats | ZDNET

Regulations, Fines and Legislation

SEC cyber security disclosure rules, with checklist | TechTarget

UK quietly scrubs encryption advice from government websites | TechCrunch

Switzerland Mandates Cyber Reporting for Critical Infrastructure - Infosecurity Magazine

The risks of standing down: Why halting US cyber ops against Russia erodes deterrence | CSO Online

Balancing Cyber Security Accountability & Deregulation

‘Ban These Chinese Routers NOW,’ Cries House Committee - Security Boulevard

CISA completed its election security review. It won’t make the results public | CyberScoop

Ex-NSA vet slams reported halt to Russia cyber ops​ | Cybernews

Amid personnel turmoil at cyber agencies, a government shutdown could increase potential harm | CyberScoop

White House instructs agencies to avoid firing cyber security staff, email says | KELO-AM

Cyber Security Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

MS-ISAC loses federal support | StateScoop

Legislative push for child online safety runs afoul of encryption advocates (again) | CyberScoop

Apple To Appeal Government Backdoor Order Friday | Silicon UK

Romanian cyber security authority publishes draft order for registration of entities under NIS2 Directive

Models, Frameworks and Standards

86% of Financial Firms are Still Not Fully Compliant With DORA: Clear Junction Highlights Hurdles | The Fintech Times

NIST Finalizes Differential Privacy Rules to Protect Data

Cyber Essentials April 2025 Update: What you Need to Know

Romanian cyber security authority publishes draft order for registration of entities under NIS2 Directive

Backup and Recovery

Lessons from the Field, Part III: Why Backups Alone Won’t Save You - Security Boulevard

Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025

Data Protection

NIST Finalizes Differential Privacy Rules to Protect Data

Careers, Working in Cyber and Information Security

Cyber security workers aren't massively happy with their employers - but they are being paid pretty well | TechRadar

Strengthening the Human Firewall: Prioritising Mental Health in Cyber Security Teams - IT Security Guru

Understaffed but still delivering -- the reality of cyber security teams

How remote work strengthens cyber security teams - Help Net Security

Managing the emotional toll cyber security incidents can take on your team | CSO Online

The Legacy of the Cyber Security Challenge | SC Media UK

UK’s infosec chiefs must be paid more than PM, say officials • The Register

Law Enforcement Action and Take Downs

US seizes $23 million in crypto stolen via password manager breach

Employee charged with stealing unreleased movies, sharing them online

Developer sabotaged ex-employer IT systems with kill switch • The Register

Texas Developer Convicted After Kill Switch Sabotage Plot - Infosecurity Magazine

Developer Convicted for Hacking Former Employer's Systems - SecurityWeek

Russian crypto exchange Garantex seized in international law enforcement operation | CyberScoop

Cyber criminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets | TechRadar

Man found guilty of planting infinite loop logic bomb on ex-employer's system

Misinformation, Disinformation and Propaganda

Europe, Don't Forget the Information War - CEPA


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Europe, Don't Forget the Information War - CEPA

 

Nation State Actors

UK AI Research Under Threat From Nation-State Hackers - Infosecurity Magazine

China

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers - SecurityWeek

Salt Typhoon: A Wake-up Call for Critical Infrastructure

China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days - SecurityWeek

‘Ban These Chinese Routers NOW,’ Cries House Committee - Security Boulevard

UK AI Research Under Threat From Nation-State Hackers - Infosecurity Magazine

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers - SecurityWeek

Russia

The UK is unprepared and vulnerable to Russian cyber attacks. Here's why

The risks of standing down: Why halting US cyber ops against Russia erodes deterrence | CSO Online

The Geopolitical Fallout of a Potential US Cyber Stand-Down – The Diplomat

Europe, Don't Forget the Information War - CEPA

Ex-NSA vet slams reported halt to Russia cyber ops​ | Cybernews

Ukraine loses Signal support for anti-Russian cyber threat efforts, says official | SC Media

North Korea

Microsoft: North Korean hackers join Qilin ransomware gang

EU investigates OKX for its role in Lazarus' $1.5 billion Bybit hack | Cryptopolitan

North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack - BBC News

North Korean hackers spread spyware through Google Play disguised as utility apps | Engineering and Technology Magazine

Spyware in bogus Android apps is attributed to North Korean group | The Record from Recorded Future News

Lazarus Group deceives developers with 6 new malicious npm packages | CyberScoop

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

1,600 Victims Hit by South American APT's Malware - SecurityWeek




Vulnerability Management

Why Now is the Time to Adopt a Threat-Led Approach to Vulnerability Management

CISOs Connect Research Report on Cyber Security Debt Exposes Widespread Vulnerabilities

Balancing Cyber Security Accountability & Deregulation

Vulnerabilities

Thousands of Orgs Risk Zero-Day VM Escape Attacks

Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday - SecurityWeek

Patch Tuesday: Critical Code Execution Bugs in Adobe Acrobat and Reader - SecurityWeek

Fortinet Patches 18 Vulnerabilities  - SecurityWeek

Newly Patched Windows Zero-Day Exploited for Two Years - SecurityWeek

Google researchers uncover critical security flaw in all AMD Zen processors | TechSpot

Mass Exploitation of Critical PHP Vulnerability Begins - SecurityWeek

Top Bluetooth chip security flaw could put a billion devices at risk worldwide | TechRadar

SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver - SecurityWeek

CISA tags critical Ivanti EPM flaws as actively exploited in attacks

Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw - SecurityWeek

Critical PHP RCE vulnerability mass exploited in new attacks

Apple fixed the third actively exploited zero-day of 2025

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

Zoom Patches 4 High-Severity Vulnerabilities - SecurityWeek

PoC Exploit Released for Actively Exploited Linux Kernel Write Vulnerability

New SuperBlack ransomware exploits Fortinet auth bypass flaws

Cisco Patches 10 Vulnerabilities in IOS XR - SecurityWeek

Mozilla warns users to update Firefox before certificate expires

GitLab patches critical authentication bypass vulnerabilities

FreeType Zero-Day Being Exploited in the Wild - SecurityWeek


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Advisory 12 March 2025 – Security Updates from Microsoft, Fortinet, Apple, Adobe, Zoom and SAP

Black Arrow Cyber Advisory 12 March 2025 – Security Updates from Microsoft, Fortinet, Apple, Adobe, Zoom and SAP

Executive Summary

Microsoft’s Patch Tuesday for March 2025 delivered 57 security updates across its product line, including 6 actively exploited zero-day vulnerabilities. This month, several other major software and hardware vendors also released critical security updates to address vulnerabilities that could be exploited by attackers.

Fortinet issued 17 security advisories with updates addressing various high, medium, and low severity vulnerabilities across multiple product ranges, including FortiOS, FortiProxy, FortiPAM, FortiSRA, FortiAnalyzer, FortiManager, FortiAnalyzer-BigData, FortiSandbox, FortiNDR, FortiWeb, FortiSIEM, and FortiADC.

Apple released updates to address zero-day security issues across its iPhone, iPad, macOS, and visionOS product ranges, specifically targeting vulnerabilities in WebKit, the browser engine used within Safari and other Apple products.

Adobe provided updates addressing 35 vulnerabilities, including critical issues in various product lines such as Acrobat and Reader, InDesign, and Substance 3D Sampler.

Zoom patched five vulnerabilities in its applications, including four rated ‘high severity’, affecting Zoom Workplace, Rooms Controller, Rooms Client, and Meeting SDK products.

SAP also released 21 new security notes, covering high, medium, and low severity vulnerabilities addressed by security patches.

What’s the risk to me or my business?

The actively exploited vulnerabilities could allow an attacker to compromise the confidentiality, integrity and availability of the affected applications and the organisations data on the affected systems.

What can I do?

Black Arrow recommends applying the available security updates for all supported versions of products that have been impacted by the various vulnerabilities. The updates should be applied as soon as possible for actively exploited vulnerabilities and all other vulnerabilities that have a critical or high severity ratings.

Microsoft

Further details on specific updates within this Microsoft patch Tuesday can be found here:

https://msrc.microsoft.com/update-guide/releaseNote/2025-Mar

Apple, Adobe, Fortinet, Zoom, SAP

Further details of the vulnerabilities in affected Apple, Adobe, Fortinet and SAP:

https://helpx.adobe.com/security/security-bulletin.html

https://support.apple.com/en-us/100100

https://fortiguard.fortinet.com/psirt

https://www.zoom.com/en/trust/security-bulletin/?cms_guid=false&lang=en-US

https://support.sap.com/en/my-support/knowledge-base/security-notes-news/march-2025.html

#threatadvisory #threatintelligence #cybersecurity

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 07 March 2025

Black Arrow Cyber Threat Intelligence Briefing 07 March 2025:

-Cyber Security's Future Is All About Governance, Not More Tools

-'Cocktail of Cyber-Risk' Should Stir Concerns Among CISOs

-Why Cyber Drills are as Vital as Fire Drills

-Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

-Rising Cyber Threats in Europe’s Financial Sector: An ENISA Overview

-Old Unpatched Vulnerabilities Among the Most Widely Exploited

-Chinese State Back Threat Actor ‘Silk Typhoon’ Shifted to Specifically Targeting Outsourced IT Providers

-Social Engineering and Stolen Credential Threats Continue to Dominate Cyber Attacks

-Security CEOs Warn Your Voicemail Greeting is the Latest Target for Cyber Criminals

-Would-be Extortionists Send “BianLian” Ransom Notes in the Mail

-Cyber Threat Highest It’s Ever Been, Ex-Five Eyes Leader Warns

-Trump Administration Retreats in Fight Against Russian Cyber Threats

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Our review this week includes the evolving shift in cyber security, where governance and proactive risk management is becoming more critical than tool proliferation as exemplified by the inclusion of the ‘Govern’ function in the NIST Cyber Security Framework. Businesses still face a cocktail of cyber risks as geopolitical tensions, misinformation, and AI-driven threats continue to evolve. Despite increased awareness, cyber risk integration remains insufficient at the executive level, leaving many organisations, particularly smaller businesses, exposed.

Vulnerability management remains a pressing concern. 40% of vulnerabilities leveraged in 2024 date back to 2020 or earlier, while ransomware and botnet expansion thrive on unpatched systems. Meanwhile, the financial sector continues to be a target for cyber attacks, with European regulators responding through stricter risk management frameworks like DORA. The rise of state-sponsored actors such as China-backed Silk Typhoon, which targets IT service providers, further underscores the importance of securing supply chains and third-party dependencies.

Our review this week also highlights the importance of rehearsing how to respond to a cyber incident, as well as the changing tactics of attackers such as the use of AI voice cloning from voicemail recordings to impersonate individuals, and false extortion demands. These, and other observations from our threat intelligence briefings, highlight the need for comprehensive security awareness. With cyber threats at an all-time high, organisations must adopt a strategic, governance-led approach to resilience, ensuring robust defences against both sophisticated adversaries and opportunistic cyber criminals.

Top Cyber Stories of the Last Week

Cyber Security's Future Is All About Governance, Not More Tools

The cyber security landscape is shifting from tool-centric procurement to strategic governance, with CISOs taking a more prominent role in business decision-making. Despite growth in the number of security tools that organisations deploy, fragmented workflows and diminishing returns persist. The focus is now on aligning security with business objectives, regulatory expectations, and operational efficiency. The NIST Cyber Security Framework 2024 update introduced a "Govern" function, underscoring proactive risk management. As cyber security becomes integral to corporate strategy, CISOs must prioritise transparency, accountability, and resilience over simply expanding their security stack.

'Cocktail of Cyber-Risk' Should Stir Concerns Among CISOs

The World Economic Forum's ‘Global Cybersecurity Outlook 2025’ highlights the evolving risk landscape, where cyber security threats are increasingly intertwined with geopolitical and economic risks. Misinformation and AI-related threats are now among the top concerns, while cyber espionage is reportedly declining. Despite growing awareness, only 60% of CEOs and CISOs integrate cyber risk into enterprise risk management. Smaller businesses are particularly vulnerable, with 35% admitting their cyber resilience is insufficient. The report stresses that CISOs must navigate shifting board priorities, regulatory changes, and supply chain risks while ensuring cyber security remains a core business consideration.

Why Cyber Drills are as Vital as Fire Drills

Cyber resilience is becoming a business imperative, with human error remaining the leading cause of cyber incidents and the average cost of a cyber attack reaching a record $4.88 million in 2024. A recent study found that 94% of organisations have implemented or plan to implement cyber drills within three years, recognising their role in strengthening defences and ensuring business continuity. Yet, decision-makers spend only 39% of their time on cyber readiness. As nearly half of businesses faced an attack in the past year, routine cyber drills, like fire drills, are essential to preparing teams for real-world threats.

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Nonprofit organisations have experienced a sharp rise in cyber attacks, with email threats increasing by 35% over the past year. A report by Abnormal Security highlights that limited cyber security resources and high-trust environments make nonprofits prime targets. Credential phishing has surged by 50%, compromising donor databases and enabling financial fraud, while malware attacks have risen by 26%, often leading to ransomware incidents. As cyber criminals refine their tactics, nonprofits must prioritise email security, leveraging AI-driven solutions to detect threats and protect sensitive data, ensuring operational resilience and maintaining public trust.

Rising Cyber Threats in Europe’s Financial Sector: An ENISA Overview

The latest report from the European Network and Information Security Agency (ENISA) highlights a surge in cyber threats targeting Europe’s financial sector, with 488 reported incidents between January 2023 and June 2024. Banks bore the brunt of attacks (46%), followed by public financial institutions (13%) and individual customers (10%). DDoS attacks were the most common, accounting for 58% of incidents, often linked to geopolitical tensions. Data breaches, ransomware, and fraud also saw a rise, exposing sensitive financial records and disrupting operations. In response, regulators have strengthened cyber security policies, with initiatives like DORA aiming to enhance resilience through stricter risk management and incident response frameworks.

Old Unpatched Vulnerabilities Among the Most Widely Exploited

GreyNoise’s latest report highlights that 40% of vulnerabilities exploited in 2024 were from 2020 or earlier, with some dating back over two decades. Attackers are also accelerating their exploitation of newly disclosed flaws, with some targeted within hours. Home internet routers and enterprise solutions from vendors like Ivanti, D-Link, and VMware were among the most affected. Ransomware groups remain the primary exploiters, leveraging 28% of newly listed vulnerabilities in the US Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalogue. Key attacker objectives include botnet expansion, cryptocurrency mining, and ransomware deployment, underscoring the risks posed by unpatched legacy systems.

Chinese State Back Threat Actor ‘Silk Typhoon’ Shifted to Specifically Targeting Outsourced IT Providers

Microsoft has reported that Silk Typhoon, a Chinese state-backed espionage group, has shifted focus to targeting IT management firms, aiming to infiltrate downstream customers. The group exploits stolen API keys, credentials, and unpatched software to access cloud and on-premises systems. By compromising IT providers and privileged access tools, they steal sensitive data from sectors including government, healthcare, and energy. Microsoft highlights Silk Typhoon’s ability to swiftly adapt, making it one of the most pervasive Chinese threat actors. This report coincides with US indictments of 12 Chinese nationals linked to cyber espionage, including two alleged Silk Typhoon members.

Social Engineering and Stolen Credential Threats Continue to Dominate Cyber Attacks

CrowdStrike’s 2025 Global Threat Report highlights a sharp rise in social engineering attacks, with credential theft surging by 442% in the latter half of 2024. Stolen credentials remain a primary attack vector, while adversaries operate with increasing speed: the average time to move within a compromised network has fallen to just 48 minutes, with some breaches occurring in as little as 51 seconds. The report underscores the need for enhanced employee training, stronger credential protection, and improved detection capabilities to counter these evolving threats, particularly as cyber criminals leverage AI and target cloud environments with greater sophistication.

Security CEOs Warn Your Voicemail Greeting is the Latest Target for Cyber Criminals

Cyber security leaders are warning that AI voice cloning is a growing threat, with criminals using voicemail recordings to impersonate individuals. Experts highlight that just three seconds of audio is enough to create a convincing deepfake, which can be exploited in scams targeting employees, families, and businesses. C-suite executives are particularly at risk, with attacks mimicking their voices to manipulate staff. To mitigate this risk, security professionals recommend replacing personal voicemail greetings with automated defaults, limiting voice recordings online, and using a family-safe word to verify urgent requests.

Would-be Extortionists Send “BianLian” Ransom Notes in the Mail

Executives are being targeted in a new ransomware scam involving physical letters falsely claiming to be from the BianLian ransomware group. The letters demand ransoms of $250,000 to $350,000, threatening to leak sensitive data unless payment is made within 10 days. However, security experts have found no evidence of actual network intrusions, suggesting the campaign is a fraudulent extortion attempt. The FBI has issued a warning, confirming no links to the real BianLian group. Organisations are advised to inform executives, review incident response procedures, and report any such letters to law enforcement.

Cyber Threat Highest It’s Ever Been, Ex-Five Eyes Leader Warns

The cyber threat to critical infrastructure is at an all-time high, driven by geopolitical tensions, financial incentives, and technological advancements, warns the former head of the UK’s National Cyber Security Centre (NCSC). Organised criminals and state-backed hacking groups pose a growing risk to essential services. Artificial intelligence is making cyber attacks more efficient, cost-effective, and accessible, potentially enabling new threat actors to launch large-scale campaigns. While financial motives remain unchanged, the increasing role of AI in cyber warfare is a key concern, as it lowers barriers to entry for malicious actors, amplifying the risks faced by organisations globally.

Trump Administration Retreats in Fight Against Russian Cyber Threats

The Trump administration has shifted its stance on cyber threats, no longer publicly recognising Russia as a major cyber security risk to US national security and critical infrastructure. This policy change marks a significant departure from long-standing intelligence assessments and contrasts with the positions of US allies. Experts warn that deprioritising Russia as a cyber threat could leave the US vulnerable to attacks. Reports indicate internal directives have limited efforts to monitor Russian cyber activities, raising concerns that adversaries may exploit weakened defences. Meanwhile, job cuts across key agencies may have further reduced cyber security capabilities, compounding the risks.

Sources:

https://www.darkreading.com/cyber-risk/cybersecurity-future-governance-not-more-tools

https://www.darkreading.com/cyber-risk/thinking-outside-box-cyber-risk

https://www.forbes.com/sites/jameshadley/2025/03/04/why-cyber-drills-are-as-vital-as-fire-drills/

https://www.infosecurity-magazine.com/news/nonprofits-email-threats-rise-35/

https://www.jdsupra.com/legalnews/rising-cyber-threats-in-europe-s-7746792/

https://www.infosecurity-magazine.com/news/old-vulnerabilities-widely/

https://cyberscoop.com/silk-typhoon-targets-it-services/

https://natlawreview.com/article/social-engineering-stolen-credential-threats-continue-dominate-cyber-attacks

https://cybernews.com/security/cybercriminals-use-voicemail-greetings-ai-voice-cloning-attacks/

https://www.infosecurity-magazine.com/news/extortionists-bianlian-ransom/

https://www.nzherald.co.nz/business/markets-with-madison/cyber-threat-highest-its-ever-been-ex-five-eyes-leader-warns/F4G6TUDZ3JAT7PNZNFBVBXXPF4/

https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security


Governance, Risk and Compliance

Cybersecurity’s Future Is All About Governance, Not More Tools

Why Employee Training Is A Critical Component Of Effective Business Cybersecurity - Minutehack

Why Cyber Drills Are As Vital As Fire Drills

'Cocktail of Cyber-Risk' Should Stir Concerns Among CISOs

SolarWinds CISO says security execs are ‘nervous’ about individual liability for data breaches  | CyberScoop

Top security CEOs warn your voicemail greeting is the latest target for cyber criminals | Cybernews

Third-Party Attacks Drive Major Financial Losses in 2024 - Infosecurity Magazine

Third-Party Risk Top Cybersecurity Claims

Cyber risks see SME focus but big risks remain

Board Oversight of Cyber Security Incidents

How to create an effective incident response plan | CSO Online

CFOs’ Risk Outlook—The Economy, Cyber and Talent Are Top Concerns

What CISOs need from the board: Mutual respect on expectations | CSO Online

The evolving landscape of regulatory compliance in cybersecurity - Digital Journal

WTF? Why the cyber security sector is overrun with acronyms | CSO Online

The 5 stages of incident response grief - Help Net Security

A Shield of Defensibility Protecting CISOs and Their Companies

CISO Liability Risks Spur Policy Changes at 93% of Organisations - Infosecurity Magazine

Are cybersecurity chiefs focusing too much on legal liability—and not enough on fixing vulnerabilities? | Fortune

CISO vs. CIO: Where security and IT leadership clash (and how to fix it) - Help Net Security

Cyber Threats Are Evolving Faster Than Defences

Cyber threat highest it’s ever been, ex-Five Eyes leader warns - NZ Herald


Threats

Ransomware, Extortion and Destructive Attacks

Ransomware Evolution: From Encryption to Extortion

Mad, Bad, And Dangerous To Know: Cyber Criminals Are More Sophisticated Than Ever

Cyber criminals picked up the pace on attacks last year | CyberScoop

Ransomware 2025: Lessons from the Past Year and What Lies Ahead

Report: CISA Vulnerabilities Catalog Monitored By Ransomware Gangs | MSSP Alert

Ransomware activity surged last year, report finds | SC Media

Ransomware Attacks Appear to Keep Surging - InfoRiskToday

Inside the Minds of Cyber Criminals: A Deep Dive into Black Basta’s Leaked Chats   - Security Boulevard

Your New Car Could Be the Next Ransomware Target

Ransomware scum abusing Microsoft Windows-signed driver • The Register

VulnCheck Exposes CVEs From Black Bastas' Chats

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Would-be Extortionists Send “BianLian” Ransom Notes in the Mail - Infosecurity Magazine

Cactus Ransomware: What You Need To Know | Tripwire

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

Emulating the Relentless RansomHub Ransomware - Security Boulevard

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks

Ransomware: from REvil to Black Basta, what do we know about Tramp? | Computer Weekly

Schools Vs Ransomware: Lessons Learned From A Cyber Attack - TeachingTimes

Ransomware Victims

Hunters International ransomware claims attack on Tata Technologies

Qilin claims attacks on cancer, women's clinics • The Register

Ransomware crew threatens to leak 'stolen' Tata Tech data • The Register

‘My company thrived for 150 years — then Russian hackers brought it down in three months’

Ransomware Group Takes Credit for Lee Enterprises Attack - SecurityWeek

Qilin Ransomware gang claims the hack of the Ministry of Foreign Affairs of Ukraine

Phishing & Email Based Attacks

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

Phishing Campaign Uses Havoc Framework to Control Infected Systems - Infosecurity Magazine

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

Watch out - that LinkedIn email could be a fake, laden with malware | TechRadar

5,000 CAPTCHA Tests Used As Infostealer Gateways—Do Not Complete Them

Massive Phishing Campaign Spreads Lumma Stealer Via Bogus CAPTCHA PDFs | MSSP Alert

How a Manual Remediation for a Phishing URL Took Down Cloudflare R2 - InfoQ

Business Email Compromise (BEC)/Email Account Compromise (EAC)

From Event to Insight Unpacking a B2B Business Email Compromise BEC Scenario | Trend Micro (US)

Other Social Engineering

2025 CrowdStrike Global Threat Report: 442% Surge in Social Engineering and Credential Theft

How QR code attacks work and how to protect yourself - Help Net Security

Vishing attacks surged 442% last year - how to protect yourself | ZDNET

The Hidden Risks Of Job Hunting: Recruitment Fraud And Cybersecurity

What is vishing? Voice phishing is surging - expert tips on how to spot it and stop it | ZDNET

North Korea's Latest 'IT Worker' Scheme Seeks Nuclear Funds

Digital nomads and risk associated with the threat of infiltred employees

YouTube warns of AI-generated video of its CEO used in phishing attacks

Scammers take over social media - Help Net Security

Fake police call cryptocurrency investors to steal their funds

Artificial Intelligence

Top security CEOs warn your voicemail greeting is the latest target for cyber criminals | Cybernews

89% of enterprise AI usage is invisible to the organisation - Help Net Security

Deepfake cyber attacks proliferated in 2024, iProov claims • The Register

Nearly 12,000 API keys and passwords found in AI training dataset

The Urgent Need to Address Cyber Security in the GenAI Market

Web DDoS attacks see major surge as AI allows more powerful attacks | TechRadar

How New AI Agents Will Transform Credential Stuffing Attacks

YouTube warns of AI-generated video of its CEO used in phishing attacks

New Report Finds that 78% of Chief Information Security Officers Globally are Seeing a Significant Impact from AI-Powered Cyber Threats - up 5% from last year

Private 5G Networks Face Security Risks Amid AI Adoption - Infosecurity Magazine

Anorexia coaches, self-harm buddies and sexualized minors: How online communities are using AI chatbots for harmful behavior  | CyberScoop

Police arrests suspects tied to AI-generated CSAM distribution ring

Innovation vs. security: Managing shadow AI risks - Help Net Security

Attackers distributing Trojans disguised as DeepSeek or Grok clients for Windows | Kaspersky official blog

Malware

Microsoft says malvertising campaign impacted 1 million PCs

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

Watch out - that LinkedIn email could be a fake, laden with malware | TechRadar

Hackers Weaponizing PowerShell & Microsoft Legitimate Apps To Deploy Malware

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Devs beware: fake Golang packages target Mac users | Cybernews

Polyglot files used to spread new backdoor | CSO Online

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers | WIRED

5,000 CAPTCHA Tests Used As Infostealer Gateways—Do Not Complete Them

Typosquatted Go Packages Distribute Malware Loader Targeting Linux And MacOS

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Badbox Android botnet disrupted through coordinated threat hunting | CSO Online

Massive Phishing Campaign Spreads Lumma Stealer Via Bogus CAPTCHA PDFs | MSSP Alert

26 Million Devices Hit By Infostealers—Bank Cards Leaked To Dark Web

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers | WIRED

Massive botnet that appeared overnight is delivering record-size DDoSes - Ars Technica

Attackers distributing Trojans disguised as DeepSeek or Grok clients for Windows | Kaspersky official blog

Russian-Speaking Hackers Goad Users Into Installing Havoc

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Bots/Botnets

Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet | TechRadar

Widespread network edge device targeting conducted by PolarEdge botnet | SC Media

Massive botnet that appeared overnight is delivering record-size DDoSes - Ars Technica

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices - SecurityWeek

Badbox Android botnet disrupted through coordinated threat hunting | CSO Online

Mobile

Over 500K Android, iOS, iPadOS, Devices Impacted By Spyzie Stalkerware | MSSP Alert

Governments can't seem to stop asking for secret backdoors • The Register

New Android RAT Dubbed “AndroRAT” Attacking to Steal Pattern, PIN & Passcodes

Do you really need to worry about spyware on your phone?

Google’s 'consent-less' Android tracking probed by academics • The Register

Google confirms mass app deletion on Play Store after ad fraud | Android Central

Denial of Service/DoS/DDoS

Massive botnet that appeared overnight is delivering record-size DDoSes - Ars Technica

Web DDoS attacks see major surge as AI allows more powerful attacks | TechRadar

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices - SecurityWeek

Internet of Things – IoT

Top risks produced by old wireless routers and smart home devices

8 ways to secure your smart home from hackers

Your New Car Could Be the Next Ransomware Target

BadBox Botnet Powered by 1 Million Android Devices Disrupted - SecurityWeek

How Can Your Smart Washer Pose A Threat To Your Privacy?

Badbox Android botnet disrupted through coordinated threat hunting | CSO Online

Goodbye Kia - this is the serious vulnerability that affects all vehicles registered after this date

Data Breaches/Leaks

Inside a cyber attack: How hackers steal data

Lost luggage data leak exposes nearly a million records | Cybernews

75% of US government websites experienced data breaches | Cybernews

Angel One Breach Compromises Client Data | MSSP Alert

Organised Crime & Criminal Actors

Mad, Bad, And Dangerous To Know: Cyber Criminals Are More Sophisticated Than Ever

Cyber criminals picked up the pace on attacks last year | CyberScoop

Cyber threat highest it’s ever been, ex-Five Eyes leader warns - NZ Herald

Online crime-as-a-service skyrockets with 24,000 users selling attack tools - Help Net Security

US Soldier Intends to Admit Hacking 15 Telecom Carriers

Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement | CyberScoop

Nigerian Accused of Hacking Tax Preparation Firms Extradited to US - SecurityWeek

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

How North Korea stole $1.5bn from Bybit – the biggest ever crypto theft - AML Intelligence

International cops seize Russian crypto exchange Garantex • The Register

Bybit hackers resume laundering activities, moving another 62,200 ETH

US recovers $31 million stolen in 2021 Uranium Finance hack

$51,300,000,000: Crypto Scams 2025 Report by Chainalysis is Out

Lazarus Group at it again - New victim suspected in $3.1M Tron hack | Cryptopolitan

North Korea’s $1.5 billion heist puts the crypto world on notice - The Japan Times

Shape-shifting Chrome extensions target wallets​ | Cybernews

Fake police call cryptocurrency investors to steal their funds

Insider Risk and Insider Threats

Digital nomads and risk associated with the threat of infiltred employees

Insurance

Third-Party Risk Top Cyber Security Claims

Supply Chain and Third Parties

Third-Party Attacks Drive Major Financial Losses in 2024 - Infosecurity Magazine

Third-Party Risk Top Cyber Security Claims

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

Why Vendor Risk Management Can't Be a One-Time Task | UpGuard

Ransomware crew threatens to leak 'stolen' Tata Tech data • The Register

Cloud/SaaS

How to plan your cloud migration with security in mind | SC Media

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

New Microsoft 365 outage impacts Teams, causes call failures

Microsoft Teams and other Windows tools hijacked to hack corporate networks | TechRadar

Attackers Leverage Microsoft Teams and Quick Assist for Access - Infosecurity Magazine

Apple begins legal battle to resist 'egregious' iCloud backdoor demand | Macworld

Outages

New Microsoft 365 outage impacts Teams, causes call failures

Barclays: bank to pay £12.5m compensation for online outage

Microsoft Blames Widespread Outage On “Problematic Code Change”

How a Manual Remediation for a Phishing URL Took Down Cloudflare R2 - InfoQ

Identity and Access Management

Misconfigured access management systems expose global enterprises to security risks | CSO Online

Identity: The New Cyber Security Battleground

Prioritising data and identity security in 2025 - Help Net Security

Encryption

The UK will neither confirm nor deny that it’s killing encryption | The Verge

Encryption Wars: Governments Want a Backdoor, but Hackers Are Watching | HackerNoon

"We will not walk back" – Signal would rather leave the UK and Sweden than remove encryption protections | TechRadar

France pushes for law enforcement access to Signal, WhatsApp and encrypted email  | Computer Weekly

Governments can't seem to stop asking for secret backdoors • The Register

Apple begins legal battle to resist 'egregious' iCloud backdoor demand | Macworld

Why a push for encryption backdoors is a global security risk - Help Net Security

UK cyber security damaged by “clumsy Home Office political censorship” | Computer Weekly

Linux and Open Source

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Typosquatted Go Packages Distribute Malware Loader Targeting Linux And MacOS

Open Source Security Risks Continue To Rise

Passwords, Credential Stuffing & Brute Force Attacks

2025 CrowdStrike Global Threat Report: 442% Surge in Social Engineering and Credential Theft

How New AI Agents Will Transform Credential Stuffing Attacks

‘My company thrived for 150 years — then Russian hackers brought it down in three months’

Social Media

UK probes TikTok, Reddit over child data privacy concerns • The Register

Watch out - that LinkedIn email could be a fake, laden with malware | TechRadar

YouTube warns of AI-generated video of its CEO used in phishing attacks

Scammers take over social media - Help Net Security

USCIS mulls policing social media of all would-be citizens • The Register

Malvertising

Microsoft says malvertising campaign impacted 1 million PCs

Training, Education and Awareness

Why Employee Training Is A Critical Component Of Effective Business Cyber Security - Minutehack

Regulations, Fines and Legislation

Former intelligence officials denounce job cuts to federal cyber roles - Nextgov/FCW

Cyber resilience under DORA – are you prepared for the challenge? | TechRadar

The Crime and Policing Bill Explained

Governments can't seem to stop asking for secret backdoors • The Register

Apple begins legal battle to resist 'egregious' iCloud backdoor demand | Macworld

Why a push for encryption backdoors is a global security risk - Help Net Security

What is the Digital Operational Resilience Act (DORA)? | Definition from TechTarget

The evolving landscape of regulatory compliance in cyber security - Digital Journal

Is Trump risking US national security to woo Putin? US no longer sees Russia as major cyber threat, tweaks foreign policy- The Week

CISA: No Change on Defending Against Russian Cyber Threats - SecurityWeek

UK security in shock as America signals end to cyber operations against Russia

The Wiretap: How Trump, Hegseth And DOGE Are Undermining Ukrainian Security

DoD, CISA Deny Reports of Pausing Cyber Operations Against Russia | MSSP Alert

Gadgets Used By American Presidents (And Why They Were A Security Nightmare)

National Security Threatened By Cyber Security Job Cuts, Experts Say | MSSP Alert

CISA Cuts: A Dangerous Gamble in a Dangerous World

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation - Help Net Security

Trump's Staffing Overhauls Hit Nation's Cyber Defense Agency

Strengthening Telecommunications Security: A Call to Action for Cyber Resilience

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates - Security Boulevard

Google asks US government to drop breakup plan over national security fears | TechRadar

Models, Frameworks and Standards

Cyber resilience under DORA – are you prepared for the challenge? | TechRadar

What is the Digital Operational Resilience Act (DORA)? | Definition from TechTarget

Financial Organisations Urge CISA to Revise Proposed CIRCIA Implementation - SecurityWeek

Navigating NIS 2 compliance [Q&A]

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates - Security Boulevard

Careers, Working in Cyber and Information Security

New 2025 SANS Threat Hunting Survey Reveals 61% of Organisations Struggle with Staffing Shortages

The days of easy hiring in cyber security coming to an end • The Register

Stress and Burnout Impacting Vast Majority of IT Pros - Infosecurity Magazine

Cyber Security Job Satisfaction Plummets, Women Hit Hardest - Infosecurity Magazine

Why Cyber Security Jobs Are Hard to Find in a Worker Shortage

Will AI Start Taking Cyber Security Professionals' Jobs?

Law Enforcement Action and Take Downs

International cops seize Russian crypto exchange Garantex • The Register

US seizes domain of Garantex crypto exchange used by ransomware gangs

US Soldier Intends to Admit Hacking 15 Telecom Carriers

Police arrests suspects tied to AI-generated CSAM distribution ring

Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement | CyberScoop

Nigerian Accused of Hacking Tax Preparation Firms Extradited to US - SecurityWeek


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Nation State Actors

China

Will Chinese cyberespionage be more aggressive in 2025? CrowdStrike thinks so | TechRadar

Silk Typhoon shifted to specifically targeting IT management companies | CyberScoop

In case we forgot, Typhoon attacks remind us of China’s cyber capability—and intent | The Strategist

Chinese cyber espionage growing across all industry sectors | CSO Online

Defence, not more assertive cyber activity, is the right response to Salt Typhoon | The Strategist

US Charges Members of Chinese Hacker-for-Hire Group i-Soon - Infosecurity Magazine

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Russia

The Trump Administration Is Deprioritizing Russia as a Cyber Threat | WIRED

As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow - The Washington Post

Finland's secret service says frequency of cable incidents is 'exceptional' | Reuters

France has ‘trouble understanding’ US halt on cyber operations against Russia – POLITICO

Is Trump risking US national security to woo Putin? US no longer sees Russia as major cyber threat, tweaks foreign policy- The Week

CISA: No Change on Defending Against Russian Cyber Threats - SecurityWeek

US Cyber Command Russia stand-down: Strategic diplomacy or security gamble? | SC Media

DHS says CISA won’t stop looking at Russian cyber threats | CyberScoop

UK security in shock as America signals end to cyber operations against Russia

National Security Threatened By Cyber Security Job Cuts, Experts Say | MSSP Alert

CISA Cuts: A Dangerous Gamble in a Dangerous World

Russian telecom Beeline facing outages after cyber attack | The Record from Recorded Future News

Russian-Speaking Hackers Goad Users Into Installing Havoc

International cops seize Russian crypto exchange Garantex • The Register

‘My company thrived for 150 years — then Russian hackers brought it down in three months’

Ukraine's intel service honors civilian hackers for the first time with military award | The Record from Recorded Future News

Qilin Ransomware gang claims the hack of the Ministry of Foreign Affairs of Ukraine

Iran

Large cyber attack emanated from Iran days after Trump sanctions - watchdogs | Iran International

Suspected Iranian Hackers Used Compromised Indian Firm's Email to Target U.A.E. Aviation Sector

Crafty Camel APT Targets Aviation, OT With Polygot Files

North Korea

How North Korea stole $1.5bn from Bybit – the biggest ever crypto theft - AML Intelligence

Bybit hackers resume laundering activities, moving another 62,200 ETH

North Korea's Latest 'IT Worker' Scheme Seeks Nuclear Funds

Digital nomads and risk associated with the threat of infiltred employees

Lazarus Group at it again - New victim suspected in $3.1M Tron hack | Cryptopolitan

The rise of Lazarus Group from Sony hacks to billion dollar crypto heists



Other News

Rising Cyber Threats in Europe’s Financial Sector: An ENISA Overview | HaystackID - JDSupra

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35% - Infosecurity Magazine

Cyber risks see SME focus but big risks remain

Attackers could hack smart solar systems and cause serious damages

Popular Chrome extensions hijacked by hackers in widespread cyber attack — 3.2 million at risk | Tom's Guide

This Browser-Based Attack Can Dodge Security Protections to Take Over Your Account

What is cyber stalking and how to prevent it? | Definition from TechTarget

The More You Care, The More You Share: Information Sharing And Cyber Awareness

What is a Watering Hole Attack? | Definition from TechTarget

WTF? Why the cyber security sector is overrun with acronyms | CSO Online

If you want security, start with secure products – Computerworld

ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report - SecurityWeek

Over Half of Organisations Report Serious OT Security Incidents - Infosecurity Magazine

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation - Help Net Security

Finland's secret service says frequency of cable incidents is 'exceptional' | Reuters

Polish Space Agency offline as it recovers from cyber attack

Hackers breach military walls as funding falls short | Cybernews

Why Decommissioned Nuclear Sites Must Stay on the Security Agenda | SC Media UK

15 Percent of Healthcare PCs Fail Security Test, Increasing Risk of Ransomware, Breaches, and Compliance Violations | Business Wire

3 Cyber Security Steps Every Local Government Should Take

First EU “cyber” Council focusses on crisis management and critical infrastructure security – ministry - Delfi EN

Google asks US government to drop breakup plan over national security fears | TechRadar



Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 28 February 2025

Black Arrow Cyber Threat Intelligence Briefing 28 February 2025:

-Cyber Security's Biggest Blind Spot - Third-Party Risk

-Cyber Criminals Can Now Clone Any Legitimate Website, and It’s Pretty Terrifying

-Over 25 New Malware Variants Created Every Single Hour

-Understanding MFA Fatigue: Why Cyber Criminals Are Exploiting Human Behaviour

-Only a Fifth of Ransomware Attacks Now Encrypt Data

-Biggest Crypto Heist in History, Worth $1.5Bn, Linked to North Korea Hackers

-89% of Enterprise GenAI Usage is Invisible to Organisations, Exposing Critical Security Risks

-Combating Deepfakes in Financial Services: A Call to Action

-Threat Actors Are Increasingly Trying to Grind Business to a Halt

-With AI and Automation, Hackers are Stealing Data at Unprecedented Speeds

-Mobile Phishing Attacks on the Rise

-With Millions Upon Millions of Victims, Scale of Info-Stealer Malware Laid Bare

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

The last week has identified several critical cyber security threats that demand immediate attention from business leaders. Third-party risk has become a major concern, with supply chain vulnerabilities now driving 31% of cyber insurance claims. Attackers are also leveraging new techniques, such as MFA fatigue and AI-powered phishing, to bypass traditional defences. The emergence of sophisticated phishing toolkits and deepfake fraud highlights the growing challenge of verifying digital identities, while mobile phishing (mishing) is increasingly targeting employees through personal devices.

The accelerating pace of cyber threats is evident, with 25 new malware variants created every hour and cyber criminals leveraging AI and automation to exfiltrate data at unprecedented speeds, sometimes within minutes. Meanwhile, ransomware actors are shifting strategies, focusing 80% of attacks on data theft rather than encryption, making traditional defences less effective. The surge in generative AI usage within enterprises, often without IT oversight, introduces further risks, including data leakage and code exposure.

Black Arrow Cyber believes that businesses must adopt a proactive, layered security approach. This includes real-time threat detection, robust vendor risk management, AI-driven fraud prevention, and enhanced employee training. With cyber extortion demands rising sharply and operational disruptions increasing, organisations that fail to adapt will face significant financial, operational, and reputational consequences.


Top Cyber Stories of the Last Week

Cyber Security's Biggest Blind Spot: Third-Party Risk

Cyber insurer Resilience has identified third-party risk as a leading driver of cyber insurance claims, accounting for 31% of all claims in 2024. Notably, for the first time, these risks led to direct financial losses, making up 23% of incurred claims. Ransomware remained a major cause, linked to 61% of losses, while transfer fraud increased to 18%. Sectors such as healthcare, finance, and manufacturing were most affected. The findings highlight the growing need for businesses to assess not just their own cyber security, but also that of their vendors to mitigate financial and operational risks.

Cyber Criminals Can Now Clone Any Legitimate Website, and It’s Pretty Terrifying

Researchers have identified a surge in activity around a new phishing toolkit, called Darcula-suite 3.0, which enables cyber criminals to clone legitimate websites with ease. This development significantly lowers the barrier for less technical attackers, allowing them to impersonate trusted brands and steal sensitive information. The toolkit includes an admin panel to track successful attacks and even generate fraudulent payment card details. As phishing scams grow more sophisticated with AI-driven enhancements, organisations must strengthen their cyber security measures to mitigate the risk of falling victim to these increasingly convincing attacks.

Over 25 New Malware Variants Created Every Single Hour

SonicWall’s latest research highlights an alarming rise in cyber threats, with 637 new malware variants detected daily; more than 25 every hour. Encrypted threats have surged by 92%, with attackers leveraging TLS encryption to bypass defences. Security teams are under increasing strain, with burnout and mental health concerns on the rise. Despite the urgency, some organisations take up to 150 days to apply critical patches, leaving them exposed. With cyber attacks doubling in cost in 2024, businesses must move beyond legacy defences and adopt real-time threat monitoring and security operations centre (SOC) capabilities to stay ahead of increasingly sophisticated threats.

Understanding MFA Fatigue: Why Cyber Criminals Are Exploiting Human Behaviour

MFA fatigue attacks are emerging as a critical cyber security threat, exploiting human behaviour rather than technical vulnerabilities. Attackers overwhelm users with repeated MFA prompts, hoping frustration or confusion will lead to accidental approval. High-profile breaches, including Uber in 2022, highlight the risks. Cyber criminals often pair push spamming with social engineering to increase success rates. Organisations must move beyond reliance on MFA alone by implementing phishing-resistant authentication, monitoring for excessive login attempts, and training staff to recognise and report unusual activity. A layered security approach is essential to counter these evolving tactics and protect critical systems.

Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest’s latest report reveals that ransomware actors are increasingly abandoning encryption, with 80% of attacks in 2024 focused solely on data exfiltration, which is 34% faster. Service accounts were a key vulnerability, implicated in 85% of breaches, while insufficient logging was identified as the leading cause of security failures. Two-thirds of critical intrusions involved legitimate software, and a quarter stemmed from exploited public-facing applications. The report urges organisations to enhance monitoring, deploy AI-driven automation, and strengthen endpoint security to keep pace with increasingly rapid cyber threats.

Biggest Crypto Heist in History, Worth $1.5Bn, Linked to North Korea Hackers

A cyber attack on the Dubai-based cryptocurrency exchange Bybit resulted in the theft of an estimated $1.5bn, with analysts attributing the breach to North Korea’s Lazarus Group. Experts report that malware was used to authorise fraudulent transactions, with the stolen funds allegedly laundered to support North Korea’s missile programme. Bybit has offered a $140m bounty to trace and freeze the stolen assets. Blockchain analysis indicates North Korea-linked hackers were responsible for one in five crypto breaches in 2024, stealing $1.34bn across 47 incidents, up from $660m across 20 incidents the previous year.

89% of Enterprise GenAI Usage is Invisible to Organisations, Exposing Critical Security Risks

A new report by LayerX highlights a significant blind spot in enterprise security, revealing that nearly 90% of generative AI (GenAI) usage occurs without IT oversight. This lack of visibility increases risks such as data leakage and unauthorised access. While only 15% of employees use GenAI daily, 50% engage with these tools at least biweekly. Notably, 39% of frequent users are software developers, raising concerns over proprietary code exposure. Additionally, half of all data pasted into GenAI tools contains corporate information, underscoring the urgent need for robust security measures to manage ‘shadow AI’ and protect sensitive business data.

Combating Deepfakes in Financial Services: A Call to Action

Deepfake fraud is emerging as a critical threat to financial institutions. Criminals use AI-generated video and audio to bypass traditional security measures, impersonating executives and manipulating high-value transactions. One incident saw an organisation transfer $25 million following a deepfake video call. To combat this, financial firms must adopt advanced identity verification, including liveness detection and AI-driven fraud analysis. A layered security approach, combined with employee awareness and customer education, is essential to mitigating risk and maintaining trust in digital banking.

Threat Actors Are Increasingly Trying to Grind Business to a Halt

Palo Alto Networks’ Unit 42 found that nearly 9 in 10 cyber attacks it responded to last year led to business disruption, with organisations facing operational downtime, fraud-related losses and reputational damage. Attackers increasingly use disruption as leverage, alongside encryption and data theft, to pressure victims into paying. The median extortion demand surged by almost 80% to $1.25 million in 2024, though negotiated payments averaged $267,500. Critical infrastructure sectors, including health care and manufacturing, were particularly targeted. These findings highlight the growing threat of cyber extortion and the increasing financial and operational toll on businesses.

With AI and Automation, Hackers are Stealing Data at Unprecedented Speeds

ReliaQuest’s Annual Cyber-Threat Report highlights how AI and automation are accelerating cyber attacks, with hackers now exfiltrating critical data in record time. On average, attackers achieve lateral movement within 48 minutes, with the fastest observed data theft occurring in just 4 hours and 29 minutes. Ransomware groups increasingly prioritise data exfiltration over encryption, with 80% of attacks focused on stealing information. In 60% of cases, stolen data is sent to legitimate cloud platforms. With the threat landscape evolving rapidly, organisations must rethink their response strategies to detect and mitigate attacks before critical assets are compromised.

Mobile Phishing Attacks on the Rise

Mishing (mobile phishing) attacks have risen sharply, with one major global campaign compromising over 600 organisations. Attackers are increasingly using advanced social engineering tactics, including device-aware phishing and geolocation-based redirection, making scams more targeted and harder to detect. The rise in Bring Your Own Device policies and reduced user verification of URLs have contributed to this trend. Security experts highlight the need for organisations to adapt, recommending mobile threat defence, phishing-resistant multi-factor authentication, clear Bring Your Own Device policies, and strong password management to counter the growing risk of credential-based attacks.

With Millions Upon Millions of Victims, Scale of Info-Stealer Malware Laid Bare

A vast trove of stolen credentials has been added to the privacy-breach-notification service ‘Have I Been Pwned’ (HIBP) after a government agency tipped off its founder, Troy Hunt. The dataset, linked to the "Alien Txtbase" Telegram channel, comprises 1.5TB of data, including 23 billion records and 284 million unique email addresses, harvested by info-stealer malware. HIBP has integrated 244 million new passwords and updated 199 million existing ones. Attackers increasingly exploit stolen credentials to bypass security, with new HIBP APIs now enabling organisations to check if their domains are compromised, reinforcing the need for strong cyber security measures.

Sources:

https://www.prnewswire.com/news-releases/cybersecuritys-biggest-blind-spot-third-party-risk-new-resilience-analysis-finds-302386804.html

https://www.xda-developers.com/cybercriminals-clone-legitimate-website/

https://www.techradar.com/pro/security/over-25-new-malware-variants-created-every-single-hour-as-smart-device-cyberattacks-more-than-double-in-2024

https://www.itsecurityguru.org/2025/02/25/understanding-mfa-fatigue-why-cybercriminals-are-exploiting-human-behaviour/

https://www.infosecurity-magazine.com/opinions/healthcare-ai-fight-cyber-attacks/

https://news.sky.com/story/biggest-crypto-heist-in-history-worth-1-5bn-linked-to-north-korea-hackers-13317301

https://thehackernews.com/2025/02/89-of-enterprise-genai-usage-is.html

https://www.finextra.com/blogposting/27927/combating-deepfakes-in-financial-services-a-call-to-action

https://cyberscoop.com/cyberattacks-business-disruption-2025-unit-42-palo-alto-networks/

https://cybernews.com/security/hackers-stealing-data-at-unprecedented-speeds/

https://www.scworld.com/brief/mobile-phishing-attacks-on-the-rise

https://www.theregister.com/2025/02/26/hibp_adds_giant_infostealer_trove/



Threats

Ransomware, Extortion and Destructive Attacks

Only a Fifth of Ransomware Attacks Now Encrypt Data - Infosecurity Magazine

AI is helping hackers get access to systems quicker than ever before | TechRadar

FBI Has Warned About 'Ghost' Cyber Attacks. What You Need to Know. - Business Insider

Warning issued over prolific 'Ghost' ransomware group | ITPro

Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cyber Criminals Double Down on Extortion

New Anubis Ransomware Could Pose Major Threat to Organisations - SecurityWeek

EncryptHub breaches 618 orgs to deploy infostealers, ransomware

With AI and automation, hackers are stealing data at unprecedented speeds | Cybernews

23 Vulnerabilities in Black Basta's Chat Logs Exploited in Wild

CL0P Ransomware Attacking Telecommunications & Healthcare Sectors In Large Scale

Threat actors are increasingly trying to grind business to a halt | CyberScoop

Massive leak exposes the inner workings of top ransomware syndicate Black Basta | TechSpot

Black Basta ransomware leak sheds light on targets, tactics | TechTarget

NCC Group tracks alarming ransomware surge in January | TechTarget

A landscape forever altered? The LockBit takedown one year on | Computer Weekly

Should ransomware payments be illegal? | TechRadar

Black Basta Goes Dark Amid Infighting, Chat Leaks Show

Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail | Malwarebytes

Targeted by Ransomware, Middle East Banks Shore Up Security

Dragos: Ransomware attacks against industrial orgs up 87% | TechTarget

Ransomware Victims

Ransomware attack on Southern Water cost £4.5 million – DataBreaches.Net

Hackers claim responsibility for NHS provider attack - BBC News

DISA took a year to disclose a breach affecting 3.3M+ people • The Register

DragonForce Ransomware Group is Targeting Saudi Arabia

British celebs warned their private details could be leaked online after cyber criminals hacked agency | Daily Mail Online

'Paddington' victim of Russian cyber attack

Ransomware Gang Publishes Stolen Genea IVF Patient Data - Infosecurity Magazine

LockBit taunts FBI Director Kash Patel with alleged “Classified” leak threat

Home Depot Refutes Clop Ransomware Attack Claims | MSSP Alert

‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day | The Record from Recorded Future News

Phishing & Email Based Attacks

Cyber criminals can now clone any legitimate website, and it's pretty terrifying

Cyber Crooks Exploit URL Manipulation In Sophisticated Phishing Scam

Forget phishing, now "mishing" is the new security threat to worry about | TechRadar

Cyber Criminals Can Now Clone Any Brand's Site in Minutes Using Darcula PhaaS v3

Job Application Spear Phishing - Security Boulevard

Deceptive Signatures: Advanced Techniques in BEC Attacks

Beware: PayPal "New Address" feature abused to send phishing emails

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Be careful! That legit PayPal email might be a phishing scam | PCWorld

How I Keep Myself Safe From Phishing When I Work From Home

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Deceptive Signatures: Advanced Techniques in BEC Attacks

Other Social Engineering

Understanding MFA Fatigue: Why Cyber Criminals Are Exploiting Human Behaviour - IT Security Guru

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

One wrong SMS can wipe your savings, thanks to this Android Trojan | Cybernews

Pump.fun X account hacked to promote scam governance token

DeepSeek-Spoofing Leveraged For Crypto Exfiltration | MSSP Alert

Artificial Intelligence

Deep trouble: Deepfakes and their implications for cyber security - Verdict

4 Low-Cost Ways to Defend Your Organisation From Deepfakes

Combating Deepfakes in Financial Services: A Call to Action: By Adam Preis

AI is helping hackers get access to systems quicker than ever before | TechRadar

With AI and automation, hackers are stealing data at unprecedented speeds | Cybernews

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

The truth about GenAI security: your business can't afford to “wait and see” | TechRadar

The First International AI Safety Report: A Call To Action

89% of Enterprise GenAI Usage Is Invisible to Organisations Exposing Critical Security Risks, New Report Reveals

Quarter of Brits Report Deepfake Phone Scams - Infosecurity Magazine

Microsoft names cyber criminals behind AI deepfake network

AI-Powered Deception is a Menace to Our Societies

Why AI deployment requires a new level of governance - Help Net Security

AI Is Everywhere Since October 7, From the Battlefield to the Cyber Arena - The Media Line

DeepSeek-Spoofing Leveraged For Crypto Exfiltration | MSSP Alert

OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns

Nearly a third of UK public sector IT professionals anxious about AI security risks

2FA/MFA

Understanding MFA Fatigue: Why Cyber Criminals Are Exploiting Human Behaviour - IT Security Guru

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks - Infosecurity Magazine

Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know | ITPro

Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments | The Record from Recorded Future News

Why Gmail is replacing SMS codes with QR codes - and what it means for you | ZDNET

Malware

Scale of unstoppable info-stealer malware laid bare • The Register

Cyber criminals prefer remote tools over malware, says CrowdStrike | SC Media

Why ‘malware as a service’ is becoming a serious problem | ITPro

Over 25 new malware variants created every single hour as smart device cyber attacks more than double in 2024 | TechRadar

Have I Been Pwned adds 284M accounts stolen by infostealer malware

Is your email or password among the 240+ million compromised by infostealers? - Help Net Security

3.9 Billion Passwords Stolen—Infostealer Malware Blamed

EncryptHub breaches 618 orgs to deploy infostealers, ransomware

AI malware pioneers | Cybernews

New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer

5 Active Malware Campaigns in Q1 2025

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised Systems

Hundreds of GitHub repos served up malware for years - Help Net Security

Mac malware masks as job interview to steal crypto | Cybernews

‘Auto-Color’ Linux Malware Uses Advanced Stealth Tactics To Evade Detection

Two new pieces of Mac malware in the wild – one being fixed this week

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks - Infosecurity Magazine

New malware disrupts critical industrial processes • The Register

Bots/Botnets

Massive botnet hits Microsoft 365 accounts - Help Net Security

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks - Infosecurity Magazine

Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know | ITPro

Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments | The Record from Recorded Future News

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

Mobile

Mobile phishing attacks on the rise | SC Media

Forget phishing, now "mishing" is the new security threat to worry about | TechRadar

SpyLend Android malware downloaded 100,000 times from Google Play

Apple currently only able to detect Pegasus spyware in half of infected iPhones

Pegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectors

Flaw found in stalkerware apps, exposing millions of people. Here's how to find out if your phone is being spied upon

One wrong SMS can wipe your savings, thanks to this Android Trojan | Cybernews

Unmanaged Devices: The Overlooked Threat CISOs Must Confront

Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail | Malwarebytes

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Security flaw in popular stalkerware apps is exposing phone data of millions | TechRadar

Why this Android image-scanning feature is controversial - and how to get rid of it | ZDNET

A Major Security Flaw Has Been Discovered in Samsung's Secure Folder Feature | Extremetech

Denial of Service/DoS/DDoS

How DDoS Attacks Work and How You Can Protect Your Business From Them - Security Boulevard

Web DDoS attacks up over 500 percent

Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550%

Internet of Things – IoT

Cyber Attacks On EV Chargers Pose A Growing Threat | The Truth About Cars

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

Hackers Can Crack Into Car Cameras in Minutes Flat

Data Breaches/Leaks

Orange Group confirms breach after hacker leaks company documents

Cyber Security's Biggest Blind Spot: Third-Party Risk, New Resilience Analysis Finds

Third parties now dominant cyber-attack point

Background check, drug testing provider DISA suffers data breach - Help Net Security

Hacker Behind Over 90 Data Leaks Arrested in Thailand - SecurityWeek

DISA took a year to disclose a breach affecting 3.3M+ people • The Register

Top digital loan firm security slip-up puts data of 36 million users at risk | TechRadar

Organised Crime & Criminal Actors

B1ack’s Stash released 1 Million credit cards - Security Affairs

Thailand Targets Cyber Sweatshops to Free 1000s of Captives

Microsoft names cyber criminals behind AI deepfake network

INSIGHT: Fraud-as-a-Service: Creating a new breed of fraudsters - AML Intelligence

10 cyber security insights from ex hacker and FBI agent who arrested him

2025 CrowdStrike Global Threat Report: Cyber Criminals Are Shifting Tactics – Are You Ready? - Security Boulevard

Data: Cyber threats skyrocket as attackers think like businesses | Capacity Media

'Silver Fox' APT Skirts Windows Blocklist in BYOVD Attack

26 New Threat Groups Spotted in 2024: CrowdStrike - SecurityWeek

Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies | CyberScoop

Hacker Behind Over 90 Data Leaks Arrested in Thailand - SecurityWeek

Leader of cyber blackmail gang faces jail – Court News UK

The evolution of Russian cyber crime | Intel 471

Beware of Fake Cyber Security Audits: Cyber Criminals Use Scams to Breach Corporate Systems | Tripwire

How Anonymous Actually Works, According to a Founding Member - Business Insider

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested – DataBreaches.Net

US Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Biggest crypto heist in history, worth $1.5bn, linked to North Korea hackers | Science, Climate & Tech News | Sky News

Lazarus Group moves funds to multiple wallets as Bybit offers bounty

Lazarus Group launches ‘QinShihuang’ meme coin to launder $26M more from Bybit stash | Cryptopolitan

AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto

Mac malware masks as job interview to steal crypto | Cybernews

Inside the Lazarus Group money laundering strategy

Fake CS2 tournament streams used to steal crypto, Steam accounts

Pump.fun X account hacked to promote scam governance token

DeepSeek-Spoofing Leveraged For Crypto Exfiltration | MSSP Alert

Argentina’s $4.6 Billion Crypto Scandal; Largest-Ever Crypto Theft

Insider Risk and Insider Threats

The Time to Speak to Employees About Insider Risk Is Now

US Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

Insurance

Insurers still concerned over cyber risk unknowns

Supply Chain and Third Parties

Cyber Security's Biggest Blind Spot: Third-Party Risk, New Resilience Analysis Finds

Third parties now dominant cyber-attack point

Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access - Security Boulevard

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

Russia warns financial sector organisations of IT service provider LANIT compromise

Cloud/SaaS

UK backdoor order forces Apple to disable cloud encryption | Digital Trends

Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand - SecurityWeek

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks - Infosecurity Magazine

Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments | The Record from Recorded Future News

Are False Positives Killing Your Cloud Security? Veriti Research Reveals  - Security Boulevard

The Future of Auditing: What to Look for in 2025 - Security Boulevard

Encryption

Apple Pulls Encrypted iCloud Security Feature in UK Amid Government Backdoor Demands - MacRumors

Government has made UK user data ‘less secure’ with Apple row – experts - LBC

How end-to-end encryption will and won't change for Apple users in the UK | Tech News - Business Standard

Experts Slam Government After “Disastrous” Apple Encryption Move - Infosecurity Magazine

Public told to use Apple security tool Advanced Data Protection that Home Office tried to crack

Quantum Computing Has Arrived; We Need To Prepare For Its Impact

The encryption backdoor debate: Why are we still here?

The Case for Encryption | Open Rights Group

Google Says Its Encryption Has Not Changed—Does Android Now Beat iPhone?

FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data

UK blindsided US intelligence by asking for Apple backdoor, "a violation of American’s privacy and civil liberties" | TechRadar

Signal May Exit Sweden If Government Imposes Encryption Backdoor - Infosecurity Magazine

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

Linux and Open Source

New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised Systems

‘Auto-Color’ Linux Malware Uses Advanced Stealth Tactics To Evade Detection

OpenSSF Releases Security Baseline for Open Source Projects - SecurityWeek

Passwords, Credential Stuffing & Brute Force Attacks

Scale of unstoppable info-stealer malware laid bare • The Register

Hackers stole this engineer's 1Password database. Could it happen to you? | ZDNET

Is your email or password among the 240+ million compromised by infostealers? - Help Net Security

3.9 Billion Passwords Stolen—Infostealer Malware Blamed

HaveIBeenPwned Adds 244 Million Passwords Stolen By Infostealers - Infosecurity Magazine

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics - SecurityWeek

Social Media

As Meta gets rid of fact-checkers, misinformation is going viral | TechCrunch

How new Facebook policies incentivize spreading misinformation | ZDNET

Pump.fun X account hacked to promote scam governance token

Regulations, Fines and Legislation

Government has made UK user data ‘less secure’ with Apple row – experts - LBC

Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace | CyberScoop

Cyber security Needs to Stay Nonpartisan in the Age of DOGE

UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution | The Record from Recorded Future News

DOGE must halt all ‘negligent cyber security practices,’ House Democrats tell Trump | The Record from Recorded Future News

House Dems say DOGE is leaving publicly exposed entry points into government systems | CyberScoop

Firing of 130 CISA staff worries cyber security industry | CSO Online

Federal cyber security layoffs could leave U.S. vulnerable to hackers - CBS News

Why we need an expanded CISA to fight today’s cyber threats | SC Media

UK blindsided US intelligence by asking for Apple backdoor, "a violation of American’s privacy and civil liberties" | TechRadar

Gabbard Calls for Investigation of UK’s Apple Backdoor Request

The Future of Auditing: What to Look for in 2025 - Security Boulevard

Trump 2.0 Brings Cuts to Cyber, Consumer Protections – Krebs on Security

Fake video of Trump kissing Musk's toes beamed to federal computers

China compromised GOP emails ahead of Republican convention • The Register

NIST Purge Puts US Semiconductors, AI Safety At Risk

Models, Frameworks and Standards

We must all safeguard against cyber attacks

UK businesses should look to Ireland amid EU cyber security overhaul | Computer Weekly

How To Take Your Firm From Risk To Resilience In 8 DORA-compliant Steps

Careers, Working in Cyber and Information Security

The CISO's dilemma of protecting the enterprise while driving innovation - Help Net Security

The cyber security skills gap reality: We need to face the challenge of emerging tech | CSO Online

Many cyber security pros report low job satisfaction—all while trying to fend off increasing threats from hackers | Fortune

Cyber security professionals face expanding responsibilities, with 61% covering multiple domains

Law Enforcement Action and Take Downs

Microsoft names cyber criminals behind AI deepfake network

Hacker Behind Over 90 Data Leaks Arrested in Thailand - SecurityWeek

Leader of cyber blackmail gang faces jail – Court News UK

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested – DataBreaches.Net

US Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

Misinformation, Disinformation and Propaganda

As Meta gets rid of fact-checkers, misinformation is going viral | TechCrunch

How new Facebook policies incentivize spreading misinformation | ZDNET

AI-Powered Deception is a Menace to Our Societies

Data Leak Exposes TopSec's Role in China's Censorship-as-a-Service Operations

Opinion | The right-wing media machine hits a wall - The Washington Post


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Aggressive Tactics, Weaponization of AI-powered Deception Rises | Business Wire

The Growing Threat of Cyber Warfare from Nation-States - PaymentsJournal

Nation State Actors

A pivotal year for geopolitical cyber attacks – how should businesses manage the risks? | Insurance Business America

Geopolitical Tension Fuels APT and Hacktivism Surge - Infosecurity Magazine

How APT Naming Conventions Make Us Less Safe

China

It's not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills | CyberScoop

FBI Has Warned About 'Ghost' Cyber Attacks. What You Need to Know. - Business Insider

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks - Infosecurity Magazine

A Tale of Two Typhoons: Properly Diagnosing Chinese Cyber Threats - War on the Rocks

2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises | Business Wire

CrowdStrike: China hacking has reached 'inflection point' | TechTarget

Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)'s staff emails

Data Leak Exposes TopSec's Role in China's Censorship-as-a-Service Operations

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics - SecurityWeek

China compromised GOP emails ahead of Republican convention • The Register

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks - Infosecurity Magazine

Russia

The evolution of Russian cyber crime | Intel 471

Ukrainian hackers claim breach of Russian loan company linked to Putin’s ex-wife | The Record from Recorded Future News

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

Russia warns financial sector organisations of IT service provider LANIT compromise

Cyber Attacks Hits Leading Russian IT Service Provider’s Subsidiaries | MSSP Alert

Russia warns financial sector of major IT service provider hack

Australia Bans Kaspersky Software Over National Security and Espionage Concerns

Apple Cuts Off Russian Developers from Enterprise Program Amid Ongoing Sanctions - gHacks Tech News

Sweden investigates suspected sabotage of undersea telecoms cable - BBC News

Germany takes the fight to Russia in undersea cable war

Drone-Equipped U.S. Marines Now Helping Protect Baltic Sea Submarine Cables

Putin’s secret weapon: The threat to the UK lurking on our sea beds - BBC News

North Korea

Biggest crypto heist in history, worth $1.5bn, linked to North Korea hackers | Science, Climate & Tech News | Sky News

Lazarus Group launches ‘QinShihuang’ meme coin to launder $26M more from Bybit stash | Cryptopolitan

FBI Confirms North Korea’s Lazarus Group as Bybyit Hackers - Infosecurity Magazine

Inside the Lazarus Group money laundering strategy

FBI fingers North Korea for $1.5B Bybit cryptocurrency heist • The Register

Lazarus Group moves funds to multiple wallets as Bybit offers bounty

EU sanctions North Korean tied to Lazarus group over involvement in Ukraine war | The Record from Recorded Future News

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Modern Approach to Attributing Hacktivist Groups - Check Point Research

How Anonymous Actually Works, According to a Founding Member - Business Insider





Vulnerability Management

23 Vulnerabilities in Black Basta's Chat Logs Exploited in Wild

Software Vulnerabilities Take Almost Nine Months to Patch - Infosecurity Magazine

UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution | The Record from Recorded Future News

61% of Hackers Use New Exploit Code Within 48 Hours of Attack - Infosecurity Magazine

Software security debt is spiralling out of control – remediation times have surged 47% in the last five years, and it’s pushing teams to breaking point | ITPro

What is VMaaS? Why You Should Consider Vulnerability-Management-as-a-Service

Misconfigured Access Systems Expose Hundreds Of Thousands Of Employees And Organisations

US Government Supercharges Security Vulnerabilities

Vulnerabilities

Atlassian fixed critical flaws in Confluence and Crowd

Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls - SecurityWeek

Huge cyber attack found hitting vulnerable Microsoft-signed legacy drivers to get past security | TechRadar

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

Cisco Patches Vulnerabilities in Nexus Switches - SecurityWeek

Vulnerabilities in MongoDB Library Allow RCE on Node.js Servers - SecurityWeek

Mac security researchers expose two new exploits | Macworld

Max Severity RCE Vuln in All Versions of MITRE Caldera

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363) - Help Net Security


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 21 February 2025

Black Arrow Cyber Threat Intelligence Briefing 14 February 2025:

-Supply Chain Cyber Attacks Surge Over 400%, Expected to Continue Rising

-98% of Business Leaders Can't Spot a Phishing Scam

-Two-Thirds of UK Businesses Still Failing on Cyber Security

-44% of Middle-Market Firms Invest in Cyber Crime Protection

-A Deepfake Epidemic Is Coming: People Are Simply Not Good Enough at Identifying Fakes

-Cyber Security Gaps Exposed as 96% of S&P 500 Firms Hit by Data Breaches

-Cyber Criminals Shift Focus to Social Media as Attacks Reach Historic Highs

-Is a Lack of Supply Chain Visibility Undermining Board-Level Confidence in Cyber Security Programs?

-Ransomware Gangs Extort Victims 17 Hours After Intrusion on Average

-Over 330 million Credentials Compromised by Infostealers

-Mobile Phishing Attacks Surge, Accounting for 16% of Phishing Incidents

-Phishing-as-a-Service (PhaaS) Can Now Auto-Generate Phishing Kits for Any Brand

-This Open Text-to-Speech Model Needs Just Seconds of Audio to Clone Your Voice

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Black Arrow Cyber has identified a significant surge in cyber threats targeting organisations worldwide, with supply chain vulnerabilities, phishing scams, and ransomware tactics evolving at an alarming rate. Supply chain cyber attacks have increased by 431% in just two years, exposing weaknesses in third-party security oversight and operational dependencies. Simultaneously, phishing attacks remain a major risk, with 98% of senior business leaders unable to recognise key warning signs. The rapid rise of deepfake technology, infostealer malware, and mobile phishing further exacerbates these threats, with cyber criminals leveraging AI and automation to enhance their attack strategies.

Corporate cyber security measures remain insufficient, as evidenced by 96% of S&P 500 firms experiencing data breaches and 69% of UK businesses failing to implement basic network security protections. Ransomware gangs are accelerating their attacks, demanding ransoms within 17 hours of infiltration, while Phishing-as-a-Service platforms are making sophisticated attacks accessible to criminals with little technical knowledge. Social media has also become a prime target, with 2.55 billion threats blocked in a single quarter.

Black Arrow Cyber believes that urgent action is required. Businesses must prioritise proactive security strategies, including continuous supply chain monitoring, robust phishing awareness training, and advanced authentication measures to mitigate these growing risks. As cyber threats evolve, only a strong, multi-layered defence will ensure operational resilience and data security in an increasingly volatile digital landscape.

Top Cyber Stories of the Last Week

Supply Chain Cyber Attacks Surge Over 400%, Expected to Continue Rising

A new cyber risk report by Cowbell has revealed a 431% surge in supply chain cyber attacks between 2021 and 2023, with further increases expected by 2025. Businesses with revenues over $50 million are 2.5 times more likely to be targeted, with manufacturing, public administration, and education among the most at-risk sectors. Key vulnerabilities stem from reliance on third-party suppliers, poor visibility into vendor security, and weaknesses in operating systems and business applications. To mitigate these risks, organisations must enhance supplier oversight, conduct regular cyber risk assessments, and implement proactive security measures across their supply chains.

98% of Business Leaders Can't Spot a Phishing Scam

A new report from Tech.co has revealed that 98% of senior business leaders struggle to recognise all the warning signs of phishing, despite such attacks accounting for 40% of data breaches in 2024, a sharp rise from the previous year. Nearly half of respondents failed to identify urgency or threats as key phishing indicators, while 19% could not correctly define two-factor authentication. With the global average cost of a data breach reaching $4.88M, the findings highlight a critical gap in cyber security awareness at the highest levels, underscoring the need for improved training across all leadership roles.

Two-Thirds of UK Businesses Still Failing on Cyber Security

Beaming’s latest research reveals that 69% of UK businesses, equating to 3.6 million companies, are at heightened risk of cyber attack due to poor network security practices. Many fail to encrypt data in transit, isolate traffic from public infrastructure, or monitor for malicious activity. While the majority are micro businesses, over 7,000 medium-sized and nearly 1,000 large organisations also fall short. With corporate networks now critical to business operations, the report highlights a widespread failure to recognise their role in safeguarding sensitive data and maintaining operational resilience.

44% of Middle-Market Firms Invest in Cyber Crime Protection

A recent PYMNTS Intelligence report highlights that cyber security is a growing concern for middle-market CFOs, with 44% of high-uncertainty firms (facing fluctuating demand, supply chain disruptions, or macroeconomic volatility) investing in AI-driven threat detection. Rising cyber threats are diverting budgets away from innovation, forcing firms to prioritise security over growth. Nearly a third of high-uncertainty organisations have conducted third-party security assessments, while just 13% have implemented multifactor authentication. Despite these measures, optimism about cyber security improvements remains mixed, with 31% of high-uncertainty firms expecting risks to worsen in 2025, while 74% of low-uncertainty firms anticipate improvements.

A Deepfake Epidemic Is Coming: People Are Simply Not Good Enough at Identifying Fakes

A new study by iProov highlights the growing threat of deepfakes, revealing that most people struggle to distinguish AI-generated content from reality. In a test of 2,000 participants, only 0.1% correctly identified all deepfakes, with older adults being particularly vulnerable and 39% of those over 65 had never heard of deepfakes. While younger generations showed greater confidence, their detection accuracy did not improve. Social media was identified as a key risk area, with nearly half of respondents pointing to Meta and TikTok. Experts warn that traditional detection methods are insufficient, calling for biometric security solutions to combat rising deepfake threats.

Cyber Security Gaps Exposed as 96% of S&P 500 Firms Hit by Data Breaches

Nearly all S&P 500 firms have experienced data breaches, with 96% impacted, highlighting critical cyber security gaps across industries. A new report reveals widespread deficiencies in software patching, SSL configurations, and system hosting, with nearly 90% of companies affected by hosting vulnerabilities and over 80% exposed to web application security risks. Manufacturing, Finance, and Healthcare rank among the most vulnerable sectors. Nearly 63% of Finance sector employees reuse compromised passwords. The findings underscore the urgent need for stronger encryption, better patch management, and stricter credential security to mitigate risks and prevent further breaches.

Cyber Criminals Shift Focus to Social Media as Attacks Reach Historic Highs

Cyber criminals are increasingly exploiting social media platforms, with attacks reaching record highs in 2024. A new report from Gen revealed that 2.55 billion threats were blocked in Q4 alone, equating to 321 per second. Social engineering accounted for 86% of these, highlighting the growing sophistication of scams. Malvertising drove 41% of threats, while Facebook was the most targeted platform, linked to 56% of social media attacks. Financial scams surged, with mobile banking malware infections rising by 236%. As AI-driven fraud increases, businesses must prioritise cyber security awareness and robust defences to mitigate evolving digital risks.

Is a Lack of Supply Chain Visibility Undermining Board-Level Confidence in Cyber Security Programs?

Many UK organisations are struggling with supply chain cyber security. 95% of C-level executives reported being negatively impacted by supply chain cyber breaches, yet 34% have no way of knowing when an incident occurs. As supply chains grow (some organisations engage with over 10,000 third parties) so too does risk, with nearly every firm with 10,000+ suppliers suffering a breach in the past year. Boards must prioritise continuous monitoring and structured oversight to mitigate risk and ensure operational resilience amidst increasing regulatory pressures.

Ransomware Gangs Extort Victims 17 Hours After Intrusion on Average

Ransomware groups are accelerating their attacks, reducing the time organisations have to detect intrusions. Analysis shows the average time from breach to ransom demand is now just 17 hours, with some groups acting in as little as 4 to 6 hours. Groups with the fastest attack times have also seen the highest growth in victims. A shift towards data theft over encryption is emerging, exploiting gaps in data loss prevention tools. Multiple sectors remain primary targets, with attackers increasingly abusing remote monitoring tools to maintain access and evade detection.

Over 330 million Credentials Compromised by Infostealers

Infostealer malware emerged as a major initial access threat in 2024, with over 330 million credentials compromised across at least 4.3 million machines, according to a new report. These stolen credentials grant access to critical corporate services, heightening cyber security risks. While law enforcement efforts disrupted key infostealer operations, including RedLine, threats persist due to the growth of malware-as-a-service models. The report also highlighted a 10.5% rise in ransomware victims and a 28.5% increase in active threat groups, underscoring the escalating cyber crime landscape organisations must navigate.

Mobile Phishing Attacks Surge, Accounting for 16% of Phishing Incidents

Mobile phishing attacks, or “mishing,” have surged, with daily incidents peaking at over 1,000 in August 2024. A report by Zimperium zLabs found that 16% of these attacks occurred in the US, with India leading global susceptibility at 37%. Attackers are increasingly exploiting mobile-first channels such as SMS, QR codes and messaging apps to bypass traditional security measures, often using geolocation-targeted campaigns. With 82% of phishing sites now designed for mobile devices, experts stress the need for mobile-specific security strategies, including phishing-resistant multi-factor authentication, real-time URL analysis and targeted user training.

Phishing-as-a-Service (PhaaS) Can Now Auto-Generate Phishing Kits for Any Brand

The latest version of the Darcula phishing-as-a-service (PhaaS) platform removes technical barriers, enabling cyber criminals to launch highly sophisticated phishing attacks with minimal effort. The platform's new DIY phishing kit generator allows users to clone any brand's website automatically, streamlining credential theft. Additional features include enhanced anti-detection measures, real-time campaign monitoring, and tools for automating credit card fraud. Netcraft reports that in the past 10 months, it has blocked nearly 100,000 Darcula-related domains and 20,000 phishing sites, warning that the ease of use and growing adoption of this platform will significantly increase phishing attack volumes.

This Open Text-to-Speech Model Needs Just Seconds of Audio to Clone Your Voice

Zyphra has released an open-source text-to-speech model capable of cloning a voice with just five seconds of sample audio. The Zonos models, trained on 200,000 hours of multilingual speech data, generate convincing voice replicas, though subtle pacing inconsistencies remain detectable. Unlike competitors, Zyphra has made the models freely available under an open licence. While the technology has legitimate applications in accessibility and audiobook production, it also raises security concerns, such as its potential use in scams and misinformation campaigns. Given the minimal effort required to create realistic clones, organisations should be alert to emerging threats in voice-based authentication and fraud.

Sources:

https://www.insurancebusinessmag.com/us/news/cyber/supply-chain-cyber-attacks-surge-over-400-expected-to-continue-rising--cowbell-report-525369.aspx

https://www.businesswire.com/news/home/20250220627260/en/98-of-Business-Leaders-Cant-Spot-a-Phishing-Scam-Tech.co-Report-Reveals

https://totaltele.com/two-thirds-of-uk-businesses-still-failing-on-cyber-security/

https://www.pymnts.com/cybersecurity/2025/44percent-middle-market-firms-invest-cybercrime-protection/

https://www.techradar.com/pro/in-a-test-2000-people-were-shown-deepfake-content-only-one-of-them-managed-to-get-a-perfect-score

https://www.techmonitor.ai/technology/cybersecurity/cybersecurity-gaps-exposed-96-sp-500-firms-data-breaches

https://www.helpnetsecurity.com/2025/02/18/cybercriminals-social-media-attacks/

https://betanews.com/2025/02/16/is-a-lack-of-supply-chain-visibility-undermining-board-level-confidence-in-cyber-security-programs/

https://www.csoonline.com/article/3825444/ransomware-gangs-extort-victims-17-hours-after-intrusion-on-average.html

https://www.infosecurity-magazine.com/news/330-million-credentials/

https://www.infosecurity-magazine.com/news/mobile-phishing-attacks-surge-16/

https://www.bleepingcomputer.com/news/security/darcula-phaas-can-now-auto-generate-phishing-kits-for-any-brand/

https://www.theregister.com/2025/02/16/ai_voice_clone/



Threats

Ransomware, Extortion and Destructive Attacks

Ransomware gangs extort victims 17 hours after intrusion on average | CSO Online

Ransomware and reputation | Professional Security Magazine

Ransomware Detection: Attack Types & Latest Techniques in 2025 - Security Boulevard

BlackLock ransomware onslaught: What to expect and how to fight it - Help Net Security

Ransomware Spike Driven By RaaS Operations | MSSP Alert

The new ransomware groups worrying security researchers in 2025 | ITPro

Ransomware Attacks on Critical Infrastructure, AI Use to Grow in 2025 | MSSP Alert

Dozens of Orgs Claimed To Be Hacked by Cl0p Ransomware | MSSP Alert

Ending the Ransomware Scourge Requires Punishing Its Enablers

There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims | ITPro

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group - Infosecurity Magazine

The growing cyber threat: Ransomware, China, and state-sponsored attacks - GZERO Media

Feds warn Ghost ransomware crew remains active, potent • The Register

CISA and FBI: Ghost ransomware breached orgs in 70 countries

Inside A LockBit Ransomware Attack: A Firsthand Account Of Financial And Security Fallout

Updated Shadowpad Malware Leads to Ransomware Deployment | Trend Micro (US)

Darktrace Report Highlights The Growing Power Of MaaS, Sneaky Evasion Tactics

Black Basta ransomware gang's internal chat logs leak online

Acronis H2 2024 Cyber Threats Report Unveils Rise in

The complete story of the 2024 ransomware attack on UnitedHealth

Consultation launched to protect critical national infrastructure from ransomware | New Civil Engineer

Is Russia Reining In Ransomware-Wielding Criminals?

Ransomware losses tumble but threat remains: Chainalysis

NailaoLocker ransomware targets EU healthcare-related entities

Ransomware Victims

Dozens of Orgs Claimed To Be Hacked by Cl0p Ransomware | MSSP Alert

Lee Enterprises newspaper disruptions caused by ransomware attack

Cyber attack likely to have ‘material impact’ on media giant Lee Enterprises’ bottom line | The Record from Recorded Future News

Christie's Ransomware Hack Settlement Pact Wins Court's Approval

Army soldier linked to Snowflake extortion to plead guilty • The Register

The complete story of the 2024 ransomware attack on UnitedHealth

Medusa extortion gang demands $2M from UK's HCRG Care Group • The Register

NailaoLocker ransomware targets EU healthcare-related entities

Phishing & Email Based Attacks

Darcula PhaaS can now auto-generate phishing kits for any brand

Mobile Phishing Attacks Surge with 16% of Incidents in US - Infosecurity Magazine

98% of Business Leaders Can't Spot a Phishing Scam Tech.co Report Reveals | Business Wire

Russian Hackers Target Microsoft 365 Accounts with Device Code Attacks - Infosecurity Magazine

What is device code phishing, and why are Russian spies so successful at it? - Ars Technica

Suspected Russian spies caught spoofing Teams invites • The Register

Threat actors are using legitimate Microsoft feature to compromise M365 accounts - Help Net Security

Hackers are using this new phishing technique to bypass MFA | ITPro

What is barrel phishing? All you need to know | NordVPN

Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains

Phishing with AI is cyber security’s new hook

This New Email Attack Can Bypass Spam Filters: Here's How to Protect Against It

Amazon Phish Hunts for Security Answers and Payment Information - Security Boulevard

Phishing attack hides JavaScript using invisible Unicode trick

Russian phishing campaigns exploit Signal's device-linking feature

A Signal Update Fends Off a Phishing Technique Used in Russian Espionage | WIRED

200 businesses take part in first nationwide phishing test as part of Exercise SG Ready | The Straits Times

Spear Phishing vs Phishing: What Are the Main Differences?

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Mining Company NioCorp Loses $500,000 in BEC Hack - SecurityWeek

Other Social Engineering

Zypher's speech model can clone your voice with 5s of audio • The Register

Cyber criminals shift focus to social media as attacks reach historic highs - Help Net Security

Venture capital giant Insight Partners hit by cyber attack

Cyber Investor Insight Partners Suffers Security Breach - Infosecurity Magazine

Insight Partners, VC Giant, Falls to Social Engineering

A deepfake epidemic is coming as survey shows that people are simply not good enough at identifying fakes | TechRadar

Artificial Intelligence

Zypher's speech model can clone your voice with 5s of audio • The Register

The AI Hype Frenzy Is Fueling Cyber Security Risks

IT spending will be driven by cyber security and AI

The Hidden Cyber Security Crisis: How GenAI is Fueling the Growth of Unchecked Non-Human Identities - Security Boulevard

Cyber security pros are preparing for a new adversary: AI agents | Fortune

Ransomware Attacks on Critical Infrastructure, AI Use to Grow in 2025 | MSSP Alert

Why Regulating AI Is So Hard — And Necessary - The Good Men Project

The overlooked cyber security threat of AI

UK’s AI Safety Institute Rebrands Amid Government Strategy Shift - Infosecurity Magazine

The risks of autonomous AI in machine-to-machine interactions - Help Net Security

Sounding the alarm on AI-powered cyber security threats in 2025 | TechRadar

AI vs. Endpoint Attacks: What Security Leaders Need To Know | VentureBeat

Phishing with AI is cyber security’s new hook

A deepfake epidemic is coming as survey shows that people are simply not good enough at identifying fakes | TechRadar

Russia’s AI-Powered Cyber Attacks Threaten to Outpace Western Defences

The cyber insurance reckoning: Why AI-powered attacks are breaking coverage (and what comes next) | VentureBeat

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

UK’s AI Security Institute to protect against AI risks to national security

DarkMind: A new backdoor attack that leverages the reasoning capabilities of LLMs

Controlling Shadow AI: Protecting Knowledge Management From Cyber Threats

How to run DeepSeek AI locally to protect your privacy - 2 easy ways | ZDNET

US AI Safety Institute will be 'gutted,' Axios reports | ZDNET

Europe Mounts the Artificial-Intelligence Barricades - Bloomberg

Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything | ZDNET

2FA/MFA

Hackers are using this new phishing technique to bypass MFA | ITPro

Malware

Microsoft Outlook targeted by new malware attacks allowing sneaky hijacking | TechRadar

New FinalDraft Malware Spotted in Espionage Campaign - SecurityWeek

ESentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms

Malware-as-a-Service accounts for 57 percent of all threats

300% increase in endpoint malware detections - Help Net Security

Why ‘malware as a service’ is becoming a serious problem | ITPro

Over 330 Million Credentials Compromised by Infostealers - Infosecurity Magazine

Beware of Fake BSOD Delivered by Malicious Python Script

PirateFi game on Steam caught installing password-stealing malware

Microsoft Detects New XCSSET MacOS Malware Variant - Infosecurity Magazine

Telegram Used as C2 Channel for New Golang Malware - Infosecurity Magazine

Russian malware discovered with Telegram hacks for C2 operations | CSO Online

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer - Infosecurity Magazine

Evolving Snake Keylogger Variant Targets Windows Users - Infosecurity Magazine

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Hackers used free Steam game to steal passwords, Valve warns affected users | TechSpot

US military and defence contractors hit with Infostealer malware | TechRadar

Updated Shadowpad Malware Leads to Ransomware Deployment | Trend Micro (US)

Darktrace Report Highlights The Growing Power Of MaaS, Sneaky Evasion Tactics

Google Calendar Malware Is on the Rise. Here’s How to Stay Safe | WIRED

Hide and Seek in Memory: Outsmarting Sneaky Malware with Data Magic | HackerNoon

Phishing attack hides JavaScript using invisible Unicode trick

Chinese hackers use custom malware to spy on US telecom networks

Mobile

Mobile Phishing Attacks Surge with 16% of Incidents in US - Infosecurity Magazine

The 6 most notorious and dangerous Android malware of all time

Chrome for Android adds new protection against malicious apps | Digital Trends

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

Apple resists UK regulator demands to open up iOS browsers, citing security risks | TechSpot

Your Android phone could have stalkerware — here's how to remove it | TechCrunch

Denial of Service/DoS/DDoS

Qualys Identifies Critical Vulnerabilities That Enable DDoS, MITM Attacks 

Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites - Security Affairs

Pro-Russian hackers target Italy for the third consecutive day in retaliation for Mattarella’s remarks - Euractiv

Internet of Things – IoT

Massive Data Exposure At Mars Hydro Highlights IoT Security Risks

Connected vehicle hacking on the increase

Data Breaches/Leaks

Cyber security gaps exposed as 96% of S&P 500 firms hit by data breaches

N Ireland police charges suspected terrorists using FoI data • The Register

Insight Partners, VC Giant, Falls to Social Engineering

When Brand Loyalty Trumps Data Security

Massive data breach in France: Protect yourself from cyber attacks

Zacks Investment hit in data breach - 12 million users potentially at risk | TechRadar

Fintech giant Finastra notifies victims of October data breach

Massive Data Exposure At Mars Hydro Highlights IoT Security Risks

Zacks Investment Research Breach Hits 12 Million - Infosecurity Magazine

US Coast Guard paychecks delayed by cyber attack | TechRadar

Cyber attack compromises leading Australian IVF provider’s data | SC Media

Data breach risk confirmed - Bailiwick Express News Guernsey

Organised Crime & Criminal Actors

Malware-as-a-Service accounts for 57 percent of all threats

Why ‘malware as a service’ is becoming a serious problem | ITPro

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police - SecurityWeek

Black Basta ransomware gang's internal chat logs leak online

Thousands of trafficked scammers await return to Thailand • The Register

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Two arrested after pensioner scammed out of crypto nest egg • The Register

Insider Risk and Insider Threats

The Bourne Insecurity: When Defence Employees Unwittingly Help Attackers

Forrester Report: The Complexities Of Human-Element Breaches

Insurance

The cyber insurance reckoning: Why AI-powered attacks are breaking coverage (and what comes next) | VentureBeat

Supply Chain and Third Parties

Is a lack of supply chain visibility undermining board-level confidence in cyber security programs?

Supply chain cyber attacks surge over 400%, expected to continue rising – Cowbell report | Insurance Business America

Third party delegation risk - IT Security Guru

Cloud/SaaS

Hackers are using this new phishing technique to bypass MFA | ITPro

Russian Hackers Target Microsoft 365 Accounts with Device Code Attacks - Infosecurity Magazine

What is device code phishing, and why are Russian spies so successful at it? - Ars Technica

Suspected Russian spies caught spoofing Teams invites • The Register

Threat actors are using legitimate Microsoft feature to compromise M365 accounts - Help Net Security

ZEST Security's Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the Organisation

Trump admin sought to counter UK-ordered iCloud encryption backdoor | SC Media

New "whoAMI" Attack Exploits AWS AMI Name Confusion for Remote Code Execution

How CISOs can balance security and business agility in the cloud - Help Net Security

Identity and Access Management

The Hidden Cyber Security Crisis: How GenAI is Fueling the Growth of Unchecked Non-Human Identities - Security Boulevard

Identity is the Breaking Point—Get It Right or Zero Trust Fails | VentureBeat

Encryption

What is an encryption backdoor? | TechCrunch

Trump admin sought to counter UK-ordered iCloud encryption backdoor | SC Media

10 years on after Data and Goliath warned of data collection • The Register

Rethinking the Debate on Encryption Backdoors | SC Media UK

Quantum computing in cyber security: A double-edged sword | Computer Weekly

Passwords, Credential Stuffing & Brute Force Attacks

Over 330 Million Credentials Compromised by Infostealers - Infosecurity Magazine

PirateFi game on Steam caught installing password-stealing malware

The Bourne Insecurity: When Defence Employees Unwittingly Help Attackers

Hackers used free Steam game to steal passwords, Valve warns affected users | TechSpot

US military and defence contractors hit with Infostealer malware | TechRadar

Hundreds of US Military and Defence Credentials Stolen - Infosecurity Magazine

Credential Theft Becomes Cyber Criminals' Favorite Target

Social Media

Cyber criminals shift focus to social media as attacks reach historic highs - Help Net Security

Training, Education and Awareness

How Slashing the SAT Budget Is Appreciated By Hackers - Security Boulevard

Regulations, Fines and Legislation

Why Regulating AI Is So Hard — And Necessary - The Good Men Project

Trump admin sought to counter UK-ordered iCloud encryption backdoor | SC Media

UK’s AI Safety Institute Rebrands Amid Government Strategy Shift - Infosecurity Magazine

Insider threat: cyber security experts on giving Elon Musk and DOGE the keys to US government IT systems

UK’s AI Security Institute to protect against AI risks to national security

SEC creates Cyber and Emerging Technologies Unit

CIOs to the DORA test: how to speed up the process for compliance | CSO Online

Top US Election Security Watchdog Forced to Stop Election Security Work | WIRED

Elon Musk's DOGE launched its website. It was hacked within days | Fortune

Why dismantling the PCLOB and CSRB threatens privacy and national security

DoD's new CISO once had clearance revoked for data leak • The Register

DOGE Now Has Access to the Top US Cyber Security Agency | WIRED

DOGE access to Social Security, IRS data could create privacy and security risks, experts say | The Record from Recorded Future News

Consultation launched to protect critical national infrastructure from ransomware | New Civil Engineer

US AI Safety Institute will be 'gutted,' Axios reports | ZDNET

Europe Mounts the Artificial-Intelligence Barricades - Bloomberg

Models, Frameworks and Standards

CIOs to the DORA test: how to speed up the process for compliance | CSO Online

PCI DSS 4.0 Mandates DMARC By 31st March 2025

Careers, Working in Cyber and Information Security

Cyber security jobs are on the rise as digital threats continue to evolve - The Globe and Mail

Cyber security Salaries Stay Competitive, Retention Challenges Persist - Security Boulevard

Cyber security is tough: 4 steps leaders can take now to reduce team burnout | CSO Online

Q&A: Tackling the cyber skills gap — Financier Worldwide

Cyber security professionals not happy in their jobs

West Coast Cyber Security Salaries Outshine Rest of Country - Infosecurity Magazine

Law Enforcement Action and Take Downs

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police - SecurityWeek

US Army soldier pleads guilty to AT&T and Verizon hacks | TechCrunch

The Zservers takedown is another big win for law enforcement | ITPro

Two arrested after pensioner scammed out of crypto nest egg • The Register

Thousands of trafficked scammers await return to Thailand • The Register

Ending the Ransomware Scourge Requires Punishing Its Enablers

Is Russia Reining In Ransomware-Wielding Criminals?


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Banking sector wrestling with cyber concerns amid spectre of geopolitical impacts

ESentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms

Latest EY and IIF survey reveals cyber security as top risk for global CROs amid geopolitical tensions | EY - Global

Spies Eye AUKUS Nuclear Submarine Secrets - Infosecurity Magazine

Nation State Actors

China

Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says | CyberScoop

The growing cyber threat: Ransomware, China, and state-sponsored attacks - GZERO Media

China-Linked Threat Group Targets Japanese Orgs' Servers

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

Chinese hackers use custom malware to spy on US telecom networks

Salt Typhoon used custom malware JumbledPath to spy on US telecom providers

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

AI Could Help the US Evade a Crippling Cyber Attack on Its Satellites - Business Insider

How to run DeepSeek AI locally to protect your privacy - 2 easy ways | ZDNET

Russia

Hackers are using this new phishing technique to bypass MFA | ITPro

Russian Hackers Target Microsoft 365 Accounts with Device Code Attacks - Infosecurity Magazine

Suspected Russian spies caught spoofing Teams invites • The Register

Russian malware discovered with Telegram hacks for C2 operations | CSO Online

Russia’s AI-Powered Cyber Attacks Threaten to Outpace Western Defences

Russian Groups Target Signal Messenger in Spy Campaign

Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites - Security Affairs

Ending the Ransomware Scourge Requires Punishing Its Enablers

Russian phishing campaigns exploit Signal's device-linking feature

Is Russia Reining In Ransomware-Wielding Criminals?

North Korea

North Korea's Kimsuky Attacks Rivals' Trusted Platforms

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

N Ireland police charges suspected terrorists using FoI data • The Register




Vulnerability Management

Cyber security experts defend CVSS amid criticism | SC Media

Edge device vulnerabilities fuelled attack sprees in 2024 | CyberScoop

Microsoft reminds admins to prepare for WSUS driver sync deprecation

Vulnerabilities

Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure - SecurityWeek

SonicWall firewalls under attack. Patch now • The Register

Palo Alto Networks and SonicWall Firewalls Under Attack - Infosecurity Magazine

Microsoft is pushing a security update to Windows 11 that breaks File Explorer

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Ivanti endpoint manager can become endpoint ravager • The Register

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement - SecurityWeek

Qualys Identifies Critical Vulnerabilities That Enable DDoS, MITM Attacks 

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products

OpenSSH bugs threaten enterprise security, uptime • The Register

Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities - SecurityWeek

Palo Alto warns firewalls flaws are under active attack • The Register

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack - Infosecurity Magazine

Firefox 135.0.1: important security update and bug fixes - gHacks Tech News

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target US Telecom Networks


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 14 February 2025

Black Arrow Cyber Threat Intelligence Briefing 14 February 2025:

-Russian State Threat Group Shifts Focus to US, UK Targets

-Majority of Businesses Expect a Cyber Breach in 2025

-The Hidden Cyber Threat Lurking in Your Supply Chain

-Cyber Resilience: A C-Suite Game Plan for Balancing Innovation, Compliance and Risk

-NIS2: the GDPR of Cyber Security

-Hackers Ramp Up Efficiency, Speed, and Scale in 2024, Targeting Business of All Sizes

-Number of Active Dark Web Ransomware Groups Up 38% in 2024

-Nation State Hackers Want in on the Ransomware Action – Ransomware Isn’t Always About the Money: Government Spies Have Objectives, Too

-Enterprises Under Growing Pressure to Demonstrate Readiness for Cyber Threats

-Cyber Criminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

-The UK’s Secret iCloud Backdoor Request Raises Concerns from Critics

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

There has been a clear surge in cyber threats targeting UK and US organisations in recent weeks, particularly from state-backed and criminal ransomware groups. Russian state-affiliated actors are exploiting vulnerabilities in critical infrastructure sectors, while nation-state groups from China, Iran, and North Korea increasingly use ransomware for espionage and financial gain. The number of active ransomware groups rose by 38% in 2024, with attacks becoming more efficient through automation. The evolving threat landscape demands proactive cyber defence, including robust endpoint protection, threat intelligence, and rapid incident response.

Despite growing awareness, organisations remain vulnerable due to inadequate investment and outdated security strategies. Research shows that 60% of businesses expect a cyber breach in 2025, yet nearly half have not reviewed their security posture recently. Supply chain risks are particularly pressing, with financial services firms facing repeated third-party breaches. The EU’s NIS2 directive is set to impose stricter cyber security standards, with UK firms working with EU partners already required to comply. Leadership alignment is crucial, as gaps between CIOs, CTOs, and CISOs continue to hinder cyber resilience.

Regulatory pressure is mounting, with the UK government reportedly seeking backdoor access to encrypted data. Meanwhile, cyber criminals are exploiting seasonal events, such as Valentine’s Day, to launch sophisticated scams. As cyber threats intensify, Black Arrow Cyber advises organisations to adopt a ‘Resilient by Design’ approach, prioritising zero trust security models, continuous monitoring, and executive-level collaboration to mitigate risks and safeguard long-term business continuity.


Top Cyber Stories of the Last Week

Russian State Threat Group Shifts Focus to US, UK Targets

Microsoft has identified a shift in focus by a Russian state-backed cyber threat group, Seashell Blizzard, towards targets in the US and UK. The group, linked to the Russian military intelligence, has exploited vulnerabilities in widely used internet-facing systems to gain persistent access, steal credentials, and move laterally within networks. Their indiscriminate approach has impacted critical infrastructure sectors, including energy and defence. The campaign aligns with Russia’s broader strategy of destabilising Western institutions, with Microsoft warning that such activity is likely to continue, presenting a significant cyber security challenge for organisations globally.

Majority of Businesses Expect a Cyber Breach in 2025

Zscaler’s latest research highlights a stark reality: 60% of global organisations expect a significant cyber breach in 2025. Despite 94% of IT leaders expressing confidence in their resilience measures, nearly half have not reviewed their strategies recently. The report underscores the need for a shift towards ‘Resilient by Design’, embedding cyber resilience into security strategies from the outset. However, 49% of leaders say investment is inadequate. Zscaler advocates for a zero-trust approach to mitigate threats and ensure business continuity in an evolving cyber landscape.

The Hidden Cyber Threat Lurking in Your Supply Chain

More than half of large UK financial services firms suffered a third-party supply chain attack in 2024, with nearly a quarter facing three or more incidents, according to research by Orange Cyberdefense. The study found that firms relying on one-time onboarding risk assessments were twice as likely to be attacked as those with continuous monitoring. With 92% of UK cyber security leaders calling for stronger regulations, many argue that aligning with EU standards could enhance resilience. While sentiment on UK regulation remains mixed, firms failing to rigorously assess third-party risks face the greatest exposure to cyber threats.

Cyber Resilience: A C-Suite Game Plan for Balancing Innovation, Compliance and Risk

LevelBlue’s latest report highlights the disconnect between CIOs, CTOs, and CISOs, which is undermining cyber resilience. While 66% of CISOs believe budgets lack proactive security funding, only around half of CIOs and CTOs agree. Compliance is another divide, with 73% of CTOs seeing it as a barrier to competitiveness, while most CISOs and CIOs view it as essential for risk management. Encouragingly, cloud adoption is a shared priority. However, with 63% of executives stating leadership does not prioritise cyber resilience, organisations must foster collaboration at the top to treat it as a strategic business imperative, not just a technical concern.

NIS2: the GDPR of Cyber Security

The EU’s NIS2 directive introduces stringent cyber security standards, yet only 30% of member states have fully implemented it. This legislation mandates 24-hour reporting of major cyber incidents and stricter accountability for supply chain security. UK businesses working with EU partners are already being asked to comply, as contracts are being updated to reflect these requirements. With open-source software making up 90% of modern applications and cyber threats rising, aligning with NIS2 principles is not just about compliance but about safeguarding long-term resilience. Early adoption helps businesses avoid operational strain and remain competitive in an evolving regulatory landscape.

Hackers Ramp Up Efficiency, Speed, and Scale in 2024, Targeting Business of All Sizes

Hackers are accelerating their tactics, deploying ransomware faster and at greater scale across businesses of all sizes. The Huntress 2025 Cyber Threat Report found that ransomware incidents from key groups increased by up to 15% in 2024, with some attacks executed in under six hours. Automation played a major role, with 87% of attacks relying on automated tools before shifting to hands-on activity. Education, healthcare, and technology were prime targets, while infostealers enabled initial access. As cyber criminals refine their techniques, organisations must adopt proactive security measures, including strong incident response plans and robust endpoint protection.

Number of Active Dark Web Ransomware Groups Up 38% in 2024

A new report highlights a 38% rise in active ransomware groups in 2024, with 94 groups listing victims and 49 new groups emerging. The total number of victims posted on ransomware leak sites also increased by 11% to 5,728. The ransomware landscape is shifting, with newer groups like RansomHub, now the most prolific, overtaking previously dominant players. This evolving threat environment presents challenges for security teams, making it essential for organisations to apply threat intelligence to anticipate attack techniques and focus defences on the most likely adversaries based on their industry and risk profile.

Nation State Hackers Want in on the Ransomware Action – Ransomware Isn’t Always About the Money: Government Spies Have Objectives, Too

Nation-state actors are increasingly adopting ransomware, not just for financial gain but also for espionage and geopolitical disruption. Threat groups linked to Russia, China, Iran, and North Korea are blurring the lines between cyber crime and state-sponsored hacking. Russian-linked Sandworm has disguised destructive attacks as ransomware, while North Korea uses ransomware profits to fund weapons programmes. Chinese and Iranian groups have leveraged ransomware as a distraction to mask intelligence gathering. With over $3 billion stolen in cryptocurrency-related cyber attacks, these operations highlight the evolving threats beyond traditional financially motivated cyber crime.

Enterprises Under Growing Pressure to Demonstrate Readiness for Cyber Threats

A new study by Immersive Labs highlights that 96% of cyber leaders see effective communication of cyber readiness to boards as crucial for 2025, driven by regulatory pressures and rising cyber threats. Nearly half of organisations surveyed experienced a cyber attack in the past year, with software and cloud vulnerabilities (51%) and ransomware (46%) cited as the biggest risks. To improve resilience, 94% are deploying cyber drills, yet 76% face readiness barriers, mainly due to competing business priorities. Encouragingly, 55% report strong cyber awareness at board level, reflecting a growing recognition of cyber risk at the highest levels.

Cyber Criminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

Cyber criminals are exploiting Valentine’s Day with romance scams, phishing attacks and fraudulent e-commerce offers. A report found that 58,734 people in the US fell victim to romance scams in 2024, resulting in losses of $697 million. AI-driven scams are becoming more sophisticated, with chatbots and deepfake videos increasing fraud success rates. Valentine-themed phishing emails have doubled since last year, with half now classified as scams. Businesses are urged to monitor brand impersonation and educate customers. McAfee blocked over 321,000 fraudulent URLs, highlighting the growing cyber threat as criminals exploit emotions for financial gain.

The UK’s Secret iCloud Backdoor Request Raises Concerns from Critics

The UK government has reportedly issued a secret order requiring Apple to create a backdoor into its iCloud encryption, raising concerns from some quarters about privacy and security. The request, made under the Investigatory Powers Act 2016, would give authorities unrestricted access to users’ private data, bypassing Apple’s end-to-end encryption safeguards. Apple has historically resisted similar demands and has suggested it may withdraw services from the UK rather than compromise security. Critics warn that such backdoors weaken encryption for all users, set a dangerous global precedent, and risk enabling mass surveillance under the guise of national security.

Sources:

https://cyberscoop.com/russian-state-threat-group-shifts-focus/

https://www.silicon.co.uk/security/cyberwar/majority-of-businesses-expect-a-cyber-breach-in-2025-599573

https://www.accountancyage.com/2025/02/10/the-hidden-cyber-threat-lurking-in-your-supply-chain/

https://www.scworld.com/resource/cyber-resilience-a-c-suite-game-plan-for-balancing-innovation-compliance-and-risk

https://www.techradar.com/pro/nis2-the-gdpr-of-cybersecurity

https://www.globenewswire.com/news-release/2025/02/11/3024266/0/en/Hackers-Ramp-Up-Efficiency-Speed-and-Scale-in-2024-Targeting-Business-of-All-Sizes.html

https://betanews.com/2025/02/11/number-of-active-dark-web-ransomware-groups-up-38-percent-in-2024/

https://www.theregister.com/2025/02/12/ransomware_nation_state_groups/

https://betanews.com/2025/02/12/enterprises-under-growing-pressure-to-demonstrate-readiness-for-cyber-threats/

https://securityboulevard.com/2025/02/cybercriminals-exploit-valentines-day-with-romance-scams-phishing-attacks/

https://www.helpnetsecurity.com/2025/02/13/uk-government-icloud-backdoor-request/



Threats

Ransomware, Extortion and Destructive Attacks

2024 Breaks Records With Highest Ever Ransomware Attacks

Number of active dark web ransomware groups up 38 percent in 2024

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks - Infosecurity Magazine

Ransomware attacks spiked in 2024—but they're nothing compared to what's coming this year, tech expert warns. 'I’m very afraid of the things we’re going to see in 2025' | Fortune

Hackers Ramp Up Efficiency, Speed, and Scale in 2024,

Cyber crime is helping fund rogue nations across the world - and it's only going to get worse, Google warns | TechRadar

Nation-state hackers want in on the ransomware action • The Register

Chinese Cyber Spy Possibly Launching Ransomware Attacks as Side Job - SecurityWeek

Triplestrength hits with ransomware, cloud crypto mining • The Register

Google says policymakers must stem upward cyber crime trend • The Register

US adversaries increasingly turning to cyber criminals and their malware for help | CyberScoop

Warning: Cyber Crime Services Underpin National Security Risk

‘We Don’t Negotiate with Terrorists’: Ransomware Strategy in Modern Cyber Security | MSSP Alert

Cyber attacks targeting medical organisations up 32% in 2024 | SC Media

US indicts 8Base ransomware operators for Phobos encryption attacks

Operation Phobos Aetor: Police dismantled 8Base ransomware gang

Thai authorities detain four Europeans in ransomware crackdown | CyberScoop

Ransomware Victims

Label maker Avery says ransomware investigation also found credit-card scraper | The Record from Recorded Future News

Was Cisco Just Hit By Ransomware? What Happened And What To Do

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access

Cisco Says Ransomware Group's Leak Related to Old Hack - SecurityWeek

Cisco dispels Kraken data breach claims, insists stolen data came from old attack | ITPro

120K Compromised in Memorial Hospital Ransomware Attack

'Cyber event' delaying US newspaper prints enters 2nd week • The Register

Phishing & Email Based Attacks

SVG files are offering cyber criminals an easy way in with new phishing attacks | TechRadar

Cyber Criminals Weaponize Graphics Files in Phishing Attacks - Infosecurity Magazine

AI-Powered Social Engineering: Reinvented Threats

Cyber Criminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks - Security Boulevard

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques - Infosecurity Magazine

Google's DMARC Push Pays Off, but Challenges Remain

A new Facebook phishing campaign looks to trick you with emails sent from Salesforce | TechRadar

Cloudflare outage caused by botched blocking of phishing URL

Phishing Season 2025: The Latest Predictions Unveiled - Security Boulevard

Study: Workplace Phishing Tests Only Have a 2% Success Rate

Other Social Engineering

DPRK hackers dupe targets into typing PowerShell commands as admin

Windows, Mac And Linux Users Given New LinkedIn Security Warning

I'm a security expert and I almost fell for this IT job scam • The Register

Artificial Intelligence

Malicious AI Models on Hugging Face Exploit Novel Attack Technique - Infosecurity Magazine

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

AI-Powered Social Engineering: Reinvented Threats

Bad Actors Target DeepSeek In LLMJacking Attacks

DeepSeek-R1: A Smorgasbord Of Security Risks

CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead   - Security Boulevard

How to Steer AI Adoption: A CISO Guide

AI-Driven Cyber Threats Require New Defence Strategies | MSSP Alert

Biz Beware: DeepSeek AI Fails Multiple Security Tests

AI chatbots distort the news, BBC finds - see what they get wrong | ZDNET

A review of the UK Government AI security guidance

How fake security reports are swamping open-source projects, thanks to AI | ZDNET

Rapid growth of AI poses ‘profound’ threat to privacy – The Irish Times

In Paris, US signals shift from AI safety to deregulation | CyberScoop

ChatGPT maker OpenAI taking claims of data breach ‘seriously’ | The Independent

20 million OpenAI users hacked? Here's how to stay safe | PCWorld

2FA/MFA

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques - Infosecurity Magazine

Inside The Söze Syndicate: MFA Flaws, And The Battle For SMB Security

4 Ways to Keep MFA From Becoming too Much of a Good Thing

Malware

North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe | TechRadar

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

Millions of Mac owners urged to be on alert for info-stealing malware | Tom's Guide

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

US adversaries increasingly turning to cyber criminals and their malware for help | CyberScoop

Microsoft IIS servers targeted for malware deployment | SC Media

Hackers are targeting your password manager app | Mashable

Microsoft warns hackers have a new and devious way of distributing malware | TechRadar

Linux running in a PDF? This hack is as bizarre as it is brilliant | ZDNET

Bots/Botnets

Botnet Spotlight | Networks Hosting Botnet C&Cs: Same Players, Same Problems | Blog

Denial of Service/DoS/DDoS

DDoS Attack Volume and Magnitude Continues to Soar - Infosecurity Magazine

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

Internet of Things – IoT

Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records - Infosecurity Magazine

Data Breaches/Leaks

Research Reveals Data Breaches On The Rise at UK Law Firms | Tripwire

Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records - Infosecurity Magazine

Silent breaches are happening right now, most companies have no clue - Help Net Security

Over 3 million Fortune 500 employee accounts compromised since 2022 - Help Net Security

14 State AGs to Sue DOGE Over Payment System Access | MSSP Alert

Judge: DOGE made US Treasury ‘more vulnerable to hacking’ • The Register

Research Reveals Data Breaches On The Rise at UK Law Firms | Tripwire

20 million OpenAI users hacked? Here's how to stay safe | PCWorld

HPE notifies employees of data breach after Russian Office 365 hack

Over 882K Impacted By Hospital Sisters Health System Breach | MSSP Alert

Georgia Hospital Alerts 120,000 Individuals of Data Breach - Infosecurity Magazine

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials - SecurityWeek

Lexipol Data Leak: Hackers Drop Police Training Manuals

Cisco dispels Kraken data breach claims, insists stolen data came from old attack | ITPro

Additional Details on PowerSchool Breach Impact Emerge | MSSP Alert

120K Compromised in Memorial Hospital Ransomware Attack

Organised Crime & Criminal Actors

Cyber crime is helping fund rogue nations across the world - and it's only going to get worse, Google warns | TechRadar

Nation-state hackers want in on the ransomware action • The Register

Google says policymakers must stem upward cyber crime trend • The Register

US adversaries increasingly turning to cyber criminals and their malware for help | CyberScoop

Warning: Cyber Crime Services Underpin National Security Risk

Russian cyber criminal Alexander Vinnik is being released from US custody in exchange for Marc Fogel

Russia taps cyber criminals to keep military pressure on Ukraine – POLITICO

Botnet Spotlight | Networks Hosting Botnet C&Cs: Same Players, Same Problems | Blog

Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Triplestrength hits with ransomware, cloud crypto mining • The Register

US: Man Gets 20 Years for $37m Crypto Heist - Infosecurity Magazine

Insider Risk and Insider Threats

Human Risk Management Will Be the Hot Topic of 2025 | Mimecast

Behavioural Analytics in Cyber Security: Who Benefits Most?

Insurance

Tips for Maximizing Your Cyber Insurance Program | Goodwin - JDSupra

Supply Chain and Third Parties

Nearly half of organisations suffer third-party security incidents

58% of UK financial firms targeted in supply chain cyber attacks, survey reveals

Third-Party Risk Management Failures Expose UK Finance Sector - Infosecurity Magazine

The hidden cyber threat lurking in your supply chain - Accountancy Age

Inconsistent security strategies fuel third-party threats - Help Net Security

Should the UK Take Note of EU Digital Resilience Rules as Supply Chain Attacks Continue asks Orange | The Fintech Times

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment

It's time to secure the extended digital supply chain - Help Net Security

Why CFOs and CISOs Should Care About B2B Cyber Audits

IT reliance leaves insurers open to attack

Cloud/SaaS

Triplestrength hits with ransomware, cloud crypto mining • The Register

Cyber criminals Are Moving into the Cloud and Making Your Active Directory Their New Home | Ankura - JDSupra

Labour's Demand to Spy on Apple Users Undermines the Security and Privacy of Us All – The Daily Sceptic

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance - Help Net Security

Outages

PlayStation Network Outage: A Wake-Up Call For Cyber Security?

Cloudflare outage caused by botched blocking of phishing URL

Encryption

UK's secret Apple iCloud backdoor order is a global emergency, say critics | TechCrunch

Apple’s ‘Dangerous’ iPhone Update Is Much Worse Than You Think

Experts Dismayed at UK’s Apple Encryption Demands - Infosecurity Magazine

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance - Help Net Security

The UK’s war on encryption affects all of us | The Verge

Europol Warns Financial Sector of “Imminent” Quantum Threat - Infosecurity Magazine

Passwords, Credential Stuffing & Brute Force Attacks

Over 3 million Fortune 500 employee accounts compromised since 2022 - Help Net Security

Security attacks on password managers have soared | TechRadar

Massive brute force attack uses 2.8 million IPs to target VPN devices

Huge cyber attack under way - 2.8 million IPs being used to target VPN devices | TechRadar

Social Media

North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe | TechRadar

Windows, Mac And Linux Users Given New LinkedIn Security Warning

What to do if your social media accounts are hacked | The Independent

Google fixes flaw that could unmask YouTube users' email addresses

A new Facebook phishing campaign looks to trick you with emails sent from Salesforce | TechRadar

Malvertising

Magecart Attackers Abuse Google Ad Tool to Steal Data

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

Chinese-Speaking Group Manipulates SEO with BadIIS | Trend Micro (US)

Regulations, Fines and Legislation

The UK’s war on encryption affects all of us | The Verge

CIOs to the DORA test: how to speed up the process for compliance | CSO Online

Apple ordered to open encrypted user accounts globally to UK spying | The Verge

NIS2: the GDPR of cyber security | TechRadar

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance - Help Net Security

Most UK GDPR Enforcement Actions Targeted Public Sector in 2024 - Infosecurity Magazine

Treasury Curtails Musk-led DOGE’s Government Access | MSSP Alert

Musk’s DOGE teen was fired by cyber security firm for leaking company secrets

Judge: DOGE made US Treasury ‘more vulnerable to hacking’ • The Register

Should the UK Take Note of EU Digital Resilience Rules as Supply Chain Attacks Continue asks Orange | The Fintech Times

Elon Musk's DOGE Is a Cyber Security Nightmare

The Government’s Computing Experts Say They Are Terrified - The Atlantic

A review of the UK Government AI security guidance

Cyber security group sues DOGE over data access | Mashable

Trump White House Dismantles Key Data Security Safeguards

In Paris, US signals shift from AI safety to deregulation | CyberScoop

Coast Guard falls short on maritime cyber security, GAO says • The Register

Trump Order Grants DOGE Hiring Powers, Raising Cyber Fears

Models, Frameworks and Standards

CIOs to the DORA test: how to speed up the process for compliance | CSO Online

NIS2: the GDPR of cyber security | TechRadar

Should the UK Take Note of EU Digital Resilience Rules as Supply Chain Attacks Continue asks Orange | The Fintech Times

Data Protection

Most UK GDPR Enforcement Actions Targeted Public Sector in 2024 - Infosecurity Magazine

Careers, Working in Cyber and Information Security

Data reveals sharpest tech skills shortages in software engineering, data science and cyber security | theHRD

Tackling the UK's cyber security skills shortage | TechRadar

Cyber Security Challenge Announces Plans for Closure | SC Media UK

UK Military Fast-Tracks Cyber Security Recruitment - Infosecurity Magazine

Law Enforcement Action and Take Downs

US: Man Gets 20 Years for $37m Crypto Heist - Infosecurity Magazine

US indicts 8Base ransomware operators for Phobos encryption attacks

District of Maryland | Phobos Ransomware Affiliates Arrested in Coordinated International Disruption | United States Department of Justice

Operation Phobos Aetor: Police dismantled 8Base ransomware gang

Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster

US woman faces years in federal prison for running laptop farm for N Korean IT workers

Alabama Man Pleads Guilty to Hacking SEC's X Account - SecurityWeek

Misinformation, Disinformation and Propaganda

AI chatbots distort the news, BBC finds - see what they get wrong | ZDNET


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets

Nation State Actors

Nation-state hackers want in on the ransomware action • The Register

Cyber crime is helping fund rogue nations across the world - and it's only going to get worse, Google warns | TechRadar

Google says policymakers must stem upward cyber crime trend • The Register

US adversaries increasingly turning to cyber criminals and their malware for help | CyberScoop

Warning: Cyber Crime Services Underpin National Security Risk

China

Chinese Cyber Spy Possibly Launching Ransomware Attacks as Side Job - SecurityWeek

Chinese espionage tools deployed in RA World ransomware attack

Salt Typhoon strikes again - more US ISPs, universities and telecoms networks hit by Chinese hackers | TechRadar

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP - Infosecurity Magazine

China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers | WIRED

DeepSeek-R1: A Smorgasbord Of Security Risks

We’re In for a Rude Awakening on Cyber Security

Security Researchers Warn of New Risks in DeepSeek AI App

Chinese-Speaking Group Manipulates SEO with BadIIS | Trend Micro (US)

Russia

Russian Seashell Blizzard Hackers Gain, Maintain Access to High-Value Targets: Microsoft - SecurityWeek

A Hacker Group Within Russia’s Notorious Sandworm Unit Is Breaching Western Networks | WIRED

Russian state threat group shifts focus to US, UK targets | CyberScoop

Russia's intelligence recruits Ukrainians for terror attacks via messaging apps

Salt Typhoon's Impact on the US and Beyond

Russia taps cyber criminals to keep military pressure on Ukraine – POLITICO

23 Companies, 120 Servers Down: Ukraine’s Cyber Strike Shakes Russia’s Energy Sector | Defense Express

Russian military hackers deploy malicious Windows activators in Ukraine

US, UK and Australia Hit Bulletproof Hoster Zservers with Sanctions - Infosecurity Magazine

The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation | Microsoft Security Blog

HPE notifies employees of data breach after Russian Office 365 hack

Russian cyber criminal Alexander Vinnik is being released from US custody in exchange for Marc Fogel

Russia Says Baltic Sea Cable Damaged by ‘External Impact' - The Moscow Times

TeamViewer's CISO on Thriving After Russian Cyber-Attack - Infosecurity Magazine

North Korea

DPRK hackers dupe targets into typing PowerShell commands as admin

North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe | TechRadar

Researchers Unveiled Tactics, Techniques, and Procedures Used by North Korean Hackers

I'm a security expert and I almost fell for this IT job scam • The Register

US woman faces years in federal prison for running laptop farm for N Korean IT workers




Vulnerability Management

XE Group shifts from credit card skimming to exploiting zero-days

How fake security reports are swamping open-source projects, thanks to AI | ZDNET

Vulnerabilities

Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws

Adobe Plugs 45 Software Security Holes, Warn of Code Execution Risks - SecurityWeek

SonicWall firewall exploit lets hackers hijack VPN sessions, patch now

Fortinet 0-Day in FortiOS & FortiProxy Let Attackers Hijack Firewall to Gain Super Admin Access

SAP Releases 21 Security Patches - SecurityWeek

PAN-OS 0-day Vulnerability Let Attackers Bypass Web Interface Authentication

High-Severity OpenSSL Vulnerability Found by Apple Allows MitM Attacks - SecurityWeek

Apple’s security patch highlights the growing security threat – Computerworld

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now

Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities - SecurityWeek

Additional Details on PowerSchool Breach Impact Emerge | MSSP Alert

Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers

Apple fixes iPhone and iPad bug actively exploited in ‘extremely sophisticated attacks’

Progress Software fixed multiple high-severity LoadMaster flaws

Intel Patched 374 Vulnerabilities in 2024 - SecurityWeek

Security Researchers Warn of New Risks in DeepSeek AI App

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Surge in attacks exploiting old ThinkPHP and ownCloud flaws


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Advisory 12 February 2025 – Comprehensive Security Updates from Microsoft, Adobe, Apple, and More

Black Arrow Cyber Advisory 12 February 2025 – Microsoft, Adobe, Fortinet, Apple, Ivanti, OpenSSL, SAP, Zyxel, Intel, AMD & Nvidia Security Updates

Executive Summary

Microsoft’s Patch Tuesday for February 2025 included 63 security updates for its product line, including 2 actively exploited zero-day vulnerabilities. Several other major software and hardware vendors released critical security updates this month to address vulnerabilities that could be exploited by attackers.

Ivanti patched several critical flaws within its Connect Secure and Policy Secure products. Apple issued patches for its iOS and iPadOS devices to address a USB vulnerability that could allow for data exfiltration. Adobe provided updates addressing 45 vulnerabilities for several products, including InDesign, Commerce, Magento, Substance, Photoshop Elements, and Illustrator.

Fortinet published nine security advisories with updates addressing high, medium, and low severity security issues. They also updated a previous advisory from January with additional information and reference to CVE-2025-24472, which Arctic Wolf had previously highlighted in their breakdown of the attack pattern against Fortinet Fortigate Firewalls since November 2024.

OpenSSL released patches to address a vulnerability related to raw public keys, introduced with OpenSSL 3.2. Patches were released within versions 3.4.1, 3.3.2, and 3.2.4 to address the issue. As OpenSSL is utilised by many vendors, it may take some time for the updates to propagate to affected products.

SAP released 19 new security notes, including high, medium, and low vulnerabilities addressed by security patches. Zyxel recently released a security advisory on three reported vulnerabilities, informing customers to replace affected devices as they have reached end of life and are no longer supported.

Additionally, Intel, AMD, and Nvidia published new security advisories addressing high-severity vulnerabilities in their products. Intel released 34 security advisories across their product line, including a critical issue in their Server Board BMC Firmware. AMD released 11 security bulletins which included firmware patches for several high-severity vulnerabilities affecting their embedded processors. Nvidia issued four advisories for vulnerabilities within their Container, Triton, Jetson, and JPEG2000 products.

What’s the risk to me or my business?

The actively exploited vulnerabilities could allow an attacker to compromise the confidentiality, integrity and availability of the affected applications and the organisations data on the affected systems.

What can I do?

Black Arrow recommends applying the available security updates for all supported versions of products that have been impacted by the various vulnerabilities. The updates should be applied as soon as possible for actively exploited vulnerabilities and all other vulnerabilities that have a critical or high severity ratings.

Microsoft

Further details on specific updates within this Microsoft patch Tuesday can be found here:

https://msrc.microsoft.com/update-guide/releaseNote/2025-Feb

Ivanti, Apple, Adobe, Fortinet, OpenSSL, SAP, Zyxel, Intel, AMD & Nvidia

Further details of the vulnerabilities in affected Ivanti, Apple, Adobe, Fortinet, OpenSSL, SAP, Zyxel, Intel, AMD and Nvidia products can be found here:

https://www.ivanti.com/blog/february-security-update

https://support.apple.com/en-us/100100

https://helpx.adobe.com/security/security-bulletin.html

https://fortiguard.fortinet.com/psirt

https://openssl-library.org/news/secadv/20250211.txt

https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2025.html

https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025

https://www.intel.com/content/www/us/en/security-center/default.html

https://www.amd.com/en/resources/product-security.html

https://www.nvidia.com/en-us/security/

#threatadvisory #threatintelligence #cybersecurity

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 7 February 2025

Black Arrow Cyber Threat Intelligence Briefing 07 February 2025:

-Destructive Attacks on Financial Institutions Surge

-AI, Cyber Crime Perceived as Top Insurance Risks

-Ransomware Victims Increased by 26% in 2024

-Over 60 Percent of Enterprise Cyber Security Incidents Relate to Known Risks

-CISOs Drive the Intersection between Cyber Maturity and Business Continuity

-Cyber Criminals Entice Traitorous Insiders via Ransom Notes

-Phishing Up Almost 50% Since 2021 with AI Attacks on the Rise

-The Cyber-Driven Domino Effect: How Financial and Security Crises Bankrupt Businesses

-Board Directors Are Taking the Lead on Cyber Security Oversight

-Credential-Stealing Malware Surges in 2024

-How Agentic AI will be Weaponised for Social Engineering Attacks

-LinkedIn Has Become a Prime Hunting Ground for Cyber Criminals

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Black Arrow Cyber's review of threat intelligence identified further evidence of an alarming increase in cyber threats targeting financial institutions, insurers, and enterprises, and the consequences that can include financial ruin.

Destructive cyber attacks have risen by over 12%, often erasing evidence rather than merely disrupting operations. Ransomware attacks surged by 26% in 2024, while phishing attacks have grown by nearly 50% since 2021, with AI-driven threats becoming more sophisticated. Insider threats are also on the rise, with ransomware gangs recruiting employees to facilitate breaches. Business leaders need to be aware that over 60% of enterprise cyber incidents stem from previously identified but unresolved risks, highlighting the need for proactive risk management. These trends underscore the evolving threat landscape and the critical need for a cohesive security strategy that includes continuous monitoring, the timely remediation of vulnerabilities, and employee awareness programmes.

The financial sector faces dual challenges from AI and cyber crime, with insurers ranking cyber attacks as an immediate risk. The weaponisation of AI in cyber attacks is accelerating, enabling adaptive, multi-stage social engineering campaigns. Meanwhile, credential-stealing malware now accounts for 25% of all malware activity, making identity protection a top priority. Cyber security governance is evolving to address this, with CISOs increasingly influencing business strategy and board directors taking a more proactive role in oversight.

As cyber risks intensify, Black Arrow Cyber advises businesses to prioritise cyber resilience, integrate security into corporate strategy, and enhance threat detection to safeguard operations, reputation, and financial stability.


Top Cyber Stories of the Last Week

Destructive Attacks on Financial Institutions Surge

Over half (54%) of financial institutions faced destructive cyber attacks last year, marking a 12.5% rise from 2023, according to Contrast Security. These attacks often serve to erase evidence rather than purely disrupt services. Two-thirds (64%) of firms reported cyber incidents, with cloud environments and APIs identified as key attack vectors. Despite strong detection rates (94%), attackers still bypassed defences, with 46 major breaches per month evading web application firewalls. Customer account takeovers rose by 48%, while 43% suffered ‘island hopping’ attacks where attackers exploit trusted relationships between organisations. The report highlights the need for continuous monitoring and application defence to counter evolving threats.

AI, Cyber Crime Perceived as Top Insurance Risks

The latest report from law firm Kennedys identifies artificial intelligence (AI) adoption and cyber crime as major risks for insurers. While AI is seen as the highest long-term risk, cited by over 85% of respondents, its full impact is expected to emerge over the next three to five years. Meanwhile, cyber attacks present a more immediate threat, with 27% of European, Middle Eastern, and African partners ranking it as their top concern for 2025. AI is also being exploited in cyber crime, increasing insurers’ exposure to data breaches. The report warns that inadequate cyber security could lead to severe financial, legal, and reputational consequences.

Ransomware Victims Increased by 26% in 2024

Ransomware attacks surged by 26% in 2024, with nearly 5,300 reported victims, according to a new analysis. The number of active ransomware gangs also grew, with LockBit remaining the most prolific despite a 50% drop in its victims. RansomHub rapidly scaled operations to take second place, while the Play gang continued to focus on manufacturing, real estate, and technology. Seasonal trends showed peak activity in spring and autumn, with summer seeing a decline. The US remained the most targeted country, with over 1,700 victims, more than ten times the number seen in Canada or the UK.

Over 60% of Enterprise Cyber Security Incidents Relate to Known Risks

A new report from ZEST Security reveals that 62% of enterprise cyber security incidents stem from previously identified risks that remain unresolved. Security teams struggle with long remediation times, taking 10 times longer to fix vulnerabilities than attackers take to exploit them. The financial burden is significant, exceeding $2 million annually. Backlogs are a key issue, with 87% of organisations managing over 100 critical security tickets. While automation and effort-based prioritisation are gaining traction, stricter SLAs and regulatory pressure are expected to drive faster remediation to mitigate the growing risk of cloud security incidents.

CISOs Drive the Intersection between Cyber Maturity and Business Continuity

The role of the CISO is evolving beyond IT, with one in five now reporting directly to the CEO, according to Deloitte’s latest cyber survey. High-cyber-maturity organisations are embedding cyber security into business strategy, enhancing resilience and enabling business continuity. Budget allocations are shifting, with cyber spending increasingly integrated into digital transformation and IT investments, reflecting its cross-functional impact. As regulatory pressures grow, particularly with new SEC disclosure requirements in the US, CISOs are playing a key role in risk management and compliance. Organisations with mature cyber strategies recover faster from incidents, protecting revenue, reputation and operations in an increasingly interconnected digital landscape.

Cyber Criminals Entice Traitorous Insiders via Ransom Notes

Ransomware gangs are now targeting employees with financial incentives to betray their and other organisations, embedding recruitment messages within ransom notes. Threat groups, including Sarcoma and DoNex, have begun soliciting insider access, offering substantial rewards for login credentials, network access, and sensitive data of any organisation. Security researchers note this tactic is a recent development, with threat actors exploiting disgruntled staff to bypass defences. While such offers may seem lucrative, experts warn that cyber criminals operate with no accountability, making payment unlikely. The shift highlights the evolving sophistication of ransomware operations, reinforcing the need for robust insider threat detection and employee awareness programmes.

Phishing Up Almost 50% Since 2021 with AI Attacks on the Rise

Phishing attacks have surged by 49% since 2021, with AI-driven threats emerging as a growing concern, according to Hoxhunt’s latest report. AI-generated phishing emails, while currently under 5% of reported cases, have risen sharply in just six months. On average, organisations with 1,000 employees face 2,330 phishing attempts that bypass filters each year, leading to 466 malicious clicks. Attackers frequently impersonate Microsoft, Docusign, and HR departments to exploit urgency and curiosity. Encouragingly, phishing awareness training can reduce incidents by 86% in six months, significantly enhancing organisational resilience against social engineering threats.

The Cyber-Driven Domino Effect: How Financial and Security Crises Bankrupt Businesses

A recent case involving Stoli Group highlights how cyber incidents can push financially vulnerable businesses into bankruptcy. Following a severe ransomware attack that disrupted financial reporting, Stoli was unable to provide lenders with key data, contributing to an $84 million debt burden and its eventual collapse. This case underscores the growing risk, which is especially high for small and medium-sized businesses (SMBs) that often lack the resources to recover from cyber attacks. With nearly 60% of SMBs failing within six months of an attack, organisations must prioritise cyber security resilience to prevent financial and operational ruin.

Board Directors Are Taking the Lead on Cyber Security Oversight

Board directors are increasingly taking a proactive role in cyber security oversight, shifting responsibility from IT teams to a company-wide approach. BDO’s 2024 board survey found that 37% of directors are broadening accountability, while many are investing in incident response strategies and regulatory compliance. The US SEC’s enhanced disclosure rules are driving the need for clear cyber incident reporting. Boards are also prioritising expertise, with 27% seeking cyber security knowledge in 2025. Directors are dedicating 42 hours annually to education, while external assessments, benchmarking, and evolving response plans are strengthening resilience against emerging threats.

Credential-Stealing Malware Surges in 2024

Credential-stealing malware now represents 25% of all malware activity, marking a threefold surge in this type of threat. Picus Security’s annual cyber security report found that credential theft has, for the first time, entered the top 10 techniques in the MITRE ATT&CK framework. Analysis of over one million malware samples revealed that just 10 attack techniques accounted for 93% of all malicious actions. Attackers are increasingly using stealthy multi-stage operations to extract credentials and leveraging encrypted channels to evade detection. Security teams can mitigate risk by focusing on the most prevalent attack techniques and enforcing strong authentication practices.

How Agentic AI will be Weaponised for Social Engineering Attacks

AI-driven social engineering attacks are evolving rapidly, with cyber criminals leveraging agentic AI to create highly personalised, adaptive, and multi-stage phishing campaigns. These AI agents can autonomously gather data, refine attack strategies, and deploy deepfake audio and video to deceive employees. Unlike traditional phishing, these threats are dynamic, adjusting to real-time responses. As AI becomes more autonomous, organisations must enhance defences by deploying AI-powered security tools, investing in adaptive awareness training, and fostering a cyber-aware culture. With AI-driven attacks set to rise, proactive measures are essential to mitigate risks and safeguard against increasingly sophisticated social engineering threats.

LinkedIn Has Become a Prime Hunting Ground for Cyber Criminals

LinkedIn has become a key target for cyber criminals using fake job offers to conduct social engineering attacks. A recent Bitdefender report highlights tactics used by the Lazarus Group, a North Korean state-sponsored threat actor, to deploy malware via fraudulent recruitment messages. Attackers trick victims into running malicious code disguised as job evaluation documents, ultimately stealing cryptocurrency wallet data and establishing persistence on systems. The group has also targeted sensitive industries such as aviation and defence. Experts warn professionals to remain vigilant, verify job offers, and avoid running unverified code outside secure environments like virtual machines.

Sources:

https://www.infosecurity-magazine.com/news/destructive-attacks-banks-surge-13/

https://www.insurancejournal.com/news/national/2025/02/04/810573.htm

https://betanews.com/2025/01/31/ransomware-victims-increased-by-26-percent-in-2024/

https://betanews.com/2025/02/04/over-60-percent-of-enterprise-cybersecurity-incidents-relate-to-known-risks/

https://securityintelligence.com/articles/cisos-drive-intersection-between-cyber-maturity-and-business-continuity/

https://www.darkreading.com/threat-intelligence/cybercriminals-traitorous-insiders-ransom-notes

https://betanews.com/2025/02/06/phishing-up-almost-50-percent-since-2021-with-ai-attacks-on-the-rise/

https://www.msspalert.com/perspective/the-cyber-driven-domino-effect-how-financial-and-security-crises-bankrupt-businesses

https://news.bloomberglaw.com/privacy-and-data-security/board-directors-are-taking-the-lead-on-cybersecurity-oversight

https://informationsecuritybuzz.com/credential-stealing-malware-surges-in/

https://www.securityweek.com/how-agentic-ai-will-be-weaponized-for-social-engineering-attacks/

https://www.itpro.com/security/cyber-attacks/linkedin-social-engineering-attacks


Governance, Risk and Compliance

AI, Cyber Ccrime Perceived as Top Insurance Risks: Kennedys

CISO stature gains traction as global cyber risk escalates | CIO Dive

CISOs drive the intersection between cyber maturity and business continuity

21% of CISOs Have Been Pressured Not to Report a Compliance Issue

Cyber Monitoring Centre Introduces ‘Richter Scale’ for Cyber-Attacks - Infosecurity Magazine

It pays to know how your cyber security stacks up | CSO Online

Infosec pros struggle under growing compliance - Help Net Security

The Cyber-Driven Domino Effect: How Financial and Security Crises Bankrupt Businesses | MSSP Alert

Boardroom cyber expertise comes under scrutiny

Board Directors Are Taking the Lead on Cyber Security Oversight

Critical Questions For Boards: Are You Prepared For Ransomware?

Study warns on "head-in-the-sand" approach to cyber security

Why cyber hygiene should be a priority for every business in 2025 - Digital Journal

Why Cyber Security Is Everyone’s Responsibility

What Is Acceptable Risk?

EMEA CISOs Plan 2025 Cloud Security Investment

Under Pressure: Why Companies Must Mitigate the Churn of Cyber Security Leaders   - Security Boulevard

The CISO’s role in advancing innovation in cyber security | CSO Online

Over 60 percent of enterprise cyber security incidents relate to known risks

Security Teams Pay the Price: The Unfair Reality of Cyber Incidents - SecurityWeek

Overconfident execs are making their companies vulnerable to fraud - Help Net Security

Why Cyber Security Needs Probability — Not Predictions

Budgets and Awareness Up, Impersonation Attacks Still Prominent | SC Media UK

2024: The Year Data Security Took A Beating

Different Position, Different Challenge: AuditBoard Reveals Why Firms Struggle With Compliance | The Fintech Times


Threats

Ransomware, Extortion and Destructive Attacks

Ransomware victims increased by 26 percent in 2024

2024 Breaks Records with Highest Ever Ransomware Attacks, as Cyber Criminals Target Critical Infrastructure

Ransomware Groups Weathered Raids, Profited in 2024

Ransomware and the Impact on Human Lives

Less than half of ransomware incidents end in payment - but you should still be on your guard | TechRadar

Critical Questions For Boards: Are You Prepared For Ransomware?

Cyber Criminals Court Traitorous Insiders via Ransom Notes

How to combat exfiltration-based extortion attacks | TechRadar

Top 3 Ransomware Threats Active in 2025

New AI "agents" could hold people for ransom in 2025 | Malwarebytes

Destructive Attacks on Financial Institutions Surge 13% - Infosecurity Magazine

Cyber Security Risks for Financial Services Firms: Proactive Strategies to Stay Ahead | BCLP - JDSupra

More destructive cyber attacks target financial institutions - Help Net Security

Ransomware recovery payments fell in 2024 • The Register

Ransomware Victims

Tata Technologies reports ransomware attack to Indian stock exchange | The Record from Recorded Future News

Indian tech giant Tata Technologies hit by ransomware attack

Tata Technologies confirms ransomware attack, says investigation still ongoing | TechRadar

Wirral NHS cyberattack leads to missed cancer care targets • The Register

Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden | WIRED

Data breach disclosed by Mizuno after BianLian claims | SC Media

Engineering group IMI latest UK firm to be hit by cyber attack

Phishing & Email Based Attacks

How Agentic AI will be Weaponized for Social Engineering Attacks - SecurityWeek

Phishing up almost 50 percent since 2021 with AI attacks on the rise

Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA - Infosecurity Magazine

High-profile X Accounts Targeted in Phishing Campaign - Infosecurity Magazine

1-Click Phishing Campaign Targets High-Profile X Accounts

Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe | TechRadar

Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip - Security Boulevard

Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank - Infosecurity Magazine

Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks - Security Boulevard

Business Email Compromise (BEC)/Email Account Compromise (EAC)

US and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

Wembley Multi-Academy Trust Scammed Out of £385,000

Other Social Engineering

How Agentic AI will be Weaponized for Social Engineering Attacks - SecurityWeek

Top 5 AI-Powered Social Engineering Attacks

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe | TechRadar

LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to look out for | ITPro

How to Protect Yourself from the Growing Threat of Spam Calls and Robocalls

Artificial Intelligence

How Agentic AI will be Weaponized for Social Engineering Attacks - SecurityWeek

Top 5 AI-Powered Social Engineering Attacks

AI, Cyber Crime Perceived as Top Insurance Risks: Kennedys

Why employees smuggle AI into work - BBC News

AI jailbreaking techniques prove highly effective against DeepSeek | Computer Weekly

DeepSeek’s Flagship AI Model Under Fire for Security Vulnerabilities - Infosecurity Magazine

Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices - SecurityWeek

UK Announces “World-First” AI Security Standard - Infosecurity Magazine

DeepSeek R1 has taken the world by storm, but security experts claim it has 'critical safety flaws' that you need to know about | ITPro

Protect your data as cyber criminals use AI to target Mac in 2025

Risk Matters: Cyber Risk and AI – The Changing Landscape

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US - SecurityWeek

Video Cyber Security expert discovers DeepSeek using ‘digital fingerprinting technology’ - ABC News

Qualys Report Raises Red Flags In DeepSeek-RI Security

New AI "agents" could hold people for ransom in 2025 | Malwarebytes

How Are Threat Actors Using Adversarial GenAI?

Invisible Threats: The Rise of AI-Powered Steganography Attacks - Security Boulevard

AI Rise: Can We Still Trust What We See? - InfoRiskToday

You Could Get 5 Years In Prison For Possessing These AI Tools

Cyber Threat Defence Code of Practice Announced by UK Government | SC Media UK

Can AI & the Cyber Trust Mark Rebuild Endpoint Confidence?

Scotland at risk of major AI hack, expert warns

Charges mount in former ex-Googler's AI theft case • The Register

2FA/MFA

Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA - Infosecurity Magazine

Malware

Credential-stealing Malware Surges In 2024 

Macs targeted by almost two dozen newly emergent payloads last year | SC Media

Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

DaggerFly-Linked Linux Malware Targets Network Appliances - Infosecurity Magazine

Threefold Increase in Malware Targeting Credential Stores - Infosecurity Magazine

Mac Users Warned As “Fully Undetectable” Security Backdoor Confirmed

Surge in Infostealer Attacks Threatens EMEA Organisations - Infosecurity Magazine

AI Malware Dressed Up as DeepSeek Lurks in PyPi

Protect your data as cyber criminals use AI to target Mac in 2025

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

22 New Mac Malware Families Seen in 2024 - SecurityWeek

New Microsoft script updates Windows media with bootkit malware fixes

Lazarus APT targets crypto wallets using cross-platform JavaScript stealer

Microsoft says attackers use exposed ASP.NET keys to deploy malware

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

The RAT Pack Returns: ValleyRAT's Devious Delivery Methods 

Chinese cyber spies use new SSH backdoor in network device hacks

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

Russian cyber research companies post alerts about infostealer, industrial threats | The Record from Recorded Future News

Bots/Botnets

Akamai warns of active attacks from new Mirai variant | SC Media

Mobile

Screenshot-reading malware cracks iPhone security for the first time | Digital Trends

Malware With Screen Reading Code Found in iOS Apps for the First Time - MacRumors

Google Bans 158,000 Malicious Android App Developer Accounts in 2024

Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104

Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe | TechRadar

Security and Privacy on Your Android Phone: Features You Should Know About - CNET

Why rebooting your phone daily is your best defence against zero-click hackers | ZDNET

Gravy Analytics soaks up another sueball over data breach • The Register

Wiping your iPhone? Here's the easiest way to erase all personal data | ZDNET

Denial of Service/DoS/DDoS

Akamai warns of active attacks from new Mirai variant | SC Media

Internet of Things – IoT

Akamai warns of active attacks from new Mirai variant | SC Media

Backdoor uncovered in China-made patient monitors — Contec CMS8000 raises questions about healthcare device security | Tom's Hardware

Can AI & the Cyber Trust Mark Rebuild Endpoint Confidence?

Data Breaches/Leaks

Credential Theft Becomes Cyber Criminals' Favourite Target

Gravy Analytics soaks up another sueball over data breach • The Register

OpenAI Data Breach: Threat Actor Allegedly Claims 20 Million Logins for Sale

International Civil Aviation Organisation (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Mizuno USA says hackers stayed in its network for two months

NorthBay Health Data Breach Impacts 569,000 Individuals - SecurityWeek

Globe Life data breach may impact an additional 850,000 clients

US healthcare provider data breach impacts 1 million patients

Cover-up Follow-up: Westend Dental starts notifying patients of October 2020 ransomware attack – DataBreaches.Net

1 Million Impacted by Data Breach at Connecticut Healthcare Provider - SecurityWeek

Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden | WIRED

Data breach disclosed by Mizuno after BianLian claims | SC Media

Data Purportedly Stolen From Trump Hotels In Cyberattack | MSSP Alert

Taliban deny cyber security breach, claim leaked documents were not confidential | Amu TV

Organised Crime & Criminal Actors

US and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

DOJ: Over 17M Americans Impacted By Seized Cyber Crime Forums | MSSP Alert

From credit card fraud to zero-day exploits: Xe Group expanding cyber criminal efforts | CyberScoop

Crazy Evil gang runs over 10 highly specialized social media scams

Police dismantles HeartSender cyber crime marketplace network

2 Arrested in Takedown of Nulled, Cracked Hacking Forums - SecurityWeek

Two of the world's largest cyber crime forums knocked offline | ITPro

FBI, Europol shut down hacking sites selling personal info, tools for cyber criminals | News Brief | Compliance Week

California man steals $50 million using fake investment sites, gets 7 years

US accuses Canadian math prodigy of $65M crypto scheme • The Register

LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to look out for | ITPro

Dangerous hacker responsible for more than 40 cyberattacks on strategic organisations arrested – DataBreaches.Net

Man Sentenced to 7 Years in Prison for Role in $50M Internet Scam | Tripwire

Charges mount in former ex-Googler's AI theft case • The Register

Fraud factories, cyber criminals and corruption: The Economist's new podcast, "Scam Inc", uncovers a new, global, underground economy worth more than illicit drug trade

Thailand cuts power and internet to areas of Myanmar to disrupt scam gangs

Nigeria Touts Cyber Success as African Cyber Crime Rises

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

Even the US government can fall victim to cryptojacking | FedScoop

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

US accuses Canadian math prodigy of $65M crypto scheme • The Register

Lazarus APT targets crypto wallets using cross-platform JavaScript stealer

Insider Risk and Insider Threats

Why employees smuggle AI into work - BBC News

Cyber Criminals Court Traitorous Insiders via Ransom Notes

Charges mount in former ex-Googler's AI theft case • The Register

What you can do to prevent workforce fraud - Help Net Security

How to Root Out Malicious Employees - Security Boulevard

Human error an overlooked cyber risk for SMEs

Insurance

AI, Cyber Crime Perceived as Top Insurance Risks: Kennedys

Cyber Monitoring Centre Introduces ‘Richter Scale’ for Cyber-Attacks - Infosecurity Magazine

UK’s Cyber Monitoring Centre begins incident classification work | Computer Weekly

Supply Chain and Third Parties

Over a dozen firms compromised in BeyondTrust breach | SC Media

Tata Technologies confirms ransomware attack, says investigation still ongoing | TechRadar

Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip - Security Boulevard

How to create a third-party risk management policy | TechTarget

Cloud/SaaS

EMEA CISOs Plan 2025 Cloud Security Investment

Microsoft SharePoint Connector Flaw Could've Enabled Credential Theft Across Power Platform

Watch Out For These 8 Cloud Security Shifts in 2025

Here’s all the ways an abandoned cloud instance can cause security issues | CyberScoop

Only 3% of organisations have a dedicated budget for SaaS security - Help Net Security

Chinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud

Abandoned AWS Cloud Storage: A Major Cyberattack Vector

Outages

Familiar failings as Barclays outage delays transactions | Today's Conveyancer 

Encryption

Cyber Insights 2025: Quantum and the Threat to Encryption - SecurityWeek

If you're not working on quantum-safe encryption now, it's already too late | ZDNET

Linux and Open Source

Linux Foundation Europe and OpenSSF launch initiative for EU Cyber Resilience Act compliance - Tech.eu

DaggerFly-Linked Linux Malware Targets Network Appliances - Infosecurity Magazine

Linux Security: Scan Your Servers for Rootkits With Ease - The New Stack

Passwords, Credential Stuffing & Brute Force Attacks

Credential Theft Becomes Cyber Criminals' Favorite Target

Millions Of Password Manager Users On Red Alert—Act Now To Stay Safe

Threefold Increase in Malware Targeting Credential Stores - Infosecurity Magazine

Cyber Criminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Stop saving your email login info in your password manager | PCWorld

Social Media

These Are the Accounts Most Targeted By Hackers: Here's How to Secure Them

High-profile X Accounts Targeted in Phishing Campaign - Infosecurity Magazine

1-Click Phishing Campaign Targets High-Profile X Accounts

LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to look out for | ITPro

Malvertising

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts

Fraudulent Google ads seek to breach Microsoft advertisers’ credentials | SC Media

Regulations, Fines and Legislation

“Vámonos!” Declares DORA, But 43% Of UK Financial Services Say “No” 

Infosec pros struggle under growing compliance - Help Net Security

UK Announces “World-First” AI Security Standard - Infosecurity Magazine

It's Time to Consolidate Cyber Security Regulations

Critical Questions For Boards: Are You Prepared For Ransomware?

Is DOGE a cyber security threat? A security expert explains the dangers of violating protocols and regulations that protect government computer systems

Musk' DOGE leashed by court after digging up Treasury data • The Register

Protecting the US from hackers apparently isn't in Trump's budget

Ireland responds to EU infringement notice on cyber security directive | Business Post

21% of CISOs Have Been Pressured Not to Report a Compliance Issue

Resolutions for Healthcare Providers: Part 1 of 2 – Cyber Security, Privacy and HIPAA Compliance | Bodman - JDSupra

Recent US Executive Order Calls for Encrypting DNS - ISC

Different Position, Different Challenge: AuditBoard Reveals Why Firms Struggle With Compliance | The Fintech Times

Trump’s anti-DEI efforts damage national security, former officials say - Nextgov/FCW

DORA Compliance Must be a Top Priority for US Financial Institutions - Security Boulevard

House Democrats demand answers over DOGE OPM server • The Register

Musk, DOGE Move into Treasury Systems Raises Security, Privacy Concerns | MSSP Alert

The biggest breach of US government data is under way | TechCrunch

Cyber Threat Defence Code of Practice Announced by UK Government | SC Media UK

Talks begin to move National Cyber Security Centre to Department of Justice

Can AI & the Cyber Trust Mark Rebuild Endpoint Confidence?

DeepSeek users could face million-dollar fine and prison time under new law | The Independent

USCG Final Rule on Cyber Security in Marine Transportation

Models, Frameworks and Standards

“Vámonos!” Declares DORA, But 43% Of UK Financial Services Say “No” 

Linux Foundation Europe and OpenSSF launch initiative for EU Cyber Resilience Act compliance - Tech.eu

Ireland responds to EU infringement notice on cyber security directive | Business Post

DORA Compliance Must be a Top Priority for US Financial Institutions - Security Boulevard

Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks - Security Boulevard

Resolutions for Healthcare Providers: Part 1 of 2 – Cyber Security, Privacy and HIPAA Compliance | Bodman - JDSupra

Careers, Working in Cyber and Information Security

The cyber security skills gap reality: We need to face the challenge of emerging tech | CSO Online

Shaping The Next Generation Of Cyber Security Professionals

The Cyber Security Crisis: Companies Can’t Fill Roles, Workers Shut Out

Under Pressure: Why Companies Must Mitigate the Churn of Cyber Security Leaders   - Security Boulevard

Government must address cyber security staffing shortage, NAO warns

Why Diversity Should not be Removed from Cyber in 2025 | SC Media UK

Public sector pay gap threatens UK cyber resilience

The hidden dangers of a toxic cyber security workplace - Help Net Security

Law Enforcement Action and Take Downs

Ransomware Groups Weathered Raids, Profited in 2024

US and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

DOJ: Over 17M Americans Impacted By Seized Cyber Crime Forums | MSSP Alert

Police dismantles HeartSender cyber crime marketplace network

2 Arrested in Takedown of Nulled, Cracked Hacking Forums - SecurityWeek

FBI, Europol shut down hacking sites selling personal info, tools for cyber criminals | News Brief | Compliance Week

California man steals $50 million using fake investment sites, gets 7 years

Identity thief whose deception led to his victim’s incarceration gets a 12-year prison term | AP News

US accuses Canadian math prodigy of $65M crypto scheme • The Register

Dangerous hacker responsible for more than 40 cyberattacks on strategic organisations arrested – DataBreaches.Net

Man Sentenced to 7 Years in Prison for Role in $50M Internet Scam | Tripwire

Charges mount in former ex-Googler's AI theft case • The Register

Europol Cracks Down on Global Child Abuse Network “The Com” - Infosecurity Magazine

Thailand cuts power and internet to areas of Myanmar to disrupt scam gangs

Nigeria Touts Cyber Success as African Cyber Crime Rises

Misinformation, Disinformation and Propaganda

Mis/Disinformation: The Skew of Information and Its Impacts on You | AFCEA International


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Britain to boost cyber warfare capabilities

Exploring The Cyber Security Battlefield Of 2025

The Weaponization of Operational Technology

International Civil Aviation Organisation (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Nation State Actors

China

Is DeepSeek a national security threat? New research highlights ties with Chinese telecom raising data security concerns | Mint

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US - SecurityWeek

Video Cyber Security expert discovers DeepSeek using ‘digital fingerprinting technology’ - ABC News

Qualys Report Raises Red Flags In DeepSeek-RI Security

Chinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud

Chinese cyber spies use new SSH backdoor in network device hacks

Backdoor uncovered in China-made patient monitors — Contec CMS8000 raises questions about healthcare device security | Tom's Hardware

DeepSeek Jailbreak Reveals Its Entire System Prompt

AI jailbreaking techniques prove highly effective against DeepSeek | Computer Weekly

DeepSeek’s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot | WIRED

Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices - SecurityWeek

DeepSeek R1 has taken the world by storm, but security experts claim it has 'critical safety flaws' that you need to know about | ITPro

Australia bans DeepSeek over security... - Mobile World Live

Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks

Russia

Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank - Infosecurity Magazine

CVE-2025-0411: Ukrainian Organisations Targeted in Zero-Day Campaign and Homoglyph Attacks | Trend Micro (US)

British PM scrapped ‘dangerously obvious’ email after Russian hacking | Cybernews

7-Zip MotW bypass exploited in zero-day attacks against Ukraine

British PM Keir Starmer’s Personal Email Allegedly Hacked by Russian Operatives

Russian cyber research companies post alerts about infostealer, industrial threats | The Record from Recorded Future News

North Korea

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

Lazarus APT targets crypto wallets using cross-platform JavaScript stealer

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

WhatsApp claims that 100 journalists and activists were the targets of Israeli-made spyware

Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists

WhatsApp: Global spyware campaign conducted by Israeli firm | SC Media


Tools and Controls

Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware

Risk Matters: Cyber Risk and AI – The Changing Landscape

Enterprises invest heavily in AI-powered solutions - Help Net Security

What Is Acceptable Risk?

EMEA CISOs Plan 2025 Cloud Security Investment

Watch Out For These 8 Cloud Security Shifts in 2025

Here’s all the ways an abandoned cloud instance can cause security issues | CyberScoop

Future of Cyber Security: Will XDR Absorb SIEM & SOAR? | Trend Micro (US)

How AI-driven SOC co-pilots will change security center operations

Only 3% of organisations have a dedicated budget for SaaS security - Help Net Security

The API security crisis and why businesses are at risk - Help Net Security

Beware cyber security tech that’s past its prime — 5 areas to check or retire | CSO Online

Recent US Executive Order Calls for Encrypting DNS - ISC

Financial services to increase AI spending with cyber security a top priority, finds Nvidia report - FStech

How to build an effective purple team playbook | TechTarget

Security Teams Pay the Price: The Unfair Reality of Cyber Incidents - SecurityWeek

One breach to rule them all: The security perils of digital consolidation | SC Media

Budgets and Awareness Up, Impersonation Attacks Still Prominent | SC Media UK

Why streamlining cyber security is essential for success - Verdict

How to create a third-party risk management policy | TechTarget

Is Your Antivirus Spying on You? Yes, and Some Are Worse Than Others

What does it mean to build in security from the ground up? • The Register

Why honeypots deserve a spot in your cyber security arsenal | CSO Online



Vulnerability Management

Navigating the Future: Key IT Vulnerability Management Trends 

Transforming Vulnerability Management with Threat Intelligence: A Vision for MSSPs | MSSP Alert

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

Over 60 percent of enterprise cyber security incidents relate to known risks

Managing Software Risk in a World of Vulnerabilities

Infosec pros: We need CVSS, warts and all | CyberScoop

From credit card fraud to zero-day exploits: Xe Group expanding cyber criminal efforts | CyberScoop

Vulnerabilities

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

A worrying security flaw could have left Microsoft SharePoint users open to attack | TechRadar

Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104

Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities - SecurityWeek

Google warns Android users of a kernel flaw under attack • The Register

Critical RCE bug in Microsoft Outlook now exploited in attacks

Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware

Zyxel won’t patch newly exploited flaws in end-of-life routers

Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers | TechCrunch

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access

Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc

AMD patches high severity security flaw affecting Zen chips | TechRadar

Microsoft Patches Critical Azure AI Face Security Bug | MSSP Alert

New Microsoft script updates Windows media with bootkit malware fixes

CISA orders agencies to patch Linux kernel bug exploited in attacks

Cisco Patches Critical Vulnerabilities in Enterprise Security Product - SecurityWeek

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key

7-Zip MotW bypass exploited in zero-day attacks against Ukraine

Netgear warns users to patch critical WiFi router vulnerabilities


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 31 January 2025

Black Arrow Cyber Threat Intelligence Briefing 31 January 2025:

-More Than Half of UK Workplaces Faced Cyber Attacks Last Year

-Cyber Security Responsibilities Across the C-Suite: A Breakdown for Every Executive

-Hackers Use Generative AI to Attack More Frequently and Effectively

-74% of Organisations are Increasing Crisis Simulation Budgets

-Only 13% of Organisations Fully Recover Data After a Ransomware Attack

-Cyber Security Threats Hit Mid-Market Firms Where It Hurts: The Bottom Line

-GhostGPT Can Write Malicious Code, Create Malware, and Create Convincing Phishing Emails for Just $50/Week

-New Phishing Campaign Targets Mobile Devices with Malicious PDFs

-The Clock is Ticking: Hackers Can Take You Down in 48 Minutes

-Security Threats Top Concerns for UK SMEs

-SaaS (Cloud) Breaches Skyrocket 300% as Traditional Defences Fall Short

-Rise of AI is Causing Many Firms to Worry About Their Cyber Security

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Looking at open source reporting this week, and indeed from our own work, it is clear that UK businesses are facing an alarming rise in cyber attacks, with over half experiencing an incident in 2024. Despite this, only a minority have structured risk assessments or incident response plans in place. AI-driven phishing attacks have surged by over 4,000%, yet just 17% of organisations invest in cyber security training. Meanwhile, the rapid adoption of generative AI is both strengthening defences and empowering attackers. Tools like GhostGPT, available for as little as $50 per week, are automating malware development and phishing campaigns, reducing the technical barrier for cyber criminals. The time from initial breach to full compromise has shrunk to just 48 minutes, highlighting the need for faster response times and automated defences.

Cyber security is no longer just a technical challenge but a critical business issue requiring C-suite engagement. CEOs must integrate security into corporate strategy, particularly for mid-market firms where breaches threaten growth and innovation. The escalating ransomware crisis has led to 58% of victims shutting down operations, yet only 13% fully recover their data, exposing gaps in resilience. The surge in SaaS breaches, up 300% in the past year, further underscores the importance of identity protection and continuous monitoring to mitigate risk.

As cyber threats intensify, Black Arrow Cyber advises organisations to prioritise crisis simulations, proactive investment, and cross-functional collaboration. With 74% of CISOs increasing crisis simulation budgets and AI reshaping the threat landscape, businesses must act now to build resilience. Strengthening mobile security, enforcing least privilege access, and rapidly addressing vulnerabilities are crucial to preventing financial and reputational harm. The cyber security clock is ticking, and businesses must move swiftly to stay ahead of evolving threats.


Top Cyber Stories of the Last Week

More Than Half of UK Workplaces Faced Cyber Attacks Last Year

More than half of UK businesses experienced a cyber attack in 2024, yet only 31% had conducted a cyber risk assessment, and just 15% had a formal incident response plan. Phishing attacks, fuelled by AI advancements, have surged by over 4,000% since 2022, making cyber resilience essential. Despite the evolving threat landscape, only 17% of businesses provide cyber security training to staff. Organisations must prioritise continuous monitoring, attack simulations, and structured incident response plans to mitigate risks. A strong cyber resilience strategy ensures businesses can not only prevent attacks but also respond effectively, minimising disruption and financial impact.

Cyber Security Responsibilities Across the C-Suite: A Breakdown for Every Executive

Cyber security is a core business concern requiring engagement from the entire C-suite, not just the Chief Information Security Officer (CISO). With cyber threats growing in complexity and regulations becoming stricter, organisations must integrate security into their business strategies. A single cyber attack can cause severe financial losses, operational disruption, and reputational damage. Every member of the C-suite plays a key role: CEOs set strategic business priorities that require a secure business environment, CFOs manage financial risks, and a good CISO establishes security defences across people, operations and technology with the CHRO, COO, and CIO. Cross-functional collaboration is essential, ensuring cyber security is embedded in operations, innovation, and culture to protect the organisation’s future.

Hackers Use Generative AI to Attack More Frequently and Effectively

The latest Splunk CISO Report highlights the growing role of Generative AI (GenAI) in cyber security, with over half (52%) of CISOs prioritising emerging technologies. However, only a third (33%) of board members share this view, exposing a strategic gap. Attackers are leveraging GenAI to enhance the effectiveness (32%) and volume (28%) of cyber attacks, making AI-driven threats a top concern for 36% of CISOs. Budget constraints remain an issue, with 64% of CISOs linking underfunding to increased cyber risks.

74% of Organisations are Increasing Crisis Simulation Budgets

Following a series of high-profile cyber incidents in 2024, CISOs are increasing investment in crisis simulations to strengthen organisational resilience. A report by Hack The Box found that 74% of CISOs are raising budgets for crisis preparedness in 2025, with 16% of security budgets being reallocated to these exercises. Key drivers include the growing frequency of cyber incidents (31%) and gaps in incident response planning (20%). With AI reshaping the cyber threat landscape, organisations are prioritising realistic, stress-tested simulations to ensure both technical and non-technical teams can respond decisively to evolving threats.

Only 13% of Organisations Fully Recover Data After a Ransomware Attack

Ransomware attacks are becoming more disruptive, with 58% of organisations forced to shut down operations, up from 45% in 2021. Business impacts are severe: 40% reported revenue losses, 41% lost customers, and 35% suffered significant brand damage. Despite 29% of IT budgets allocated to ransomware defences, 88% of organisations have been victims, with only 13% fully recovering their data. Poor visibility in hybrid environments and unpatched systems are key vulnerabilities. With only 27% adopting microsegmentation, organisations must prioritise containment strategies to protect critical systems and avoid the rising costs of downtime, lost business, and reputational harm.

Cyber Security Threats Hit Mid-Market Firms Where It Hurts: The Bottom Line

Middle-market firms, especially those facing high uncertainty due to fluctuating demand, supply chain disruptions, or macroeconomic volatility, face growing cyber security threats that directly impact their financial stability and innovation. According to PYMNTS Intelligence’s 2025 Certainty Project, 72% of firms are concerned about financial losses due to cyber incidents, rising to 88% for those experiencing heightened uncertainty. High-uncertainty firms are also 81% more likely to delay or cancel technology initiatives, stalling growth. Despite constrained resources, CFOs are shifting cyber security from an IT concern to a business priority, recognising its role in resilience and competitive advantage. As cyber threats escalate, proactive investment in security is essential to safeguard operations and drive innovation.

GhostGPT Can Write Malicious Code, Create Malware, and Create Convincing Phishing Emails for Just $50/Week

Hackers are using an AI chatbot, GhostGPT, to automate cyber attacks, enabling them to write malware, craft phishing emails, and develop exploits with ease. Unlike mainstream AI tools, GhostGPT lacks ethical safeguards and is marketed openly on cyber crime forums. Available as a Telegram bot for as little as $50 per week, it lowers the barrier for attackers with minimal technical skills. Security researchers warn that AI-driven threats like GhostGPT will make cyber attacks more sophisticated and harder to detect, underscoring the need for organisations to adapt their defences to counter AI-enabled cyber crime.

New Phishing Campaign Targets Mobile Devices with Malicious PDFs

A newly discovered phishing campaign is targeting mobile users by impersonating known brands and delivering malicious PDF files via SMS. Researchers uncovered over 20 malicious PDFs and 630 phishing pages, highlighting a large-scale operation spanning more than 50 countries. The campaign employs a sophisticated obfuscation technique to bypass detection, tricking users into providing sensitive information. As mobile phishing threats grow, organisations must prioritise mobile security investments, implement multi-factor authentication and adopt a layered security approach to mitigate risks posed by increasingly advanced social engineering tactics.

The Clock is Ticking: Hackers Can Take You Down in 48 Minutes

Hackers are accelerating their attacks, with the average time from initial access to lateral movement now just 48 minutes; 22% faster than last year. The quickest observed incident took only 27 minutes. A key driver is the rise of information-stealing malware, aiding initial access brokers in expediting attacks. Additionally, the ransomware-as-a-service ecosystem has become more efficient, and AI is enhancing hacking tools. Alarmingly, the time from vulnerability discovery to exploitation has dropped from 47 days to just 18 days; a 62% decrease. Automated defences and rapid patching are critical to mitigating these evolving threats.

Security Threats Top Concerns for UK SMEs

JumpCloud’s latest report highlights that 61% of UK SMEs see security as their top challenge in 2025, with 45% having suffered a cyber security attack, and phishing accounting for 53% of incidents. IT teams are under pressure, with 90% concerned about unauthorised apps expanding their attack surface, and 60% fearing AI threats will outpace their defences. Despite security concerns, nearly half (48%) hesitate to strengthen protections due to user experience trade-offs. Tool sprawl remains an issue, driving 83% to seek unified platforms. Budgets are increasing, with 76% expecting cyber security investment to rise and MSP adoption growing to 79%.

SaaS (Cloud) Breaches Skyrocket 300% as Traditional Defences Fall Short

Software-as-a-Service (SaaS) breaches have surged by 300% in the past year as cyber criminals and nation-state actors increasingly target these platforms. A report by Obsidian Security found that 85% of incidents stemmed from compromised identities, with adversary-in-the-middle attacks accounting for 39%. The healthcare sector was the most affected (14%), followed by government (13%) and financial services (11%). Traditional security tools are struggling to protect SaaS environments, with MFA failing in 84% of cases due to weak implementation or adversary-in-the-middle (AiTM) techniques. To mitigate risk, firms must enhance visibility over SaaS usage, enforce least privilege access controls, and implement continuous monitoring to detect and respond to threats swiftly.

Rise of AI is Causing Many Firms to Worry About Their Cyber Security

A Sophos report highlights growing concerns about AI's impact on cyber security, with 89% of IT leaders fearing flaws in generative AI could weaken defences. Despite this, 99% now see AI as essential when selecting a cyber security provider. While AI enhances threat capabilities, one in five IT leaders hopes it will strengthen protection, and 14% hope it will relieve employee burnout. However, four in five anticipate rising costs, though 87% expect long-term savings. With 98% already embedding AI in security solutions, firms are urged to adopt a human-first approach and carefully assess AI vendors for data quality and effectiveness.

Sources:

https://www.thehrdirector.com/business-news/digitalisation/half-uk-workplaces-faced-cyberattacks-last-year/

https://securityboulevard.com/2025/01/cybersecurity-responsibilities-across-the-c-suite-a-breakdown-for-every-executive/

https://www.techradar.com/pro/security/hackers-use-genai-to-attack-more-frequently-and-effectively

https://www.helpnetsecurity.com/2025/01/28/cisos-crisis-simulation-budgets/

https://www.helpnetsecurity.com/2025/01/29/ransomware-attacks-business-operations-disruption/

https://www.pymnts.com/cybersecurity/2025/cybersecurity-threats-hit-mid-market-firms-where-it-hurts-the-bottom-line/

https://www.itpro.com/security/cyber-crime/hackers-are-using-a-new-ai-chatbot-to-wage-cyber-attacks-ghostgpt-lets-users-write-malicious-code-create-malware-and-curate-phishing-emails-and-it-costs-just-usd50-to-use

https://www.infosecurity-magazine.com/news/phishing-campaign-targets-mobile/

https://www.forbes.com/sites/daveywinder/2025/01/28/hackers-are-getting-faster-48-minutes-and-youre-cooked/

https://pcr-online.biz/2025/01/29/security-threats-top-concerns-for-uk-smes/

https://www.infosecurity-magazine.com/news/saas-breaches-defenses-short/

https://www.techradar.com/pro/security/rise-of-ai-is-causing-many-firms-to-worry-about-their-cybersecurity


Governance, Risk and Compliance

CISOs boost board presence by 77% over two years | Computer Weekly

Cyber Security Responsibilities Across the C-Suite: A Breakdown for Every Executive - Security Boulevard

CISOs are gaining more influence in the boardroom, and it’s about time | ITPro

74% of CISOs are increasing crisis simulation budgets - Help Net Security

Rise of AI is causing many firms to worry about their cyber security | TechRadar

Hackers Are Getting Faster—48 Minutes And You’re Cooked

Cyber security crisis in numbers - Help Net Security

Cyber security Threats Hit Mid-Market Firms in the Bottom Line

CISOs Are Gaining C-Suite Swagger

88% of High-Uncertainty Firms Report Cyber Security Risks

UK Organisations Boosting Cyber Security Budgets - Infosecurity Magazine

UK's small businesses underestimating risk of cyber attacks

Security threats top concerns for UK SMEs – PCR

It’s time to catch up with cyber attackers | TechRadar

More than half of UK workplaces faced cyber attacks last year | theHRD

How to improve cyber resilience across your workforce | theHRD

Cyber Resilience: Sorry Vendors, It’s About Leadership, Not Tech

Crisis Simulation: The New Frontier for CISOs in 2025

How CISOs can forge the best relationships for cyber security investment | CSO Online

Old Ways of Vendor Risk Management Are No Longer Enough

We're losing the battle against complexity, and AI may or may not help | ZDNET

Revealed – top emerging threats for banks and insurers | Insurance Business America

Acronis Data Privacy Survey Reveals 64% of Global Consumers

Cyber trends set to influence business strategies - Help Net Security


Threats

Ransomware, Extortion and Destructive Attacks

TRIPLESTRENGTH Operation Targets Major Cloud Platforms | MSSP Alert

Don't count on ransomware insurance to save you - Tech Monitor

Survey Surfaces Extent of Financial Damage Caused by Ransomware Scourge - Security Boulevard

58% of Ransomware Victims Forced to Shut Down Operations - Infosecurity Magazine

Illumio Research Reveals 58% of Companies Hit With

Only 13% of organisations fully recover data after a ransomware attack - Help Net Security

Another banner year for ransomware gangs • The Register

Ransomware Gangs Linked by Shared Code and Ransom Notes - Infosecurity Magazine

The rising tide of ransomware and what it means for small and medium-sized businesses [Q&A]

Lynx Ransomware Infrastructure To Attack Windows, Linux, ESXi & Affiliate Panel Uncovered

Baguettes bandits strike again with ransomware, humiliation • The Register

New Hellcat Ransomware Gang Employs Humiliation Tactics - Infosecurity Magazine

Revealed – top emerging threats for banks and insurers | Insurance Business America

New report warns of sophisticated techniques being used by ransomware group Arcus Media - SiliconANGLE

How Interlock Ransomware Infects Healthcare Organisations

What we know about the AI-powered ransomware group, FunkSec - Raconteur

UK: Consultation on Ransomware payments | DLA Piper - JDSupra

Lynx ransomware infiltration reveals affiliate panel details | SC Media

Ransomware gang uses SSH tunnels for stealthy VMware ESXi access

Ransomware Victims

MGM to pay $45m to data breach and ransomware victims

Let’s Secure Insurance failed to secure their own data storage. Now they have a breach. – DataBreaches.Net

152,000 Impacted by Data Breach at Berman & Rabin - SecurityWeek

'A poignant reminder of the devastating impact': The steps to take to safeguard your business against ransomware attack - Business MK

Healthcare Sector Charts 2 More Ransomware Attacks

Ransomware Attack Disrupts Blood Donation Services in US - Infosecurity Magazine

Smiths Group Scrambling to Restore Systems Following Cyber Attack - SecurityWeek

Phishing & Email Based Attacks

New Phishing Campaign Targets Mobile Devices with Malicious PDFs - Infosecurity Magazine

Google forced to step up phishing defences following ‘most sophisticated attack’ it has ever seen | TechRadar

The top 10 brands exploited in phishing attacks - and how to protect yourself | ZDNET

Hidden Text Salting Disrupts Brand Name Detection Systems - Infosecurity Magazine

Hidden in Plain Sight: PDF Mishing Attack - Security Boulevard

Threat Actors Exploit Government Websites for Phishing - Infosecurity Magazine

Phishing Campaign Baits Hook With Malicious Amazon PDFs

Nine out of ten emails are spam - Help Net Security

Other Social Engineering

New Phishing Campaign Targets Mobile Devices with Malicious PDFs - Infosecurity Magazine

Scammers Are Creating Fake News Videos to Blackmail Victims | WIRED

DoJ Busts Up Another Multinational DPRK IT Worker Scam

Don't Fall For These Reddit Scam Pages Waiting to Install Malware On Your Computer

Reddit, WeTransfer pages spoofed in Lumma Stealer campaign | SC Media

British Vishing-as-a-Service Trio Sentenced - Infosecurity Magazine

Artificial Intelligence

Prompt Injection Tricks AI Into Downloading And Executing Malware | Hackaday

Hackers use GenAI to attack more frequently and effectively | TechRadar

Hackers are using a new AI chatbot to wage attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails – and it costs just $50 to use | ITPro

Rise of AI is causing many firms to worry about their cyber security | TechRadar

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

89% of IT Leaders Worry GenAI Flaws Could Negatively Impact Their Organisation’s Cyber Security Strategies, Sophos Survey Finds

DeepSeek's popularity exploited by malware peddlers, scammers - Help Net Security

AI-powered Chrome extensions are watching you…

AI security posture management will be needed before agentic AI takes hold - Help Net Security

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED

DeepSeek Blames Disruption on Cyber Attack as Vulnerabilities Emerge - SecurityWeek

The Wiretap: DeepSeek Turned Into Evil Malware Maker, Researchers Find

Nation-State Hackers Abuse Gemini AI Tool - Infosecurity Magazine

What we know about the AI-powered ransomware group, FunkSec - Raconteur

The 10 worst software disasters of 2024: cyber attacks, malicious AI, and silent threats | TechRadar

DeepSeek database left open, exposing sensitive info • The Register

Hackers Are Using Google's AI Chatbot to Make Attacks More Efficient - Business Insider

Time Bandit ChatGPT jailbreak bypasses safeguards on sensitive topics

Risk Matters: Cyber Risk and AI – The Changing Landscape | Newswise

Preparing financial institutions for the next generation of cyber threats - Help Net Security

Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks

Former OpenAI safety researcher brands pace of AI development ‘terrifying’ | Artificial intelligence (AI) | The Guardian

2FA/MFA

How hackers bypass MFA – and what to do about it | ITPro

Malware

Over a billion credentials stolen were stolen in malware attacks in 2024 | TechRadar

Prompt Injection Tricks AI Into Downloading And Executing Malware | Hackaday

Hacker infects 18,000 "script kiddies" with fake malware builder

Russian Scammers Target Crypto Influencers with Infostealers - Infosecurity Magazine

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

Phishing Campaign Baits Hook With Malicious Amazon PDFs

Don't Fall For These Reddit Scam Pages Waiting to Install Malware On Your Computer

Reddit, WeTransfer pages spoofed in Lumma Stealer campaign | SC Media

18,459 Devices Compromised Worldwide Via XWorm RAT Builder | MSSP Alert

Cyber Insights 2025: Malware Directions - SecurityWeek

Secondary payloads delivered via MintsLoader attacks | SC Media

The Wiretap: DeepSeek Turned Into Evil Malware Maker, Researchers Find

Over 10,000 WordPress sites found showing fake Google browser update pages to spread malware | TechRadar

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyber Attacks

Phishing campaign in Poland and Germany deploys TorNet backdoor | SC Media

What Happens When Students Bring Malware to Campus? | EdTech Magazine

Bots/Botnets

Aquabot Botnet Targeting Vulnerable Mitel Phones - SecurityWeek

Mobile

New Phishing Campaign Targets Mobile Devices with Malicious PDFs - Infosecurity Magazine

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Google Play security teams used AI in 92% of app reviews in 2024 - Android Authority

Google blocked 2.36 million risky Android apps from Play Store in 2024

Denial of Service/DoS/DDoS

The Undercurrent Behind the Rise of DeepSeek: DDoS Attacks in the Global AI Technology Game - Security Boulevard

Internet of Things – IoT

Cyber Security Threats To Modern Cars: How Hackers Are Taking Control

Data Breaches/Leaks

MGM to pay $45m to data breach and ransomware victims

TalkTalk confirms data breach involving a third-party platform

UK telco TalkTalk launches probe into alleged data grab • The Register

1 in 2 Americans affected by UnitedHealth cyber attack, new disclosure shows | Rock Hill Herald

UnitedHealth estimates 190M people impacted by Change Healthcare cyber attack – DataBreaches.Net

Mega Data Breaches Push US Victim Count to 1.7 Billion - Infosecurity Magazine

Millions of airline customers possibly affected by OAuth security flaw | TechRadar

DeepSeek database left open, exposing sensitive info • The Register

312% Surge in Breach Notices That Could Have Been Prevented

PowerSchool starts notifying victims of massive data breach

Reporting a Breach? Make Sure Your Lawyer's on Call

152,000 Impacted by Data Breach at Berman & Rabin - SecurityWeek

Cyber security Event at Benefits Management Group Results in Data Breach | Console and Associates, P.C. - JDSupra

Organised Crime & Criminal Actors

Cyber security crisis in numbers - Help Net Security

Hackers Are Getting Faster—48 Minutes And You’re Cooked

Man arrested after climate activists cut UK insurance firms’ fibre optic cables | UK news | The Guardian

FBI nominee Kash Patel gets questions on cyber crime investigations, Silk Road founder, surveillance powers | CyberScoop

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

TRIPLESTRENGTH Operation Targets Major Cloud Platforms | MSSP Alert

At least $69 million stolen from crypto platform Phemex in suspected cyber attack | The Record from Recorded Future News

Russian Scammers Target Crypto Influencers with Infostealers - Infosecurity Magazine

What's Yours is Mine: Is Your Business Ready for Cryptojacking Attacks?

Insider Risk and Insider Threats

How to improve cyber resilience across your workforce | theHRD

British Museum says ex-contractor 'shut down' IT systems • The Register

HR Magazine - Former employee shuts down British Museum IT systems

CrowdStrike Highlights Magnitude of Insider Risk

Insurance

Don't count on ransomware insurance to save you - Tech Monitor

Cyber Insights 2025: Cyberinsurance – The Debate Continues - SecurityWeek

Supply Chain and Third Parties

TalkTalk confirms data breach involving a third-party platform

Revealed – top emerging threats for banks and insurers | Insurance Business America

How Lazarus Group built a cyber espionage empire - Help Net Security

Third-Party Vendors Are the Supply Chain’s Ignored Vulnerability | HackerNoon

Building Resilience Against Zero-Day Threats In Third-Party Risk Management

Old Ways of Vendor Risk Management Are No Longer Enough

Companies told to enhance third party cyber security efforts

GoDaddy’s Cyber Security Called Into Question

Cloud/SaaS

TRIPLESTRENGTH Operation Targets Major Cloud Platforms | MSSP Alert

SaaS Breaches Skyrocket 300% as Traditional Defences Fall Short - Infosecurity Magazine

MITRE's Latest ATT&CK Simulations Tackles Cloud Defences

Microsoft investigates Microsoft 365 outage affecting users, admins

Outages

Man arrested after climate activists cut UK insurance firms’ fibre optic cables | UK news | The Guardian

Microsoft investigates Microsoft 365 outage affecting users, admins

Identity and Access Management

Hackers use Windows RID hijacking to create hidden admin account

Staying Ahead with Enhanced IAM Protocols - Security Boulevard

Microsoft Details Key Strategies for Proactive Identity Management

Encryption

"Anonymity is not a fundamental right": experts disagree with Europol chief's request for encryption back door | TechRadar

Linux and Open Source

Lynx Ransomware Infrastructure To Attack Windows, Linux, ESXi & Affiliate Panel Uncovered

Lazarus Group's latest heist hits hundreds globally • The Register

Facebook flags Linux topics as 'cyber security threats' — posts and users being blocked | Tom's Hardware

Passwords, Credential Stuffing & Brute Force Attacks

Over a billion credentials stolen were stolen in malware attacks in 2024 | TechRadar

Multiple Git flaws led to credentials compromise

Social Media

Is TikTok a national security threat – or is the ban a smokescreen for superpower rivalry? | TikTok | The Guardian

Microsoft Eyes TikTok’s US Operations Amid National Security Concerns - gHacks Tech News

facebook flags Linux topics as threats

Facebook flags Linux topics as 'cyber security threats' — posts and users being blocked | Tom's Hardware

Trump’s bigger China cyber threat isn’t TikTok - The Japan Times

Malvertising

Security Bite: How hackers are still using Google Ads to spread malware - 9to5Mac

Training, Education and Awareness

How to improve cyber resilience across your workforce | theHRD

Regulations, Fines and Legislation

National security risks in routers, modems targeted in bipartisan Senate bill | CyberScoop

SEC and FCA fines: Issues jump - Help Net Security

312% Surge in Breach Notices That Could Have Been Prevented

UK: Consultation on Ransomware payments | DLA Piper - JDSupra

Strengthening National Security in the AI Era

FBI nominee Kash Patel gets questions on cyber crime investigations, Silk Road founder, surveillance powers | CyberScoop

Trump Administration Faces Security Balancing Act in Borderless Cyber Landscape - SecurityWeek

Gutting US cyber advisory boards 'foolish' • The Register

Models, Frameworks and Standards

MITRE's Latest ATT&CK Simulations Tackles Cloud Defences

Careers, Working in Cyber and Information Security

Hackers allegedly stole $69M from cryptocurrency platform Phemex

Nine human-centric strategies that strengthen security teams | SC Media

How to make sure you’ve got the cyber security people you need

Law Enforcement Action and Take Downs

Another banner year for ransomware gangs • The Register

British Vishing-as-a-Service Trio Sentenced - Infosecurity Magazine

Brit fraudsters sentenced over account takeover operation • The Register

Authorities Seize Domains of Popular Hacking Forums in Major Cyber Crime Crackdown

Nulled, Other Cyber Crime Websites Seized by Law Enforcement - SecurityWeek

FBI seizes Cracked.io, Nulled.to hacking forums in Operation Talent

Law enforcement continues efforts to disrupt cyber crime forums and services – DataBreaches.Net

Misinformation, Disinformation and Propaganda

AI, disinformation and cyber security - POST


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

The Private Sector on the Front Line | Foreign Affairs

Nation State Actors

China

MPs and peers start inquiry into Russian and Chinese sabotage threats to subsea internet cables | Computer Weekly

As Russian Spy Ship Yantar Enters British Waters, the Deep-Sea Battle Over Undersea Cables Heats Up - WSJ

Vessel seized on suspicion of cutting Baltic internet cable

Latvia: Undersea cable likely damaged by external influence – DW – 01/27/2025

One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years | TechRadar

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED

Inside China's 'hacking capital' that has ignited global cyber security alarms | ITV News

Is TikTok a national security threat – or is the ban a smokescreen for superpower rivalry? | TikTok | The Guardian

Are We Serious About Chinese Spying? - SMERCONISH

DeepSeek Blames Disruption on Cyber Attack as Vulnerabilities Emerge - SecurityWeek

National security risks in routers, modems targeted in bipartisan Senate bill | CyberScoop

The Wiretap: DeepSeek Turned Into Evil Malware Maker, Researchers Find

Hackers Are Using Google's AI Chatbot to Make Attacks More Efficient - Business Insider

Baltic undersea pipes and cables keep getting damaged. What’s going on? | CNN Business

Trump’s bigger China cyber threat isn’t TikTok - The Japan Times

UK launches inquiry into threats to subsea cable systems

Sweden seizes vessel after another undersea cable damaged • The Register

DeepSeek's popularity exploited by malware peddlers, scammers - Help Net Security

Gutting US cyber advisory boards 'foolish' • The Register

Microsoft Eyes TikTok’s US Operations Amid National Security Concerns - gHacks Tech News

Russia

MPs and peers start inquiry into Russian and Chinese sabotage threats to subsea internet cables | Computer Weekly

As Russian Spy Ship Yantar Enters British Waters, the Deep-Sea Battle Over Undersea Cables Heats Up - WSJ

Vessel seized on suspicion of cutting Baltic internet cable

Latvia: Undersea cable likely damaged by external influence – DW – 01/27/2025

Cross-Party Inquiry Examines Threats to Undersea UK Internet Cables - ISPreview UK

Nation-State Hackers Abuse Gemini AI Tool - Infosecurity Magazine

Baltic undersea pipes and cables keep getting damaged. What’s going on? | CNN Business

UK launches inquiry into threats to subsea cable systems

Sweden seizes vessel after another undersea cable damaged • The Register

Exclusive: Baltic Sea shipping tax could pay for undersea cable protection, says Estonian minister | Reuters

Russian Scammers Target Crypto Influencers with Infostealers - Infosecurity Magazine

European Union Sanctions Russian Nationals for Hacking Estonia - SecurityWeek

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Iran

Google details nefarious Gemini use by Iranian spies • The Register

North Korea

How Lazarus Group built a cyber espionage empire - Help Net Security

DoJ Busts Up Another Multinational DPRK IT Worker Scam

Lazarus Group's latest heist hits hundreds globally • The Register

Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks


Tools and Controls

74% of CISOs are increasing crisis simulation budgets - Help Net Security

Crisis Simulations: A Top 2025 Concern for CISOs

CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks - Infosecurity Magazine

Crisis Simulation: The New Frontier for CISOs in 2025

How to improve cyber resilience across your workforce | theHRD

Attackers exploit SimpleHelp RMM Software flaws for initial access

Building Resilience Against Zero-Day Threats In Third-Party Risk Management

Hackers exploiting flaws in SimpleHelp RMM to breach networks

Risk Matters: Cyber Risk and AI – The Changing Landscape | Newswise

UK Organisations Boosting Cyber Security Budgets - Infosecurity Magazine

PrintNightmare Aftermath: Windows Print Spooler is Better. What's Next?

Old Ways of Vendor Risk Management Are No Longer Enough

Cyber Resilience: Sorry Vendors, It’s About Leadership, Not Tech

How CISOs can forge the best relationships for cyber security investment | CSO Online

Prepare to be breached: the radical cyber-security strategy that might save your business | The Independent

Microsoft Teams phishing attack alerts coming to everyone next month

Man arrested after climate activists cut UK insurance firms’ fibre optic cables | UK news | The Guardian

How to Choose the Right Cyber Security Software: A Comprehensive Guide - Security Boulevard

Remote Monitoring and Management (RMM) Abuse | Intel 471

Staying Ahead with Enhanced IAM Protocols - Security Boulevard

We're losing the battle against complexity, and AI may or may not help | ZDNET

WFH with privacy? 85% of Brit bosses are snooping on staff • The Register

Fragmented cyber security is costing businesses billions, and putting them at risk | TechRadar

Nine out of ten emails are spam - Help Net Security



Vulnerability Management

Building Resilience Against Zero-Day Threats In Third-Party Risk Management

NCSC Calls on Vendors to Eradicate “Unforgivable” Vulnerabilities - Infosecurity Magazine

Microsoft to deprecate WSUS driver synchronization in 90 days

The 10 worst software disasters of 2024: cyber attacks, malicious AI, and silent threats | TechRadar

UK’s NCSC Proposes New Vulnerability Classification System | MSSP Alert

Vulnerabilities

Fortinet Zero-Day Gives Attackers Super-Admin Privileges

TeamViewer Patches High-Severity Vulnerability in Windows Applications - SecurityWeek

RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

Palo Alto Networks firewalls have UEFI flaws, Secure Boot bypasses | CSO Online

One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years | TechRadar

LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity - SecurityWeek

Vulnerabilities in Telecom Networks Let Hackers Gain Access to 3,000 Companies 

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

SonicWall says hackers are exploiting a new zero-day bug to breach customer networks | TechCrunch

Aquabot Botnet Targeting Vulnerable Mitel Phones - SecurityWeek

Multiple Git flaws led to credentials compromise

Apple Silicon flaws could make your private data vulnerable

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer

Apple's in-house chips have security flaws that could expose your Gmail inbox to attackers

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

VMware plugs credential-leaking bugs in Cloud Foundation • The Register

TeamViewer fixed a bug in Windows client and host applications

Hackers exploiting flaws in SimpleHelp RMM to breach networks

Millions of airline customers possibly affected by OAuth security flaw | TechRadar

Critical remote code execution bug found in Cacti framework

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow’s Key Cyber Predictions for 2025

Black Arrow’s Key Cyber Predictions for 2025

At Black Arrow, we see significant cyber risks escalating in 2025 as attackers’ technology and tactics develop, and geopolitical tensions increase. Our cyber threat intelligence, including our weekly briefing for our newsletter subscribers, shows a sharp rise in attacks during 2024, which continues into 2025. This includes increasingly sinister phishing and other AI-enabled attacks as part of ransomware and extortion, which in some cases lead to the collapse of the victim organisation.

At Black Arrow, we see significant cyber risks escalating in 2025 as attackers’ technology and tactics develop, and geopolitical tensions increase. Our cyber threat intelligence, including our weekly briefing for our newsletter subscribers, shows a sharp rise in attacks during 2024, which continues into 2025. This includes increasingly sinister phishing and other AI-enabled attacks as part of ransomware and extortion, which in some cases lead to the collapse of the victim organisation.

Phishing in 2025, Powered by AI

In 2025, we see phishing continuing its alarming rise. Attackers are using AI to amplify the dangers of phishing, not just in emails but also in Teams and other messaging platforms. AI-generated messages adapt to bypass existing controls, with greater success in landing in employees' inboxes. Gone are the days of spotting phishing through bad spelling and grammar; AI will generate perfect communications tailored to specific sectors and will flex to penetrate victims' security.

Deepfake: A Growing Threat in 2025

Deepfake audio and video calls form part of a modern attack scenario, no longer limited to sophisticated attackers. The deepfake video attack on Arup last year, which resulted in USD 25 million in fraudulent bank payments, was a trailblazing example. With the rapid development of AI, we predict that deepfake attacks will affect small and medium-sized businesses as much as large organisations. The technology and kits for such attacks are set to become cheaper and more accessible in 2025.

Supply Chain Risks: No Company is an Island

Organisations heavily rely on other companies to manage key activities or systems, including outsourced payroll, IT, accounting, legal services, and marketing. This trend will continue to grow in 2025, along with substantial cyber security risks. Attackers will increasingly focus on supply chains as an easy way to access data for ransom or payment fraud. An example of the most popular attack we see would be where an attacker gains access to your third party’s email account (known as business email compromise, or BEC), and then interacts with you from that trusted email account to make changes to bank account details for upcoming payments. BEC and other attacks often start with phishing emails which we see will be enhanced by AI and deepfake in 2025.

Quantum Computing: On the Horizon

With many organisations developing quantum computing, we expect advances in 2025 and beyond that will present opportunities for both organisations and attackers. Quantum computers have the potential to solve highly complex problems at high speed, but this capability could also be used by attackers to break encryption. We see 2025 as the year when many organisations start to reexamine their security approaches to withstand the malicious use of quantum computing.

Constant Innovation: The Need for Threat Intelligence

The sudden appearance of DeepSeek AI in late January 2025, which sent shockwaves through the global technology sector, reminds us that all businesses need to stay abreast of technological developments and understand their cyber security implications. We encourage you to subscribe to our free weekly threat intelligence briefing, sent by email every Monday, to help keep up to date.

Visit our website at www.blackarrowcyber.com/subscribe for more information.

Read More
Black Arrow Admin Black Arrow Admin

Black Arrow Cyber Threat Intelligence Briefing 24 January 2025

Black Arrow Cyber Threat Intelligence Briefing 24 January 2025:

-Russian Ransomware Groups Deploy Email Bombing and Teams Vishing

-Cyber Security Breaches Are Increasing Business Insolvency Risks

-Companies Seek Specialised Expertise to Combat Artificial Intelligence (AI) Cyber Threats

-When Risk Becomes Habit: Employee Behaviour and Organisational Security

-New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing

-Global Cyber Attacks Jumped 44% Last Year

-Phishing Campaigns Became a Lot More Sinister in 2024

-CISOs Dramatically Increase Boardroom Influence but Many Still Lack Soft Skills

-Bad News - Businesses Who Pay Ransomware Attackers Aren’t Very Likely to Get Their Data Back

-Deepfakes Force a New Era in Fraud Detection, Identity Verification

-Misinformation Is No. 1 Global Risk, Cyber Espionage in Top 5

-Educate, Prepare, and Mitigate: The Keys to Unlocking Cyber Resilience

-What is ‘Security Theatre’ and How Can Firms Move Beyond It?

-SMEs Face Rising Cyber Threats Amid AI and Training Concerns

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week, our cyber threat intelligence reports on new and evolving tactics of attackers and the devastating impact of attacks, as well as how organisations should act to improve their security including rehearsing how they will react when they experience an incident.

Recent reports highlight a surge in attacks whereby the attacker overwhelms their victim with emails and then contacts them on Teams posing as IT support to gain access to the victim’s systems. These attacks underscore the need for organisations to restrict external communications, limit remote access, and enhance employee awareness to prevent breaches. Furthermore, the growing use of artificial intelligence (AI) by cyber criminals has necessitated a focus on specialised expertise, with companies investing in both internal training and external cyber security support to counter AI-driven threats.

Behind the stories of attacks and data breaches, there are the real lives of individuals and organisations who suffer the heart-breaking catastrophic impact, including organisations that have closed or filled for insolvency. Studies indicate that the average cost of a breach is now nearly $5 million, while paying ransom demands often fails to recover data, leading to further losses. The increasing sophistication of phishing campaigns and deepfake technology is further complicating fraud detection and identity verification processes. To mitigate these risks, firms must adopt a proactive approach that includes robust incident response plans, enhanced employee training, and the adoption of zero-trust security frameworks.

Organisations must move beyond 'security theatre' by focusing on practical, risk-based strategies that address core vulnerabilities rather than relying on superficial measures. The rise in nation-state cyber espionage, misinformation, and AI-enabled threats highlights the importance of collaboration between public and private sectors to enhance resilience. As cyber security gains greater prominence at the boardroom level, business leaders must ensure they are equipped with the necessary knowledge and strategic vision to navigate this rapidly changing threat landscape effectively.

Top Cyber Stories of the Last Week

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing

Security experts have identified two ransomware groups using email bombing and Teams-based social engineering to gain remote access to corporate systems. Victims receive thousands of spam emails followed by a fraudulent Teams call from someone posing as IT support. The attackers then attempt to install remote access tools to steal data and extort organisations. At least 15 attacks have been observed in the past three months, with a significant increase recently. Businesses are advised to restrict external Teams calls, limit remote access tools, and enhance employee awareness to mitigate these evolving threats.

Cyber Security Breaches Are Increasing Business Insolvency Risks

Cyber attacks are increasingly pushing businesses into financial distress, with data breaches and ransomware incidents significantly raising operational costs and even leading to bankruptcy. A 2024 IBM study found that data breaches cost companies an average of $4.9 million globally, nearly doubling in the US. High-profile cases, such as Stoli Group and National Public Data, highlight the devastating impact, with disrupted operations and mounting legal expenses. Despite the rising risks, 75% of small US businesses remain underinsured for cyber events, underscoring the growing need for robust cyber insurance and proactive security measures to ensure business resilience.

Companies Seek Specialised Expertise to Combat Artificial Intelligence (AI) Cyber Threats

Kaspersky's latest study highlights growing concerns over AI-driven cyber attacks, with 92% of IT and security professionals expecting an escalation in such threats within the next two years. In response, organisations are prioritising cyber security expertise, with 94% focusing on internal training and 93% seeking external support from cyber security vendors. The report reveals that 61% of companies already utilise external expertise, while 62% have internal training programs in place, reflecting a dual approach to strengthening cyber defences across various sectors.

When Risk Becomes Habit: Employee Behaviour and Organisational Security

A recent report highlights that a small number of employees account for a disproportionate share of cyber security risks within organisations. Just 5% of users are responsible for 75% of detected security incidents, with 1% clicking on nearly half of phishing emails. While most employees engage in only one type of risky behaviour, a small group repeatedly commit multiple infractions. The study suggests that shielding high-risk roles, such as managers and executives, from frequent phishing attempts may be more effective than additional training, helping organisations better mitigate human-related cyber threats.

New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing

Researchers have identified a new malicious AI chatbot, GhostGPT, which is being sold on Telegram to assist cyber criminals with activities such as malware creation and phishing. Unlike earlier tools, GhostGPT offers easy access without the need to jailbreak existing AI models. Thousands of views on online forums highlight growing interest in such tools, which enable low-skilled attackers to launch sophisticated campaigns with ease. The chatbot is marketed for a range of criminal activities, including exploit development and business email compromise, with claims of anonymity and fast response times to aid efficiency.

Global Cyber Attacks Jumped 44% Last Year

Check Point Software’s latest report reveals a 44% rise in cyber attacks globally last year, driven by evolving nation-state tactics and the growing use of generative AI. Threat actors are shifting from short-term attacks to sustained campaigns aimed at undermining trust and stability. AI-driven disinformation targeted a third of global elections, while ransomware groups increasingly focus on data extortion over encryption. Healthcare saw a 47% surge in ransomware attacks, and compromised edge devices became key entry points. The report stresses the need for resilience, urging firms to enhance bring-your-own-device (BYOD) security, threat intelligence, and patch management.

Phishing Campaigns Became a Lot More Sinister in 2024

Phishing attacks surged by 202% in the second half of 2024, with some individuals receiving at least one sophisticated phishing attempt each week capable of bypassing security controls. The rise in advanced tactics, such as leveraging legitimate services to mask malicious intent, has made detection increasingly challenging. To counter these threats, organisations must focus on employee awareness, regular software updates, and adopting a zero-trust security approach to mitigate risks effectively.

CISOs Dramatically Increase Boardroom Influence but Many Still Lack Soft Skills

Splunk's latest research reveals that Chief Information Security Officers (CISOs) are gaining greater influence in the boardroom, with 82% now reporting directly to the CEO, up from 47% in 2023. However, board members highlight a need for improved business acumen, communication, and emotional intelligence among CISOs. Budget concerns persist, with only 29% of CISOs feeling adequately funded, while 64% reported that financial constraints led to a cyber attack. The report underscores the need for better alignment between CISOs and boards to position cyber security as a business enabler and drive digital resilience.

Bad News - Businesses Who Pay Ransomware Attackers Aren’t Very Likely to Get Their Data Back

A recent Hiscox study has revealed that paying ransomware demands rarely leads to full data recovery, with only 7% of businesses successfully retrieving all their data. 1 in 10 firms that paid still experienced data leaks. Beyond financial losses, ransomware attacks have a significant impact on reputation, with 47% of affected firms facing challenges in attracting new customers and 43% reporting customer losses. Additionally, 21% lost business partners due to reputational damage. With ransomware attacks becoming more frequent, a company’s response strategy is critical to minimising long-term harm and ensuring operational resilience.

Deepfakes Force a New Era in Fraud Detection, Identity Verification

Deepfake technology is posing a significant challenge for businesses globally, with nearly half affected by its growing sophistication. To combat this, organisations are enhancing their identity verification processes by incorporating liveness checks and strengthening biometric methods such as facial recognition and fingerprint scanning. However, traditional fraud methods, including fake IDs, remain prevalent. The industry is adapting to rising regulatory pressures and evolving workforce needs, with AI and machine learning playing an increasing role in fraud prevention. Moving forward, businesses must strike a balance between robust security measures and user-friendly solutions to meet compliance demands and customer expectations.

Misinformation Is No. 1 Global Risk, Cyber Espionage in Top 5

The World Economic Forum's Global Risks Report 2025 highlights misinformation and disinformation as the top global risk over the next two years, driven by the rise of generative AI and geopolitical tensions. Cyber espionage ranks fifth, with one in three CEOs citing it as a major concern. Despite growing threats, cyber resilience remains inadequate, particularly among small and mid-sized firms, with 35% feeling underprepared. Larger organisations face challenges with supply chain vulnerabilities, while AI presents both opportunities and risks, with 47% of firms concerned about its misuse. Public-private partnerships are crucial to enhancing cyber resilience and regulatory alignment.

Educate, Prepare, and Mitigate: The Keys to Unlocking Cyber Resilience

Recent cyber incidents have highlighted the real-world impact of poor cyber security, affecting healthcare services and retail supply chains, eroding public trust, and damaging brand reputations. With threats increasing year over year, organisations must focus on education, preparation, and mitigation to enhance resilience. Employee training, regular risk assessments, and penetration testing are crucial to identifying and addressing vulnerabilities. Additionally, having a robust incident response plan and business continuity plan, regularly tested and updated, ensures operational resilience and safeguards customer trust in the face of potential cyber attacks.

What is ‘Security Theatre’ and How Can Firms Move Beyond It?

Many organisations are trapped in ‘security theatre,’ relying on an increasing number of alerts and tools that create an illusion of protection rather than addressing the root causes of cyber threats. In 2024 alone, over 1 billion individuals were impacted by data breaches, a 409% rise from the previous year. Despite rising investments in cyber security, human error remains the primary attack vector, with 99% of identity attacks targeting passwords. To move beyond performative security, organisations must focus on reducing the attack surface by eliminating static credentials and minimising standing privileges.

SMEs Face Rising Cyber Threats Amid AI and Training Concerns

Sharp Europe’s latest study highlights the growing cyber security risks facing European SMEs, with 84% of employees now more concerned than a year ago. AI-driven threats are a major worry, with 43% citing AI as a key factor in their unease, while 72% lack confidence in identifying cyber threats. 41% of SME workers have not received cyber security training in the past two years. With over half of SMEs fearing they could go out of business within a week of a major incident, the report underscores the urgent need for improved training and proactive cyber security measures.

Sources:

https://www.infosecurity-magazine.com/news/ransomware-email-bombing-teams/

https://news.bloomberglaw.com/privacy-and-data-security/cybersecurity-breaches-are-increasing-business-insolvency-risks

https://www.satelliteevolution.com/post/companies-seek-specialised-expertise-to-combat-artificial-intelligence-ai-cyber-threats

https://www.mimecast.com/blog/when-risk-becomes-habit-employee-behavior-and-organizational-security/

https://www.infosecurity-magazine.com/news/ghostgpt-ai-chatbot-malware/

https://www.itpro.com/security/cyber-attacks/global-cyber-attacks-jumped-44-percent-last-year

https://hackernoon.com/phishing-campaigns-became-a-lot-more-sinister-in-2024

https://www.infosecurity-magazine.com/news/cisos-increase-boardroom-influence/

https://www.techradar.com/pro/security/only-1-in-10-who-pay-ransomware-attackers-actually-retrieve-their-data

https://www.helpnetsecurity.com/2025/01/24/identity-fraud-rise/

https://www.govinfosecurity.com/misinformation-no-1-global-risk-cyberespionage-in-top-5-a-27358

https://informationsecuritybuzz.com/the-keys-to-unlocking-cyber-resilience/

https://cyberscoop.com/security-theater-cybersecurity-tooling-ev-kontsevoy-op-ed/

https://www.therecycler.com/posts/smes-face-rising-cyber-threats-amid-ai-and-training-concerns/


Governance, Risk and Compliance

Many firms see cyber attacks as their top business concern this year | TechRadar

Experts fire security warning as EU’s DORA comes into play

DORA Takes Effect: Financial Firms Navigating Compliance Headwinds - Infosecurity Magazine

Cyber disruptions remain top business risk concern in US, globally | CIO Dive

The WEF forecasts a rocky year ahead in cyber security - Verdict

When risk becomes habit Employee behaviour and organisational security | Mimecast

Why CISOs Must Think Clearly Amid Regulatory Chaos

The CFO may be the CISO’s most important business ally | CSO Online

Global cyber attacks jumped 44% last year | ITPro

Security chiefs whose companies operate in the EU should be exploring DORA now | CSO Online

Cyber security Breaches Are Increasing Business Insolvency Risks

Educate, Prepare, & Mitigate: The Keys To Unlocking Cyber Resilience

What is ‘security theatre’ and how can we move beyond it? | CyberScoop

Security Need to Start Saying 'No' Again

CISOs Dramatically Increase Boardroom Influence but Still Lack Soft Sk - Infosecurity Magazine

CISOs are juggling security, responsibility, and burnout - Help Net Security

Splunk Report: CISOs Gain Influence in the C-Suite and Boardrooms Worldwide

Nearly half of CISOs now report to CEOs, showing their rising influence - Help Net Security

Businesses prepare to update their cyber security playbooks for Trump era amid increasing threats | Fortune

SMEs face rising cyber threats amid AI and training concerns - The Recycler - 20/01/2025

JPMorgan’s CISO on Overcoming Surging Threats and Regulatory Hurdles - Infosecurity Magazine

Cyber security is tough: 4 steps leaders can take now to reduce team burnout | CSO Online

The UK's cyber security landscape: Key trends and challenges for 2025

CISO Top 10 Priorities for Q1 2025: Key Findings and Evolving Focus | SC Media

Top Priorities for Cyber Security Leaders in 2025: Info-Tech Research Group Publishes Annual Report


Threats

Ransomware, Extortion and Destructive Attacks

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing - Infosecurity Magazine

Ransomware gangs pose as IT support in Microsoft Teams phishing attacks

Ransomware Attacks Surge to Record High in December 2024 - Infosecurity Magazine

Microsoft services exploited in separate ransomware campaigns | SC Media

Bad news - businesses who pay ransomware attackers aren’t very likely to get their data back | TechRadar

Record Number of Ransomware Attacks in December 2024 - SecurityWeek

Suspected AI-Powered Python Backdoor Tapped for RansomHub Deployment | MSSP Alert

HP Wolf Security Threat Intelligence: AI-Fueled Cyber Attackers - The Futurum Group

FBI: North Korean IT workers steal source code to extort employers

Russian couple on trial for large-scale ransomware attacks

35 years on: The history and evolution of ransomware | TechRadar

The impact of the cyber insurance industry in resilience against ransomware | TechRadar

Medusa Ransomware: What You Need To Know | Tripwire

A floppy disk launched world's first ransomware attack 35 years ago | TechSpot

New Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detection

Next Steps for the International Counter Ransomware Initiative

Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

Ransomware Victims

Ransomware costs at NHS provider Synnovis far outstrip profits

59 organisations reportedly victim to breaches caused by Cleo software bug | TechRadar

PowerSchool hackers have your kid's info. These 3 steps protect them | PCWorld

Ransomware attack forces Brit high school to shut doors • The Register

Phishing & Email Based Attacks

Ransomware Groups Abuse Microsoft Services for Initial Access - SecurityWeek

Microsoft Teams abused in Russian email bombing ransomware campaign | TechRadar

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing - Infosecurity Magazine

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Ransomware gangs pose as IT support in Microsoft Teams phishing attacks

New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing - Infosecurity Magazine

Phishing Campaigns Became a Lot More Sinister in 2024 | HackerNoon

Phishing Risks Rise as Zendesk Subdomains Facilitate Attacks - Infosecurity Magazine

When risk becomes habit Employee behaviour and organisational security | Mimecast

Tycoon 2FA Phishing Kit Upgraded to Bypass Security Measures - Infosecurity Magazine

Phishing Attacks Are Top Security Issue for Consumers

Account Compromise and Phishing Top Healthcare Security Incidents - Infosecurity Magazine

Other Social Engineering

Microsoft Teams abused in Russian email bombing ransomware campaign | TechRadar

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing - Infosecurity Magazine

FBI: North Korean IT workers steal source code to extort employers

Scam Yourself attacks: How social engineering is evolving - Help Net Security

Hundreds of fake Reddit sites push Lumma Stealer malware

Artificial Intelligence

Why the 'Bring Your Own AI' trend could mean big trouble for business leaders | ZDNET

Employees Enter Sensitive Data Into GenAI Prompts Too Often

New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing - Infosecurity Magazine

HP Wolf Security Threat Intelligence: AI-Fueled Cyber Attackers - The Futurum Group

Companies seek specialised expertise to combat Artificial Intelligence (AI) cyber threats

Suspected AI-Powered Python Backdoor Tapped for RansomHub Deployment | MSSP Alert

Invisible Prompt Injection: A Threat to AI Security | Trend Micro (US)

The Security Risk of Rampant Shadow AI

Deepfakes force a new era in fraud detection, identity verification - Help Net Security

CISA releases AI cyber security playbook

World Economic Forum Provides Guidance on AI Use | SC Media UK

One in ten GenAI prompts puts sensitive data at risk - Help Net Security

SMEs face rising cyber threats amid AI and training concerns - The Recycler - 20/01/2025

Trump Overturns Biden Rules on AI Development, Security

Misinformation Is No. 1 Global Risk, Cyberespionage in Top 5

UK Ministry of Defence enlists sci-fi writers to prepare for dystopian futures | Ministry of Defence | The Guardian

Sage Copilot grounded briefly to fix AI misbehaviour • The Register

2FA/MFA

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Sneaky 2FA Kit Exposes Vulnerabilities In 2FA Security

Microsoft to Mandate MFA for Accessing Microsoft 365 Admin Center

Malware

New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing - Infosecurity Magazine

Suspected AI-Powered Python Backdoor Tapped for RansomHub Deployment | MSSP Alert

Fake Homebrew Google ads target Mac users with malware

Enterprise Juniper Routers Tagged with 'Magic' Backdoor

Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure

Hundreds of fake Reddit sites push Lumma Stealer malware

Telegram captcha tricks you into running malicious PowerShell scripts

Chinese Hackers Hijack VPN's Website to Spread Malware

Bots/Botnets

Botnet Unleashes Record-Breaking 5.6Tbps DDoS Attack

Mirai Botnet Spinoffs Unleash Global DDoS Attack Wave

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

Mobile

Mobile Cyber Security Trends for 2025: Key Predictions and Preparations - Security Boulevard

New Porn Ban Threat—Millions Of iPhone, iPad, Android Users Now At Risk

Novel Android Malware Leveraged By DoNot Team | MSSP Alert

Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

WhatsApp Security Alert—Broken Link Hackers Strike

Phishing Attacks Are Top Security Issue for Consumers

Denial of Service/DoS/DDoS

Botnet Unleashes Record-Breaking 5.6Tbps DDoS Attack

Cloudflare blocks 21.3 million DDoS attacks in 2024, reports record 53% surge

Standing strong against hyper-volumetric DDoS attacks | TechRadar

Critical Vulnerability In ChatGPT API Enables Reflective DDoS Attacks

Several Swiss municipalities and banks hit by cyber attack - SWI swissinfo.ch

Spooks of the internet came alive this Halloween | CSO Online

Who is DDoSing you? Competitors, most likely • The Register

How to Stop Layer 7 DDoS Attacks in 2025 - Security Boulevard

The Internet is (once again) awash with IoT botnets delivering record DDoSes

Internet of Things – IoT

Mirai Botnet Spinoffs Unleash Global DDoS Attack Wave

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

Home exercise companies like Peloton, NordicTrack harvest your sensitive data, watchdog finds - WTOP News

The Internet is (once again) awash with IoT botnets delivering record DDoSes

FTC orders GM to stop collecting and selling driver’s data

Experts found multiple flaws in Mercedes-Benz infotainment system

Subaru’s poor security left troves of vehicle data easily accessible

Data Breaches/Leaks

Otelier data breach exposes info, hotel reservations of millions

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants | WIRED

Major Cyber Security Vendors’ Credentials Found on Dark Web - Infosecurity Magazine

Fortinet: FortiGate config leaks are genuine but misleading • The Register

Wolf Haldenstein Data Breach Impacts 3.4 Million People - SecurityWeek

HPE’s sensitive data exposed in alleged IntelBroker hack | CSO Online

PowerSchool hacker claims they stole data of 62 million students

Organised Crime & Criminal Actors

New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing - Infosecurity Magazine

US President Donald Trump granted a "full and unconditional pardon" to Ross Ulbricht

Telegram boss Pavel Durov admits 'seriousness' of French allegations

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

"Crazy Evil" Cryptoscam Gang: Unmasking a Global Threat in 2024

Insider Risk and Insider Threats

When risk becomes habit Employee behaviour and organisational security | Mimecast

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files - Infosecurity Magazine

When risky cyber security behaviour becomes a habit among employees - Help Net Security

Insurance

The impact of the cyber insurance industry in resilience against ransomware | TechRadar

Report highlights urgent need for cyber insurance | Insurance Business America

Supply Chain and Third Parties

Supply chain attack strikes array of Chrome Extensions • The Register

The critical need for watertight security across the IT supply chain | TechRadar

Biden order gives CISA software supply chain 'teeth' | TechTarget

Cloud/SaaS

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing - Infosecurity Magazine

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Ransomware gangs pose as IT support in Microsoft Teams phishing attacks

Why some companies are backing away from the public cloud | ZDNET

Fortinet's 2025 State Of Cloud Security: Insights On Multi-Cloud Adoption, Security Challenges, And Future Trends

Cloud challenges | Professional Security Magazine

Staying Ahead: Key Cloud-Native Security Practices - Security Boulevard

Outages

Bitbucket services “hard down” due to major worldwide outage

Identity and Access Management

How Secure Is Your PAM Strategy? - Security Boulevard

Will 2025 See a Rise of NHI Attacks?

Linux and Open Source

Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure

Passwords, Credential Stuffing & Brute Force Attacks

Major Cyber Security Vendors’ Credentials Found on Dark Web - Infosecurity Magazine

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

Social Media

Has the TikTok Ban Already Backfired on US Cyber Security?

TikTok among six tech firms under fire for sending Europeans' personal data to China | TechRadar

Hundreds of fake Reddit sites push Lumma Stealer malware

Trump dismisses concerns over TikTok's potential security risks

TikTok Restores Service for US Users Based on Trump's Promised Executive Order - SecurityWeek

Meta confirms it will keep fact-checkers outside the US 'for now' | TechCrunch

TikTok users posting cat videos do not threaten UK national security, minister says | TikTok | The Guardian

Meta's pay-or-consent model criticized by EU consumer groups • The Register

Donald Trump’s bigger China cyber threat isn’t TikTok

Malvertising

Fake Homebrew Google ads target Mac users with malware

Understanding and avoiding malvertizing attacks | TechRadar

Training, Education and Awareness

Companies seek specialised expertise to combat Artificial Intelligence (AI) cyber threats

Outside Expertise or In House Training? Kaspersky Reveals How Firms Prepare for Growing AI Threat | The Fintech Times

Educate, Prepare, & Mitigate: The Keys To Unlocking Cyber Resilience

SMEs face rising cyber threats amid AI and training concerns - The Recycler - 20/01/2025

Regulations, Fines and Legislation

Experts fire security warning as EU’s DORA comes into play

DORA Takes Effect: Financial Firms Navigating Compliance Headwinds - Infosecurity Magazine

Security chiefs whose companies operate in the EU should be exploring DORA now | CSO Online

GDPR Fines Total €1.2bn in 2024 - Infosecurity Magazine

Why CISOs Must Think Clearly Amid Regulatory Chaos

EU’s DORA could further strain cyber security skills gap | CSO Online

Executive Order 14144 on Cyber Security: Building on 2021's Foundation with Advanced NHI Security - Security Boulevard

Trump axes TSA chief who led pipeline, airline, rail cyber security rules | SC Media

Government battles against tech could leave consumers less secure | CyberScoop

Biden's Cyber Security EO Leaves Trump a Comprehensive Blueprint for Defence

CISA should abandon disinformation fight, Trump’s DHS pick says - Defense One

TikTok among six tech firms under fire for sending Europeans' personal data to China | TechRadar

TikTok Restores Service for US Users Based on Trump's Promised Executive Order - SecurityWeek

Trump Overturns Biden Rules on AI Development, Security

Trump’s disbanding of Cyber Safety Review Board draws ire | SC Media

Under Trump, US Cyber Defence Loses Its Head | WIRED

Trump Has Had a Light Touch on Cyber Security – So Far - Security Boulevard

Trump has fired a major cyber security investigations body. It’s a risky move

PayPal fined by New York for cyber security failures | Reuters

Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones - Security Boulevard

Donald Trump’s bigger China cyber threat isn’t TikTok

Models, Frameworks and Standards

Experts fire security warning as EU’s DORA comes into play

DORA Takes Effect: Financial Firms Navigating Compliance Headwinds - Infosecurity Magazine

Security chiefs whose companies operate in the EU should be exploring DORA now | CSO Online

EU’s DORA could further strain cyber security skills gap | CSO Online

MITRE Launches D3FEND 1.0 to Standardize Cyber Security Techniques

GDPR Fines Total €1.2bn in 2024 - Infosecurity Magazine

EU Strengthens Cyber Security with Enhanced NIS2 Directive | MSSP Alert

76% of Irish businesses will struggle to meet NIS2 requirements

OWASP Top 10 2025 - Most Critical Weaknesses Exploited/Discovered in Smart Contract

Cyber Essentials NHS and Healthcare Organisations - Security Boulevard

Irish companies 'a mixed bag' on new cyber attack laws

Backup and Recovery

Acronis CISO on why backup strategies fail and how to make them resilient - Help Net Security

Data Protection

GDPR Fines Total €1.2bn in 2024 - Infosecurity Magazine

Privacy professionals feel more stressed than ever - Help Net Security

Careers, Working in Cyber and Information Security

EU’s DORA could further strain cyber security skills gap | CSO Online

Law Enforcement Action and Take Downs

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files - Infosecurity Magazine

Telegram boss Pavel Durov admits 'seriousness' of French allegations

Washington Man Admits to Role in Multiple Cyber Crime, Fraud Schemes - SecurityWeek

Russian couple on trial for large-scale ransomware attacks

Misinformation, Disinformation and Propaganda

Misinformation Is No. 1 Global Risk, Cyberespionage in Top 5

Meta confirms it will keep fact-checkers outside the US 'for now' | TechCrunch

CISA should abandon disinformation fight, Trump’s DHS pick says - Defense One

Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones - Security Boulevard


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Misinformation Is No. 1 Global Risk, Cyberespionage in Top 5

Understanding Cyber Effects in Modern Warfare - War on the Rocks

Taking the fight to the enemy: Cyber persistence strategy gains momentum

Let’s get creative to protect undersea cables from sabotage – POLITICO

Nation State Actors

Businesses prepare to update their cyber security playbooks for Trump era amid increasing threats | Fortune

Are attackers already embedded in US critical infrastructure networks?

China

Nato flotilla assembles off Estonia to protect undersea cables in Baltic Sea | Nato | The Guardian

ProxyLogon, one of Salt Typhoon's favorites, still wide open • The Register

FCC says US telcos by law must secure networks from spies • The Register

US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches | WIRED

Treasury Breach by Chinese Sponsored Hackers Focused on Sanctions, Report Says - Bloomberg

Trump Fires DHS Board Probing Salt Typhoon Hacks

Trump dismisses concerns over TikTok's potential security risks

Trump ‘waved a white flag to Chinese hackers,’ senator says • The Register

Chinese Hackers Hijack VPN's Website to Spread Malware

How Taiwan Balances Cyber Security With Human Rights in Resisting China – The Diplomat

TikTok among six tech firms under fire for sending Europeans' personal data to China | TechRadar

TikTok Restores Service for US Users Based on Trump's Promised Executive Order - SecurityWeek

New Chinese cyberespionage campaign targeted South Korean VPN service | SC Media

US Supreme Court Gives Green Light to TikTok Ban - Infosecurity Magazine

TikTok Says It Will 'Go Dark' Unless It Gets Clarity From Biden Following Supreme Court Ruling - SecurityWeek

Has the TikTok Ban Already Backfired on US Cyber Security?

Trump Faces Unique Challenges Due to Chinese Hackers | Newsmax.com

TikTok users posting cat videos do not threaten UK national security, minister says | TikTok | The Guardian

Trump has fired a major cyber security investigations body. It’s a risky move

Donald Trump’s bigger China cyber threat isn’t TikTok

Hackers game out infowar against China with the US Navy • The Register

Russia

Russian Ransomware Groups Deploy Email Bombing and Teams Vishing - Infosecurity Magazine

Microsoft Teams abused in Russian email bombing ransomware campaign | TechRadar

Nato flotilla assembles off Estonia to protect undersea cables in Baltic Sea | Nato | The Guardian

Shutting down the net: The growing threat of Russian internet censorship · Global Voices

Russian Hackers Target WhatsApp Accounts, Microsoft | Silicon UK

Several Swiss municipalities and banks hit by cyber attack - SWI swissinfo.ch

Increased cyber security cooperation forged by Russia, Iran | SC Media

CERT-UA warns against "security audit" requests via AnyDesk - Help Net Security

Ukraine's State Registers Restored Following Cyber Attack - Infosecurity Magazine

Massive Russian hack on government database shows cracks in Ukraine's digitalization drive

Russian APT Phishes Kazakh Gov't for Strategic Intel

Russian telecom giant Rostelecom investigates suspected cyber attack on contractor | The Record from Recorded Future News

Iran

Increased cyber security cooperation forged by Russia, Iran | SC Media

North Korea

FBI: North Korean IT workers steal source code to extort employers

The hacker state: How North Korea weaponised internet - India Today


Tools and Controls

An estimated 46,000 VPN servers are vulnerable to being hijacked | Tom's Guide

Educate, Prepare, & Mitigate: The Keys To Unlocking Cyber Resilience

Companies seek specialised expertise to combat Artificial Intelligence (AI) cyber threats

Unsecured Tunnelling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

Outside Expertise or In House Training? Kaspersky Reveals How Firms Prepare for Growing AI Threat | The Fintech Times

Deepfakes force a new era in fraud detection, identity verification - Help Net Security

How Secure Is Your PAM Strategy? - Security Boulevard

Chinese Hackers Hijack VPN's Website to Spread Malware

How Can Generative AI be Used in Cyber Security - Security Boulevard

SDLC Gap Analysis: Requirement For Organisation - Security Boulevard

Fortinet's 2025 State Of Cloud Security: Insights On Multi-Cloud Adoption, Security Challenges, And Future Trends

Using your own laptop or phone for work? Why it’s a security hazard for businesses

Cyber Insights 2025: Attack Surface Management - SecurityWeek

Cyber Insights 2025: APIs – The Threat Continues - SecurityWeek

Acronis CISO on why backup strategies fail and how to make them resilient - Help Net Security

CISA releases AI cyber security playbook

SMEs face rising cyber threats amid AI and training concerns - The Recycler - 20/01/2025

Will 2025 See a Rise of NHI Attacks?

Staying Ahead: Key Cloud-Native Security Practices - Security Boulevard

2025 Prediction 1: The Rise In Physical Threats To Corporate Executives Will Continue In 2025 - Security Boulevard

Microsoft to Mandate MFA for Accessing Microsoft 365 Admin Center

Think like an attacker: Increase attack surface visibility with integrated exposure management | SC Media

AI-driven insights transform security preparedness and recovery - Help Net Security



Vulnerability Management

Exploits on the rise: How defenders can combat sophisticated threat actors | TechRadar

Microsoft: Exchange 2016 and 2019 reach end of support in October

How to Perform a Website Security Scan: A Vulnerabilities Guide

Vulnerabilities

SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

Microsoft Outlook has a new ‘critical’ flaw that spreads malware easily | Digital Trends

A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks

Unsecured Tunnelling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

Critical Vulnerability In ChatGPT API Enables Reflective DDoS Attacks

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

7-Zip bug could allow a bypass of a Windows security feature. Update now | Malwarebytes

Cisco addresses a critical privilege escalation bug in Meeting Management

FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know - SecurityWeek

Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw - Help Net Security

Six vulnerabilities in rsync announced and fixed in a day • The Register

50K Fortinet firewalls still vulnerable to latest zero-day • The Register

Yubico Issues Security Advisory As 2FA Bypass Vulnerability Confirmed

CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List

QNAP fixes six Rsync vulnerabilities in NAS backup, recovery app

Asus lets chip fix slip out early, AMD says patch is inbound • The Register


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3

Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Read More