Black Arrow Cyber Threat Briefing 02 December 2022
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Businesses Increasing Cyber Spend Without Clear Strategy, Study Finds
Most businesses worldwide claim to be confident that their current cyber security budgets are fit for their needs, but at the same time would be willing to spend more, according to research by the cloud platform provider Fastly.
While 71% of businesses highlighted their confidence in their currently budgets, 73% of the same businesses are willing to increase their budget. In the US specifically, over 85% of IT leaders considered their current budget to be adequate, but 79% are still thinking of increasing it.
This cyber spending paradox has been highlighted in Fastly’s latest study ‘Fighting fire with fire’ published on November 30, 2022.
One explanation is that IT leaders fear lagging the evolving cyber threat landscape and put their trust in technology to help them catch up and prepare for future cyber security risks.
“Overwhelmed and overworked, IT leaders are putting their faith in an abundance of tools and technologies and hoping for their best,” reads the report.
The reality, though, is that the majority of organisations are increasing spending with no clear strategy. Spending more money doesn’t necessarily equate to a safer business. Instead, it can create the illusion of security, and ironically put the businesses at even greater risk down the line when their security tools don’t work.
https://www.infosecurity-magazine.com/news/businesses-cyber-spend-no-strategy/
Cyber Security and ESG Among Top Areas of Concern for Audit Leaders in 2023
In an effort to understand key factors and concerns impacting Internal Audit executives, ManpowerGroup announced this week results from its sixth annual Internal Audit Priorities survey. While cyber security continues as the number one risk, Environmental, Social, and Governance (ESG) jumped up to number two on the list of emerging risks.
“Cyber security remains the top concern for many executives, who are seeing their audit teams expand their coverage of Information Technology Governance. But this year's survey also reveals the growing importance of ESG as more organisations are increasing their commitment to developing comprehensive ESG strategies in 2023 and beyond" said Manpower.
Many Internal Audit leaders expressed concern about Internal Audit Departments struggling to keep fully staffed, amid the ongoing pandemic and shifts in how and where auditors work. The survey shows 53% are working hybrid and 25% are fully remote.
Today's Chief Audit Executives are faced with balancing constrained audit resources with the consistent pressure to expand audit coverage within their organisations. Companies are experiencing a 100% increase, year-over-year, in audit departments deferring audits because resources aren't available. Due to the current state of the job market, many Internal Audit Departments have not been fully staffed over the past 12-18 months according to Jefferson Wells, part of Manpower.
KEY FINDINGS
The top five areas for Audit Committees are Data privacy and cyber security (43%), Emerging risks and impacts on major initiatives (37%), Strategic risk (33%), ESG (31%), and Employee retention (29%).
With the growing importance of ESG, 71% of Chief Audit Executives (CAE) are including an assessment of ESG in their audit plans.
As ransomware and other attacks have exponentially increased in both frequency and ferocity, Internal Audit departments are now shifting more attention to preventative, strategic methods of cyber defence.
As operational involvement increases, internal audit leaders are looking for other ways to enhance their audit function. Two areas with the highest return on investment are data analytics (52%) and other internal audit specific technologies (48%).
Ransomware Warning! Expect Hackers to Hit Harder During Holiday Season
Organisations should prepare for an onslaught of ransomware during the holidays as cyber crews take advantage of lower security staffing levels and subpar defences, security provider Cybereason said in a new study.
Ransomware attacks that take place on weekends and holidays hit organisations when they are most vulnerable, resulting in longer investigation times and causing greater damage, according to Cybereason’s global study of 1,200 cyber security professionals “Organisations at Risk 2022: Ransomware Attackers Don’t Take Holidays”.
It’s not just weekends and holidays where short staffing paves the way for hackers. Traditional Monday through Friday staffing models are out of step with cyber threats and expose companies the rest of the week, the report said.
Here are some key findings:
More than one-third of respondents who experienced a ransomware attack on a weekend or holiday said their organisations lost more money as a result, a 19% increase over 2021.
The numbers ticked up to 42% in the education sector and 48% in the travel and transportation industry.
Ransomware attacks make up nearly half (49%) of all security incidents that security operations centre (SOC) teams are most frequently trying to resolve.
Four-in-ten (44%) of respondents indicated they reduce security staff by as much as 70% on weekends and holidays.
One-fifth (21%) noted that their organisations operate a skeleton crew during those times, cutting staff by as much as 90%.
7% of respondents indicated they were 80% to 100% staffed on weekends and holidays.
2023 To Be Costliest, Most Destructive Year for Cyber Security as Recession Fears Force Firms to Cut Budgets
2023 is predicted to be one of the costliest and most destructive years for cyber security, with hackers upping their games in view of companies rethinking their cyber security budgets in anticipation of looming recession and ransomware gangs targeting supply chain firms for mounting focused attacks to extract optimum rewards, a latest report said.
New strains such as fileless malwares not requiring downloads, hackers crafting new modus operandi to exploit vulnerabilities in cloud security, and mounting targeted attacks on individuals will be among the potent cyber crime trends in the coming year, 2023, said the report by NordLocker, the leading global VPN (virtual private network) service provider.
The proposed European Union (EU) move to make digital platforms to scan all files and messages, impacting internet security and privacy, is the other major cyber threat to watch out for in 2023.
“From new strains of potent malware to major policies that threaten privacy and encryption, 2023 could expect several new and more damaging cyber security threats,” the report cautioned.
Cyber attacks, rated among the top five risks globally, are projected to cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015, according to some of the research and industry bodies. Besides financial losses, hacking also leads to major loss of productivity, reputation damage, legal liabilities for companies and organisations.
Cyber security never stops evolving because digital technologies are increasingly overtaking each part of our lives. This ever-changing nature of the cyber security field makes each week, month, and year different from those that have passed, making it extremely important to stay two steps ahead of emerging threats.
Cloud security will become most important in the coming year, with companies increasingly moving their data into the cloud instead of storing files locally on their computer. We will see a growing number of cyber attacks that exploit vulnerabilities in current solutions in cloud computing.
The report also cautioned that reduced cyber security spending will expose vulnerabilities, leading to increased hacking and cyber thefts.
Cyber Crime Expected to Skyrocket in Coming Years
According to estimates from Statista’s “Cybersecurity Outlook”, the global cost of cyber crime is expected to surge in the next five years, rising from $8.44 trillion in 2022 to $23.84 trillion by 2027. Cyber crime is defined by Cyber Crime Magazine as the “damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.”
As more and more people turn online, whether for work or their personal lives, there are more potential opportunities for cyber criminals to exploit. At the same time, attacker techniques are becoming more advanced, with more tools available to help scammers. The coronavirus pandemic saw a particular shift in cyber attacks, as Statista’s Outlook analysts explain: “The COVID-19 crisis led to many organisations facing more cyber attacks due to the security vulnerability of remote work as well as the shift to virtualised IT environments, such as the infrastructure, data, and network of cloud computing.”
https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/
UK Introducing Mandatory Cyber Incident Reporting for Managed Service Providers
The British government is introducing a new mandatory reporting obligation on managed service providers (MSPs) to disclose cyber incidents, alongside minimum security requirements which could see MSPs fined up to £17 million ($20 million) for non-compliance.
The government said on Wednesday that MSPs “play a central role in supporting the UK economy” and warned they are “an attractive and high value target for malicious threat actors, and can be used as staging points through which threat actors can compromise the clients of those managed services.” MSPs are paid to manage IT infrastructure and provide support, often to smaller businesses that don’t have a designated IT department.
Financially-motivated ransomware attacks have impacted MSPs such as Kaseya in the United States and the NHS supplier Advanced in Britain, with the latter severely impacting patient care according to BBC News.
Recent reports detailed how the ransomware incident affecting the software provider Advanced prompted the government to hold several Cabinet Office Briefing Rooms (COBR) crisis management meetings.
State-sponsored actors have also targeted MSPs, according to the National Cyber Security Centre (NCSC), which in 2018 attributed a global espionage campaign known as “Cloud Hopper” to the Chinese Ministry of State Security.
The new obligations on these providers will be introduced through an update to the Network and Information Systems (NIS) Regulations which in their current form require essential services such as water, energy and transport to uphold security standards and notify national authorities about incidents.
CISOs’ Priorities for The Coming Year
BlueFort Security surveyed 600 CISOs from a variety of UK organisations and found most have moved beyond the challenges of widespread shift to remote working – which resulted in severely limited visibility, intelligence and control – and are now focused on digital transformation and migration to the cloud, despite a chaotic world and bleak economic environment.
88% of CISOs say cyber security has become more of a priority for their Board over the last 12 months. And while 37% of CISOs still have their cyber security budget defined as a subset of their organisation’s general IT budget, 58% of CISOs expect world events to cause an increase in their cyber security budget over the next budget cycle.
CISOs are looking to the future. When asked about the areas their departments are prioritising their time and budget, CISOs said they are accelerating digital transformation (47%) and ensuring cyber security protection is fit for purpose for the future (46%).
Enabling cloud transformation is now a key focus area for UK security leadership. With 57% of organisations using multiple clouds and 37% using a single cloud environment, CISOs now have a clear focus – secure the cloud and secure the (primarily cloud-based) applications. However, while progress has been made in securing these environments, 52% of CISOs are confident they are able to fully enforce a consistent security policy across all applications in the cloud. 42% can only partially enforce cloud application security policies, while 5% are unable to at all.
This challenge is likely to remain front and centre for CISOs over the next 12 months as their organisations continue along their digital transformation journeys, with 52% stating they will be moving applications to the public cloud, migrating apps from one cloud to another and replacing legacy systems with SaaS applications. And, while 62% of CISOs say their organisation is using a cloud security posture management tool, 52% are manually standardising and enforcing security policies in their public cloud environments for each application.
https://www.helpnetsecurity.com/2022/11/30/cisos-cloud-transformation/
The Evolution of Business Email Compromise
In 2012, the US Federal Bureau of Investigation (FBI) began investigating an influx of reported fraud incidents involving threat actors rerouting payments to attacker-controlled accounts. In these incidents, victims received seemingly legitimate emails containing requests to alter scheduled payments. The threat actors typically impersonated executives or finance and payroll personnel and convinced victims to reroute payments to a different bank account. These first instances of business email compromise (BEC) kicked off a decade of attacks that use this simple yet highly effective scheme. While the threat has evolved, threat actors continue to use phishing attacks to steal credentials and then send fraudulent invoices soliciting payment. Thousands of organisations have lost billions of dollars.
When BEC was first discovered, law enforcement referred to it as "man in the email" fraud. Because much of the money at the time was sent to China, Japan, and South Korea, law enforcement believed that the threat actors could be Asia-based organised crime groups. Multiple investigations confirmed that these schemes were connected and that the money eventually ended up with threat actors located in Nigeria.
BEC fraud emerged from Nigerian organised crime groups that conducted operations such as romance scams, advance-fee schemes (also known as "Nigerian prince" or "419" scams), and elder fraud. The low barrier to entry and potential for high payouts attracted more threat groups. Because the technical aspects of these schemes are relatively simple, threat actors with little to no technical capabilities could launch successful attacks.
By 2014, cooperation between law enforcement and financial institutions revealed a clearer understanding of BEC schemes. As BEC tactics, techniques, and procedures (TTPs) matured, the financial losses and number of impacted organisations increased. In 2014, the US Internet Crime Complaint Center (IC3) received 2,417 BEC complaints, with losses totaling $226 million. The numbers grew steadily until a decrease in reported incidents in 2020. However, that decline was likely due to the COVID-19 pandemic disrupting normal business processes. Momentum resumed in 2021, with 19,954 complaints and adjusted losses of almost $2.4 billion.
https://www.darkreading.com/endpoint/the-evolution-of-business-email-compromise
Web App and API Attacks Surge 257% in Financial Services
The volume of web application and API attacks detected over the past 12 months surged by 3.5 times year-on-year in the financial services sector, the highest of any vertical, according to the cloud security vendor Akamai.
Akamai’s latest State of the Internet report, Enemy at the Gates, is based on analysis of global customer traffic during the period October 01 2021 to September 26 2022 .
The growth in threats targeting web apps and APIs is reflective of the increasing investment financial institutions are putting into digital services, as a result of open banking mandates like Europe’s PSD2, the report claimed. While these technologies help to open banking services up to third party providers and create a more streamlined experience for customers, they also expand the corporate attack surface.
Overall, banking is the third-most attacked vertical when it comes to web apps and APIs, with 15% of the total accounted for by these threats. “Security is a tough challenge when building them. Vulnerabilities residing in these web applications could lead to remote code execution (RCE) and breaches. Second, web applications have the ability to capture and store confidential customer information (i.e., login credentials),” the report explained.
“Once attackers launch web applications attacks successfully, they could steal confidential data, and in more severe cases, gain initial access to a network and obtain more credentials that could allow them to move laterally. Aside from the implications of a breach, stolen information could be peddled in the underground or used for other attacks. This is highly concerning given the troves of data, such as personal identifiable information and account details, held by the financial services vertical.”
https://www.infosecurity-magazine.com/news/web-app-api-attacks-257-financial/
Australia Will Now Fine Firms Up To AU$50 Million for Data Breaches
The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million for companies and data controllers who suffered large-scale data breaches.
The financial penalty introduced by the new bill is set to whichever is greater:
AU$50 million
Three times the value of any benefit obtained through the misuse of information
30% of a company's adjusted turnover in the relevant period
Previously, the penalty for severe data exposures was AU$2.22 million, considered wholly inadequate to incentivise companies to improve their data security mechanisms.
The new bill comes in response to a series of recent cyber attacks against Australian companies, including ransomware and network breaches, resulting in the exposure of highly sensitive data for millions of people in the country. The Australian government has wasted no time in responding to recent major data breaches having announced, introduced, and delivered legislation in just over a month. These new, larger penalties send a clear message to large companies that they must do better to protect the data they collect.
The most notable incidents were the Optus telecommunication provider data breach that impacted 11 million people, and the Medibank insurance firm ransomware attack that exposed the data of 9.7 million.
Threats
Ransomware and Extortion
What is Ransom Cartel? A ransomware gang focused on reputational damage | CSO Online
FBI: Cuba ransomware raked in $60 million from over 100 victims (bleepingcomputer.com)
Black Basta Crew Using Qakbot in Widespread Ransomware Strikes - MSSP Alert
Lockbit 3.0 has BlackMatter ransomware code, wormable traits | TechTarget
Trigona ransomware spotted in increasing attacks worldwide (bleepingcomputer.com)
Ransomware Gang Takes Credit for Maple Leaf Foods Hack | SecurityWeek.Com
SSP hit by cyber security breach and $7m ransomware demand - Insurance Post (postonline.co.uk)
Sandworm gang launches Monster ransomware attacks on Ukraine • The Register
Virginia County Confirms Personal Information Stolen in Ransomware Attack | SecurityWeek.Com
Cyber attack on LA schools shows bolder action needed to stop ransomware | VentureBeat
Phishing & Email Based Attacks
Other Social Engineering; Smishing, Vishing, etc
Experts Find 16,000+ Scam FIFA World Cup Domains - Infosecurity Magazine (infosecurity-magazine.com)
Malware
Bot Attacks Targeting Your Business - (informationsecuritybuzz.com)
Hackers are spreading malware via trending TikTok challenge: report - The Record by Recorded Future
New Windows malware also steals data from victims’ mobile phones (bleepingcomputer.com)
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices | Ars Technica
TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com)
Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines (darkreading.com)
Mobile
Google says Google should do a better job of patching Android phones | Ars Technica
Android and iOS apps with 15 million installs extort loan seekers (bleepingcomputer.com)
Android malware infected 300,000 devices to steal Facebook accounts (bleepingcomputer.com)
Predatory loan apps found in Google and Apple stores • The Register
Hack-for-Hire Group Targets Android Users With Malicious VPN Apps | SecurityWeek.Com
Drop What You're Doing and Update iOS, Android, and Windows | WIRED UK
New Exploit Broker on the Scene Pays Premium for Signal App Zero-Days (darkreading.com)
Malicious Android app found powering account creation service (bleepingcomputer.com)
Critical RCE bugs in Android remote keyboard apps with 2M installs (bleepingcomputer.com)
New Windows malware also steals data from victims’ mobile phones (bleepingcomputer.com)
Internet of Things – IoT
Energy firms accused of using smart meters to ‘disconnect customers by back door’ (telegraph.co.uk)
US bans sale of Huawei, ZTE tech amid security fears - BBC News
IoT device origin matters more than ever - Help Net Security
Security researcher says Eufy has a big security problem | Android Central
Hyundai app bugs allowed hackers to remotely unlock, start cars (bleepingcomputer.com)
Sirius XM Bug Lets Researchers Hijack Hondas, Nissans, Acuras (gizmodo.com)
EV Chargers Could Be A Serious Target For Hackers | Hackaday
Data Breaches/Leaks
Lastpass says hackers accessed customer data in new breach (bleepingcomputer.com)
5.4 million Twitter users' stolen data leaked online — more shared privately (bleepingcomputer.com)
Cabinet Office alerted to data breach – and fails to respond for 10 days (civilserviceworld.com)
Organised Crime & Criminal Actors
How cyber criminals have been affected by the war in Ukraine | The Economist
Cyber criminals are cashing in on FIFA World Cup-themed cyber attacks - Help Net Security
Crafty threat actor uses 'aged' domains to evade security platforms (bleepingcomputer.com)
BlackProxies proxy service increasingly popular among hackers (bleepingcomputer.com)
The Metaverse Could Become a Top Avenue for Cyber attacks in 2023 (darkreading.com)
Darknet markets generate millions in revenue selling stolen personal data | Ars Technica
Gangs of cyber criminals are expanding across Africa, investigators say | Cybercrime | The Guardian
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Insider Risk and Insider Threats
Fraud, Scams & Financial Crime
Identifying key areas for fraud risk during the recession - Help Net Security
Scammers ‘targeting neobank customers’ in the UK as fraud rates soar | Sifted
Spanish police dismantle operation that made €12M via investment scams (bleepingcomputer.com)
Impersonation Attacks
Insurance
Dark Web
Software Supply Chain
Denial of Service DoS/DDoS
Holiday DDoS Cyber attacks Can Hurt E-Commerce - Information Security Buzz
Cyber security researchers take down DDoS botnet by accident (bleepingcomputer.com)
Cloud/SaaS
Rackspace rocked by ‘security incident’ in hosted Exchange • The Register
GoTo says hackers breached its dev environment, cloud storage (bleepingcomputer.com)
Microsoft 365 banned in German schools over privacy concerns | TechTarget (computerweekly.com)
Don't ignore the security risks of limitless cloud data - Help Net Security
How the Cloud Changed Digital Forensics Investigations (darkreading.com)
How the MITRE ATT&CK Framework Enhances Cloud Security (trendmicro.com)
Banks in EU face tougher rules on using cloud computing giants | Reuters
Encryption
Governments want to avert quantum's encryption apocalypse (axios.com)
Serious Security: MD5 considered harmful – to the tune of $600,000 – Naked Security (sophos.com)
Dell, HP, and Lenovo Devices Found Using Outdated OpenSSL Versions (thehackernews.com)
API
Open Source
A new Linux flaw can be chained with other two bugs to gain full root privileges - Security Affairs
Small open source projects pose significant security risks | TechTarget
Passwords, Credential Stuffing & Brute Force Attacks
Social Media
Millions of Twitter users hacked in ‘colossal’ security breach | The Independent
How secure a Twitter replacement is Mastodon? Let us count the ways | Ars Technica
Twitter lacks transparency in misinformation fight -French regulator | Reuters
Twitter ends Covid misinformation policy under Musk - BBC News
Hackers Release Millions of Twitter IDs and User Info for Free (gizmodo.com)
Twitter isn’t going to stop people posting COVID-19 misinformation anymore • Graham Cluley
Hackers are spreading malware via trending TikTok challenge: report - The Record by Recorded Future
Meta fined €265mn by Irish watchdog over privacy concerns | Financial Times (ft.com)
TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com)
Chinese bots flood Twitter in attempt to obscure Covid protests | Twitter | The Guardian
Regulations, Fines and Legislation
Meta fined €265mn by Irish watchdog over privacy concerns | Financial Times (ft.com)
EU Council adopts NIS2 directive to harmonize cyber security across member states | CSO Online
Data Protection
Law Enforcement Action and Take Downs
Police Shutter 13,000 Sites in Piracy Crackdown - Infosecurity Magazine (infosecurity-magazine.com)
Spanish police dismantle operation that made €12M via investment scams (bleepingcomputer.com)
Website offering spoofing services taken offline after joint operation | CSO Online
Crackdown on African Cyber crime Leads to Arrests, Infrastructure Takedown | SecurityWeek.Com
Crypto exchange given go-ahead to track stolen assets in UK court ruling | Financial Times (ft.com)
Privacy, Surveillance and Mass Monitoring
Misinformation, Disinformation and Propaganda
Twitter lacks transparency in misinformation fight -French regulator | Reuters
Twitter ends Covid misinformation policy under Musk - BBC News
Spyware, Cyber Espionage & Cyber Warfare, including Russian Invasion of Ukraine
How cyber criminals have been affected by the war in Ukraine | The Economist
Sandworm gang launches Monster ransomware attacks on Ukraine • The Register
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices | Ars Technica
A Hacked Newsroom Brings a Spyware Maker to US Court | The New Yorker
Nation State Actors
Nation State Actors – Russia
OpZero’s modus operandi: opportunity hunter, front for Kremlin, or both? (cybernews.com)
US Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer – Krebs on Security
Nation State Actors – China
Chinese bots flood Twitter in attempt to obscure Covid protests | Twitter | The Guardian
US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment (bleepingcomputer.com)
Cloudflare finds a way through China's network defences • The Register
Nation State Actors – North Korea
Vulnerability Management
Vulnerabilities
Exchange Server bugs caused years of security turmoil | TechTarget
ConnectWise Quietly Patches Flaw That Helps Phishers – Krebs on Security
Cisco ISE Vulnerabilities Can Be Chained in One-Click Exploit | SecurityWeek.Com
Google Chrome emergency update fixes 9th zero-day of the year (bleepingcomputer.com)
Tenable: 72% of organisations remain vulnerable to Log4Shell | TechTarget
Chrome 108 Patches High-Severity Memory Safety Bugs | SecurityWeek.Com
Pre-auth RCE in Oracle Fusion Middleware exploited in the wild (CVE-2021-35587) - Help Net Security
Acer fixes UEFI bugs that can be used to disable Secure Boot (bleepingcomputer.com)
A new Linux flaw can be chained with other two bugs to gain full root privileges - Security Affairs
Dell, HP, and Lenovo Devices Found Using Outdated OpenSSL Versions (thehackernews.com)
Drop What You're Doing and Update iOS, Android, and Windows | WIRED UK
Nvidia Patches Many Vulnerabilities in Windows, Linux Display Drivers | SecurityWeek.Com
Other News
Top 3 Non-Technical Cyber security Trends for 2023 (trendmicro.com)
Many Global 2000 companies lack proper domain security - Help Net Security
Here is why you should have Cobalt Strike detection in place | CSO Online
'Cyber security key to business sustainability' The Nation Newspaper (thenationonlineng.net)Metaverse exploitation and abuse to rise in 2023: Kaspersky (cointelegraph.com)
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.