Black Arrow Cyber Threat Briefing 04 October 2024
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
How Snoozing on Cyber Security Fails Modern Businesses
A recent study has found that many organisations are delaying crucial data security updates, likened to hitting the snooze button on an alarm. This reluctance to modernise security measures leaves businesses vulnerable to evolving threats as technologies like cloud and AI are integrated into operations. The report highlights that clinging to legacy security systems can lead to significant financial and reputational damage. Despite the ever-present threat of cyber attacks, many organisations hesitate to upgrade due to comfort with existing systems and perceived cost implications. The adoption of modern security practices like Zero Trust models and AI-driven tools is essential to mitigate these risks.
Cyber Criminals Capitalise on Poorly Configured Cloud Environments
According to the 2024 Elastic Global Threat Report, cyber criminals are exploiting poorly configured cloud environments and leveraging off-the-shelf offensive security tools, which account for approximately 54% of observed malware alerts, with one tool responsible for over 27% of infections. Misconfigurations are widespread: 47% of Microsoft Azure failures are tied to storage issues, and 30% of AWS failures result from the lack of multi-factor authentication. There has been a 12% increase in brute-force techniques, particularly in Azure environments. While defence technologies are making progress, the report emphasises the need for enterprises to enhance cloud configurations and enforce security measures like multi-factor authentication.
90% of Cyber Security Incidents Could Be Avoided, Survey Reveals
Veeam Software has found that only 43% of EMEA IT decision-makers believe the forthcoming NIS2 directive will significantly enhance EU cyber security. This scepticism persists despite 90% of respondents reporting at least one security incident in the past year that NIS2 could have prevented. While nearly 80% are confident they will eventually comply with NIS2, up to two-thirds expect to miss the October 2024 deadline. The report highlights barriers to compliance, including technical debt (24%), lack of leadership understanding (23%), and insufficient budget (21%). Additionally, 40% have experienced decreased IT budgets since NIS2 was announced, with many organisations ranking it lower in urgency than other business priorities.
The Cyber Industry Needs to Accept It Can't Eliminate Risk
A recent analysis highlights that striving for zero risk in cyber security is unattainable for organisations. The reliance on large technology providers like CrowdStrike exposes systemic risks, where an incident can have widespread impact across dependent businesses. The article emphasises that instead of pursuing perfection, organisations should focus on reducing risks to a manageable level. Transparency with stakeholders about residual risks is crucial to set realistic expectations and maintain trust. It also suggests diversifying technology stacks to avoid overloading risk onto a few providers, and implementing practical security measures that can be consistently followed to manage risks effectively.
Cyber Teams Say They Can’t Keep Up with Attack Volumes
ISACA has found that understaffing and underfunding are major concerns for cyber security professionals in Europe, with 61% reporting understaffed teams and 52% citing underfunding despite predicted spending increases. The report highlighted that 68% feel their work is more stressful now than in 2019 due to a complex threat landscape. Nearly 58% expect to face a cyber attack in the next 12 months, up six percentage points from 2023. Additionally, 52% pointed to a lack of soft skills among cyber pros, especially communication, exacerbating the skills gap in the industry.
C-Level Executives are a Weak Point for Cyber Security
Research indicates that 72% of US senior executives have been targeted by cyber attacks in the past 18 months, highlighting the C-suite as a key security vulnerability. Attacks have grown in frequency and sophistication, with impersonation scams up by 26%, and 27% involving AI-assisted deepfakes. Despite this, many organisations have not prioritised executive security training, though 87% of IT professionals believe senior executives require more training than other staff. As cyber security remains a top concern, companies must enhance security measures to protect their data.
Email Phishing Attacks Surge as Attackers Bypass Security Controls
Egress has reported a 28% rise in email phishing attacks in Q2 2024 compared to Q1, highlighting attackers' effective methods to bypass security controls. These threats intensify as 44% of attacks originated from internally compromised accounts and 8% from supply chain accounts. The report found that 89% of phishing emails involved impersonation, often targeting HR, IT and finance departments. Additionally, commodity attacks have surged, causing a 2700% increase in phishing volumes during such campaigns. Emerging trends also show attackers using multi-channel approaches, leveraging platforms like MS Teams and WhatsApp to exploit vulnerabilities.
Security Threats Are More Pressing Than Ever for Business Leaders, With Cloud Worries Taking Top Spot
PwC has found that cloud-related threats are now the top concern for executives, with 42% ranking them as their primary worry. Despite this focus, 34% admit they are least prepared to address these issues. Hack-and-leak operations and third-party breaches are also significant concerns, cited by 38% and 35% of respondents respectively. Interestingly, Chief Information Security Officers place ransomware among their top three worries, with 42% feeling underprepared to tackle it. The expanding attack surface from increased reliance on cloud, AI, and connected devices underscores the need for an agile, enterprise-wide approach to resilience.
Ten Million Brits Hit by Fraud in Just Three Years
A recent study sponsored by Santander UK and conducted by the Social Market Foundation (SMF) revealed that 21% of respondents across 15 European countries experienced fraud between 2021 and 2023, at a direct cost of £168bn. However, the SMF estimated the total cost of such incidents at £420bn; this includes productivity losses from having to spend time reporting and recovering from the fraud incident. In the UK alone, victims lost an average of £907 each, amounting to a total direct cost of around £9bn. The report highlights that while most believe banks should lead in compensating victims, many also see digital platforms and telecom providers as responsible. Both SMF and Santander are calling on the British government to spearhead a global initiative to combat fraud, including international agreements and enhanced law enforcement.
Is the Weakest Link in Cyber Security Becoming Even Weaker?
Human error is the leading cause of cyber security breaches, with Cybint reporting that 95% result from human mistakes. Verizon's 2023 Data Breach Investigations Report highlights that 74% of incidents involve a human element, such as clicking on phishing links. The rise of deepfakes and increased exposure of personal information have intensified these risks, making attacks more sophisticated. Despite awareness training, prominent organisations continue to face breaches. Notably, Gen Z is over three times more likely to fall for online fraud compared to baby boomers. Remote working has further blurred boundaries, increasing vulnerability to cyber attacks.
Cyber Incidents are the Achilles Heel for Major UK CEOs, Report Finds
FGS Global has found that cyber attacks are the top concern for UK businesses, with 36% of senior leaders reporting cyber incidents in the past year. Despite 85% of firms experiencing a crisis, only 36% feel highly prepared to handle ransomware attacks, which over half fear facing. The report highlights a lack of understanding around cyber security and cyber crime, intensified by AI risks.
Sources:
https://votiro.com/blog/how-snoozing-on-cybersecurity-fails-modern-businesses/
https://www.helpnetsecurity.com/2024/10/04/cloud-environments-attack-surface/
https://dcnnmagazine.com/security/90-of-cybersecurity-incidents-could-be-avoided-survey-reveals/
https://www.computerweekly.com/opinion/The-cyber-industry-needs-to-accept-it-cant-eliminate-risk
https://www.computerweekly.com/news/366612212/Cyber-teams-say-they-cant-keep-up-with-attack-volumes
https://www.techradar.com/pro/c-level-executives-are-a-weak-point-for-cybersecurity-research-says
https://www.infosecurity-magazine.com/news/email-phishing-surge-bypass/
https://www.infosecurity-magazine.com/news/ten-million-brits-hit-fraud-three/
https://hackernoon.com/is-the-weakest-link-in-cybersecurity-becoming-even-weaker
https://www.cityam.com/cyber-incidents-are-the-achilles-heel-for-major-uk-ceos-report-finds/
Governance, Risk and Compliance
CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)
Allies to Leverage During a Cyber Crisis (darkreading.com)
The cyber industry needs to accept it can't eliminate risk | Computer Weekly
Cyber incidents are the Achilles Heel for major UK CEOs, report finds (cityam.com)
As CISO roles expand, so should cyber budgets, says NASCIO 2024 cyber security report | StateScoop
Human Capital and Risk Governance: Insider Threats To Cyber Security (forbes.com)
Global cyber threat to double predicts new report (emergingrisks.co.uk)
Over Half of Cyber Professionals Feel Their Budget is Underfunded - IT Security Guru
C-level executives are a weak point for cyber security | TechRadar
Average North American CISO salary now $565,000 • The Register
BlackBerry report: Cyber threats up 53%, critical sectors hit (securitybrief.co.nz)
Cyber teams say they can’t keep up with attack volumes | Computer Weekly
Watch out, CFOs: cyber crime is booming, says former White House advisor | Fortune
Normalizing Security Culture: Stay Ready (darkreading.com)
Cyber attacks causing reputational damages: CIRA – BNN Bloomberg
Security spending signals major role change for CISOs and their teams | CSO Online
Strengthening Security Posture Through People-First Engagement (informationsecuritybuzz.com)
Forrester's CISO Budget Planning Guide for 2025: Prioritize API Security - Security Boulevard
Gartner: CISOs should ditch ‘zero tolerance’ prevention (techinformed.com)
How to Enlist the CFO as a Cyber Security Budget Ally | Mimecast
Threats
Ransomware, Extortion and Destructive Attacks
Ransomware gangs are using stolen data to threaten CEOs | Fortune
Embargo ransomware escalates attacks to cloud environments (bleepingcomputer.com)
Microsoft: Cloud Environments of US Organisations Targeted in Ransomware Attacks - SecurityWeek
Multinational police effort hits sections of Lockbit ransomware operation | CyberScoop
Russia’s FSB protected Evil Corp gang that carried out NATO cyber-attacks (yahoo.com)
US charges Joker's Stash and Rescator money launderers (bleepingcomputer.com)
More frequent disruption operations needed to dent ransomware gangs, officials say | CyberScoop
Ransomware activity shows no signs of slowing down - Help Net Security
International Counter Ransomware Initiative 2024 Joint Statement | The White House
Ransomware crew infects 100+ orgs monthly with BabyLockerKZ • The Register
Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)
Healthcare organisations are having to pay millions to solve ransomware attacks | TechRadar
Here's what to expect from the Counter Ransomware Initiative meeting this week (therecord.media)
JPCERT shares Windows Event Log tips to detect ransomware attacks (bleepingcomputer.com)
Some of the world's biggest countries are teaming up to tackle ransomware scams | TechRadar
Ransomware August 2024 round-up: fools, rules and tools | TechFinitive
Ransomware Victims
Patelco Credit Union Data Breach Impacts Over 1 Million People - SecurityWeek
Ransomware forces Texas hospital to turn away ambulances • The Register
Agence France-Presse says cyber attack targeted IT systems (therecord.media)
Dermatology Practice Sued After Ransomware Attack Exposed Data (bloomberglaw.com)
Phishing & Email Based Attacks
UK on high alert over Iranian spear-phishing attacks, says NCSC | Computer Weekly
New report reveals a rise in phishing attacks, as commodity (globenewswire.com)
Beyond Phishing: AI's New Tricks for Cyber Attacks (govinfosecurity.com)
UK issues alert over threat from cyber attackers working for Iranian state | Evening Standard
iPhone, Android Users Warned After 50,000 Message Email Bomb Attack (forbes.com)
Common Words in Email Scams: Money, Income, Investment, More | Entrepreneur
QR Code phishing is advancing to a new level, so be on your guard | TechRadar
Attackers Targeting Recruiters With More_Eggs Backdoor (darkreading.com)
“Gone Phishing”—Every Cyber Attacker’s Favorite Phrase - Gigaom
IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)
Ireland is the most phished country in the world, says survey (siliconrepublic.com)
Business Email Compromise (BEC)/Email Account Compromise (EAC)
IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert
Other Social Engineering
QR Code phishing is advancing to a new level, so be on your guard | TechRadar
Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)
Physical Security Is a Big Part of Staying Digitally Safe: My 5 Top Tips (makeuseof.com)
Meet the people hacker trying to improve cyber security (siliconrepublic.com)
Artificial Intelligence
AI-related cyber crime sparks concern among 65% of global survey participants (techmonitor.ai)
New report reveals a rise in phishing attacks, as commodity (globenewswire.com)
Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon
Three essential steps for organisations to safeguard against deepfakes | TechRadar
Beyond Phishing: AI's New Tricks for Cyber Attacks (govinfosecurity.com)
Putting an end to the AI cyber responsibility turf wars | CyberScoop
Shadow AI, Data Exposure Plague Workplace Chatbot Use (darkreading.com)
FIN7 Gang Hides Malware in AI “Deepnude” Sites - Infosecurity Magazine (infosecurity-magazine.com)
Ukraine-Russia Cyber Battles Have Real-World Impact (darkreading.com)
Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)
Could APIs be the undoing of AI? - Help Net Security
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)
1 in 4 people have experienced identity fraud - and most of them blame AI | ZDNET
Rogue AI: What the Security Community is Missing | Trend Micro (US)
Spotting AI-generated scams: Red flags to watch for - Help Net Security
Cyber security experts praise veto of California's AI safety bill | SC Media (scworld.com)
2FA/MFA
The most common authentication method is also the least secure - Help Net Security
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA (thehackernews.com)
Malware
FIN7 Gang Hides Malware in AI “Deepnude” Sites - Infosecurity Magazine (infosecurity-magazine.com)
New Fin7 Hacker’s AI Naked Image Generator Serves Up More Than Nudes (forbes.com)
DCRat Malware Spreads via HTML Smuggling | MSSP Alert
Attackers Targeting Recruiters With More_Eggs Backdoor (darkreading.com)
Thousands of Linux systems infected by stealthy malware since 2021 (arstechnica.com)
Microsoft reveals how Windows 10 and Windows 11 block keyloggers - Neowin
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)
Here's How Criminals Use CAPTCHAs to Help Spread Malware (makeuseof.com)
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (thehackernews.com)
Bots/Botnets
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (thehackernews.com)
What bots mean for businesses and consumers - Help Net Security
Mobile
iPhone, Android Users Warned After 50,000 Message Email Bomb Attack (forbes.com)
This nasty Android adware is making phones unusable — how to stay safe | Tom's Guide (tomsguide.com)
‘Pig butchering’ trading apps found on Google Play, App Store (bleepingcomputer.com)
Verizon outage: iPhones, Android devices stuck in SOS mode (bleepingcomputer.com)
Denial of Service/DoS/DDoS
Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps - SecurityWeek
After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks - SecurityWeek
Hacktivist activity drives a rise in DDoS attacks (betanews.com)
Telcos face increasing frequency and sophistication of DDoS attacks - Nokia (telecoms.com)
Cloudflare mitigated new record-breaking DDoS attack of 3.8 Tbps (securityaffairs.com)
Wave of record-breaking DDoS attacks originating from compromised WiFi routers | Cybernews
Internet of Things – IoT
Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)
Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors
Data Breaches/Leaks
Transport for London (TfL) cyber attack: What you need to know - BBC News
43% of data breaches target small businesses in 5 industries | Retail Technology Review
UK data watchdog confirms it's investigating MoneyGram data breach | TechCrunch
Patelco Credit Union Data Breach Impacts Over 1 Million People - SecurityWeek
T-Mobile US agrees to $31.5M settlement after IT breaches • The Register
Dutch police breached by a state actor (securityaffairs.com)
Louisiana Accounting Firm Breach Impacts More Than 127K Customers | MSSP Alert
Organised Crime & Criminal Actors
UK man allegedly used genealogy sites to hack execs’ email accounts | Fortune
Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)
How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death | TechCrunch
UK reveals father and son at heart of Evil Corp hacking group - BBC News
Man charged for selling forged license keys for network switches (bleepingcomputer.com)
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Linux malware “perfctl” behind years-long cryptomining campaign (bleepingcomputer.com)
Over $750 Million Stolen in Crypto Last Quarter Despite Drop in Hacks: CertiK - Decrypt
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (thehackernews.com)
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)
Insider Risk and Insider Threats
Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon
Insider Threats: Are Disgruntled Employees a Cyber Security Risk? | PLANSPONSOR
Insurance
A Guide to Buying and Maintaining Cyberinsurance | PLANSPONSOR
Beazley forecasts cyber insurance market to grow to $40bn by 2030 - Reinsurance News
Munich Re’s HSB launches comprehensive cyber insurance solution for SMBs - Reinsurance News
Supply Chain and Third Parties
Cyber companies need a best practice approach to major incidents. | Computer Weekly
Digital twins are optimizing supply chains and more. Here's why enterprises should care | ZDNET
Cloud/SaaS
Embargo ransomware escalates attacks to cloud environments (bleepingcomputer.com)
Microsoft: Cloud Environments of US Organisations Targeted in Ransomware Attacks - SecurityWeek
Cloud threats top execs' list of cyber nightmares • The Register
Cyber criminals capitalize on poorly configured cloud environments - Help Net Security
The top enterprise cloud threats of 2024 (betanews.com)
Hackers Breach Hybrid Cloud with Stolen Entra ID Credentials (petri.com)
IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert
Hacker made millions from breaking into business Office 365 accounts | TechRadar
Navigating the Security Risks of Multicloud Management (darkreading.com)
Top 6 Cloud Security Threats to Watch Out For - Security Boulevard
The End of The SaaS Era: Rethinking Software’s Role In Business
Outages
Cyber companies need a best practice approach to major incidents. | Computer Weekly
UK Post Office axes MoneyGram services in wake of cyber attack (finextra.com)
Verizon outage: iPhones, Android devices stuck in SOS mode (bleepingcomputer.com)
The Playstation Network is down in a global outage (bleepingcomputer.com)
Identity and Access Management
Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions - SecurityWeek
Active Directory attack guidance issued by Five Eyes | SC Media (scworld.com)
Encryption
The fix for BGP’s weaknesses – RPKI – has issues of its own • The Register
Linux and Open Source
Worried about that critical RCE Linux bug? Here's why you can relax | ZDNET
After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks - SecurityWeek
Thousands of Linux systems infected by stealthy malware since 2021 (arstechnica.com)
Passwords, Credential Stuffing & Brute Force Attacks
The most common authentication method is also the least secure - Help Net Security
Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)
IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert
Passkeys and Cyber Security Awareness: A New Era Of Business Security (informationsecuritybuzz.com)
Poor password habits still an issue worldwide (betanews.com)
Complicated Passwords Make You Less Safe, Experts Now Say (forbes.com)
Why your password policy should include a custom dictionary (bleepingcomputer.com)
Social Media
Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)
Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors
UK regulator preparing for ‘strong action’ against tech giants
Are social media influencers equipped to dodge cyber attacks? | Mint (livemint.com)
Brits bemoan personal data practices but do little about it • The Register
Training, Education and Awareness
Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon
One-Third of UK Teachers Do Not Have Cyber Security Training (techrepublic.com)
Regulations, Fines and Legislation
NIS2 could prevent cyber security incidents but many businesses aren't ready (betanews.com)
Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)
SolarWinds CISO: World's Cyber Regulations Still 'In Flux' (pymnts.com)
Sellafield nuclear site in Cumbria fined for IT security breaches - BBC News
Government outlines plan for Cyber Security and Resilience Bill | UKAuthority
How Should CISOs Navigate the SEC Cyber Security Rules? (darkreading.com)
Ireland to grant National Cyber Security Centre emergency powers (finextra.com)
Opinion: How to design a US data privacy law | Ars Technica
UK data watchdog confirms it's investigating MoneyGram data breach | TechCrunch
T-Mobile US agrees to $31.5M settlement after IT breaches • The Register
Opinion | Artificial Intelligence Requires Specific Safety Rules - The New York Times (nytimes.com)
Minimum Healthcare Cyber Standards Called by New Legislation | MSSP Alert
UK regulator preparing for ‘strong action’ against tech giants
Cyber Security in the European Union | Cooley LLP - JDSupra
Financial regulatory agencies are sunsetting a tool to assess cyber risks | FedScoop
Cyber security experts praise veto of California's AI safety bill | SC Media (scworld.com)
Models, Frameworks and Standards
NIS2 could prevent cyber security incidents but many businesses aren't ready (betanews.com)
Could Security Misconfigurations Top OWASP List? (darkreading.com)
Government outlines plan for Cyber Security and Resilience Bill | UKAuthority
Data Protection
Opinion: How to design a US data privacy law | Ars Technica
Brits bemoan personal data practices but do little about it • The Register
Careers, Working in Cyber and Information Security
Average North American CISO salary now $565,000 • The Register
Cyber UK's quickest growing tech field, but skills gap remains | Computer Weekly
Cyber security Professionals Operate Under Increased Stress Levels - Security Boulevard
How Are We Going to Fill 4.8 Million Cyber Security Jobs? (inforisktoday.com)
Cyber security hiring slows, pros' stress levels rise - Help Net Security
Share of Women in UK Cyber Roles Now Just 17% - Infosecurity Magazine (infosecurity-magazine.com)
Law Enforcement Action and Take Downs
Russia exploited Evil Corp relationship for NATO attacks • The Register
Unmasked: The Evil Corp cyber gangster who worked for LockBit | Computer Weekly
More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers - SecurityWeek
Iranian hackers charged over Trump campaign disruption | TechRadar
U.S. charges Joker's Stash and Rescator money launderers (bleepingcomputer.com)
Law enforcement arrests vacationing LockBit developer in ongoing operation | TechSpot
Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)
How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death | TechCrunch
UK reveals father and son at heart of Evil Corp hacking group - BBC News
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)
Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)
More frequent disruption operations needed to dent ransomware gangs, officials say | CyberScoop
Telegram revealed it shared U.S. user data with law enforcement (securityaffairs.com)
Man charged for selling forged license keys for network switches (bleepingcomputer.com)
Misinformation, Disinformation and Propaganda
Intel agencies warn of Iran's ongoing phishy behavior • The Register
Iranian hackers charged over Trump campaign disruption | TechRadar
Microsoft cracks down further on Russian hackers looking to disrupt elections | TechRadar
Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)
Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)
Protecting Democratic Institutions from Cyber Threats - Microsoft On the Issues
Cyber Warfare and Cyber Espionage
Nation State Actors
China
Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)
China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration (thehackernews.com)
Russia
Russia exploited Evil Corp relationship for NATO attacks • The Register
Multinational police effort hits sections of Lockbit ransomware operation | CyberScoop
Police arrest four suspects linked to LockBit ransomware gang (bleepingcomputer.com)
More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers - SecurityWeek
Russia’s FSB protected Evil Corp gang that carried out Nato cyber-attacks (yahoo.com)
Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)
Ukraine-Russia Cyber Battles Have Real-World Impact (darkreading.com)
Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (bleepingcomputer.com)
Microsoft cracks down further on Russian hackers looking to disrupt elections | TechRadar
Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)
bne IntelliNews - Russian tech startups, cyber security firms flourish amid sanctions
Russian authorities arrest nearly 100 in raids tied to cyber criminal money laundering | CyberScoop
Dutch police breached by a state actor (securityaffairs.com)
Law enforcement arrests vacationing LockBit developer in ongoing operation | TechSpot
Iran
UK on high alert over Iranian spear-phishing attacks, says NCSC | Computer Weekly
Intel agencies warn of Iran's ongoing phishy behaviour • The Register
Iranian hackers charged over Trump campaign disruption | TechRadar
Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)
North Korea
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (thehackernews.com)
North Korea Profits as 'Stonefly' APT Swarms US Co's. (darkreading.com)
North Korean hackers attack Diehl Defence company - Militarnyi
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Hacktivist activity drives a rise in DDoS attacks (betanews.com)
ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions | WIRED
Tools and Controls
Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon
CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)
Cyber companies need a best practice approach to major incidents. | Computer Weekly
Allies to Leverage During a Cyber Crisis (darkreading.com)
The cyber industry needs to accept it can't eliminate risk | Computer Weekly
As CISO roles expand, so should cyber budgets, says NASCIO 2024 cyber security report | StateScoop
Over Half of Cyber Professionals Feel Their Budget is Underfunded - IT Security Guru
Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions - SecurityWeek
How to Plan and Prepare for Penetration Testing (thehackernews.com)
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA (thehackernews.com)
Moving DevOps Security Out of 'the Stone Age' (darkreading.com)
Security spending signals major role change for CISOs and their teams | CSO Online
Three hard truths hindering cloud-native detection and response - Help Net Security
Forrester's CISO Budget Planning Guide for 2025: Prioritize API Security - Security Boulevard
Gartner: CISOs should ditch ‘zero tolerance’ prevention (techinformed.com)
API security maturity model to assess API security posture | TechTarget
Top 6 Cloud Security Threats to Watch Out For - Security Boulevard
JPCERT shares Windows Event Log tips to detect ransomware attacks (bleepingcomputer.com)
The Silent Epidemic: Uncovering the Dangers of Alert Fatigue and How to Overcome It (cybereason.com)
Top 5 Myths of AI & Cyber Security (darkreading.com)
How organisations can derive value from security investments and enable business growth | ITPro
How to balance your understanding of threats and how you respond to them | ITPro
Does your security strategy show continuous improvement? | ITPro
The convergence of network and security – how it helps achieve business outcomes | ITPro
Other News
The cyber industry needs to accept it can't eliminate risk | Computer Weekly
Cyber incidents are the Achilles Heel for major UK CEOs, report finds (cityam.com)
Global cyber threat to double predicts new report (emergingrisks.co.uk)
Cyber teams say they can’t keep up with attack volumes | Computer Weekly
How Snoozing on Cyber Security Fails Modern Businesses - Security Boulevard
UK man allegedly used genealogy sites to hack execs’ email accounts | Fortune
UK Post Office axes MoneyGram services in wake of cyber attack (finextra.com)
Feds say Microsoft security ‘requires an overhaul’ — but will it listen? – Computerworld
Global cyber attacks will more than double this year to 211, says QBE - Reinsurance News
Critical Infrastructure: The latest target for cyber criminals? | TechRadar
When Innovation Outpaces Financial Services Cyber Security - Security Boulevard
Securing Space in the Age of Advanced Cyber Threats (eetimes.eu)
Schools reminded to maintain cyber hygiene by Ofqual | Education Business (educationbusinessuk.net)
America's policy in cyber space is about persistence, not deterrence (cyberscoop.com)
One-Third of UK Teachers Do Not Have Cyber Security Training (techrepublic.com)
Global Cyber Security Agencies Release OT Security Guidelines (inforisktoday.com)
Vulnerability Management
Could Security Misconfigurations Top OWASP List? (darkreading.com)
What are zero-day vulnerabilities? | TechRadar
NVD still backlogged with 17K+ unprocessed bugs • The Register
Systems used by courts and governments across the US riddled with vulnerabilities | Ars Technica
Vulnerabilities
Thousands of Adobe Commerce e-stores hacked by exploiting CosmicSting bug (securityaffairs.com)
Worried about that critical RCE Linux bug? Here's why you can relax | ZDNET
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch (thehackernews.com)
Progress Software Releases Patches for 6 Flaws in WhatsUp Gold – Patch Now (thehackernews.com)
New Chrome Security Warning For 3 Billion Windows, Mac, Linux, Android Users (forbes.com)
Rackspace systems hit by zero-day exploit of third-party app • The Register
Organisations Warned of Exploited SAP, Gpac and D-Link Vulnerabilities - SecurityWeek
Zimbra RCE Vuln Under Attack Needs Immediate Patching (darkreading.com)
700K+ DrayTek routers are sitting ducks on the internet • The Register
Critical flaw in NVIDIA Container Toolkit allows full host takeover (bleepingcomputer.com)
Microsoft fixes Windows KB5043145 reboot loops, USB and Bluetooth issues (bleepingcomputer.com)
VLC Player Vulnerability Let Attackers Execute Malicious Code (cybersecuritynews.com)
Arc browser adds security bulletins and bug bounties - The Verge
The fix for BGP’s weaknesses – RPKI – has issues of its own • The Register
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.