Black Arrow Cyber Threat Briefing 05 June 2024
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Nearly 10 billion Passwords Leaked in the Largest Compilation of All-time
A recent discovery by Cybernews researchers has revealed the largest password compilation to date, containing 9.9 billion unique plaintext passwords in a file named rockyou2024.txt, posted by forum user ObamaCare. This dataset, sourced from both old and new breaches, poses a significant threat by heightening the risk of credential stuffing attacks. Previous incidents have shown such attacks can severely impact organisations, as seen with recent breaches at Santander and Ticketmaster. To mitigate risks, users should avoid using the same passwords across different sites and services, immediately reset exposed passwords, enable multi-factor authentication, and use password managers to generate and store complex passwords securely.
Half of Employees Fear Punishment for Reporting Security Mistakes
A recent report by ThinkCyber, based on a survey conducted at Infosecurity Europe 2024, reveals that half of employees fear repercussions if they report a security mistake. Only 51% believe that most colleagues are focused on security, with 39% feeling this concern is limited to executives and security teams. Key risky behaviours include clicking on phishing links (53%), sharing corporate data (53%), and sharing credentials (51%). The report highlights the ineffectiveness of current security awareness training, with 42% unable to prove its impact on behaviour.
New RUSI Report Exposes Psychological Toll of Ransomware
A recent report by the UK’s Royal United Services Institute (RUSI) reveals the severe psychological toll that ransomware attacks inflict on victims. The study, titled 'Your Data is Stolen and Encrypted: The Ransomware Victim Experience’, highlights that beyond service disruptions, line managers should be mindful of workloads and the psychological and physical impact of ransomware attacks on the organisation and its staff.
Recommendations include prioritising psychological support in cyber resilience strategies and enhancing public funding for mental health services tailored to ransomware victims. Additionally, the report underscores the need for clearer support roles from UK agencies like the NCSC and ICO, and calls for comprehensive improvements in organisational cyber security practices.
Cyber Extortion Soars: SMBs Hit Four Times Harder
A recent report by Orange Cyberdefense has revealed a 77% year-on-year growth in cyber extortion victims, with 60 distinct ransomware groups responsible for 4,374 attacks from Q1 2023 to Q1 2024. Small and medium-sized businesses were hit 4.2 times more often than larger enterprises. The healthcare sector saw a staggering 160% increase in cyber extortion attacks, placing it among the top three most targeted industries. Additionally, the actual victim numbers are likely 50-60% higher than reported due to unaccounted ransom payments. A new trend of "re-victimisation" was also observed, where organisations faced repeated attacks.
2024 Is Already the Year of the Cyber Attack
A recent wave of cyber breaches has underscored the urgent need for robust cyber security measures, as highlighted by the CDK Global hack that disrupted auto dealership management systems for well over two weeks. Data extortion and ransomware attacks have surged, with high-profile incidents affecting UnitedHealth Group’s Change Healthcare, Dell, Microsoft, and others. Notable breaches included Evolve Bank & Trust, which had a knock on effect on a number of high profile FinTechs, and Neiman Marcus. The UK’s Synnovis attack severely impacted London hospitals, further exemplifying the critical threat. A report by PYMNTS Intelligence found 82% of eCommerce merchants experienced cyber attacks in the past year, with nearly half suffering revenue and customer losses, emphasising the growing cyber security challenge in the digital age.
Survey Reveals Growing Lack of Cyber Security Confidence
A recent survey by Ivanti highlights half of IT and security professionals lacking confidence in preventing a damaging security incident in the next 12 months. Data silos between cyber security and IT teams are a significant barrier, causing slow incident response for 40% of respondents and reduced productivity for 82%. The survey reveals it takes an average of 33.8 hours to restore services after an incident. Despite these challenges, organisations are investing in emerging technologies like identity threat detection (47%) and cyber asset management (46%). However, only 46% have identified vulnerable third-party components in their supply chains.
Cyber Security is Worth the Spend
A recent report highlights that businesses face a constant balancing act between growth and cost, particularly regarding IT and security budgets. Despite significant cyber security investments, few organisations can accurately gauge the return on these expenditures. Companies spend millions annually, with the cyber security market projected to reach $300 billion. Effective cyber security remains critical, with CISOs needing to demonstrate risk management, validate controls, and rationalise spend. As cyber threats grow, organisations must integrate cyber security into overall risk management, ensuring data visibility and compliance to safeguard assets and maintain operational integrity.
Only 13% of Organisations are Cyber Mature
A recent survey by Commvault reveals that 83% of respondents had experienced a material security incident, with over half occurring in the past year. To combat this, five key cyber recovery markers were identified: early warning tools, clean dark sites or secondary system in place, isolated immutable data storage, defined incident response plans, and specific recovery readiness measures. Organisations deploying at least four markers recover 41% faster and report fewer breaches. Only 13% of respondents were categorised as cyber mature, with 54% confident in their recovery ability, highlighting the need for comprehensive resilience strategies.
Full-Blown Cyber War: a Hollywood Worthy Scenario
A recent analysis highlights the growing threat of cyber warfare, which could destabilise critical infrastructure and disrupt daily life more covertly than other warfare. Experts warn that strategic cyber attacks could target power, water, communications, and banking systems, causing societal chaos. Recent incidents, such as attacks on Microsoft's communication systems and Denmark's power grid, demonstrate the persistent threat. Despite the potential for massive damage, mutually assured destruction in cyber space remains complex due to the diverse actors involved. Effective cyber deterrence and robust defences are essential to mitigate these emerging threats.
Rising Risks Set to Drive Huge Investment in Cyber Security
A recent report by Stocklytics.com predicts that cyber security spending will soar to $272 billion by 2029, reflecting a 50% increase as businesses combat escalating cyber threats. Despite a significant rise in cyber security budgets, cyber attacks remain a major concern, with the annual cost of cyber crime projected to reach $9.2 trillion in 2024 and $13.8 trillion by 2028. Statista's survey indicates cyber security spending has already grown by 60% from 2018 to 2024, with annual spending expected to increase by $17 billion per year. Over the next decade, global spending on cyber solutions and security measures is forecasted to exceed $2.5 trillion.
Authorised Push Payment Fraud Singled Out as Biggest Financial Crime Threat
A recent study by The Payments Association reveals that 65% of payments professionals consider fraud their most pressing financial crime threat, with authorised push payment (APP) scams being the most concerning, as identified by 27% of respondents. APP fraud, where scammers trick victims into transferring money, predominantly stems from online sources (76%) and telecoms (16%). Despite a 12% rise in APP fraud cases in 2023, losses fell by 5% to £460 million. However, new rules will soon hold payment service providers liable for these losses, prompting concerns about the financial impact on smaller fintech firms.
Setting the Tone at the Top to Manage Enterprise Risk
A recent report highlights the critical need for comprehensive risk management in today's business landscape, emphasising that cyber threats are ubiquitous and not just Black Swan events. High-profile cases like Uber, SolarWinds, and Wells Fargo demonstrate the catastrophic impact a single cyber incident can have on an organisation’s reputation, operations, and financial stability. The evolving role of CISOs, who are now facing personal liability for breaches, underscores the importance of strong corporate governance and a clear "tone at the top." Effective cyber security must be prioritised at all levels, with a proactive, enterprise-wide approach to managing operational risk.
Cyber Criminals are Free to Exploit Vulnerabilities Without Fear
A recent report highlights the infuriatingly low enforcement against cyber crime, with only 0.3% of reported incidents resulting in prosecution. This has emboldened cyber criminals, allowing them to exploit vulnerabilities with impunity, often raking in up to $2 million annually. Despite the astronomical financial and human costs, underreporting and outdated legal frameworks contribute to a pitiful conviction rate. The dark web further complicates efforts to catch these criminals, who often operate across borders, exploiting legal loopholes. Urgent reforms in cyber security laws and increased global cooperation are crucial to addressing this rampant issue effectively.
Sources:
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
https://www.infosecurity-magazine.com/news/employees-fear-punishment-reporting/
https://www.infosecurity-magazine.com/news/report-exposes-psychological-toll/
https://www.infosecurity-magazine.com/news/cyber-extortion-soars-smb-hit/
https://www.pymnts.com/cybersecurity/2024/2024-is-already-the-year-of-the-cyberattack/
https://securityboulevard.com/2024/07/survey-surfaces-growing-lack-of-cybersecurity-confidence/
https://www.techradar.com/pro/cybersecurity-is-worth-the-spend
https://www.helpnetsecurity.com/2024/07/04/organizations-cyber-recovery-plans/
https://cybernews.com/editorial/cyberwar-hollywood-worthy-scenario/
https://www.emergingrisks.co.uk/rising-risks-set-to-drive-huge-investment-in-cyber-security/
https://www.infosecurity-magazine.com/news/app-fraud-biggest-financial-crime/
https://www.infosecurity-magazine.com/opinions/tone-top-enterprise-risk/
https://hackernoon.com/cyber-scum-are-free-to-exploit-vulnerabilities-without-fear
Governance, Risk and Compliance
Survey Surfaces Growing Lack of Cyber Security Confidence - Security Boulevard
Half of employees afraid to report security errors (betanews.com)
Rising risks set to drive huge investment in cyber security (emergingrisks.co.uk)
Cyber security is worth the spend | TechRadar
Only 13% of organisations are cyber mature - Help Net Security
76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News
Adapting cyber security strategies to the escalating threat landscape (securitybrief.co.nz)
Cyber Workforce Grows 15% at Large Organisations - Infosecurity Magazine (infosecurity-magazine.com)
Cyber crime rises putting organisations under significant stress, report reveals (holyrood.com)
Navigating the cyber security tempest in the UK organisations (thehrdirector.com)
The impossibility of “getting ahead” in cyber defence - Help Net Security
Cyber resilience - how to achieve it when most businesses – and CISOs – don’t care (diginomica.com)
Companies spend more on cyber security but struggle to track expenses - Help Net Security
Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict
Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)
Threats
Ransomware, Extortion and Destructive Attacks
New ransomware group uses phone calls to pressure victims, researchers say (therecord.media)
2024 Is Already the Year of the Cyber Attack (pymnts.com)
‘I don’t see it happening’: CISA chief dismisses ban on ransomware payments (therecord.media)
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack (bleepingcomputer.com)
Never assume the end of an attack infrastructure | TechRadar
Cyber attacks on healthcare organisations are surging – here's why | ITPro
Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)
How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)
Ransomware payouts hit all-time high, but that’s not the whole story (securityintelligence.com)
Businesses bolster defences against evolving ransomware (devx.com)
Ransomware Victims
Cyber attacks on London's hospitals continue to disrupt services - BBC News
Vladimir Putin's latest escalation has hit far too close to home (telegraph.co.uk)
Insurance Software Vendor Notifies 6.1 Million of 2023 Hack (govinfosecurity.com)
Infosys McCamish says LockBit stole data of 6 million people (bleepingcomputer.com)
Hundreds of Thousands Impacted in Children's Hospital Cyber Attack (darkreading.com)
Leading claimant firm hit in latest 'targeted cyber campaign' | Law Gazette
Evolve Bank & Trust Faces Wave of Suits Following Cyber Attack (bloomberglaw.com)
Wise confirms impact from Evolve Bank breach | SC Media (scmagazine.com)
Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Security Week
Croatia’s largest hospital KBC-Zagreb claimed by LockBit | Cybernews
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack (bleepingcomputer.com)
Fintech company Wise says some customers affected by Evolve Bank data breach | TechCrunch
Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach (darkreading.com)
Indonesia struggles to recover after cyber attack hits 282 agencies - Nikkei Asia
Lockbit Ransomware Attack Exposes Affirm Customers' Data (pcmag.com)
Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)
Hackers of Indonesian government apologize and give key • The Register
US new-vehicle sales growth slows after CDK cyber attack | Reuters
A cyber attack shutdown the University Hospital Centre Zagreb in Croatia (securityaffairs.com)
Patelco shuts down banking systems following ransomware attack (bleepingcomputer.com)
“Everything’s frozen”: Ransomware locks credit union users out of bank accounts | Ars Technica
Affirm to SEC: Customer info feared stolen in Evolve breach • The Register
Cambridge University Press & Assessment hit by cyber attack (timeshighereducation.com)
Phishing & Email Based Attacks
Escalating global cyber threats require robust layered security measures | TechRadar
Formula 1 governing body discloses data breach after email hacks (bleepingcomputer.com)
Router maker's support portal hacked, replies with MetaMask phishing (bleepingcomputer.com)
Other Social Engineering
Fake SMS – many fall victim to old scam – DW – 06/28/2024
Dozens of Arrests Disrupt €2.5m Vishing Gang - Infosecurity Magazine (infosecurity-magazine.com)
Artificial Intelligence
Generative AI is new attack vector endangering enterprises, says CrowdStrike CTO | ZDNET
AI will ‘turbocharge’ cyber crime, auditors warn - CIR Magazine
Getting the balance right between business innovation, security and AI (securitybrief.co.nz)
Deepfakes: Distorted Reality And The Growing Threat (informationsecuritybuzz.com)
The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)
Rethinking Cyber Security in the Age of AI - Security Boulevard
Friend or Foe? AI's Complicated Role in Cyber Security (darkreading.com)
How the rush to regulate AI could bring new cyber security challenges (betanews.com)
Organisations weigh the risks and rewards of using AI - Help Net Security
Financial services shun AI over job and regulatory fears
How Enterprises Can Safely Use Unstructured Data With LLMs (forbes.com)
Photos of Australian children found in AI training dataset, create deepfake risk | Biometric Update
Infostealing malware masquerading as generative AI tools - Help Net Security
2FA/MFA
How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)
3 Ways to Chill Attacks on Snowflake (darkreading.com)
Twilio's Authy App Breach Exposes Millions of Phone Numbers (thehackernews.com)
Twilio urges users to update Authy apps after hack (siliconrepublic.com)
2FA hack exposes millions of phone numbers to hackers - Android Authority
Malware
This new threat infects devices with a dozen malware at once | TechRadar
Multi-Malware 'Cluster Bomb' Campaign Drops Widespread Cyber Havoc (darkreading.com)
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data (thehackernews.com)
This Malware Targets Those Looking for Work: Here's How (makeuseof.com)
Unmasking Rafel RAT: Understanding the Threat - Zimperium
CapraRAT Spyware Disguised as Popular Apps Threatens Android Users (thehackernews.com)
How cyber criminals are using free IT tools, YouTube videos to spread malware - The Hindu
Fake IT support sites push malicious PowerShell scripts as Windows fixes (bleepingcomputer.com)
Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware (thehackernews.com)
China-linked APT exploited Cisco NX-OS zero-day to deploy custom malware (securityaffairs.com)
Indian Software Firm's Products Hacked to Spread Data-Stealing Malware (thehackernews.com)
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks (thehackernews.com)
South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware (thehackernews.com)
NCA’s Operation Morpheus targets illicit Cobalt Strike use | Computer Weekly
Europol shuts down Cobalt Strike servers used by hackers (stackdiary.com)
Infostealing malware masquerading as generative AI tools - Help Net Security
Infostealer malware logs used to identify child abuse website members (bleepingcomputer.com)
Hackers attack HFS servers to drop malware and Monero miners (bleepingcomputer.com)
Software Productivity Tools Hijacked to Deliver Infostealers (darkreading.com)
Mobile
Security experts issue warning over new spyware variant targeting Android users | ITPro
Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug - Security Week
Stop Using Your Face or Thumb to Unlock Your Phone (gizmodo.com)
Denial of Service/DoS/DDOS
Why every company needs a DDoS response plan - Help Net Security
Beware DDoS attacks - the raid which flies under the radar - BusinessCloud
New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks (thehackernews.com)
Internet of Things – IoT
Are smart home security systems more of a security risk than a benefit? | TechRadar
99% of IoT exploitation attempts rely on previously known CVEs - Help Net Security
Any IoT Device Can Be Hacked, Even Grills (darkreading.com)
Data Breaches/Leaks
The biggest data breaches in 2024: 1B stolen records and rising | TechCrunch
Russia's Midnight Blizzard stole email of more Microsoft customers (securityaffairs.com)
TeamViewer links corporate cyber attack to Russian state hackers (bleepingcomputer.com)
Ticketmaster Confirms User Email Addresses, Phone Numbers Stolen in Hack (pcmag.com)
Insurance Software Vendor Notifies 6.1 Million of 2023 Hack (govinfosecurity.com)
Infosys McCamish says LockBit stole data of 6 million people (bleepingcomputer.com)
Hundreds of Thousands Impacted in Children's Hospital Cyber Attack (darkreading.com)
Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)
Panama Papers: Court acquits all 28 charged with money laundering - BBC News
Landmark Admin Discloses Data Breach Impacting Personal, Medical Information - Security Week
‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk - Security Boulevard
3 Ways to Chill Attacks on Snowflake (darkreading.com)
Formula 1 governing body discloses data breach after email hacks (bleepingcomputer.com)
Twilio's Authy App Breach Exposes Millions of Phone Numbers (thehackernews.com)
Ethereum mailing list breach exposes 35,000 to crypto draining attack (bleepingcomputer.com)
2FA hack exposes millions of phone numbers to hackers - Android Authority
Dairy giant Agropur says data breach exposed customer info (bleepingcomputer.com)
300k Affected by Year-Old Data Breach at Florida Community Health Centers - Security Week
Healthcare fintech firm HealthEquity disclosed a data breach (securityaffairs.com)
Cambridge University Press & Assessment hit by cyber attack (timeshighereducation.com)
Organised Crime & Criminal Actors
Cyber criminals Are Free To Exploit Vulnerabilities Without Fear | HackerNoon
Cyber crime rises putting organisations under significant stress, report reveals (holyrood.com)
Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining (thehackernews.com)
Ethereum mailing list breach exposes 35,000 to crypto draining attack (bleepingcomputer.com)
Insider Risk and Insider Threats
A fifth of office workers have access to data from a previous employer - Business Plus
Insurance
Cyber insurance Premiums are Going Down: Here’s Why and What to Expect - Security Week
76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News
Insurers told they need to get active in cyber risk response (emergingrisks.co.uk)
Cyber insurance Bedevils Law Firms - Above the Law
Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)
Supply Chain and Third Parties
Cyber attacks on London's hospitals continue to disrupt services - BBC News
Ticketmaster Confirms User Email Addresses, Phone Numbers Stolen in Hack (pcmag.com)
Evolve Bank & Trust Faces Wave of Suits Following Cyber Attack (bloomberglaw.com)
Wise confirms impact from Evolve Bank breach | SC Media (scmagazine.com)
Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Security Week
Fintech company Wise says some customers affected by Evolve Bank data breach | TechCrunch
Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach (darkreading.com)
Cloud/SaaS
Ticketmaster sends notifications about recent massive data breach (bleepingcomputer.com)
Security in the public cloud explained: A guide for IT and security admins | Computer Weekly
Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard
Ensuring data security in an uncertain world | TechRadar
47% of corporate data stored in the cloud is sensitive - Help Net Security
Bare metal can come back, says Gartner, citing VMware prices • The Register
Identity and Access Management
Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard
3 Ways to Chill Attacks on Snowflake (darkreading.com)
Compliance, Security and the Role of Identity - Security Boulevard
Encryption
Modern Cryptographic Attacks: A Guide for the Perplexed - Check Point Research
Linux and Open Source
New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems (thehackernews.com)
PoC Exploit Published for Linux Kernel Privilege Escalation Flaw (cybersecuritynews.com)
Passwords, Credential Stuffing & Brute Force Attacks
Police allege ‘evil twin’ in-flight Wi-Fi used to steal info • The Register
RockYou2024: 10 billion passwords leaked in the largest compilation of all time | Cybernews
Hackers exploit critical D-Link DIR-859 router flaw to steal passwords (bleepingcomputer.com)
Social Media
Training, Education and Awareness
Cyber security training needs a human touch (betanews.com)
Fortinet annual skills gap report - more security training needed - Verdict
Regulations, Fines and Legislation
Banking groups balk at proposed cyber incident reporting rule | American Banker
Ensuring data security in an uncertain world | TechRadar
The Critical Role of Governments in EU Cyber Resilience - IDC Europe Blog (blog-idceurope.com)
How the rush to regulate AI could bring new cyber security challenges (betanews.com)
Financial services shun AI over job and regulatory fears
Models, Frameworks and Standards
Cyber Essentials at 10: Success or failure? | Computer Weekly
Backup and Recovery
Data Protection
47% of corporate data stored in the cloud is sensitive - Help Net Security
Careers, Working in Cyber and Information Security
Fortinet annual skills gap report - more security training needed - Verdict
Finance sector facing multiple skills shortages amid wider disruption - Business Plus
The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)
Cyber Workforce Grows 15% at Large Organisations - Infosecurity Magazine (infosecurity-magazine.com)
Cyber Workforce Numbers Rise for Larger Organisations (darkreading.com)
Here are 5 of the highest-paying cyber security jobs | Fortune Education
Law Enforcement Action and Take Downs
NCA’s Operation Morpheus targets illicit Cobalt Strike use | Computer Weekly
Europol shuts down Cobalt Strike servers used by hackers (stackdiary.com)
Dozens of Arrests Disrupt €2.5m Vishing Gang - Infosecurity Magazine (infosecurity-magazine.com)
Misinformation, Disinformation and Propaganda
Cyber hacktivists issue “call to arms” to target elections in Europe, UK (verdict.co.uk)
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
Full-blown cyberwar: a Hollywood worthy scenario | Cybernews
Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News
Nation State Actors
China
China is turning to private firms for offensive cyber operations - Defense One
Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware (thehackernews.com)
Taiwan reports over 100 cyber security incidents in May | Taiwan News | Jun. 29, 2024 14:22
Russia
Russia's Midnight Blizzard stole email of more Microsoft customers (securityaffairs.com)
Russian hackers behind NHS attack are part of Kremlin-protected cyber army (inews.co.uk)
Microsoft reveals even more emails to customers were accessed by Russia-based hackers - Neowin
Vladimir Putin's latest escalation has hit far too close to home (telegraph.co.uk)
Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)
Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News
Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)
‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk - Security Boulevard
Poland to probe Russia-linked cyber attack on state news agency (therecord.media)
US Announces $10 Mln Bounty for Russian Hacker Behind 2022 Hack Targeting Ukraine (kyivpost.com)
Alert: French Diplomats Targeted By Russian Cyber Attacks - Security Boulevard
North Korea
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data (thehackernews.com)
Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Cyber hacktivists issue “call to arms” to target elections in Europe, UK (verdict.co.uk)
Tools and Controls
Cyber security training needs a human touch (betanews.com)
Rising risks set to drive huge investment in cyber security (emergingrisks.co.uk)
Cyber security is worth the spend | TechRadar
Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)
Half of IT pros think there are devices on their network they don't know about (betanews.com)
Fortinet annual skills gap report - more security training needed - Verdict
A fifth of office workers have access to data from a previous employer - Business Plus
Escalating global cyber threats require robust layered security measures | TechRadar
Fake IT support sites push malicious PowerShell scripts as Windows fixes (bleepingcomputer.com)
Reduce security risk with 3 edge-securing steps | CSO Online
76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News
The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)
Adapting cyber security strategies to the escalating threat landscape (securitybrief.co.nz)
Navigating the cyber security tempest in the UK organisations (thehrdirector.com)
Insurers told they need to get active in cyber risk response (emergingrisks.co.uk)
Cyber insurance Bedevils Law Firms - Above the Law
How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)
Companies spend more on cyber security but struggle to track expenses - Help Net Security
Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)
Organisations use outdated approaches to secure APIs - Help Net Security
Kaspersky software ban: CISOs must move quickly, experts say | CSO Online
Rethinking Cyber Security in the Age of AI - Security Boulevard
Friend or Foe? AI's Complicated Role in Cyber Security (darkreading.com)
Blurred lines: Securing the physical and digital sides of business - IT Security Guru
Understanding collective defence as a route to better cyber security | TechRadar
Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict
Staying Ahead of Adversarial AI with Incident Response Automation - Security Boulevard
Embracing Automation: The Key to Proactive Security | MSSP Alert
SIEM-Apocalypse: Protecting Your Security Team in a Time of Turmoil | MSSP Alert
US folk still buying in 3rd-party antivirus, more so the old • The Register
Four Reasons Why You Should Evaluate Your Cyber Security System (forbes.com)
Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)
Compliance, Security and the Role of Identity - Security Boulevard
Why AI is essential to securing software and data supply chains (betanews.com)
4 key steps to building an incident response plan - Help Net Security
Reports Published in the Last Week
Other News
Cyber Criminals Are Free To Exploit Vulnerabilities Without Fear | HackerNoon
Google is cracking down on internet security in this big way | Digital Trends
Water supplies remain ‘too weak’ when it comes to cyber security - Digital Journal
Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard
Hackers Are Hiding in Plain Sight: Insights from Our 2024 Cyber Threat Report | Huntress
Blurred lines: Securing the physical and digital sides of business - IT Security Guru
Understanding collective defence as a route to better cyber security | TechRadar
Over 380k Hosts Still Referencing Malicious Polyfill Domain: Censys - Security Week
Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies (thehackernews.com)
Cyber attack handling ‘staggeringly incompetent’ | Guernsey Press
Paris Olympics 2024: The rising threat of cyber attacks (yahoo.com)
States of Guernsey hit by attempted cyber attack on emails - BBC News
Food Security: Mitigating the Dangers of Digital Poison | AFCEA International
CISA director: US 'not afraid' to probe holes in Big Tech • The Register
Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)
Kaspersky software ban: CISOs must move quickly, experts say | CSO Online
Space: The Final Frontier for Cyber Attacks (informationweek.com)
IT Security Responsibilities for Online Start-Ups - IT Security Guru
To guard against cyber attacks in space, researchers ask ‘what if?’ (theconversation.com)
Protecting our data in a world of rising cyber attacks - IT Security Guru
States hit back at deputies’ IT security criticism | Bailiwick Express
OPINION: Why cyber security urgently needs updating in transportation | Traffic Technology Today
Vulnerability Management
Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)
Embracing the Absurd: Finding Freedom in Cyber Security - Security Boulevard
The Great Overcomplication | AFCEA International
99% of IoT exploitation attempts rely on previously known CVEs - Help Net Security
Smashing Silos With a Vulnerability Operations Center (VOC) - Security Boulevard
Vulnerabilities
PoC Exploit Published for Linux Kernel Privilege Escalation Flaw (cybersecuritynews.com)
3 million iOS and macOS apps were exposed to potent supply-chain attacks | Ars Technica
'Almost every Apple device' vulnerable to CocoaPods • The Register
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining (thehackernews.com)
Critical GitLab Bug Threatens Software Development Pipelines (darkreading.com)
Juniper releases out-of-cycle fix for max severity auth bypass flaw (bleepingcomputer.com)
This Windows 11 bug may break Windows Security (xda-developers.com)
Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Security Week
New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data (thehackernews.com)
Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug - Security Week
Gogs vulnerabilities may put your source code at risk | SC Media (scmagazine.com)
Hackers exploit critical D-Link DIR-859 router flaw to steal passwords (bleepingcomputer.com)
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.