Black Arrow Cyber Threat Briefing 06 September 2024
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Active Ransomware Groups Surge by 56% in 2024
There was a 56% increase in active ransomware gangs in the first half of 2024, with 73 groups in operation compared to 46 in H1 2023. This rise highlights the growing fragmentation of the ransomware landscape, partly driven by law enforcement actions that disrupted major Ransomware-as-a-Service (RaaS) groups. Notably, ransomware gang BlackCat disappeared after an “exit scam” following a ransom from US healthcare provider Change Healthcare in March 2024. Smaller groups are now emerging rapidly, executing targeted attacks, and frequently reappearing under new identities, complicating cyber security efforts.
Authorised Push Payment (APP) Fraud Dominates as Scams Hit All-Time High
The UK’s Financial Ombudsman Service reported a record high in fraud and scam cases in Q2 2024, with authorised push payment (APP) fraud making up over half of the complaints. APP fraud, where victims are tricked into transferring money to fraudsters, is contentious as many banks argue that victims made a conscious decision, thus forfeiting reimbursement. Between April and June 2024, 8,734 complaints were lodged, marking a 43% year-on-year increase. The rise is attributed not only to increased fraud but also to more complex multi-stage fraud, card payments lacking protection, and more cases being filed by professional representatives.
Phishing Remains Top Cyber Threat, Credential Exposure Incidents Surging
ReliaQuest’s Q3 2024 Attacker Trends Analysis reveals that phishing remains the top cyber threat, accounting for 37% of incidents. However, credential exposure incidents have surged dramatically to 88% of security alerts, up from 60% in 2023, indicating a critical weakness in credential management. Malware, particularly the Remote Access Trojan (RAT) "SocGholish", affected 23% of customers, often linked to phishing campaigns. Additionally, MITRE ATT&CK techniques such as T1078 (Valid Accounts) and T1204 (User Execution) were frequently exploited, highlighting the need for stronger credential protection and phishing defences.
When Cyber Security Breaches Are Inevitable, It's Time to Call for A New Approach
At a recent TED Conference discussions highlighted how emerging technologies like AI and quantum computing are poised to both elevate and challenge cyber security. Research from Proofpoint shows that 94% of cloud customers were targeted monthly in 2023, with 62% successfully compromised, underscoring the increased risk. To counter this, businesses must adopt a cyber resilience mindset, focusing on sustaining operations during and after a cyber attack. This involves planning, regular practice, early detection, and partnerships to ensure organisations remain resilient amid growing cyber threats.
Critical infrastructure Sustained 13 Cyber Attacks per Second in 2023
Critical infrastructure faced over 420 million cyber attacks between January 2023 and January 2024, marking a 30% rise from the previous year. Power grids, transportation, and communication networks are particularly vulnerable due to the severe disruption any failures would cause. The US, UK, Germany, India, and Japan were the most frequently targeted, with threat actors predominantly originating from China, Russia, and Iran. The increasing digitisation of global infrastructure has heightened the risk of cyber attacks, particularly following the onset of the war in Ukraine.
How Phishing Messages Break Through Email Filters
The APWG’s Phishing Activity Trends Report for Q1 2024 revealed over 963,000 phishing attacks, with Business Email Compromise (BEC) fraud seeing a 50% rise in the average wire transfer request to $84,000. Cyber security researchers at LevelBlue Labs detailed sophisticated evasion techniques used by attackers, including voice phishing (vishing), exploiting compromised accounts, and leveraging social engineering. Attackers bypass email security gateways (SEGs) by using advanced tactics such as manipulating ZIP archives and reversing text in email source code, enabling them to distribute malware undetected. These developments highlight the urgent need for enhanced anti-phishing measures and user vigilance.
Can Every Business Afford to Be a Target?
Small and medium-sized businesses (SMBs) face an evolving cyber threat landscape, as cyber criminals increasingly adopt business models like Ransomware-as-a-Service (RaaS). According to recent findings, SMBs are particularly vulnerable due to limited financial and staffing resources, leaving them exposed to phishing attacks, leaked data, and common technology vulnerabilities. Ransomware groups provide tools to less skilled attackers, expanding the scope of attacks. Phishing remains a significant threat, especially as SMBs rely on SaaS applications. To protect themselves, SMBs must find cost-effective solutions, such as automated threat monitoring and leveraging AI for threat intelligence analysis.
To Beat Cyber-Crime Your Business Needs a Cyber Hygiene Review
A recent survey revealed that 58% of large businesses experienced cyber crime in the past 12 months, costing around £5,000 per incident. With human error responsible for 95% of cyber security breaches, a focus on cyber hygiene is critical. Organisations should conduct a ‘cyber-hygiene deep clean,’ which includes documenting all hardware, software, and applications, and updating or uninstalling outdated or unused systems. Regular password updates, software patches, and thorough vulnerability assessments of public-facing assets are essential to prevent breaches. Protecting customer data, especially PII, must be prioritised to avoid compliance issues and fines.
UK Public Growing Anxious Over Dependence on IT Systems
A recent survey by OnePoll for the International Cyber Expo found that 78% of UK respondents are concerned about the heavy reliance of global organisations on IT systems and software providers. This comes after the July 2024 CrowdStrike outage, where a faulty update affected around 8.5 million computers worldwide, disabling many Windows systems. The survey revealed that 44% of respondents were impacted, with 18% directly affected and 26% knowing someone who was. The incident highlights growing apprehension over cyber security vulnerabilities and the potential for widespread disruption to everyday life and business operations.
Russia’s Most Notorious Special Forces Unit Tied to Assassinations and Sabotage, Now Has Its Own Cyber Warfare Team
A new cyber threat group, identified as Cadet Blizzard and linked to Russia’s GRU Unit 29155, has been revealed by Western government agencies. Known for its physical sabotage and assassinations, Unit 29155 has now developed a cyber warfare team responsible for multiple hacking operations targeting Ukraine, the US, and other countries. Since 2022, the group has launched attacks using Whispergate malware, which destroyed data in at least two dozen Ukrainian organisations, and engaged in defacement and data theft under the guise of a fake hacktivist group, Free Civilian. This intertwining of physical and digital tactics highlights the growing threat posed by state-sponsored cyber warfare.
Sources
https://www.infosecurity-magazine.com/news/active-ransomware-groups-surge/
https://www.infosecurity-magazine.com/news/app-fraud-scams-alltime-high/
https://informationsecuritybuzz.com/phishing-top-cyber-threat-despite-drop/
https://www.techradar.com/pro/critical-infrastructure-sustained-13-cyber-attacks-per-second-in-2023
https://cybersecuritynews.com/phishing-email-filter-breakthroughs/
https://informationsecuritybuzz.com/can-every-business-afford-to-be-target/
https://itbrief.co.uk/story/uk-public-growing-anxious-over-dependence-on-it-systems
https://www.wired.com/story/russia-gru-unit-29155-hacker-team/
Governance, Risk and Compliance
To beat cyber-crime your business needs a cyber-hygiene review - Digital Journal
More than a CISO: the rise of the dual-titled IT leader | CSO Online
Quantifying Risks to Make the Right Cyber Security Investments (inforisktoday.com)
When Cyber Security Breaches Are Inevitable, It's Time To Call For A New Approach (forbes.com)
Making Enterprises Resilient In The Face Of Growing Cyber Threats (forbes.com)
Why the CFO-CISO relationship is key to mitigating cyber risk - Raconteur
Can Every Business Afford To Be A Target? (informationsecuritybuzz.com)
The true cost of cyber crime for your business - Help Net Security
Boards Need to Take a Hard Look tt Their Cyber Vulnerabilities (forbes.com)
Incident response planning vital for cyber security (devx.com)
Surge in cyber risks will create new exposures (emergingrisks.co.uk)
Security boom is over, with third of budgets flat or falling • The Register
How Should You Manage Cyber Risk in 2024? (informationweek.com)
Cost of a data breach: Cost savings with law enforcement involvement (securityintelligence.com)
Don’t Get Your Security from Your RMM Provider: The Risks You Should Know | MSSP Alert
Insurance groups urge state support for ‘uninsurable’ cyber risks (ft.com)
Threats
Ransomware, Extortion and Destructive Attacks
RansomHub claims 210 scalps in bid for ransomware supremacy • The Register
Ransomware gangs of 2024: The rise of the affiliates (techinformed.com)
Everything you need to know about RansomHub, the new force in the digital extortion industry | ITPro
New ransomware group is hitting VMware ESXi systems hard | TechRadar
Active Ransomware Groups Surge by 56% in 2024 - Infosecurity Magazine (infosecurity-magazine.com)
Global Ransomware Attacks Spiked Along with Payments and Demands in Q2: Corvus (claimsjournal.com)
Ransomware tactics 2024: why you need to protect yourself differently | TechFinitive
How ransomware tactics are shifting, and what it means for your business - Help Net Security
Why Are Organisations Losing the Ransomware Battle? | Axio
IT worker charged over $750,000 cyber extortion plot against former employer (bitdefender.com)
Qilin Ransomware Attack Used To Steal Chrome Browser Data - Security Boulevard
RansomHub Emerges in Rapidly Evolving Ransomware Landscape - Security Boulevard
Fog ransomware crew evolving into wide-ranging threat | Computer Weekly
Cicada Ransomware - What You Need To Know | Tripwire
83% of organisations experienced at least one ransomware attack in the last year - Help Net Security
Researcher sued for sharing data stolen by ransomware with media (bleepingcomputer.com)
Cicada3301 ransomware’s Linux encryptor targets VMware ESXi systems (bleepingcomputer.com)
Ransomware Gangs Pummel Southeast Asia (darkreading.com)
Linux Ransomware Threats: How Attackers Target Linux Systems (itprotoday.com)
Ransomware Victims
Housing charity latest to get hit by ransomware attack - TFN
City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack - SecurityWeek
Tewkesbury Borough Council cyber attack sparks disruption - BBC News
Halliburton confirms data was stolen in ongoing cyber attack | TechCrunch
‘Critical’ cyber attack on pension fund ‘almost certain’ - Somerset Live
Lockbit claims breach on Canada’s largest school board: Is the group back with a vengeance? | ITPro
Planned Parenthood confirms cyber attack as RansomHub claims breach (bleepingcomputer.com)
Phishing & Email Based Attacks
How Phishing Messages Break Through Email Filters - Report (cybersecuritynews.com)
Phishing Remains Top Cyber Threat (informationsecuritybuzz.com)
File-sharing phishing attacks zero-in on the financial sector | SC Media (scmagazine.com)
Iranian cyber criminals are targeting WhatsApp users in spear phishing campaign | Malwarebytes
Help friends and family avoid phishing emails (appleinsider.com)
Novel attack on Windows spotted in Chinese phishing campaign • The Register
Travelers Beware of Sophisticated Booking.com Phishing Attack (cybersecuritynews.com)
Business Email Compromise (BEC)
Nigerian man sentenced to 5 years for role in BEC operation | CyberScoop
Two Nigerians Sentenced to Prison in US for BEC Fraud - SecurityWeek
Other Social Engineering
How Phishing Messages Break Through Email Filters - Report (cybersecuritynews.com)
APP Fraud Dominates as Scams Hit All-Time High - Infosecurity Magazine (infosecurity-magazine.com)
Stop Scanning Random QR Codes (gizmodo.com)
Quishing, an insidious threat to electric car owners (securityaffairs.com)
VIEW: Deepfakes represent growing cyber threat - CIR Magazine
The attack with many names: SMS Toll Fraud - Help Net Security
FBI warns crypto firms of aggressive social engineering attacks (bleepingcomputer.com)
Travelers Beware of Sophisticated Booking.com Phishing Attack (cybersecuritynews.com)
Cryptohack Roundup: Focus on Pig Butchering - DataBreachToday
Recruiters and job candidates need to be vigilant of emerging cyber crime (thehrdirector.com)
North Korean Hackers Targets Job Seekers with Fake FreeConference App (thehackernews.com)
Iranian cyber criminals are targeting WhatsApp users in spear phishing campaign | Malwarebytes
Artificial Intelligence
The six most dangerous new threats security teams need to know about - IT Security Guru
AI-enhanced cyber attack tops emerging enterprise risk rankings – Gartner - CIR Magazine
AI as an Insider Threat | AFCEA International
87% of executives are concerned about bot attacks and AI fraud | Security Magazine
Deepfakes represent growing cyber threat - CIR Magazine
Gen reveals 46% surge in cyber attacks; AI scams grow rapidly (securitybrief.co.nz)
Think hard before deploying Copilot for Microsoft 365 • The Register
Businesses still ready to invest in Gen AI, with risk management a top priority | ZDNET
Clearview AI fined $33 million for facial recognition database | TechRadar
There are many reasons why companies struggle to exploit generative AI, says Deloitte survey | ZDNET
1 in 3 workers are using AI multiple times a week - and they're shouting about it | ZDNET
Inside NSA's partnerships with AI makers to prevent future attacks - Washington Times
Is AI the new bloatware? | ZDNET
AI, cyber and critical infrastructure | Professional Security
Governments need to beef up cyberdefence for the AI era - and get back to the basics | ZDNET
2FA/MFA
The six most dangerous new threats security teams need to know about - IT Security Guru
How Hackers Bypass MFA, And What You Can Do About It (forbes.com)
Admins of MFA bypass service plead guilty to fraud (bleepingcomputer.com)
UK trio pleads guilty to operating $10M MFA bypass biz • The Register
Malware
'Voldemort' Malware Curses Orgs Using Global Tax Authorities (darkreading.com)
This malware pretends to be a real VPN service to lure in victims | TechRadar
GitHub comments abused to spread Lumma Stealer malware as fake fixes (bleepingcomputer.com)
Godzilla Fileless Backdoor Exploits Atlassian Confluence Vulnerability (cybersecuritynews.com)
3,000 "ghost accounts" on GitHub spreading malware (securityintelligence.com)
Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore (thehackernews.com)
New Golang malware capable of cross-platform backdoor attacks spotted in the wild | TechRadar
What is malvertising? Cyber criminals exploiting search ads to spread malware | Invezz
China's 'Earth Lusca' Propagates Multiplatform Backdoor (darkreading.com)
Microsoft Observed A New Tickler Malware Attack Satellite Devices (cybersecuritynews.com)
Chinese organisations are being hit by Cobalt Strike malware from within China | TechRadar
New Backdoor Used By Iranian State-Sponsored Group | Decipher (duo.com)
Thousands of abandoned PyPI projects could be hijacked: Report | CSO Online
Fake OnlyFans cyber crime tool infects hackers with malware (bleepingcomputer.com)
Numerous malware deployed in prolonged APT32 intrusion | SC Media (scmagazine.com)
Mobile
Android And iOS Users Attacked By Russian APT29 Hackers, Google Warns (forbes.com)
This Popular App Company Was Sold, and Now Its Android Apps Are a Privacy Risk (makeuseof.com)
Iranian cyber criminals are targeting WhatsApp users in spear phishing campaign | Malwarebytes
Denial of Service/DoS/DDOS
Massive DDoS poured 3.15 billion packets per second on Microsoft server | Cybernews
Only 25% of organisations are prepared to manage a DDoS attack | Security Magazine
Internet of Things – IoT
Attacks Continue on Connected Devices - Electrical Contractor Magazine (ecmag.com)
A Deep Dive Into IoT Communication Protocols (informationsecuritybuzz.com)
CCTV biz Verkada pays $3M to settle FTC complaint • The Register
Data Breaches/Leaks
170 million strong data leak traced to US data broker | TechRadar
Over 1.4M Users Exposed in Tracelo Breach | MSSP Alert
Microchip Technology confirms data was stolen in cyber attack (bleepingcomputer.com)
Organised Crime & Criminal Actors
Philippine authorities detain more than 160 people over suspected cyber crime operation - Bloomberg
Admins of MFA bypass service plead guilty to fraud (bleepingcomputer.com)
CEO's Arrest Likely Won't Dampen Cyber criminal Interest in Telegram (darkreading.com)
Alleged cyber criminal wanted by US spent 15 years evading arrest (voanews.com)
The true cost of cyber crime for your business - Help Net Security
UK trio pleads guilty to operating $10M MFA bypass biz • The Register
Cyber criminals use legitimate software for attacks increasing (securitybrief.co.nz)
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Microsoft Says North Korean Cryptocurrency Thieves Behind Chrome Zero-Day - SecurityWeek
FTC: Over $110 million lost to Bitcoin ATM scams in 2023 (bleepingcomputer.com)
FBI warns crypto firms of aggressive social engineering attacks (bleepingcomputer.com)
North Korean scammers prep stealth attacks on crypto outfits • The Register
Cryptohack Roundup: Focus on Pig Butchering - DataBreachToday
Insider Risk and Insider Threats
How Employees Can Protect a Company's Cyber Security - DevX
IT worker charged over $750,000 cyber extortion plot against former employer (bitdefender.com)
INSIDER THREAT AWARENESS MONTH: Are you prepared? - IT Security Guru
Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities (thehackernews.com)
Human firewalls are essential to keeping SaaS environments safe - Help Net Security
AI as an Insider Threat | AFCEA International
Insurance
Insurance groups urge state support for ‘uninsurable’ cyber risks (ft.com)
Supply Chain and Third Parties
UK Public Worried About Global Over Reliance on IT Systems - IT Security Guru
Improved Software Supply Chain Resilience Equals Increased Security (darkreading.com)
What is Vendor Risk Monitoring in Cyber Security? | UpGuard
Top 8 Vendor Risk Monitoring Solutions in 2024 | UpGuard
Boards Need To Take A Hard Look At Their Cyber Vulnerabilities (forbes.com)
Cloud/SaaS
A third of organisations suffered a SaaS data breach this year - Help Net Security
File-sharing phishing attacks zero-in on the financial sector | SC Media (scmagazine.com)
How Confident Are You That Your Critical Saas Applications Are Secure? (thehackernews.com)
Human firewalls are essential to keeping SaaS environments safe - Help Net Security
What Is the Shared Fate Model? (darkreading.com)
Rising cloud costs leave CIOs seeking ways to cope | CIO
Outages
UK public growing anxious over dependence on IT systems (itbrief.co.uk)
We must break tech monopolies before they break us (thenextweb.com)
Boards Need To Take A Hard Look At Their Cyber Vulnerabilities (forbes.com)
Identity and Access Management
Why Identity Teams Need to Start Reporting to the CISO (darkreading.com)
The Evolution of Identity and Access Management (IAM) - Security Boulevard
Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities (thehackernews.com)
Linux and Open Source
Linux Ransomware Threats: How Attackers Target Linux Systems (itprotoday.com)
Passwords, Credential Stuffing & Brute Force Attacks
Why You Shouldn't Store Passwords in Your Browser: Password Security Risks | HackerNoon
The New Effective Way to Prevent Account Takeovers (thehackernews.com)
Social Media
Russian minister: Telegram 'too free' on content moderation • The Register
Hacker Leaks Data of 390 Million Users from VK, a Russian Social Network (hackread.com)
Germany’s Far Right Is in a Panic Over Telegram | WIRED
Fake OnlyFans cyber crime tool infects hackers with malware (bleepingcomputer.com)
Malvertising
In plain sight: Malicious ads hiding in search results (welivesecurity.com)
What is malvertising? Cyber criminals exploiting search ads to spread malware | Invezz
Your Google searches becoming big target for 'malvertising' hackers (cnbc.com)
Malvertising is popping up on search engines - The Hustle
Regulations, Fines and Legislation
Clearview AI fined $33 million for facial recognition database | TechRadar
UK Signs Council of Europe AI Convention - Infosecurity Magazine (infosecurity-magazine.com)
CCTV biz Verkada pays $3M to settle FTC complaint • The Register
Models, Frameworks and Standards
6 IT risk assessment frameworks compared | CSO Online
Banks Brace for DORA Cyber Security Deadline on Jan. 17 (inforisktoday.com)
NIST Cybersecurity Framework (CSF) and CTEM – Better Together (thehackernews.com)
Complying with PCI DSS requirements by 2025 - Help Net Security
Explaining The OWASP API Security Top 10 (informationsecuritybuzz.com)
NIST Obtains OpenAI, Anthropic AI Model Access | MSSP Alert
Making Sense of Cyber Security Standards Like FedRAMP (pymnts.com)
Careers, Working in Cyber and Information Security
Championing the Wins to Improve Wellbeing in the Cyber Workplace - IT Security Guru
Biden admin calls infosec 'national service' in job-fill bid • The Register
Are IT certifications replacing the college degree? | CIO
Law Enforcement Action and Take Downs
Philippine authorities detain more than 160 people over suspected cyber crime operation - Bloomberg
IT worker charged over $750,000 cyber extortion plot against former employer (bitdefender.com)
Admins of MFA bypass service plead guilty to fraud (bleepingcomputer.com)
CEO's Arrest Likely Won't Dampen Cyber criminal Interest in Telegram (darkreading.com)
Nigerian man sentenced to 5 years for role in BEC operation | CyberScoop
Alleged cyber criminal wanted by US spent 15 years evading arrest (voanews.com)
UK trio pleads guilty to operating $10M MFA bypass biz • The Register
Two Nigerians Sentenced to Prison in US for BEC Fraud - SecurityWeek
Cost of a data breach: Cost savings with law enforcement involvement (securityintelligence.com)
Misinformation, Disinformation and Propaganda
Justice Department accuses Russia of interfering with 2024 elections | CyberScoop
US charges Russian GRU hacking team behind WhisperGate • The Register
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
Nation State Actors
China
China's 'Earth Lusca' Propagates Multiplatform Backdoor (darkreading.com)
Chinese organisations are being hit by Cobalt Strike malware from within China | TechRadar
Novel attack on Windows spotted in Chinese phishing campaign • The Register
Russia
NCSC and allies call out Russia's Unit 29155 over cyber warfare | Computer Weekly
Russian GRU Unit Tied to Assassinations Linked to Global Cyber Sabotage and Espionage - SecurityWeek
Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team | WIRED
Android And iOS Users Attacked By Russian APT29 Hackers, Google Warns (forbes.com)
Justice Department accuses Russia of interfering with 2024 elections | CyberScoop
Sweden warns of heightened risk of Russian sabotage | Sweden | The Guardian
Russian military intelligence organised cyber attacks against Estonian institutions | News | ERR
US charges Russian GRU hacking team behind WhisperGate • The Register
The FCC has finally banned Kaspersky from telecoms kits | TechRadar
Iran
Israeli spies targeted by Iranian hackers | SC Media (scmagazine.com)
Iranian cyber criminals are targeting WhatsApp users in spear phishing campaign | Malwarebytes
New Backdoor Used By Iranian State-Sponsored Group | Decipher (duo.com)
North Korea
North Korean scammers prep stealth attacks on crypto outfits • The Register
North Korean Hackers Targets Job Seekers with Fake FreeConference App (thehackernews.com)
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Numerous malware deployed in prolonged APT32 intrusion | SC Media (scmagazine.com)
Civil Rights Groups Call For Spyware Controls - Infosecurity Magazine (infosecurity-magazine.com)
Germany’s Far Right Is in a Panic Over Telegram | WIRED
Hacker Leaks Data of 390 Million Users from VK, a Russian Social Network (hackread.com)
Spyware vendors thwart restrictions by changing names, reorganise, move - The Washington Post
Predator spyware resurfaces with signs of activity, Recorded Future says | CyberScoop
Civil Rights Groups Call For Spyware Controls - Infosecurity Magazine (infosecurity-magazine.com)
Tools and Controls
To beat cyber-crime your business needs a cyber-hygiene review - Digital Journal
Evolution of Attack Surface Management - Security Boulevard
This malware pretends to be a real VPN service to lure in victims | TechRadar
API Attack Surface: How to secure it and why it matters - Security Boulevard
Why enterprises need real-time visibility of their invisible threats (betanews.com)
Quantifying Risks to Make the Right Cyber Security Investments (inforisktoday.com)
When Cyber Security Breaches Are Inevitable, It's Time To Call For A New Approach (forbes.com)
Making Enterprises Resilient In The Face Of Growing Cyber Threats (forbes.com)
Why the CFO-CISO relationship is key to mitigating cyber risk - Raconteur
Choosing the Best Cyber Security Prioritization Method for Your Organisation - Security Boulevard
What is Vendor Risk Monitoring in Cyber Security? | UpGuard
Is the "Network" Defendable? - Security Boulevard
How Confident Are You That Your Critical SaaS Applications Are Secure? (thehackernews.com)
The Evolution of Identity and Access Management (IAM) - Security Boulevard
NIST Cybersecurity Framework (CSF) and CTEM – Better Together (thehackernews.com)
Explaining The OWASP API Security Top 10 (informationsecuritybuzz.com)
Incident response planning vital for cyber security (devx.com)
Rising cloud costs leave CIOs seeking ways to cope | CIO
Think hard before deploying Copilot for Microsoft 365 • The Register
Use AI threat modeling to mitigate emerging attacks | TechTarget
Don’t Get Your Security from Your RMM Provider: The Risks You Should Know | MSSP Alert
Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore (thehackernews.com)
Businesses still ready to invest in Gen AI, with risk management a top priority | ZDNET
Inside NSA's partnerships with AI makers to prevent future attacks - Washington Times
Other News
Critical infrastructure sustained 13 cyber attacks per second in 2023 | TechRadar
SQL injection bug allows anyone to skip airport security • The Register
TfL cyber attack could be due to poor cyber-hygiene, expert says - Verdict
TfL cyber attack could've brought London 'to a standstill' (telecomstechnews.com)
Can Every Business Afford To Be A Target? (informationsecuritybuzz.com)
We must break tech monopolies before they break us (thenextweb.com)
Cyber criminals use legitimate software for attacks increasing (securitybrief.co.nz)
Is the "Network" Defendable? - Security Boulevard
Surge in cyber risks will create new exposures (emergingrisks.co.uk)
Five notorious cyber attacks that targeted governments (theconversation.com)
Vulnerability Management
Tenable finds only 3% of vulnerabilities pose significant risks (securitybrief.co.nz)
Businesses must act now to address the zero day surge | TechRadar
Vulnerabilities
Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues (thehackernews.com)
Critical Flaws in Progress Software WhatsUp Gold Expose Systems to Full Compromise - SecurityWeek
Cisco warns of backdoor admin account in Smart Licensing Utility (bleepingcomputer.com)
Godzilla Fileless Backdoor Exploits Atlassian Confluence Vulnerability (cybersecuritynews.com)
Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux (cybersecuritynews.com)
Chrome 128 Updates Patch High-Severity Vulnerabilities - SecurityWeek
Your Google Pixel Phone's September Update Arrived (droid-life.com)
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel | Ars Technica
Worried about the YubiKey 5 vulnerability? Here's why I'm not | ZDNET
Apache OFBiz Update Fixes High-Severity Flaw Leading to Remote Code Execution (thehackernews.com)
ServiceNow Vulnerabilities: CVE-2024-4789 and CVE-2024-5217 | UpGuard
Log4j Continues to act as Organisational Vulnerability - Security Boulevard
DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign - SecurityWeek
Vulnerabilities In Two WordPress Contact Form Plugins Affect +1.1 Million (searchenginejournal.com)
VMware fixed a code execution flaw in Fusion hypervisor (securityaffairs.com)
D-Link says it is not fixing four RCE flaws in DIR-846W routers (bleepingcomputer.com)
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.