Black Arrow Cyber Threat Briefing 19 July 2024
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Crowdstrike: Software Update Triggered Worldwide Microsoft IT Outages
A recent report by cyber security firm Crowdstrike reveals that a "defect" in its software update caused major IT outages globally, affecting industries such as airlines, banking, and healthcare. The issue, which impacted Windows operating systems, was identified, isolated, and resolved, but not until a huge amount of disruption had been experienced around the world. American Airlines and other affected services have since restored operations. This incident, the worst since the 2017 WannaCry attack, resulted in a fall of over 20% ($16 billion) in Crowdstrike's value before markets opened. The event raises questions about the resilience of economic infrastructure reliant on concentrated cloud security services.
Nearly Half of SMEs Fell Victim to Cyber Attack in Last Six Months
A recent report by JumpCloud reveals that 49% of SME IT teams believe they lack the resources to defend against cyber threats. The survey, which included 612 IT decision-makers in the UK and US, found that nearly half (45%) of SMEs experienced a cyber attack in the first half of 2024. Of these, 28% faced two attacks and 17% encountered three. Phishing was the most common attack source (43%), followed by shadow IT (37%) and stolen credentials (33%). The report also highlights that 60% of respondents identified security as their biggest IT challenge, with 84% expressing concern about shadow IT (referring to any software, hardware, or other IT resource that is used within an organisation without the explicit approval, knowledge, or oversight of the IT department). Furthermore, 71% of respondents believe budget cuts would increase organisational risk, underscoring the high threat level SMEs face.
Cyber Criminals Exploit AI for Near-Perfect Phishing Emails
A new report by ReliaQuest reveals cyber criminals exploiting AI tools like ChatGPT for operations, notably creating near-perfect phishing emails with a 2.8% success rate. Although seemingly small, this rate is significant given the vast number of phishing emails sent daily. Criminals bypass AI security filters to generate harmful content, sharing and refining their techniques in cyber criminal forums.
Hotel Wi-Fi: A Hotspot for Cyber Threats
A recent report highlights significant cyber threats associated with hotel Wi-Fi networks, which prioritise guest access over robust security. Hotels had the third-least secure public Wi-Fi as of February 2023. In 2019, none of the 45 hotels across five countries that were tested passed a Wi-Fi hacking test, reflecting widespread vulnerabilities. Hotels are the third most common target for cyber attacks, accounting for 13% of all cyber compromises in 2020. Nearly 31% of hospitality organisations have experienced a data breach, with 89% facing multiple breaches annually. These breaches, averaging $3.4 million in costs, pose severe reputational risks in the competitive hospitality industry, and bigger risks for the hotel guests using them.
Cyber Security Can Be a Business Enabler
Many cyber security leaders tout the notion that cyber security is a business enabler as a way to elevate their personal brand, but the idea is backed up by knowledge and real-world examples. By reducing unnecessary controls and ensuring secure yet functional operations, organisations can enhance productivity and innovation. Effective cyber security can reduce legal fees and financial losses from breaches, while also boosting customer and partner confidence. Furthermore, compliance with regulations enhances business value, and strong security practices can differentiate an organisation from its competitors, fostering growth and trust.
Navigating Insider Risks: Are your Employees Enabling External Threats?
A recent report highlights the growing threat of accidental insiders in network security breaches. These insiders, through negligence or lack of awareness, expose internal weaknesses. Common issues include weak password practices and falling victim to phishing. Such lapses can lead to significant financial losses, reputational damage, and operational disruption. The report highlights the importance of security awareness training and fostering a culture of security to mitigate these risks effectively.
How Tabletop Exercises Can Sharpen Incident Response from Chaos to Calm
Every 39 seconds some company is hit by a cyber attack. Security incidents are a constant threat, an inevitability rather than a possibility. Incident response plans can help organisations with the aftermath of a cyber attack. Effective execution of these plans requires regular practice through tabletop exercises. These hypothetical, scenario-based activities involve key stakeholders and help clarify roles, enhance communication, and build team resilience. By conducting these exercises at least annually, organisations can identify gaps, refine their response plans, and improve overall cyber security awareness. Furthermore, involving internal and/or external stakeholders like legal counsel and law enforcement can enhance coordination during real incidents, ultimately strengthening the organisation's preparedness and response capabilities.
Gap Found Between Data Security Perceptions and Breach Reality
A recent report reveals a significant disparity between organisations' perceptions of data security and the actual frequency of breaches. Despite 63% of organisations believing their security measures are effective, 2023 saw a record-breaking number of data breaches. The report highlights major concerns of data breaches, ransomware, insider threats, and misconfigurations. It found that 72% of organisations use audits and compliance tools to meet regulatory requirements, and 60% employ role-based access control systems. However, ongoing challenges persist, with only 27% adopting data cataloguing tools and many relying on manual processes. The report recommends comprehensive data discovery, automated monitoring, and a zero-trust security model to bridge the gap between perceived and actual data security.
Why Top Leadership Must Foster a Security-Conscious Culture
A recent report highlights the crucial role of organisational culture in building cyber resilience. Despite technical defences, organisations remain vulnerable to cyber attacks due to a vast attack surface. Emphasising collective responsibility, a robust cyber security culture involves all employees, from executives to frontline staff, in protecting digital assets. Leadership is pivotal, requiring a genuine commitment to security, clear communication, and active participation in cyber security initiatives. Transparency and psychological safety are essential, encouraging employees to report suspicious activity without fear. Continuous learning and improvement, beyond mere compliance, are vital to adapting to evolving threats and fostering a security-conscious environment for long-term success.
Hackers Use PoC Exploits in Attacks 22 Minutes After Release
A recent report by Cloudflare reveals that threat actors can weaponise proof-of-concept (PoC) exploits as quickly as 22 minutes after they are made public. Covering activity from May 2023 to March 2024, the report highlights significant threats, including heightened scanning for CVEs (known vulnerabilities) and rapid exploitation attempts. This emphasises the need for robust vulnerability management and timely patching of vulnerable systems.
There's No Margin for Error in Cyber Security
A recent report reveals that human error is responsible for 74% of cyber attacks, with employees using an average of 2.5 devices for work, creating numerous potential breach points. Notable incidents include the 2020 Marriott breach affecting 5.2 million guests, caused by stolen employee credentials, and Sequoia Capital’s 2021 phishing attack. Verizon's report highlights that 49% of breaches begin with compromised credentials. Effective cyber security measures include using unique, complex passwords, enabling multi-factor authentication, updating software regularly, and cautious email practices. Organisations should implement Unified Endpoint Management (UEM) and Identity and Access Management (IAM) solutions, alongside continuous employee training, to mitigate these risks.
UK to Introduce Watered-Down Version of Mandatory Reporting for Ransomware Attacks
A recent announcement from the UK Government reveals plans to introduce the Cyber Security and Resilience Bill, updating the country's cyber security regulations. This new legislation will mandate ransomware attack reporting for regulated entities, addressing record levels of ransomware incidents in British businesses. This measure, part of the King’s Speech, responds to increasing cyber threats impacting public services and infrastructure, such as the recent Russian attack on Synnovis, which is still having repercussions for the NHS weeks later. The bill expands regulatory oversight to include supply chains and demands incident reporting to improve understanding of the cyber crime landscape. Experts highlight the bill’s alignment with the EU’s NIS2 Directive, emphasising the importance of robust security governance and mandatory notification obligations for effective policy design.
CISOs Must Shift from Tactical Defence to Strategic Leadership
A recent report highlights the evolving role of the CISO, demanding a blend of technical expertise and strong diplomatic skills. Despite increased cyber security budgets in 2024, nearly one-third of IT professionals lack documented strategies to address AI risks. The report shows a confidence gap: while 60% of non-IT leaders are confident in their cyber security, only 46% of IT professionals share this view. Moreover, 55% of IT leaders believe non-IT executives do not fully understand vulnerability management , potentially undermining security efforts. Cyber security is now a board-level discussion, CISOs must align technical risks with business priorities, effectively communicating the financial and reputational impacts of cyber threats.
One-Third of Dev Professionals Unfamiliar with Secure Coding Practices
A recent report by OpenSSF and the Linux Foundation underscores the critical need for robust software security as attackers continue to exploit software vulnerabilities. Nearly one-third of development professionals feel unfamiliar with secure software practices, with 69% relying on on-the-job experience, which takes at least five years for basic security familiarity. Lack of time (58%) and inadequate training (50%) are the main barriers to implementing secure development practices. Furthermore, 44% cite a lack of knowledge about good courses as a reason for not pursuing secure software development education. The report advocates for industry-wide efforts and language-agnostic courses to address these educational gaps.
Sources:
https://www.bbc.co.uk/news/live/cnk4jdwp49et
https://securitybrief.co.nz/story/cybercriminals-exploit-chatgpt-for-near-perfect-phishing-emails
https://securityboulevard.com/2024/07/hotel-wi-fi-a-hotspot-for-cyber-threats/
https://www.inforisktoday.com/blogs/cybersecurity-be-businesses-enabler-p-3668
https://thehackernews.com/2024/07/navigating-insider-risks-are-your.html
https://securitybrief.co.nz/story/gap-found-between-data-security-perceptions-breach-reality
https://www.scmagazine.com/perspective/why-top-leadership-must-foster-a-security-conscious-culture
https://therecord.media/uk-cyber-security-resilience-bill-labour-government
https://www.helpnetsecurity.com/2024/07/19/cyber-threats-size-sophistication/
https://www.helpnetsecurity.com/2024/07/19/devs-secure-coding-practices/
Governance, Risk and Compliance
Cyber Security Can Be a Businesses Enabler - InfoRiskToday
Half of SMEs Unprepared for Cyber Threats - Infosecurity Magazine (infosecurity-magazine.com)
How Tabletop Exercises Can Sharpen Incident Response From Chaos To Calm (forbes.com)
Gap found between data security perceptions & breach reality (securitybrief.co.nz)
Why top leadership must foster a security-conscious culture | SC Media (scmagazine.com)
Survey: Nearly Half of SMEs Fell Victim to Cyber Attack in Last Six Months - Security Boulevard
CISOs must shift from tactical defence to strategic leadership - Help Net Security
What savvy hiring execs look for in a CISO today | CSO Online
SMEs vulnerable to cyber security breaches, report reveals - NZ Herald
What business leaders need to know about the Cyber Security and Resilience Bill - Raconteur
Why CISOs should report to the CEO—and not the CIO | Fortune
7 Tips for Navigating Cyber Security Risks in M&As (darkreading.com)
Threats
Ransomware, Extortion and Destructive Attacks
Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks (thehackernews.com)
UK to introduce watered-down version of mandatory reporting for ransomware attacks (therecord.media)
Year-Old Veeam Vulnerability Exploited in Fresh Ransomware Attacks - Security Week
RansomHub Ransomware - What You Need To Know | Tripwire
New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection (thehackernews.com)
BianLian Ransomware Leveraging RDP Credentials To Gain Initial Access (cybersecuritynews.com)
SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks (bleepingcomputer.com)
HardBit Ransomware - What You Need to Know | Tripwire
Digging Into FIN7's Latest Tools and Tactics | Decipher (duo.com)
Using Threat Intelligence to Predict Potential Ransomware Attacks - Security Week
This new ransomware tries to stop victims recovery by using passphrases | TechRadar
Ransomware costs at critical infrastructure orgs soar • The Register
Ransomware Victims
NHS Trusts cancelled over 6,000 appointments after Qilin cyber attack | Computer Weekly
Costs From UnitedHealth's Ransomware Attack Soar to at Least $2.3 Billion (pcmag.com)
CDK Global said to have paid $25M ransom after cyber attack • The Register
AT&T reportedly pays $370K to hackers to delete stolen customer data - SiliconANGLE
'NHS cyber attack delayed my baby son’s life-saving kidney transplant' (inews.co.uk)
AT&T Breach Linked to American Hacker, Telecom Giant Paid $370k Ransom: Reports - Security Week
CDK Global car dealership cyber attack could cost industry $1 billion (qz.com)
London Borough of Hackney reprimanded over cyber attack | Cybernews
A Negligence Case Has Been Filed Against CDK Over Cyber Attack (jalopnik.com)
UK national blood stocks in 'very fragile' state following ransomware attack (therecord.media)
Rite Aid confirms data breach after June ransomware attack (bleepingcomputer.com)
Furniture giant shuts down manufacturing facilities after ransomware attack (therecord.media)
Phishing & Email Based Attacks
Cyber criminals exploit ChatGPT for near-perfect phishing emails (securitybrief.co.nz)
New phishing tactic hijacks email protections to mask links | SC Media (scmagazine.com)
URL protection services used to mask phishing attacks (betanews.com)
Beware of the Latest Phishing Tactic Targeting Employees - Security Boulevard
How to protect your startup from email scams | TechCrunch
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands - Security Boulevard
Shadowroot Ransomware Lures Turkish Victims via Phishing Attacks (darkreading.com)
Other Social Engineering
Social Engineering Defence - An Emerging Career (govinfosecurity.com)
Artificial Intelligence
Cyber criminals exploit ChatGPT for near-perfect phishing emails (securitybrief.co.nz)
Weaponized AI: The Malicious Mind of Hackers (financemagnates.com)
US Seizes Domains Used by AI-Powered Russian Bot Farm for Disinformation (thehackernews.com)
Why deepfakes are set to be one of 2024’s biggest cyber security dangers | TechRadar
SAP security holes raise questions about the rush to AI | CSO Online
ChatGPTriage: How can CISOs see and control employees’ AI use? - Help Net Security
White House urged to probe $1.5B G42-Microsoft AI deal • The Register
Mark Cuban: Social media algorithms' influence in 2024 election
Protect AI warns of increasing security risks in open-source AI and ML tools - SiliconANGLE
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands - Security Boulevard
SMEs looking to MSPs to help with AI and security challenges | Microscope (computerweekly.com)
Mixed reaction from the AI community on King's Speech (datacentrenews.uk)
Malware
Zeus Banking Malware Player Gets 9-Year Prison Term (inforisktoday.com)
DarkGate Malware Exploits Samba File Shares in Short-Lived Campaign (thehackernews.com)
10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit (thehackernews.com)
Facebook ads for Windows desktop themes push info-stealing malware (bleepingcomputer.com)
DarkGate malware sees boom after the Feds crush Qbot • The Register
Here’s how carefully concealed backdoor in fake AWS files escaped mainstream notice | Ars Technica
'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins (thehackernews.com)
SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts - Help Net Security
DPRK Hackers Tweak Malware to Lure MacOS Users into Video Calls (darkreading.com)
This New "Cluster Bomb" Malware Sounds Deadly, but You Can Avoid It (makeuseof.com)
Iraq-based cyber criminals deploy malicious Python packages to steal data (therecord.media)
Weaponized AWS Packages That Deliver Malware Via JPEG Files (cybersecuritynews.com)
Malware scammers gearing up for 2024 summer Olympics in Paris | SC Media (scmagazine.com)
Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges (darkreading.com)
Revolver Rabbit gang registers 500,000 domains for malware campaigns (bleepingcomputer.com)
Mobile
What is juice jacking? Why you shouldn't use public USB chargers (androidauthority.com)
'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins (thehackernews.com)
Denial of Service/DoS/DDOS
DDoS attacks see a huge rise as criminals get braver and more ambitious | TechRadar
Telecom sees fastest increase in DDoS attacks: Report - RCR Wireless News
Data Breaches/Leaks
AT&T says criminals stole phone records of 'nearly all' customers in new data breach | TechCrunch
AT&T cyber security breach potentially posed 'risk to national security' (lexch.com)
Major data breaches that have rocked organisations in 2024 - Help Net Security
US Data Breach Victim Numbers Increase by 1,000%, Literally (darkreading.com)
Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages | WIRED
Snowflake Account Attacks Driven by Exposed Legitimate Credentials (darkreading.com)
Over 400,000 Life360 user phone numbers leaked via unsecured API (bleepingcomputer.com)
Rite Aid confirms data breach after June ransomware attack (bleepingcomputer.com)
Stalkerware vendor mSpy breached for a third time • The Register
Organised Crime & Criminal Actors
Weaponized AI: The Malicious Mind of Hackers (financemagnates.com)
Well-Established Cyber Criminal Ecosystem Blooms in Iraq (darkreading.com)
Digging Into FIN7's Latest Tools and Tactics | Decipher (duo.com)
Iraq-based cyber criminals deploy malicious Python packages to steal data (therecord.media)
Why OT has become a hot target for cyber criminals | SC Media (scmagazine.com)
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
DNS hijacks target crypto platforms registered with Squarespace (bleepingcomputer.com)
Dough Finance loses $1.8M in flash loan attack (cointelegraph.com)
North Korean Cyber Threats Escalate with Crypto Job Posting Hacks, Report Reveals (bitcoinist.com)
WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach (thehackernews.com)
North Korea may have attacked Indian crypto exchange WazirX • The Register
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands - Security Boulevard
Insider Risk and Insider Threats
How to Protect Your Business From Insider Threats | HackerNoon
Navigating Insider Risks: Are your Employees Enabling External Threats? (thehackernews.com)
Australian Defence Force Private and Husband Charged with Espionage for Russia (thehackernews.com)
Australian Spycatchers Snatch Pair of Married Russian Operatives (darkreading.com)
Pentagon Leaker Jack Teixeira to Face Military Court-Martial, Air Force Says - Security Week
Insurance
Cyber insurance: How to achieve the right coverage | SC Media (scmagazine.com)
Supply Chain and Third Parties
NHS Trusts cancelled over 6,000 appointments after Qilin cyber attack | Computer Weekly
AT&T cyber security breach potentially posed 'risk to national security' (lexch.com)
Cloud/SaaS
Here’s how carefully concealed backdoor in fake AWS files escaped mainstream notice | Ars Technica
Weaponized AWS Packages That Deliver Malware Via JPEG Files (cybersecuritynews.com)
Encryption
Encrypted traffic: A double-edged sword for network defenders - Help Net Security
Passwords, Credential Stuffing & Brute Force Attacks
Snowflake Account Attacks Driven by Exposed Legitimate Credentials (darkreading.com)
Social Media
Facebook ads for Windows desktop themes push info-stealing malware (bleepingcomputer.com)
SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts - Help Net Security
My LinkedIn account was hacked: I don't use it but I fixed it fast. Here's why and how | ZDNET
Is Musk’s X Using Dark Patterns To Trick Users? EU Says ‘Yes’
Mark Cuban: Social media algorithms' influence in 2024 election
Malvertising
'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins (thehackernews.com)
SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts - Help Net Security
What is malvertising? And how to protect yourself against it | PCWorld
Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges (darkreading.com)
Regulations, Fines and Legislation
The Impact of SEC Cyber Rules on Corporate Risk Management - Security Boulevard
What business leaders need to know about the Cyber Security and Resilience Bill - Raconteur
UK to introduce watered-down version of mandatory reporting for ransomware attacks (therecord.media)
Will Smaller Companies Buckle Under the SEC's New Requirements? (darkreading.com)
CDK hack shows SEC disclosure standards are unsettled | CyberScoop
Labour unveils AI, cyber security goals in King’s Speech (techmonitor.ai)
The Strategic Defence Review must maintain a cyber focus - LBC
London Borough of Hackney reprimanded over cyber attack | Cybernews
Judge dismisses much of SEC suit against SolarWinds over cyber security disclosures | CyberScoop
Preparing for the EU Cyber Resilience Act (techuk.org)
Models, Frameworks and Standards
What is NIST Compliance? A Guide to NIST Standards, Framework & Controls - Security Boulevard
Decoding NIS2 to Secure Your Supply Chain - Infosecurity Magazine (infosecurity-magazine.com)
5 Things We've Learned From 10 Years Of Cyber Essentials (forbes.com)
Careers, Working in Cyber and Information Security
What savvy hiring execs look for in a CISO today | CSO Online
Managing exam pressure: Tips for certification preparation - Help Net Security
Social Engineering Defence - An Emerging Career (govinfosecurity.com)
The Need to Recruit Cyber Talent in the Government (darkreading.com)
3 Free Online Cyber Security Courses With Certificates (forbes.com)
Cloud Security, PowerShell Expertise Emerge as Key SOC Analyst Skills (darkreading.com)
What a cyber security analyst does and how to become one | TechTarget
Teams facing 'alert fatigue' need certainty | Professional Security
The cyber security skills gap and breaches | SC Media (scmagazine.com)
Law Enforcement Action and Take Downs
Zeus Banking Malware Player Gets 9-Year Prison Term (inforisktoday.com)
DarkGate malware sees boom after the Feds crush Qbot • The Register
Pentagon Leaker Jack Teixeira to Face Military Court-Martial, Air Force Says - Security Week
Misinformation, Disinformation and Propaganda
US Seizes Domains Used by AI-Powered Russian Bot Farm for Disinformation (thehackernews.com)
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
Weaponised AI: The Malicious Mind of Hackers (financemagnates.com)
NATO to Establish Integrated Cyber Security Centre in Europe (thedefensepost.com)
IDF Has Rebuffed 3B Cloud Cyber Attacks Since Oct. 7, Colonel Claims (darkreading.com)
TAG-100: New Threat Actor Uses Open-Source Tools for Widespread Attacks (thehackernews.com)
Nation State Actors
China
Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges (darkreading.com)
China-linked APT17 Targets Italian Companies with 9002 RAT Malware (thehackernews.com)
Russia
APT Exploits Windows Zero-Day to Execute Code via Disabled Internet Explorer - Security Week
For MSPs, Kaspersky’s US exit is a reminder to not ignore geopolitics - Security - CRN Australia
US Seizes Domains Used by AI-Powered Russian Bot Farm for Disinformation (thehackernews.com)
Kaspersky Exits US Market Following Commerce Department Ban (thehackernews.com)
Surge in cyber attacks after Romania donates Patriot to Ukraine - Verdict
Void Banshee APT exploited "lingering Windows relic" in zero-day attacks - Help Net Security
Putin's Spies Are a Threat to Paris Olympics, Google Warns - Newsweek
Australian Spycatchers Snatch Pair of Married Russian Operatives (darkreading.com)
Kaspersky offers free security software for six months in US goodbye (bleepingcomputer.com)
Iran
Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks (thehackernews.com)
New BugSleep malware implant deployed in MuddyWater attacks (bleepingcomputer.com)
IDF Has Rebuffed 3B Cloud Cyber Attacks Since Oct. 7, Colonel Claims (darkreading.com)
North Korea
DPRK Hackers Tweak Malware to Lure MacOS Users into Video Calls (darkreading.com)
Defending against APTs: A learning exercise with Kimsuky (securitybrief.co.nz)
North Korean Cyber Threats Escalate with Crypto Job Posting Hacks, Report Reveals (bitcoinist.com)
WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach (thehackernews.com)
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
For MSPs, Kaspersky’s US exit is a reminder to not ignore geopolitics - Security - CRN Australia
Damaged Internet Subsea Cables Repaired in Red Sea Amid Militant Attacks on Ships – BNN Bloomberg
Disney faces potential data breach, hacker group claims massive leak (computing.co.uk)
Stalkerware vendor mSpy breached for a third time • The Register
Tools and Controls
How Tabletop Exercises Can Sharpen Incident Response From Chaos To Calm (forbes.com)
The Impact of SEC Cyber Rules on Corporate Risk Management - Security Boulevard
Decoding NIS2 to Secure Your Supply Chain - Infosecurity Magazine (infosecurity-magazine.com)
Encrypted traffic: A double-edged sword for network defenders - Help Net Security
BianLian Ransomware Leveraging RDP Credentials To Gain Initial Access (cybersecuritynews.com)
API Transformation Cyber Risks and Survival Tactics - Security Boulevard
Threat Prevention & Detection in SaaS Environments - 101 (thehackernews.com)
Overlooked essentials: API security best practices - Help Net Security
FIN7 Group Advertises Security-Bypassing Tool on Dark Web Forums (thehackernews.com)
Risk related to non-human identities: Believe the hype, reject the FUD - Help Net Security
Cloudflare reports almost 7% of internet traffic is malicious | ZDNET
Using Threat Intelligence to Predict Potential Ransomware Attacks - Security Week
Teams facing 'alert fatigue' need certainty | Professional Security
One-third of dev professionals unfamiliar with secure coding practices - Help Net Security
20 Million Trusted Domains Vulnerable to Email Hosting Exploits (darkreading.com)
6 Steps to Build an Incident Response Workflow for Your Business - Security Boulevard
DNS hijacks target crypto platforms registered with Squarespace (bleepingcomputer.com)
Cyber insurance: How to achieve the right coverage | SC Media (scmagazine.com)
Firms skip security reviews of updates about half the time • The Register
Securing datacenters may soon need sniffer dogs • The Register
Other News
SMEs vulnerable to cyber security breaches, report reveals - NZ Herald
IT providers must navigate AI, cyber security, efficiency and economic fluctuations – Channel EYE
Hotel Wi-Fi: A Hotspot for Cyber Threats - Security Boulevard
How Startups Can Bolster Defences as Cyber Threats Loom in Cloud Era | HackerNoon
Staying Safe on the Go: Insider Risk and Travel Security Tips - Security Boulevard
CISA broke into US federal agency, wasn't spotted for months • The Register
UK Retailers Most Concerned About Cyber, Data Security Risks, Study Finds | ESM Magazine
Improving cyber resilience of frontline forces in Europe - GOV.UK (www.gov.uk)
Defending OT Requires Agility, Proactive Controls (darkreading.com)
MSP security confidence remains high despite facing a torrent of cyber threats | ITPro
Paris 2024 Olympics to face complex cyber threats - Help Net Security
Automated Threats Pose Increasing Risk to the Travel Industry (thehackernews.com)
Vulnerability Management
Hackers use PoC exploits in attacks 22 minutes after release (bleepingcomputer.com)
ZDI shames Microsoft for coordinated vuln disclosure snafu • The Register
Microsoft is changing how it delivers Windows updates: 4 things you need to know | ZDNET
Firms skip security reviews of updates about half the time • The Register
Vulnerabilities
CrowdStrike code update bricking PCs around the world • The Register
Critical Exim bug bypasses security filters on 1.5 million mail servers (bleepingcomputer.com)
Year-Old Veeam Vulnerability Exploited in Fresh Ransomware Attacks - Security Week
GitLab Sends Users Scrambling Again With New CI/CD Pipeline Takeover Vuln (darkreading.com)
APT Exploits Windows Zero-Day to Execute Code via Disabled Internet Explorer - Security Week
Critical Apache HugeGraph Vulnerability Under Attack - Patch ASAP (thehackernews.com)
Attacks Exploiting Internet Explorer Persist | MSSP Alert
Chrome 126 Updates Patch High-Severity Vulnerabilities - Security Week
Oracle Patches 240 Vulnerabilities With July 2024 CPU - Security Week
Recent Adobe Commerce Vulnerability Exploited in Wild - Security Week
Cyber Security teams advised to look out for critical Adobe, Cisco bugs | SC Media (scmagazine.com)
20 Million Trusted Domains Vulnerable to Email Hosting Exploits (darkreading.com)
Cisco Releases Security Updates for Multiple Products | CISA
Netgear warns users to patch auth bypass, XSS router flaws (bleepingcomputer.com)
Void Banshee APT exploited "lingering Windows relic" in zero-day attacks - Help Net Security
CISA warns critical Geoserver GeoTools RCE flaw is exploited in attacks (bleepingcomputer.com)
Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991) - Help Net Security
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.