Black Arrow Cyber Threat Intelligence Briefing 25 October 2024
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Overconfidence in Cyber Security: A Hidden Risk
Organisations often assume that adding more cyber security tools equates to better protection, yet this overconfidence can lead to blind spots. Companies with fragmented solutions are 3.5 times more likely to face major security incidents. The Uber data breach in 2022 illustrated how alert fatigue—where excessive notifications overwhelm teams—can lead to overlooked threats, even with advanced tools in place. To counter this, experts recommend streamlining cyber security systems, prioritising critical alerts, and regularly auditing security processes. Building a resilient defence isn’t about quantity but the strategic use of technology paired with continuous training and monitoring.
Gallagher Re Study Links Cyber Security Gaps to Higher Insurance Claims
Gallagher Re's recent study, using data from Bitsight and its own cyber incident records, highlights that gaps in cyber security increase the risk of incidents and insurance claims. Organisations with larger cyber footprints, such as extensive IP address networks, are particularly vulnerable, pointing to a need for insurers to consider technographic data alongside traditional metrics. The study suggests that targeted use of external scanning data could help insurers lower loss ratios by up to 16.4%, focusing on the most damaging risks. Basic cyber hygiene, including rapid patching and endpoint management, remains essential for mitigating incidents and reducing potential claims.
AI and Deepfakes Fuel Phishing Scams, Making Detection Harder
Teleport's study highlights that AI-powered impersonation and deepfake-driven phishing are now the hardest cyber threats for businesses to defend against, with 52% of respondents marking these as particularly challenging. AI has enabled cyber criminals to create highly convincing phishing scams targeting credentials, significantly lowering both the cost and skill needed to launch attacks. Despite the adoption of AI tools by 68% of organisations to combat these threats, overconfidence in AI's protective capabilities may be risky.
AI-Generated Cyber Threats Have C-Suite Leaders on Edge
AI-driven cyber attacks are becoming a major concern for senior executives, as sophisticated deepfakes and AI phishing scams pose evolving risks. A recent gathering of over 100 cyber security leaders in Silicon Valley highlighted the growing difficulty in combating AI-powered phishing attacks, with three-quarters of surveyed Fortune 500 security officers reporting significant challenges. Additionally, over half noted the increasing prevalence of deepfake audio and video impersonations. The threat is amplified by AI tools that often lack proper data governance, potentially exposing organisations to heightened risks from third-party suppliers, with predicted fraud losses in the US expected to climb to $40 billion by 2027.
The Single Biggest Vulnerability in Your Cyber Security Is You
A recent report highlights that human error accounts for 68% of successful cyber attacks, indicating it as a significant vulnerability within cyber security. Despite advances in technical defences, human-centric errors, such as skills-based and knowledge-based mistakes, persist as weak points. Current cyber security education and policy efforts focus largely on technical defences, but often overlook the psychological aspects of behaviour. Experts suggest that minimising cognitive load, fostering a positive cyber security culture, and adopting long-term strategies for behavioural change are crucial to reducing human error and building a more resilient cyber security posture.
Why Cyber Security Acumen Matters in the C-Suite
As generative AI and sophisticated cyber threats rise, the need for cyber security expertise within the C-suite has become critical. Effective leaders must balance AI-driven innovations with a strong cyber security framework to prevent potential breaches. This alignment is essential for strategic decision-making, resource allocation, and collaborative crisis response. Boards and CEOs who understand these risks are better positioned to safeguard data, intellectual property, and reputation. Regulatory expectations are increasing, and companies that prioritise cyber security acumen are better prepared to handle compliance challenges and adapt swiftly to evolving threats.
Cyber Incidents Surge, Damaging Brand Trust and Business Relationships – Hiscox
The latest Hiscox Cyber Readiness Report reveals a surge in cyber incidents, with 70% of UK organisations and 67% globally experiencing increased attacks over the past year. This rise in cyber threats is eroding brand trust and impacting business relationships. Nearly half of affected firms face challenges in attracting new customers, a sharp rise from 20% last year, with 43% reporting a loss of existing customers. Additionally, many organisations have integrated Generative AI, with over half acknowledging heightened cyber risk. Yet, a lack of expertise remains, with 37% of UK businesses underprepared to address these evolving risks.
Cyber Resilience vs Cyber Security: Which is More Critical?
Focusing on cyber resilience is increasingly essential for organisations today. Unlike traditional cyber security, which aims to prevent breaches, cyber resilience emphasises an organisation’s ability to continue operating amidst an incident. By adopting a culture of resilience, organisations can safeguard their operations, data, and reputation—even in the face of a cyber attack. Investing in resilience, beginning with people and culture, offers a strong return as it prepares businesses to adapt quickly to adversities. Moreover, in an era of heightened threats, cyber resilience is becoming a competitive advantage, enhancing trust with customers, stakeholders, and insurers.
Phishing Attacks Snare Security and IT Leaders
A recent survey by Arctic Wolf and Sapio Research highlights persistent vulnerabilities in cyber security culture, despite IT leaders’ high confidence levels. While 80% of leaders feel prepared against phishing, nearly two-thirds admitted to clicking on phishing links themselves. Moreover, 36% of IT leaders have bypassed their own security protocols, exposing organisations to heightened risks. In addition, 68% of security professionals reuse passwords, a significant lapse in cyber hygiene. To address these issues, experts advocate for personalised, behaviour-based training and a proactive reporting culture. Only 60% of firms have adopted AI policies, with just 29% of end users aware of these policies, underscoring a need for clearer communication.
CISO Role Gaining Influence as 20% Report Directly to CEOs, Finds Survey
A recent Deloitte Global survey highlights the increasing strategic importance of cyber security in business, with 20% of chief information security officers (CISOs) now reporting directly to CEOs. Covering responses from nearly 1,200 cyber leaders worldwide, the report shows CISOs are evolving from technical experts to key advisers on cross-business risk and resilience, a role intensified by the rise in AI-driven cyber threats. High-performing organisations lead in integrating AI into cyber defence, aiming for 27% better outcomes. Nearly 60% plan to increase cyber budgets, emphasising the alignment of security initiatives with broader digital investments and strategic growth.
Threat Actors Are Exploiting Vulnerabilities Faster Than Ever
Mandiant’s recent research highlights the urgent need for rapid patching as attackers are now exploiting vulnerabilities within just five days on average, a steep drop from 63 days in 2018. The study, based on 138 vulnerabilities disclosed in 2023, reveals a significant shift toward zero-day exploits, now outpacing N-day vulnerabilities. Zero-day vulnerabilities are unknown to vendors and lack available patches at the time of disclosure; N-day vulnerabilities are security flaws that have already been publicly disclosed and typically have a patch available but may remain unaddressed on systems, creating opportunities for cyber attacks. The report underscores that while patching is essential, implementation can be slow, particularly across large systems, mobile devices, or critical infrastructure where operational disruptions pose serious risks.
Employees Lack Fundamental Security Awareness
A recent Fortinet survey highlights growing concern among executives regarding employee cyber security awareness, with 70% stating their teams lack essential knowledge – a significant increase from last year. Over 60% expect a rise in employee-targeted cyber attacks leveraging AI. Positively, 80% of organisations are now more open to implementing security awareness initiatives. Nearly half of these leaders deliver training content quarterly, with phishing prevention as a top focus. The findings underline the necessity of a strong first line of defence, with targeted campaigns and accessible training vital to enhancing organisational cyber resilience.
Sources:
https://www.helpnetsecurity.com/2024/10/24/ai-impersonation-cyberattack-vector/
https://fortune.com/2024/10/24/ai-generated-cyber-threats-c-suite-cfo-leaders-edge/
https://www.sciencealert.com/the-single-biggest-vulnerability-in-your-cyber-security-is-you
https://www.darkreading.com/vulnerabilities-threats/why-cybersecurity-acumen-matters-c-suite
https://betanews.com/2024/10/18/cyber-resilience-vs-cybersecurity-which-is-more-critical/
https://securityboulevard.com/2024/10/phishing-attacks-snare-security-it-leaders/
https://www.techrepublic.com/article/threat-actors-mandiant-report-2024/
https://betanews.com/2024/10/23/employees-lack-fundamental-security-awareness/
Governance, Risk and Compliance
CISOs Concerned Over Growing Demands of Role - Security Boulevard
Lack of investment leaving firms open to cyber attack - PwC – The Irish Times
AI-generated cyber threats have C-suite leaders on edge | Fortune
Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media
Why Cyber Security Acumen Matters in the C-Suite
Overconfidence in Cyber Security: A Hidden Risk
Call for cyber security sea change as world looks to meet rising threats
Joe Sullivan: CEOs must be held accountable for security too | TechTarget
Cyber resilience vs. cybersecurity: Which is more critical? (betanews.com)
CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches (darkreading.com)
CISO role gaining influence as 20% report directly to CEOs, finds survey
CISOs respond: 49% of CISOs plan to leave role without industry action | Security Magazine
In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)
Gartner's 2025 tech trends show how your business needs to adapt - and fast | ZDNET
Effective strategies for measuring and testing cyber resilience - Help Net Security
Why strong cyber security means we must reduce complexity | World Economic Forum
Is the future of tech roles fractional? - BusinessCloud
Achieving peak cyber resilience - Help Net Security
68% of directors don't have a board-approved AI policy - IoD Ireland
Board Members Should Review Cyber Risk Disclosure Procedures Following SEC Enforcement
Best Cyber Security Metrics to Use in the Boardroom | Kovrr - Security Boulevard
CISO Insights: 10 modern capabilities to revamp your security | Fastly
What CIOs Must Consider With Sophos Buying Secureworks
Unclear pricing for GRC tools creates market confusion - Help Net Security
Threats
Ransomware, Extortion and Destructive Attacks
The evolution of cyber crime: How ransomware became the weapon of choice | TechRadar
Healthcare Sees 300% Surge in Ransomware Attacks
ESET partner breached to send data wipers to Israeli orgs (bleepingcomputer.com)
Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion - Security Boulevard
Akira is encrypting again after abandoning double extortion • The Register
Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks
NotLockBit: Ransomware Discovery Serves As Wake-Up Call For Mac Users | Tripwire
A Dangerous Alliance: Scattered Spider, RansomHub Join Forces
CISA confirms Veeam vulnerability is being used in ransomware attacks (therecord.media)
NotLockBit Ransomware Can Target macOS Devices - SecurityWeek
New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics
Government is fed up with ransomware payments fueling cyber attacks (cnbc.com)
Has BlackCat returned as Cicada3301? Maybe.
Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)
Ransomware protection: AI and strategies to combat rising threats - SiliconANGLE
Ransomware attacks against healthcare orgs is on the rise, Microsoft says (qz.com)
Ransomware is driving an increase in emergency patient care (cyberscoop.com)
Ransomware's ripples felt across ERs as care suffers • The Register
Russia recommends prison sentence for REvil hackers | SC Media
Are Leaders Ready to Break the Ransomware Cycle - Security Boulevard
What's behind the 51% drop in ransomware attacks? (securityintelligence.com)
Organisations Paying Fewer Ransoms, Building Resilience: Kaseya | MSSP Alert
Ransomware Victims
How the ransomware attack at Change Healthcare went down: A timeline | TechCrunch
Radisson’s Country Inn and Suites Allegedly Hit by Ransomware | MSSP Alert
Ransomware's ripples felt across ERs as care suffers • The Register
Henry Schein discloses data breach a year after ransomware attack
50,000 Files Exposed in Nidec Ransomware Attack - Infosecurity Magazine (infosecurity-magazine.com)
Ransomware gang stoops to new low, targets prominent nonprofit for disabled people (therecord.media)
Spate of ransomware attacks on German-speaking schools hits another in Switzerland
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (thehackernews.com)
Phishing & Email Based Attacks
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024 | ITPro
Evolving cyber criminal tactics targeting SMBs - Help Net Security
Latrodectus Malware Increasingly Used by Cyber Criminals - SecurityWeek
Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies
Top open source email platform hacked to steal user details | TechRadar
AI and deepfakes fuel phishing scams, making detection harder - Help Net Security
Evolving Email Threats and How to Protect Against Them - IT Security Guru
Unknown threat actors exploit Roundcube Webmail flaw in phishing campaign (securityaffairs.com)
Threat actors increasingly using malicious virtual hard drives in phishing attacks | CSO Online
LinkedIn bots and spear phishers target job seekers | Malwarebytes
75% of US Senate Campaign Websites Fail to Implement DMARC - Infosecurity Magazine
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans (thehackernews.com)
Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA
Business Email Compromise (BEC)/Email Account Compromise (EAC)
Evolving cyber criminal tactics targeting SMBs - Help Net Security
Other Social Engineering
Experts warn North Koreans are posing as IT workers in the West
'Pig butchering': How cyber criminals target investors with fake trading apps
LinkedIn bots and spear phishers target job seekers | Malwarebytes
HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop
Artificial Intelligence
AI-generated cyber threats have C-suite leaders on edge | Fortune
55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)
Hackers are finding new ways to leverage AI - Help Net Security
OpenAI’s voice API can build AI agents for phone scams • The Register
New Cyber Security Warning As 1,000 Elite Hackers Embrace AI
AI and deepfakes fuel phishing scams, making detection harder - Help Net Security
AI tools are being increasingly abused to launch cyber attacks | TechRadar
AI hack: Do not give chatbots your personal data
Cyber Security Teams Largely Ignored in AI Policy Development - Infosecurity Magazine
This new AI jailbreaking technique lets hackers crack models in just three interactions | ITPro
In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)
The rise of the machines and the growing AI identity attack surface | CSO Online
68% of directors don't have a board-approved AI policy - IoD Ireland
AI-Powered Attacks Flood Retail Websites - Infosecurity Magazine
AI honeypot hit 800K times | Cybernews
CIOs under pressure to deliver AI outcomes faster | CIO
2FA/MFA
Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media
Understanding the Importance of MFA: A Comprehensive Guide - Security Boulevard
QR codes are being hijacked to bypass MFA protections | TechRadar
Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA
Malware
HM Surf macOS vuln potentially exploited by Adloader malware • The Register
Latrodectus Malware Increasingly Used by Cyber Criminals - SecurityWeek
Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies
Over 6,000 WordPress hacked to install plugins pushing infostealers
Over 10M+ Personal And Corporate Devices Infected By Information Stealers (cybersecuritynews.com)
Modern Malware Is Stealthier Than Older Attacks: This Is How It Stays Hidden
Netskope Reports Possible Bumblebee Loader Resurgence - Infosecurity Magazine
Sneaky Ghostpulse malware loader hides inside PNG pixels • The Register
Hackers infect thousands of WordPress sites with malware plugins | PCWorld
Perfctl malware strikes again via Docker Remote API servers • The Register
'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans (thehackernews.com)
Bots/Botnets
Anti-Bot Services Help Cyber Crooks Bypass Google 'Red Page' (darkreading.com)
'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)
Mobile
Google Warns of Samsung Zero-Day Exploited in the Wild - SecurityWeek
Why you should power off your phone at least once a week - according to the NSA | ZDNET
Millions of mobile app users at risk from hardcoded creds • The Register
Location tracking of phones is out of control. Here’s how to fight back. - Ars Technica
Denial of Service/DoS/DDoS
How to detect DDoS attacks | TechTarget
Military Exercises Trigger Russian DDoS Attacks on Japan (govinfosecurity.com)
Russia-Linked Hacktivists Attack Japan's Govt, Ports (darkreading.com)
Data Breaches/Leaks
Internet Archive Breached Again, Hackers Exploited Unrotated API Tokens (cybersecuritynews.com)
Cisco Confirms Security Incident After Hacker Offers to Sell Data - SecurityWeek
Insurance admin Landmark says data breach impacts 800,000 people
Cisco takes DevHub portal offline after hacker publishes stolen data (bleepingcomputer.com)
Henry Schein discloses data breach a year after ransomware attack
Millions affected in major health data breach caused by a missing password | TechRadar
Data Breach Impacts Insurer Johnson and Johnson | MSSP Alert
Omni Family Health Data Breach Impacts 470,000 Individuals - SecurityWeek
Dance Apparel Company Sued After 65,000 Customers' Data Exposed
Organised Crime & Criminal Actors
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024 | ITPro
The evolution of cyber crime: How ransomware became the weapon of choice | TechRadar
'Pig butchering': How cyber criminals target investors with fake trading apps
Russia recommends prison sentence for REvil hackers | SC Media
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
Cyber Criminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks
Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)
'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)
Fraudulent DeFi game leveraged in new crypto investor-targeted Lazarus attack | SC Media
Insider Risk and Insider Threats
The Single Biggest Vulnerability in Your Cyber Security Is You : ScienceAlert
The Enemy Within: Navigating the Evolving Landscape of (globenewswire.com)
Fortinet report: 70% of staff lack cyber security awareness
Human error is the weakest link in the cyber security chain. Here are 3 ways to fix it
Insurance
Gallagher leader warns cyber is still an emerging risk | Insurance Times
Facing the uncertainty of cyber insurance claims - Help Net Security
The future of cyber insurance: Meeting the demand for non-attack coverage - Help Net Security
Supply Chain and Third Parties
Can the cyber security industry stop history repeating? | TechRadar
Cloud/SaaS
Think You're Secure? 49% of Enterprises Underestimate SaaS Risks
Microsoft lost some customers' cloud security logs - Help Net Security
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (thehackernews.com)
Half of Organisations Have Unmanaged Long-Lived Cloud Credentials - Infosecurity Magazine
Unmanaged Cloud Credentials Pose Risk to Half of Orgs (darkreading.com)
Top open source email platform hacked to steal user details | TechRadar
Navigating the Complexities & Security Risks of Multi-cloud Management
Evolving cloud threats: Insights and recommendations - Help Net Security
Grip Security Releases 2025 SaaS Security Risks Report
Microsoft creates fake Azure tenants to pull phishers into honeypots (bleepingcomputer.com)
Outages
Can the cyber security industry stop history repeating? | TechRadar
Identity and Access Management
Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media
A Comprehensive Guide to Finding Service Accounts in Active Directory
What is step-up authentication & how can it help prevent financial fraud? (businesscloud.co.uk)
Encryption
What NIST's post-quantum cryptography standards mean for data security
How to fend off a quantum computer attack - Help Net Security
Linux and Open Source
Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass (bleepingcomputer.com)
Why remove Russian maintainers of Linux kernel? Here's what Torvalds says | ZDNET
Passwords, Credential Stuffing & Brute Force Attacks
Half of Organisations Have Unmanaged Long-Lived Cloud Credentials - Infosecurity Magazine
Unmanaged Cloud Credentials Pose Risk to Half of Orgs (darkreading.com)
Top open source email platform hacked to steal user details | TechRadar
Millions of mobile app users at risk from hardcoded creds • The Register
The Key Components For a Secure Password Policy - Infosecurity Magazine (infosecurity-magazine.com)
Cisco fixes bug under exploit in brute-force attacks • The Register
Millions affected in major health data breach caused by a missing password | TechRadar
Social Media
LinkedIn bots and spear phishers target job seekers | Malwarebytes
Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations
What to Know About Meta’s Facial Recognition Plans | TIME
Training, Education and Awareness
55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)
Fortinet report: 70% of staff lack cyber security awareness
Employees lack fundamental security awareness (betanews.com)
Regulations, Fines and Legislation
EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online
How can businesses comply with EU’s new cyber law?
NIS2’s cyber security value spreads beyond its expanded scope | CSO Online
EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online
SEC.gov | SEC Charges Four Companies With Misleading Cyber Disclosures
EU’s NIS 2 enters into force: compliance is now mandatory
SEC charges tech companies for downplaying SolarWinds breaches (bleepingcomputer.com)
Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations
SEC is Not Accepting Half-Truths - Security Boulevard
UK Government Introduces New Data Governance Legislation - Infosecurity Magazine
SEC SolarWinds Fines a Warning to Organisations, MSSPs | MSSP Alert
Cyber Incident Response Checklist for SEC Compliance | Troutman Pepper - JDSupra
The struggle for software liability: Inside a ‘very, very, very hard problem’ (therecord.media)
In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)
OODA Loop - Board Members Should Review Cyber Risk Disclosure Procedures Following SEC Enforcement
Models, Frameworks and Standards
EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online
How can businesses comply with EU’s new cyber law?
How can businesses comply with EU’s new cyber law?
NIS2’s cyber security value spreads beyond its expanded scope | CSO Online
EU’s NIS 2 enters into force: compliance is now mandatory
EU Adopts Cyber Resilience Act For Connected Devices
What NIST's post-quantum cryptography standards mean for data security
What is DORA – and how can Proton help with compliance? | Proton
Data Protection
Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations
Careers, Working in Cyber and Information Security
What even is a ‘cyber security profession’?
CISOs Concerned Over Growing Demands of Role - Security Boulevard
Cyber security leaders struggle with job stress (devx.com)
Joe Sullivan: CEOs must be held accountable for security too | TechTarget
CISOs respond: 49% of CISOs plan to leave role without industry action | Security Magazine
Making Cyber Security Accessible For Neurodiverse Talent (darkreading.com)
What's more important when hiring for cyber security roles? - Help Net Security
What I’ve learned in my first 7-ish years in cyber security
Law Enforcement Action and Take Downs
Bumblebee malware returns after recent law enforcement disruption (bleepingcomputer.com)
Misinformation, Disinformation and Propaganda
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
CISA proposes new security requirements for businesses exposed to cyber espionage | CSO Online
Nation State Actors
China
Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain
Gambling sector subjected to APT41 intrusions | SC Media
Russia
Russian Intelligence Ramps Up Global Cyber Campaign, Says Western Intelligence
Former UK special forces director warns of Russian cyber-security threat - Jersey Evening Post
Russian Trolls Sow US Election Chaos (darkreading.com)
Military Exercises Trigger Russian DDoS Attacks on Japan (govinfosecurity.com)
How Russia’s Spies Hacked the Entire Nation of Georgia – BNN Bloomberg
Russian Strategic Information Attack for Catastrophic Effect
Russia-Linked Hacktivists Attack Japan's Govt, Ports (darkreading.com)
Why remove Russian maintainers of Linux kernel? Here's what Torvalds says | ZDNET
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (thehackernews.com)
Russian Foreign Ministry reports 'large-scale' cyber attack on its resources
Russia recommends prison sentence for REvil hackers | SC Media
Iran
Iranian hackers act as brokers selling critical infrastructure access (bleepingcomputer.com)
North Korea
Experts warn North Koreans are posing as IT workers in the West
Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices
Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)
HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop
Cyber firm launches free tool to weed out hackers in hiring process
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Sidewinder APT Deploying Expanded Attacks | MSSP Alert
Think Tanks Urge Action to Curb Misuse of Spyware and Hack-for-Hire - Infosecurity Magazine
Tools and Controls
Understanding the Importance of MFA: A Comprehensive Guide - Security Boulevard
Time to Get Strict With DMARC (darkreading.com)
55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)
Microsoft lost some customers' cloud security logs - Help Net Security
A Business Continuity Cheat Sheet - Compare the Cloud
Can the cyber security industry stop history repeating? | TechRadar
A Comprehensive Guide to Finding Service Accounts in Active Directory
Call for cyber security sea change as world looks to meet rising threats
Fortinet report: 70% of staff lack cyber security awareness
Cyber resilience vs. cyber security: Which is more critical? (betanews.com)
CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches (darkreading.com)
Multi-layered security is the key to keeping data safe – here’s why | ITPro
Effective strategies for measuring and testing cyber resilience - Help Net Security
New Research Underscores the Growing Security Risk Due to Hybrid Work Environments | Business Wire
Negating AI cyber attacks with defence in depth | TechRadar
Threat intelligence vs. threat hunting: Better together | TechTarget
API Vulnerabilities Jump 21% in Third Quarter - Security Boulevard
In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)
68% of directors don't have a board-approved AI policy - IoD Ireland
Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA
Achieving peak cyber resilience - Help Net Security
Cyber security incident response: Is your business prepared? | Proton
Microsoft creates fake Azure tenants to pull phishers into honeypots (bleepingcomputer.com)
Unclear pricing for GRC tools creates market confusion - Help Net Security
Five Ways To Improve Your Security Posture, Fast
Enhancing Cyber Security Post-Breach: A Comprehensive Guide - Security Boulevard
What is Third-Party Risk Monitoring in Cyber Security? | UpGuard
Other News
Acronym Overdose – Navigating the Complex Data Security Landscape (thehackernews.com)
The Rise of Cyber Attacks on Critical Infrastructure: Are You Prepared? - Security Boulevard
Why Cyber Security Should Be at the Top of the Agenda for the Utilities Sector (thefastmode.com)
The American Water cyber attack: Explaining how it happened (techtarget.com)
Security Checks: 85% of Online Shoppers Make Security a Top Priority
IT security and government services: Balancing transparency and security - Help Net Security
Vulnerability Management
Threat actors exploit zero days within 5 days, says Google's Mandiant | SC Media (scworld.com)
What is Vulnerability Management? Compliance, Challenges, & Solutions - Security Boulevard
Threat Actors Are Exploiting Vulnerabilities Faster Than Ever (techrepublic.com)
Vulnerabilities
Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass (bleepingcomputer.com)
Microsoft launches Edge 130 with lots of security patches and feature changes - gHacks Tech News
MacOS Safari Exploit Exposes Camera, Mic, Browser Data (darkreading.com)
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (thehackernews.com)
Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices
Atlassian Patches Vulnerabilities in Bitbucket, Confluence, Jira - SecurityWeek
Fortinet releases patches for undisclosed critical FortiManager vulnerability - Help Net Security
HM Surf macOS vuln potentially exploited by Adloader malware • The Register
Google Warns of Samsung Zero-Day Exploited in the Wild - SecurityWeek
VMware fixes critical vCenter Server RCE bug - again! (CVE-2024-38812) - Help Net Security
CISA confirms Veeam vulnerability is being used in ransomware attacks (therecord.media)
Unknown threat actors exploit Roundcube Webmail flaw in phishing campaign (securityaffairs.com)
Samsung phone users exposed to EoP attacks, Google warns • The Register
High-risk vulnerability affecting UniFi Network Server | Cybernews
CISA Warns Recent Microsoft SharePoint RCE Flaw Exploited in Attacks - SecurityWeek
Microsoft SharePoint RCE under active exploit • The Register
Cisco fixed tens of vulnerabilities, including an actively exploited one
Cisco fixes VPN DoS flaw discovered in password spray attacks
Hackers infect thousands of WordPress sites with malware plugins | PCWorld
Nvidia Patches High-Severity Flaws in Windows, Linux Graphics Drivers - SecurityWeek
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.