Black Arrow Cyber Threat Intelligence Briefing 25 October 2024

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Top Cyber Stories of the Last Week

Overconfidence in Cyber Security: A Hidden Risk

Organisations often assume that adding more cyber security tools equates to better protection, yet this overconfidence can lead to blind spots. Companies with fragmented solutions are 3.5 times more likely to face major security incidents. The Uber data breach in 2022 illustrated how alert fatigue—where excessive notifications overwhelm teams—can lead to overlooked threats, even with advanced tools in place. To counter this, experts recommend streamlining cyber security systems, prioritising critical alerts, and regularly auditing security processes. Building a resilient defence isn’t about quantity but the strategic use of technology paired with continuous training and monitoring.

Gallagher Re Study Links Cyber Security Gaps to Higher Insurance Claims

Gallagher Re's recent study, using data from Bitsight and its own cyber incident records, highlights that gaps in cyber security increase the risk of incidents and insurance claims. Organisations with larger cyber footprints, such as extensive IP address networks, are particularly vulnerable, pointing to a need for insurers to consider technographic data alongside traditional metrics. The study suggests that targeted use of external scanning data could help insurers lower loss ratios by up to 16.4%, focusing on the most damaging risks. Basic cyber hygiene, including rapid patching and endpoint management, remains essential for mitigating incidents and reducing potential claims.

AI and Deepfakes Fuel Phishing Scams, Making Detection Harder

Teleport's study highlights that AI-powered impersonation and deepfake-driven phishing are now the hardest cyber threats for businesses to defend against, with 52% of respondents marking these as particularly challenging. AI has enabled cyber criminals to create highly convincing phishing scams targeting credentials, significantly lowering both the cost and skill needed to launch attacks. Despite the adoption of AI tools by 68% of organisations to combat these threats, overconfidence in AI's protective capabilities may be risky.

AI-Generated Cyber Threats Have C-Suite Leaders on Edge

AI-driven cyber attacks are becoming a major concern for senior executives, as sophisticated deepfakes and AI phishing scams pose evolving risks. A recent gathering of over 100 cyber security leaders in Silicon Valley highlighted the growing difficulty in combating AI-powered phishing attacks, with three-quarters of surveyed Fortune 500 security officers reporting significant challenges. Additionally, over half noted the increasing prevalence of deepfake audio and video impersonations. The threat is amplified by AI tools that often lack proper data governance, potentially exposing organisations to heightened risks from third-party suppliers, with predicted fraud losses in the US expected to climb to $40 billion by 2027.

The Single Biggest Vulnerability in Your Cyber Security Is You

A recent report highlights that human error accounts for 68% of successful cyber attacks, indicating it as a significant vulnerability within cyber security. Despite advances in technical defences, human-centric errors, such as skills-based and knowledge-based mistakes, persist as weak points. Current cyber security education and policy efforts focus largely on technical defences, but often overlook the psychological aspects of behaviour. Experts suggest that minimising cognitive load, fostering a positive cyber security culture, and adopting long-term strategies for behavioural change are crucial to reducing human error and building a more resilient cyber security posture.

Why Cyber Security Acumen Matters in the C-Suite

As generative AI and sophisticated cyber threats rise, the need for cyber security expertise within the C-suite has become critical. Effective leaders must balance AI-driven innovations with a strong cyber security framework to prevent potential breaches. This alignment is essential for strategic decision-making, resource allocation, and collaborative crisis response. Boards and CEOs who understand these risks are better positioned to safeguard data, intellectual property, and reputation. Regulatory expectations are increasing, and companies that prioritise cyber security acumen are better prepared to handle compliance challenges and adapt swiftly to evolving threats.

Cyber Incidents Surge, Damaging Brand Trust and Business Relationships – Hiscox

The latest Hiscox Cyber Readiness Report reveals a surge in cyber incidents, with 70% of UK organisations and 67% globally experiencing increased attacks over the past year. This rise in cyber threats is eroding brand trust and impacting business relationships. Nearly half of affected firms face challenges in attracting new customers, a sharp rise from 20% last year, with 43% reporting a loss of existing customers. Additionally, many organisations have integrated Generative AI, with over half acknowledging heightened cyber risk. Yet, a lack of expertise remains, with 37% of UK businesses underprepared to address these evolving risks.

Cyber Resilience vs Cyber Security: Which is More Critical?

Focusing on cyber resilience is increasingly essential for organisations today. Unlike traditional cyber security, which aims to prevent breaches, cyber resilience emphasises an organisation’s ability to continue operating amidst an incident. By adopting a culture of resilience, organisations can safeguard their operations, data, and reputation—even in the face of a cyber attack. Investing in resilience, beginning with people and culture, offers a strong return as it prepares businesses to adapt quickly to adversities. Moreover, in an era of heightened threats, cyber resilience is becoming a competitive advantage, enhancing trust with customers, stakeholders, and insurers.

Phishing Attacks Snare Security and IT Leaders

A recent survey by Arctic Wolf and Sapio Research highlights persistent vulnerabilities in cyber security culture, despite IT leaders’ high confidence levels. While 80% of leaders feel prepared against phishing, nearly two-thirds admitted to clicking on phishing links themselves. Moreover, 36% of IT leaders have bypassed their own security protocols, exposing organisations to heightened risks. In addition, 68% of security professionals reuse passwords, a significant lapse in cyber hygiene. To address these issues, experts advocate for personalised, behaviour-based training and a proactive reporting culture. Only 60% of firms have adopted AI policies, with just 29% of end users aware of these policies, underscoring a need for clearer communication.

CISO Role Gaining Influence as 20% Report Directly to CEOs, Finds Survey

A recent Deloitte Global survey highlights the increasing strategic importance of cyber security in business, with 20% of chief information security officers (CISOs) now reporting directly to CEOs. Covering responses from nearly 1,200 cyber leaders worldwide, the report shows CISOs are evolving from technical experts to key advisers on cross-business risk and resilience, a role intensified by the rise in AI-driven cyber threats. High-performing organisations lead in integrating AI into cyber defence, aiming for 27% better outcomes. Nearly 60% plan to increase cyber budgets, emphasising the alignment of security initiatives with broader digital investments and strategic growth.

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Mandiant’s recent research highlights the urgent need for rapid patching as attackers are now exploiting vulnerabilities within just five days on average, a steep drop from 63 days in 2018. The study, based on 138 vulnerabilities disclosed in 2023, reveals a significant shift toward zero-day exploits, now outpacing N-day vulnerabilities. Zero-day vulnerabilities are unknown to vendors and lack available patches at the time of disclosure; N-day vulnerabilities are security flaws that have already been publicly disclosed and typically have a patch available but may remain unaddressed on systems, creating opportunities for cyber attacks. The report underscores that while patching is essential, implementation can be slow, particularly across large systems, mobile devices, or critical infrastructure where operational disruptions pose serious risks.

Employees Lack Fundamental Security Awareness

A recent Fortinet survey highlights growing concern among executives regarding employee cyber security awareness, with 70% stating their teams lack essential knowledge – a significant increase from last year. Over 60% expect a rise in employee-targeted cyber attacks leveraging AI. Positively, 80% of organisations are now more open to implementing security awareness initiatives. Nearly half of these leaders deliver training content quarterly, with phishing prevention as a top focus. The findings underline the necessity of a strong first line of defence, with targeted campaigns and accessible training vital to enhancing organisational cyber resilience.

Sources:

https://www.informationweek.com/cyber-resilience/overconfidence-in-cybersecurity-a-hidden-risk#close-modal

https://www.insurancebusinessmag.com/us/news/reinsurance/gallagher-re-study-links-cybersecurity-gaps-to-higher-insurance-claims-510935.aspx

https://www.helpnetsecurity.com/2024/10/24/ai-impersonation-cyberattack-vector/

https://fortune.com/2024/10/24/ai-generated-cyber-threats-c-suite-cfo-leaders-edge/

https://www.sciencealert.com/the-single-biggest-vulnerability-in-your-cyber-security-is-you

https://www.darkreading.com/vulnerabilities-threats/why-cybersecurity-acumen-matters-c-suite

https://www.insurancebusinessmag.com/us/news/cyber/cyber-incidents-surge-damaging-brand-trust-and-business-relationships--hiscox-511167.aspx

https://betanews.com/2024/10/18/cyber-resilience-vs-cybersecurity-which-is-more-critical/

https://securityboulevard.com/2024/10/phishing-attacks-snare-security-it-leaders/

https://www.techmonitor.ai/technology/cybersecurity/ciso-role-gaining-influence-as-20-report-directly-to-ceos-finds-survey

https://www.techrepublic.com/article/threat-actors-mandiant-report-2024/

https://betanews.com/2024/10/23/employees-lack-fundamental-security-awareness/


Governance, Risk and Compliance

CISOs Concerned Over Growing Demands of Role - Security Boulevard

Lack of investment leaving firms open to cyber attack - PwC – The Irish Times

AI-generated cyber threats have C-suite leaders on edge | Fortune

Cyber incidents surge, damaging brand trust and business relationships – Hiscox | Insurance Business America

Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media

Why Cyber Security Acumen Matters in the C-Suite

Overconfidence in Cyber Security: A Hidden Risk

Call for cyber security sea change as world looks to meet rising threats

Joe Sullivan: CEOs must be held accountable for security too | TechTarget

Cyber resilience vs. cybersecurity: Which is more critical? (betanews.com)

CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches (darkreading.com)

CISO role gaining influence as 20% report directly to CEOs, finds survey

CISOs respond: 49% of CISOs plan to leave role without industry action | Security Magazine

In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)

Gartner's 2025 tech trends show how your business needs to adapt - and fast | ZDNET

Effective strategies for measuring and testing cyber resilience - Help Net Security

Why strong cyber security means we must reduce complexity | World Economic Forum

Is the future of tech roles fractional? - BusinessCloud

Achieving peak cyber resilience - Help Net Security

68% of directors don't have a board-approved AI policy - IoD Ireland

Board Members Should Review Cyber Risk Disclosure Procedures Following SEC Enforcement

Building Digital Resilience: Insider Insights For A Safer Cyber Landscape (informationsecuritybuzz.com)

Putting the “R” back in GRC - Insights from Gartner on Emerging Cyber GRC Technologies - Security Boulevard

Best Cyber Security Metrics to Use in the Boardroom | Kovrr - Security Boulevard

CISO Insights: 10 modern capabilities to revamp your security | Fastly

What CIOs Must Consider With Sophos Buying Secureworks

Unclear pricing for GRC tools creates market confusion - Help Net Security

What’s next after the CISO role? | CSO Online


Threats

Ransomware, Extortion and Destructive Attacks

The evolution of cyber crime: How ransomware became the weapon of choice | TechRadar

Healthcare Sees 300% Surge in Ransomware Attacks

ESET partner breached to send data wipers to Israeli orgs (bleepingcomputer.com)

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion - Security Boulevard

Akira is encrypting again after abandoning double extortion • The Register

Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks

NotLockBit: Ransomware Discovery Serves As Wake-Up Call For Mac Users | Tripwire

A Dangerous Alliance: Scattered Spider, RansomHub Join Forces

CISA confirms Veeam vulnerability is being used in ransomware attacks (therecord.media)

Phishing Scams & Ransomware: Fortinet's Threat Intelligence Highlights Election Cyber Risks (thefastmode.com)

NotLockBit Ransomware Can Target macOS Devices - SecurityWeek

Embargo Ransomware Gang Deploys Customized Defence Evasion Tools - Infosecurity Magazine (infosecurity-magazine.com)

New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics

Government is fed up with ransomware payments fueling cyber attacks (cnbc.com)

Has BlackCat returned as Cicada3301? Maybe.

Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)

Ransomware protection: AI and strategies to combat rising threats - SiliconANGLE

Ransomware attacks against healthcare orgs is on the rise, Microsoft says (qz.com)

Ransomware is driving an increase in emergency patient care (cyberscoop.com)

Ransomware's ripples felt across ERs as care suffers • The Register

Russia recommends prison sentence for REvil hackers | SC Media

Are Leaders Ready to Break the Ransomware Cycle - Security Boulevard

What's behind the 51% drop in ransomware attacks? (securityintelligence.com)

Organisations Paying Fewer Ransoms, Building Resilience: Kaseya | MSSP Alert

Ransomware Victims

How the ransomware attack at Change Healthcare went down: A timeline | TechCrunch

Radisson’s Country Inn and Suites Allegedly Hit by Ransomware | MSSP Alert

Ransomware's ripples felt across ERs as care suffers • The Register

Henry Schein discloses data breach a year after ransomware attack

50,000 Files Exposed in Nidec Ransomware Attack - Infosecurity Magazine (infosecurity-magazine.com)

Ransomware gang stoops to new low, targets prominent nonprofit for disabled people (therecord.media)

Spate of ransomware attacks on German-speaking schools hits another in Switzerland

Rocky Mountain Gastroenterology Reportedly Experiences Triple Cyber Attack, Resulting in Data Breach Affecting Up to 169k | Console and Associates, P.C. - JDSupra

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (thehackernews.com)

Phishing & Email Based Attacks

Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024 | ITPro

Microsoft Named Most Imitated Brand in Phishing Attacks - Infosecurity Magazine (infosecurity-magazine.com)

Evolving cyber criminal tactics targeting SMBs - Help Net Security

Latrodectus Malware Increasingly Used by Cyber Criminals - SecurityWeek

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

Top open source email platform hacked to steal user details | TechRadar

Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachments | ITPro

AI and deepfakes fuel phishing scams, making detection harder - Help Net Security

Evolving Email Threats and How to Protect Against Them - IT Security Guru

Unknown threat actors exploit Roundcube Webmail flaw in phishing campaign (securityaffairs.com)

Phishing scams and malicious domains take center stage as the US election approaches - Help Net Security

Threat actors increasingly using malicious virtual hard drives in phishing attacks | CSO Online

Phishing Scams & Ransomware: Fortinet's Threat Intelligence Highlights Election Cyber Risks (thefastmode.com)

LinkedIn bots and spear phishers target job seekers | Malwarebytes

75% of US Senate Campaign Websites Fail to Implement DMARC - Infosecurity Magazine

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans (thehackernews.com)

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

Business Email Compromise (BEC)/Email Account Compromise (EAC)

Evolving cyber criminal tactics targeting SMBs - Help Net Security

Other Social Engineering

Experts warn North Koreans are posing as IT workers in the West

'Pig butchering': How cyber criminals target investors with fake trading apps

LinkedIn bots and spear phishers target job seekers | Malwarebytes

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop

Fortra Report Reveals Surge In Domain Impersonation, Social Media Attacks, And Dark Web Activity (informationsecuritybuzz.com)

Artificial Intelligence

AI-generated cyber threats have C-suite leaders on edge | Fortune

55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)

Hackers are finding new ways to leverage AI - Help Net Security

OpenAI’s voice API can build AI agents for phone scams • The Register

New Cyber Security Warning As 1,000 Elite Hackers Embrace AI

AI and deepfakes fuel phishing scams, making detection harder - Help Net Security

AI tools are being increasingly abused to launch cyber attacks | TechRadar

AI hack: Do not give chatbots your personal data

Cyber Security Teams Largely Ignored in AI Policy Development - Infosecurity Magazine

This new AI jailbreaking technique lets hackers crack models in just three interactions | ITPro

In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)

The rise of the machines and the growing AI identity attack surface | CSO Online

68% of directors don't have a board-approved AI policy - IoD Ireland

AI-Powered Attacks Flood Retail Websites - Infosecurity Magazine

AI honeypot hit 800K times​ | Cybernews

CIOs under pressure to deliver AI outcomes faster | CIO

2FA/MFA

Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media

Understanding the Importance of MFA: A Comprehensive Guide - Security Boulevard

QR codes are being hijacked to bypass MFA protections | TechRadar

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

Malware

HM Surf macOS vuln potentially exploited by Adloader malware • The Register

Latrodectus Malware Increasingly Used by Cyber Criminals - SecurityWeek

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

Over 6,000 WordPress hacked to install plugins pushing infostealers

New Malware WarmCookie Targets Users with Malicious Links - Infosecurity Magazine (infosecurity-magazine.com)

Over 10M+ Personal And Corporate Devices Infected By Information Stealers (cybersecuritynews.com)

Modern Malware Is Stealthier Than Older Attacks: This Is How It Stays Hidden

Netskope Reports Possible Bumblebee Loader Resurgence - Infosecurity Magazine

Sneaky Ghostpulse malware loader hides inside PNG pixels • The Register

Hackers infect thousands of WordPress sites with malware plugins | PCWorld

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection (thehackernews.com)

Perfctl malware strikes again via Docker Remote API servers • The Register

'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans (thehackernews.com)

Bots/Botnets

Anti-Bot Services Help Cyber Crooks Bypass Google 'Red Page' (darkreading.com)

'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)

Mobile

Google Warns of Samsung Zero-Day Exploited in the Wild - SecurityWeek

Why you should power off your phone at least once a week - according to the NSA | ZDNET

Millions of mobile app users at risk from hardcoded creds • The Register

Location tracking of phones is out of control. Here’s how to fight back. - Ars Technica

Denial of Service/DoS/DDoS

How to detect DDoS attacks | TechTarget

Military Exercises Trigger Russian DDoS Attacks on Japan (govinfosecurity.com)

Russia-Linked Hacktivists Attack Japan's Govt, Ports (darkreading.com)

Data Breaches/Leaks

UnitedHealth says Change Healthcare hack affects over 100 million, the largest-ever US healthcare data breach | TechCrunch

Internet Archive Breached Again, Hackers Exploited Unrotated API Tokens (cybersecuritynews.com)

Cisco Confirms Security Incident After Hacker Offers to Sell Data - SecurityWeek

Insurance admin Landmark says data breach impacts 800,000 people

Cisco takes DevHub portal offline after hacker publishes stolen data (bleepingcomputer.com)

Henry Schein discloses data breach a year after ransomware attack

Millions affected in major health data breach caused by a missing password | TechRadar

Data Breach Impacts Insurer Johnson and Johnson | MSSP Alert

Omni Family Health Data Breach Impacts 470,000 Individuals - SecurityWeek

Rocky Mountain Gastroenterology Reportedly Experiences Triple Cyber Attack, Resulting in Data Breach Affecting Up to 169k | Console and Associates, P.C. - JDSupra

Dance Apparel Company Sued After 65,000 Customers' Data Exposed

Organised Crime & Criminal Actors

Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024 | ITPro

The evolution of cyber crime: How ransomware became the weapon of choice | TechRadar

'Pig butchering': How cyber criminals target investors with fake trading apps

UK Weighs Review of Computer Misuse Act to Combat Cyber Crime - Infosecurity Magazine (infosecurity-magazine.com)

Russia recommends prison sentence for REvil hackers | SC Media

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Cyber Criminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)

The Lazarus APT Strikes Again: New Zero-Day Exploit Targets Investors Through DeFi Games (informationsecuritybuzz.com)

'Prometei' Botnet Spreads its Cryptojacker Worldwide (darkreading.com)

Fraudulent DeFi game leveraged in new crypto investor-targeted Lazarus attack | SC Media

Insider Risk and Insider Threats

The Single Biggest Vulnerability in Your Cyber Security Is You : ScienceAlert

The Enemy Within: Navigating the Evolving Landscape of (globenewswire.com)

Fortinet report: 70% of staff lack cyber security awareness

Human error is the weakest link in the cyber security chain. Here are 3 ways to fix it

Insurance

Cyber incidents surge, damaging brand trust and business relationships – Hiscox | Insurance Business America

Gallagher leader warns cyber is still an emerging risk | Insurance Times

Gallagher Re study links cyber security gaps to higher insurance claims | Insurance Business America (insurancebusinessmag.com)

Facing the uncertainty of cyber insurance claims - Help Net Security

The future of cyber insurance: Meeting the demand for non-attack coverage - Help Net Security

Supply Chain and Third Parties

Can the cyber security industry stop history repeating? | TechRadar

Cloud/SaaS

Think You're Secure? 49% of Enterprises Underestimate SaaS Risks

Microsoft lost some customers' cloud security logs - Help Net Security

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (thehackernews.com)

Half of Organisations Have Unmanaged Long-Lived Cloud Credentials - Infosecurity Magazine

Unmanaged Cloud Credentials Pose Risk to Half of Orgs (darkreading.com)

Top open source email platform hacked to steal user details | TechRadar

Navigating the Complexities & Security Risks of Multi-cloud Management

Evolving cloud threats: Insights and recommendations - Help Net Security

Grip Security Releases 2025 SaaS Security Risks Report

Microsoft creates fake Azure tenants to pull phishers into honeypots (bleepingcomputer.com)

Balancing Clients' Security and Functionality in the Cloud - Infosecurity Magazine (infosecurity-magazine.com)

Outages

Can the cyber security industry stop history repeating? | TechRadar

Identity and Access Management

Poor MFA, identity attacks dominate threat landscape in Q3 2024 | SC Media

A Comprehensive Guide to Finding Service Accounts in Active Directory

What is step-up authentication & how can it help prevent financial fraud? (businesscloud.co.uk)

Encryption

What NIST's post-quantum cryptography standards mean for data security

Why experts are warning businesses to prepare for quantum now – or face critical cyber risks when it arrives | ITPro

How to fend off a quantum computer attack - Help Net Security

Linux and Open Source

Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass (bleepingcomputer.com)

Why remove Russian maintainers of Linux kernel? Here's what Torvalds says | ZDNET

Passwords, Credential Stuffing & Brute Force Attacks

Half of Organisations Have Unmanaged Long-Lived Cloud Credentials - Infosecurity Magazine

Unmanaged Cloud Credentials Pose Risk to Half of Orgs (darkreading.com)

Top open source email platform hacked to steal user details | TechRadar

Millions of mobile app users at risk from hardcoded creds • The Register

The Key Components For a Secure Password Policy - Infosecurity Magazine (infosecurity-magazine.com)

Cisco fixes bug under exploit in brute-force attacks • The Register

Millions affected in major health data breach caused by a missing password | TechRadar

Social Media

Instagram Rolls Out New Sextortion Protection Measures - Infosecurity Magazine (infosecurity-magazine.com)

LinkedIn bots and spear phishers target job seekers | Malwarebytes

Fortra Report Reveals Surge In Domain Impersonation, Social Media Attacks, And Dark Web Activity (informationsecuritybuzz.com)

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

What to Know About Meta’s Facial Recognition Plans | TIME

Training, Education and Awareness

55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)

Fortinet report: 70% of staff lack cyber security awareness

Employees lack fundamental security awareness (betanews.com)

Regulations, Fines and Legislation

UK Weighs Review of Computer Misuse Act to Combat Cyber Crime - Infosecurity Magazine (infosecurity-magazine.com)

EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online

The worldwide focus on operational resilience in financial services: what firms and service providers need to know, Claire Harrop, Matthew O'Callaghan, Nariné Atamian, Daphne van der Houwen, Christopher Bernard

How can businesses comply with EU’s new cyber law?

NIS2’s cyber security value spreads beyond its expanded scope | CSO Online

EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online

SEC.gov | SEC Charges Four Companies With Misleading Cyber Disclosures

EU’s NIS 2 enters into force: compliance is now mandatory

Forthcoming UK Cyber Security and Resilience Bill to Boost the UK’s Cyber Defences | Alston & Bird - JDSupra

SEC charges tech companies for downplaying SolarWinds breaches (bleepingcomputer.com)

SEC hits security companies with massive fines for misdirection over SolarWinds Orion hack | Cybernews

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

SEC is Not Accepting Half-Truths - Security Boulevard

Client Alert: Key Takeaways from Recent SEC Cyber Security Enforcement Actions | Jenner & Block - JDSupra

UK Government Introduces New Data Governance Legislation - Infosecurity Magazine

SEC SolarWinds Fines a Warning to Organisations, MSSPs | MSSP Alert

Cyber Incident Response Checklist for SEC Compliance | Troutman Pepper - JDSupra

The struggle for software liability: Inside a ‘very, very, very hard problem’ (therecord.media)

In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)

US Finally Restricts Sale Of Location Data To Foreign Adversaries, But We’re Still Too Corrupt To Pass A Basic Internet-Era Privacy Law | Techdirt

OODA Loop - Board Members Should Review Cyber Risk Disclosure Procedures Following SEC Enforcement

Penn State Settles for $1.25M Over Failure to Comply With DoD, NASA Cyber Security Requirements - SecurityWeek

Models, Frameworks and Standards

EU’s NIS2 Directive for cyber security resilience enters full enforcement | CSO Online

The worldwide focus on operational resilience in financial services: what firms and service providers need to know, Claire Harrop, Matthew O'Callaghan, Nariné Atamian, Daphne van der Houwen, Christopher Bernard

How can businesses comply with EU’s new cyber law?

How can businesses comply with EU’s new cyber law?

NIS2’s cyber security value spreads beyond its expanded scope | CSO Online

EU’s NIS 2 enters into force: compliance is now mandatory

EU Adopts Cyber Resilience Act For Connected Devices

What NIST's post-quantum cryptography standards mean for data security

Government Marks 10 Years of Cyber Essentials, Calls for More Adoption | SC Media UK (scmagazineuk.com)

What is DORA – and how can Proton help with compliance? | Proton

Data Protection

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

Careers, Working in Cyber and Information Security

What even is a ‘cyber security profession’?

CISOs Concerned Over Growing Demands of Role - Security Boulevard

Enterprises are struggling to fill senior cyber security roles — and it's causing staff burnout to skyrocket | ITPro

68% of cyber security professionals in Europe face burnout, driven by high pressure and insufficient staffing  - Financial News

Cyber security leaders struggle with job stress (devx.com)

Joe Sullivan: CEOs must be held accountable for security too | TechTarget

CISOs respond: 49% of CISOs plan to leave role without industry action | Security Magazine

Making Cyber Security Accessible For Neurodiverse Talent (darkreading.com)

What's more important when hiring for cyber security roles? - Help Net Security

What I’ve learned in my first 7-ish years in cyber security

Law Enforcement Action and Take Downs

Bumblebee malware returns after recent law enforcement disruption (bleepingcomputer.com)

Misinformation, Disinformation and Propaganda

Governments fear election interference, but it’s an enterprise cyber security problem too | CSO Online

Are tech billionaires hijacking our future? This Nobel laureate warns of Big Tech's stranglehold on AI and democracy | Fortune Europe

Phishing scams and malicious domains take center stage as the US election approaches - Help Net Security

Phishing Scams & Ransomware: Fortinet's Threat Intelligence Highlights Election Cyber Risks (thefastmode.com)

Russian Trolls Sow US Election Chaos (darkreading.com)


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

CISA Proposes New Security Measures To Safeguard Sensitive Data From Adversary States (informationsecuritybuzz.com)

CISA proposes new security requirements for businesses exposed to cyber espionage | CSO Online

Nation State Actors

China

Cameron Calls for Tech Engagement with China Despite Cyber Threats - Infosecurity Magazine (infosecurity-magazine.com)

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

Gambling sector subjected to APT41 intrusions | SC Media

Russia

Russian Intelligence Ramps Up Global Cyber Campaign, Says Western Intelligence

Former UK special forces director warns of Russian cyber-security threat - Jersey Evening Post

Russian Trolls Sow US Election Chaos (darkreading.com)

Military Exercises Trigger Russian DDoS Attacks on Japan (govinfosecurity.com)

How Russia’s Spies Hacked the Entire Nation of Georgia – BNN Bloomberg

Russian Strategic Information Attack for Catastrophic Effect

Russia-Linked Hacktivists Attack Japan's Govt, Ports (darkreading.com)

Why remove Russian maintainers of Linux kernel? Here's what Torvalds says | ZDNET

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (thehackernews.com)

Russian Foreign Ministry reports 'large-scale' cyber attack on its resources

Russia recommends prison sentence for REvil hackers | SC Media

Iran

Iranian hackers act as brokers selling critical infrastructure access (bleepingcomputer.com)

North Korea

Experts warn North Koreans are posing as IT workers in the West

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

Chinese trader laundered more than $17M for Lazarus Group in 25 hacks (cointelegraph.com)

The Lazarus APT Strikes Again: New Zero-Day Exploit Targets Investors Through DeFi Games (informationsecuritybuzz.com)

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop

Cyber firm launches free tool to weed out hackers in hiring process

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Sidewinder APT Deploying Expanded Attacks | MSSP Alert

Think Tanks Urge Action to Curb Misuse of Spyware and Hack-for-Hire - Infosecurity Magazine


Tools and Controls

Understanding the Importance of MFA: A Comprehensive Guide - Security Boulevard

Time to Get Strict With DMARC (darkreading.com)

55% Of Employees Using AI At Work Have No Training On Its Risks (forbes.com)

Microsoft lost some customers' cloud security logs - Help Net Security

A Business Continuity Cheat Sheet - Compare the Cloud

Can the cyber security industry stop history repeating? | TechRadar

A Comprehensive Guide to Finding Service Accounts in Active Directory

Call for cyber security sea change as world looks to meet rising threats

Fortinet report: 70% of staff lack cyber security awareness

Cyber resilience vs. cyber security: Which is more critical? (betanews.com)

CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches (darkreading.com)

Multi-layered security is the key to keeping data safe – here’s why | ITPro

Effective strategies for measuring and testing cyber resilience - Help Net Security

New Research Underscores the Growing Security Risk Due to Hybrid Work Environments | Business Wire

Cyber insurers could cut loss ratios by 16% by excluding high-risk entities: Gallagher Re - Reinsurance News

SQL Injection Attacks: Cyber Security Expert Reveals How Businesses Can Mitigate the Risks Involved - Financial News (financial-news.co.uk)

Negating AI cyber attacks with defence in depth | TechRadar

Threat intelligence vs. threat hunting: Better together | TechTarget

API Vulnerabilities Jump 21% in Third Quarter - Security Boulevard

In 2025 Security And Risk Pros Will Brace For Regulations And Resilience (forbes.com)

68% of directors don't have a board-approved AI policy - IoD Ireland

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

AV-Comparatives Releases Latest Business Cyber Security Test Results: Top-Performing Products for Protection and Performance Certified

Achieving peak cyber resilience - Help Net Security

Cyber security incident response: Is your business prepared? | Proton

Microsoft creates fake Azure tenants to pull phishers into honeypots (bleepingcomputer.com)

Unclear pricing for GRC tools creates market confusion - Help Net Security

Five Ways To Improve Your Security Posture, Fast

Enhancing Cyber Security Post-Breach: A Comprehensive Guide - Security Boulevard

What is Third-Party Risk Monitoring in Cyber Security? | UpGuard




Vulnerability Management

Threat actors exploit zero days within 5 days, says Google's Mandiant | SC Media (scworld.com)

What is Vulnerability Management? Compliance, Challenges, & Solutions - Security Boulevard

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever (techrepublic.com)

Vulnerabilities

Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass (bleepingcomputer.com)

Microsoft launches Edge 130 with lots of security patches and feature changes - gHacks Tech News

MacOS Safari Exploit Exposes Camera, Mic, Browser Data (darkreading.com)

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (thehackernews.com)

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

Atlassian Patches Vulnerabilities in Bitbucket, Confluence, Jira - SecurityWeek

Fortinet releases patches for undisclosed critical FortiManager vulnerability - Help Net Security

HM Surf macOS vuln potentially exploited by Adloader malware • The Register

Google Warns of Samsung Zero-Day Exploited in the Wild - SecurityWeek

VMware fixes critical vCenter Server RCE bug - again! (CVE-2024-38812) - Help Net Security

Patch your Bitdefender and Trend Micro security software immediately to stay safe from these threats | TechRadar

CISA confirms Veeam vulnerability is being used in ransomware attacks (therecord.media)

Unknown threat actors exploit Roundcube Webmail flaw in phishing campaign (securityaffairs.com)

Samsung phone users exposed to EoP attacks, Google warns • The Register

High-risk vulnerability affecting UniFi Network Server | Cybernews

CISA Warns Recent Microsoft SharePoint RCE Flaw Exploited in Attacks - SecurityWeek

Microsoft SharePoint RCE under active exploit • The Register

Cisco fixed tens of vulnerabilities, including an actively exploited one

Cisco fixes VPN DoS flaw discovered in password spray attacks

Hackers infect thousands of WordPress sites with malware plugins | PCWorld

Nvidia Patches High-Severity Flaws in Windows, Linux Graphics Drivers - SecurityWeek

Critical Grafana Vulnerability Could Allow RCE | MSSP Alert


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Previous
Previous

Black Arrow Cyber Threat Intelligence Briefing 01 November 2024

Next
Next

Black Arrow Cyber Threat Briefing 18 October 2024