Black Arrow Cyber Threat Briefing 28 June 2024
Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Top Cyber Stories of the Last Week
Cyber Attacks on The Rise with Financial Sector a Top Target, Report Reveals
A recent report from BlackBerry reveals the financial sector faces significant cyber threats, with 40% of attacks on critical infrastructure targeting financial firms. In Q1 2024 alone, BlackBerry's cyber security solutions intercepted 3.1 million attacks, averaging 37,000 daily. Commercial enterprises saw a 3% rise in threats, now constituting 36% of all attacks. Unique malware is increasing, highlighting the need for updated defences. The report underscores the high motivation of threat actors, particularly in a year marked by geopolitical tensions and major global events like the Olympics.
Cloud Resources Have Become Biggest Targets for Cyber Attacks, Finds Thales
A recent report indicates that cloud security spending has surpassed all other security categories, driven by the sensitivity of nearly 47% of corporate data stored in the cloud. With 44% of participating organisations experiencing a cloud data breach, including 14% experiencing one in the past year, protecting cloud environments has become a top priority. Human error and misconfiguration are the leading causes of these breaches, accounting for 31%. Exploitation of known vulnerabilities accounts for 28% of breaches, while zero-day vulnerabilities account for 24%. The report also highlights that 66% of organisations use over 25 software as a service (SaaS) applications, yet less than 10% encrypt the majority of their sensitive cloud data. Digital sovereignty initiatives are recognised by 31% of organisations as crucial for future-proofing cloud environments.
Hackers Grow More Sinister and Brazen in Hunt for Bigger Ransoms
A recent surge in aggressive extortion tactics by cybercrime groups has led to severe disruptions, with a London hospital hack exposing hundreds of millions of health records and causing critical cancer treatment delays. In North America, attackers attempted to auction customer data of LendingTree Inc., gained by leveraging credentials from another breach. Meanwhile, car-dealership software provider CDK Global faced repeated attacks. These incidents illustrate the growing boldness of cyber criminals, who are increasingly using advanced technology to pressure major companies.
1 Out of 3 Breaches Go Undetected
A recent report by Gigamon highlights the increasing challenge organisations face in detecting breaches, with over 65% of respondents indicating that current security solutions are ineffective. Complexity in hybrid cloud environments is a significant factor, with 83% of IT leaders acknowledging it raises cyber risks. Despite a projected global information security spend of $215 billion in 2024, only 54% feel well-prepared for unauthorised access. Notably, 31% of breaches were only detected after receiving extortion threats, and 25% of organisations failed to identify the breach's root cause.
Optiv Report Shows Nearly 60% Increase in Security Budgets as Most Organisations Experience Cyber Breaches and Incidents
A recent report by Optiv, based on a Ponemon Institute survey, reveals a 59% increase in cyber budgets year-over-year, with organisations with over 5,000 users allocating an average of $26 million to cyber security in 2024. Despite these investments, 61% of respondents experienced a data breach or cyber security incident in the past two years. The report highlights that 40% of organisations feel overwhelmed by too many security tools, suggesting a need for streamlined technology integration. Key investment areas include internal security assessments (60%) and identity and access management (58%). The adoption of security orchestration technology is on the rise, with 73% using it to automate incident responses.
Why Are Threat Actors Faking Data Breaches?
A recent incident involving Europcar revealed hackers selling fake data on its 50 million customers, likely generated using AI. This trend of faking data breaches is driven by financial gain, notoriety, and attempts to distract or harm a company's reputation. For example, a Russian hacking group falsely claimed to have breached Epic Games to gain visibility, and a ransomware group falsely claimed to have breached Sony, causing reputational damage. Companies are advised to proactively monitor the dark web, compare leaked datasets with previous breaches, and deploy canary tokens to authenticate breach claims, while adopting integrated security models to enhance threat detection.
China-Sponsored Attackers Target 40K Corporate Users in 90 Days
A recent report by Menlo Security has identified three sophisticated credential-phishing campaigns, compromising over 40,000 corporate users, including executives, in just three months. Named LegalQloud, Eqooqp, and Boomer, these state-sponsored attacks use advanced techniques to bypass security controls like MFA and URL filtering. The campaigns have targeted more than 3,000 domains across various industries, with six out of ten malicious links evading detection. Researchers link these campaigns to China-sponsored threat actors, highlighting the evolving and aggressive tactics used in cyber espionage. This underscores the need for organisations to continually adapt their cyber security strategies.
Cyber Security Neglect: The Silent Killer of Businesses
A recent report underscores the hidden dangers of cyber security neglect, highlighting that such oversight can lead to catastrophic data breaches and financial ruin. IBM's 2023 Cost of a Data Breach Report indicates an average cost of $4.45 million per breach, impacting legal fees, lost business, and increased insurance premiums. Common red flags include outdated security protocols, lack of employee training, and inadequate incident response plans. Businesses must adopt a proactive approach with regular security audits, updated security measures, and comprehensive incident response plans to mitigate these risks and safeguard their operations.
Third of Organisations Have Suffered Three or More Data Breaches in the Last 24 Months
New research reveals that 50% of IT professionals are unaware of all devices connected to their network, despite nearly 60% acknowledging these insecure devices pose a significant risk. The survey of 250 IT professionals also found that over two-thirds of organisations experienced three or more data breaches in the past 24 months, with 20% taking more than five days to detect a breach. This delay increases potential damage from attacks. The report underscores the need for robust security protocols, automated network scanning tools, and continuous investment in security solutions to mitigate cyber threats and protect critical assets.
75% of New Vulnerabilities Exploited Within 19 Days
A recent report by Skybox Security highlights the urgent need for improved vulnerability management, revealing over 30,000 new vulnerabilities were published last year, averaging one every 17 minutes. Despite this surge, the average time to patch vulnerabilities exceeds 100 days, while 75% of new vulnerabilities are exploited within just 19 days. The United States National Vulnerability Database recorded a 17% increase in vulnerabilities year-over-year, with half classified as high or critical. The report underscores the necessity for continuous exposure management and modern mitigation strategies to protect against the rapid exploitation of vulnerabilities, with 25% being exploited on the same day of discovery.
It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever.
A recent report highlights the challenging landscape for modern CISOs, exacerbated by evolving cyber threats and a global shortage of staff and skills. Heightened regulatory pressures and landmark cases, such as those involving Uber and SolarWinds, underscore the critical need for robust cyber security strategies and compliance across the c-suite and board. Stress and burnout are significant issues, with 94% of CISOs reporting work-related stress and 74% leaving their jobs in 2022 due to it. Gartner predicts up to 50% of security leaders will change jobs by 2025. To mitigate these challenges, CISOs must adopt transformational leadership to enhance organisational and personal resilience.
Tackling The Role Human Error Plays in Data Breaches
A recent report by Thales reveals that human error remains a significant cause of cloud data breaches, with 22% of IT professionals identifying it as the most concerning threat and 74% considering it a key priority. Over the past three years, human error has consistently ranked as a leading source of cyber attacks for enterprises.
Given the likelihood of cyber attacks, businesses must prioritise mitigating human-related risks. This includes comprehensive employee training, robust security protocols, and continuous monitoring to safeguard IT infrastructure and ensure organisational resilience against cyber threats.
Sources:
https://www.infosecurity-magazine.com/news/cloud-breaches-half-organizations/
https://www.helpnetsecurity.com/2024/06/24/detecting-breaches-struggle-in-organizations/
https://www.helpnetsecurity.com/2024/06/24/faking-data-breaches/
https://www.darkreading.com/threat-intelligence/china-sponsored-attackers-40k-corporate-users
https://hackernoon.com/cybersecurity-neglect-the-silent-killer-of-businesses
https://www.helpnetsecurity.com/2024/06/27/nvd-vulnerabilities/
https://www.techradar.com/pro/tackling-the-role-human-error-plays-in-data-breaches
Governance, Risk and Compliance
The NYSE's $10M Wake-up Call (darkreading.com)
Cyber Attacks on the rise with financial sector a top target, report reveals (investmentnews.com)
Cyber security Neglect: The Silent Killer of Businesses | HackerNoon
Organisations with outdated security approaches getting hammered: Cloudflare | CSO Online
Today's Most Overlooked Mergers and Acquisitions Cyber Security and Compliance Risks | Inc.com
New cyber threat research for SMB in 2024 | Securelist
Building a culture of security is everyone’s responsibility - Raconteur
Small Businesses Taking Proactive Steps to Prevent Cyber Attacks (smallbiztrends.com)
Is Defence Winning? A Look at Decades of Playing Catch Up (darkreading.com)
Working with a cyber security committee of the board | Microsoft Security Blog
CISOs becoming more comfortable with risk levels - Help Net Security
Inside the Mind of a CISO: Survey and Analysis - SecurityWeek
CISOs Growing More Comfortable With Risk, But Better C-Suite Alignment Needed (darkreading.com)
Some strategies for CISOs freaked out by the specter of federal indictments | CSO Online
The challenges in maintaining effective cyber security (securitybrief.co.nz)
A proactive cyber security policy is not just smart — it’s essential (securityintelligence.com)
The cyber attacks which could wipe your business out | BelfastTelegraph.co.uk
Evaluating crisis experience in CISO hiring: What to look for and look out for | CSO Online
Threats
Ransomware, Extortion and Destructive Attacks
The State of Ransomware 2024 | SC Media (scmagazine.com)
Ransomware threat landscape Jan-Apr 2024: insights and challenges (securityaffairs.com)
UK and US cops put Qilin ransomware crims in the crosshairs • The Register
Key Takeaways From the British Library Cyber Attack (darkreading.com)
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware (thehackernews.com)
Hackers Grow More Sinister and Brazen in Hunt for Bigger Ransoms - Bloomberg
Ratel RAT targets outdated Android phones in ransomware attacks (bleepingcomputer.com)
Red Tape Is Making Hospital Ransomware Attacks Worse | WIRED
Cyber Attacks: An Unseen State Of Emergency In Healthcare (forbes.com)
Chinese Cyber Spies Employ Ransomware in Attacks for Diversion (bleepingcomputer.com)
New ransomware, infostealers pose growing risk in 2024 - Help Net Security
Best practices for protection from ransomware in cloud storage | TechTarget
Meet the Ransomware Negotiators (darkreading.com)
Ransomware Victims
Hackers Publish 400GB Of Data After London Hospital Cyber Attack (forbes.com)
UK government weighs action against Russian hackers over NHS records theft | NHS | The Guardian
LockBit lied: Stolen data is from a bank, not US Federal Reserve (bleepingcomputer.com)
UK and US cops put Qilin ransomware crims in the crosshairs • The Register
Key Takeaways From the British Library Cyber Attack (darkreading.com)
Security firm Accenture breached, claim cybercriminals | Cybernews
Here's what ransomware crims stole from Change Healthcare • The Register
NHS patients affected by cyber-attack may face six-month wait for blood test (yahoo.com)
CDK Cyber Attack: What Is It, Who Is Responsible and What’s the Fallout? - Bloomberg
Hacked UK Trove Includes Data on Newborns, Cancer Patients (1) (bloomberglaw.com)
Crisis-hit firm behind vital NHS services faces uncertain future | Technology sector | The Guardian
Evolve Bank caught up in latest Russia-linked cyber attacks (paymentexpert.com)
Expert Reveals Cyber Attack ‘Paralyzed’ Over 15K US Car Dealerships (dailydot.com)
Startups scramble to assess fallout from Evolve Bank data breach | TechCrunch
NHS officials warned over patients data exposed in ‘hackers honey pot’ | The Independent
CDK cyber attacks show need for world offensive against criminals | Automotive News (autonews.com)
Shoe Zone hit by cyber attack (drapersonline.com)
Phishing & Email Based Attacks
Widespread phishing attack impacts many LA County departments | SC Media (scmagazine.com)
The Rising Threat of Mobile Phishing and How to Avoid It | MSSP Alert
Warning in Guernsey after phishing scam increase - BBC News
Expert Reveals Cyber Attack ‘Paralyzed’ Over 15K Dealerships (dailydot.com)
Malware Sandbox Any.Run Targeted in Phishing Attack - SecurityWeek
BEC
Australian gov supplier bank details altered in cyber attacks - Security - iTnews
Other Social Engineering
Mark Cuban claims his Gmail was hacked after receiving hoax call (cointelegraph.com)
What is shoulder surfing and how to prevent it? | Proton
Artificial Intelligence
Cloud security faces pressure from AI growth, multicloud use | CSO Online
How are CISOs and organisations navigating AI cyber attacks? | TechFinitive
Political Deepfakes Are the Top Use of Malicious AI (pcmag.com)
Dangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Content (darkreading.com)
Cyber Security is a ‘team sport’ amid new gen AI–based cyber attacks | Fortune Asia
Microsoft: 'Skeleton Key' attack unlocks the worst of AI • The Register
Hackers expose deep cyber security vulnerabilities in AI | BBC News - YouTube
Security pros grade Apple Intelligence data privacy measures | TechTarget
Apple delays launch of AI-powered features in Europe, blaming EU rules | Apple | The Guardian
How to construct a cyber security policy that sits alongside AI (architecture.com)
2FA/MFA
The Snowflake breach tells us that passwords aren't enough | TechRadar
Multifactor Authentication Is Not Enough to Protect Cloud Data (darkreading.com)
Push Notification Fatigue Leads to LA County Health Department Data Breach - SecurityWeek
Malware
Use of novel malware jumps 40% in 3 months, new report finds (techmonitor.ai)
New Unfurling Hemlock threat actor floods systems with malware (bleepingcomputer.com)
Telcos Hit Hardest by Cloud Malware, Report Finds - IT Security Guru
Oyster Backdoor Spreading via Trojanized Popular Software Downloads (thehackernews.com)
Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign (thehackernews.com)
Google Chrome Web Store still has security work to do • The Register
280 Million Google Chrome Users Installed Dangerous Extensions, Study Says (forbes.com)
'Mirai-like' botnet observed attacking EOL Zyxel NAS devices • The Register
New Cyber threat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks (thehackernews.com)
Experts observed approximately 120 malicious campaigns using the Rafel RAT - Security Affairs
New Medusa malware variants target Android users in seven countries (bleepingcomputer.com)
Snowblind malware abuses Android security feature to bypass security (bleepingcomputer.com)
WordPress Fights Off Malware Attack, 5 Plugins Infected | MSSP Alert
New ransomware, infostealers pose growing risk in 2024 - Help Net Security
Mac users served info-stealer malware through Google ads | Ars Technica
Cyber attackers are using more new malware, attacking critical infrastructure | CSO Online
Korean telco allegedly infected its P2P users with malware • The Register
Mobile
Forget privacy, young internet users want to be tracked (ft.com)
Here's how to keep your data private on your phone, PC, and tablet (xda-developers.com)
The Rising Threat of Mobile Phishing and How to Avoid It | MSSP Alert
Ratel RAT targets outdated Android phones in ransomware attacks (bleepingcomputer.com)
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping (thehackernews.com)
New Medusa malware variants target Android users in seven countries (bleepingcomputer.com)
Snowblind malware abuses Android security feature to bypass security (bleepingcomputer.com)
Your Phone's 5G Connection is Vulnerable to Bypass, DoS Attacks (darkreading.com)
Denial of Service/DoS/DDOS
Don’t fall for these DDoS myths | TechFinitive
Your Phone's 5G Connection is Vulnerable to Bypass, DoS Attacks (darkreading.com)
Largest Croatian hospital under cyber attack - Help Net Security
Data Breaches/Leaks
1 out of 3 breaches go undetected - Help Net Security
Why are threat actors faking data breaches? - Help Net Security
Microsoft Tells More Clients Russian Hackers Viewed Emails (2) (bloomberglaw.com)
Santander Employee Data Breach Linked to Snowflake Attack - SecurityWeek
Post Office accidentally leaks names of sub-postmasters - BBC News
Sir Alan Bates hits out at Post Office ‘incompetence’ after data breach | Computer Weekly
First million breached Ticketmaster records released for free | Malwarebytes
The Snowflake latest: New victims, ShinyHunters takes credit • The Register
Security firm Accenture breached, claim cybercriminals | Cybernews
Push Notification Fatigue Leads to LA County Health Department Data Breach - SecurityWeek
Optus database compromised in 2022 by simple coding error - Mobile World Live
Microsoft blamed for million-record theft from Geisinger • The Register
Tackling the role human error plays in data breaches | TechRadar
NHS officials warned over patients data exposed in ‘hackers honey pot’ | The Independent
TeamViewer Detects Security Breach in Corporate IT Environment (thehackernews.com)
Authenticator for X, TikTok Exposes Personal User Info for 18 Months (darkreading.com)
Los Angeles Unified confirms student data stolen in Snowflake account hack (bleepingcomputer.com)
Neiman Marcus Data Breach Disclosed as Hacker Offers to Sell Stolen Information - SecurityWeek
Designed Receivable Solutions Data Breach Impacts 585,000 People - SecurityWeek
Web scraping is not just a security or fraud problem - Help Net Security
Organised Crime & Criminal Actors
Why are threat actors faking data breaches? - Help Net Security
Why Russia Is Facing a Crime Wave When War on Ukraine Ends - Bloomberg
Russian soldiers returning home are sending crime higher | Fortune
Four FIN9 hackers indicted for cyber attacks causing $71M in losses (bleepingcomputer.com)
Organised crime and domestic violence perps buy trackers • The Register
Wikileaks' Julian Assange Released from UK Prison, Heads to Australia (thehackernews.com)
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
50 Cent got hacked by someone shilling memecoins and it seemed to work | Mashable
Predators steal additional $10M from crypto scam victims • The Register
Feds put $5m bounty on 'CryptoQueen' Ignatova's whereabouts • The Register
Crypto-gang leader convicted of vicious kidnaps, robbery • The Register
Hackers Steal Over $2 Million in Cryptocurrency From CoinStats Wallets - SecurityWeek
CoinStats says North Korean hackers breached 1,590 crypto wallets (bleepingcomputer.com)
Insider Risk and Insider Threats
Tackling the role human error plays in data breaches | TechRadar
JPMorgan Hacker May Have Built New Fraud Empire While Working With FBI - Bloomberg
Insurance
Recovery costs of cyber attacks outpacing insurance – Sophos | Insurance Times
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
Cyber cover still seen as “nice to have” despite threats (emergingrisks.co.uk)
76% of Companies Improved Their Cyber Defences to Qualify (globenewswire.com)
UK midsize firms wary of cyber insurance: Coalition - Reinsurance News
US businesses struggle to obtain cyber insurance, lawmakers are told | CyberScoop
Supply Chain and Third Parties
Santander Employee Data Breach Linked to Snowflake Attack - SecurityWeek
The Snowflake latest: New victims, ShinyHunters takes credit • The Register
NHS patients affected by cyber-attack may face six-month wait for blood test (yahoo.com)
Microsoft blamed for million-record theft from Geisinger • The Register
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack (thehackernews.com)
Remove Polyfill.io code from your website immediately • The Register
Cloud/SaaS
Cloud security faces pressure from AI growth, multicloud use | CSO Online
The Snowflake breach tells us that passwords aren't enough | TechRadar
Multifactor Authentication Is Not Enough to Protect Cloud Data (darkreading.com)
Cloud Resources have Become Biggest Targets for Cyber Attacks, finds Thales | Thales Group
Santander Employee Data Breach Linked to Snowflake Attack - SecurityWeek
Telcos Hit Hardest by Cloud Malware, Report Finds - IT Security Guru
The Snowflake latest: New victims, ShinyHunters takes credit • The Register
Police Scotland did not consult ICO about high-risk cloud system | Computer Weekly
SAP customers warned on risks in unofficial route to cloud • The Register
Best practices for protection from ransomware in cloud storage | TechTarget
Crafting a Robust Cloud Security Strategy in 2024 | MSSP Alert
Are rainy days ahead for cloud computing? - BBC News
Encryption
Europe and Australia both back down on CSAM scanning (9to5mac.com)
Telegram says it has 'about 30 engineers'; security experts say that's a red flag | TechCrunch
Passwords, Credential Stuffing & Brute Force Attacks
The Snowflake breach tells us that passwords aren't enough | TechRadar
Levi's Data Breach: 72,000+ Customers' Data Exposed (cybersecuritynews.com)
Social Media
50 Cent got hacked by someone shilling memecoins and it seemed to work | Mashable
Authenticator for X, TikTok Exposes Personal User Info for 18 Months (darkreading.com)
Malvertising
Mac users served info-stealer malware through Google ads | Ars Technica
Regulations, Fines and Legislation
The NYSE's $10M Wake-up Call (darkreading.com)
Cyber Security | UK Regulatory Outlook June 2024 - Osborne Clarke | Osborne Clarke
Police Scotland did not consult ICO about high-risk cloud system | Computer Weekly
What qualifies as a material cyber security incident? | TechTarget
Apple delays launch of AI-powered features in Europe, blaming EU rules | Apple | The Guardian
Some strategies for CISOs freaked out by the specter of federal indictments | CSO Online
Consulting firms settle $11.3M cyber security case (devx.com)
CMM 2.0 - What UK-Based Contractors Need to Know (techuk.org)
American Privacy Rights Act is now weak sauce, critics warn • The Register
Models, Frameworks and Standards
Catching Up on Innovation With NIST CSF 2.0
Implementing CIS Controls in Small and Medium Enterprises | UpGuard
Backup and Recovery
Why immutable data storage is key to cyber security strategy | TechRadar
Data Protection
Apple delays launch of AI-powered features in Europe, blaming EU rules | Apple | The Guardian
American Privacy Rights Act is now weak sauce, critics warn • The Register
Careers, Working in Cyber and Information Security
12 hottest IT security certs for higher pay today | CSO Online
Gaining and Retaining Security Talent: A Cheat Sheet for CISOs - SecurityWeek
Fortinet report highlights global cyber security skills shortage (securitybrief.co.nz)
Employers urged to find cyber security talent differently (devx.com)
Evaluating crisis experience in CISO hiring: What to look for and look out for | CSO Online
Removal of Certain Degree Requirements To Boost Federal Cyber Workforce | AFCEA International
How to become a cyber security architect | TechTarget
Law Enforcement Action and Take Downs
Five men convicted for operating illegal streaming site Jetflicks (bleepingcomputer.com)
UK and US cops put Qilin ransomware crims in the crosshairs • The Register
Sellafield pleads guilty to criminal charges over cyber security | Computer Weekly
Four FIN9 hackers indicted for cyber attacks causing $71M in losses (bleepingcomputer.com)
Crypto-gang leader convicted of vicious kidnaps, robbery • The Register
Russian national indicted for role in cyber attacks on Ukraine | CyberScoop
Russian Charged With Ukrainian Cyber Attack Before Invasion - Law360
War Crime Prosecutions Enter a New Digital Age | WIRED
Misinformation, Disinformation and Propaganda
The inside view of spyware’s 'dirty interference,' from two recent Pegasus victims (therecord.media)
Political Deepfakes Are the Top Use of Malicious AI (pcmag.com)
Supreme Court rejects effort to limit government communication on misinformation | CyberScoop
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
Cyber operations create additional risks for people’s security and well-being | ICRC
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
Nation State Actors
China
China-Sponsored Attackers Target 40K Corporate Users in 90 Days (darkreading.com)
China-Russia alignment: a threat to Europe's security | Merics
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
'SneakyChef' APT Slices Up Foreign Affairs With SugarGh0st (darkreading.com)
Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign (thehackernews.com)
Protecting America’s cyber security demands showing our teeth | CyberScoop
Chinese Cyber Spies Employ Ransomware in Attacks for Diversion (bleepingcomputer.com)
Beyond TikTok: Navigating the cyber security landscape of tomorrow (federaltimes.com)
China-Linked Espionage Groups Target Asian Telecoms (darkreading.com)
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack (thehackernews.com)
Russia
Microsoft Tells More Clients Russian Hackers Viewed Emails (2) (bloomberglaw.com)
China-Russia alignment: a threat to Europe's security | Merics
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
US Treasury Sanctions 12 Kaspersky Executives Amid Software Ban (thehackernews.com)
Why Russia Is Facing a Crime Wave When War on Ukraine Ends - Bloomberg
Russian soldiers returning home are sending crime higher | Fortune
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware (thehackernews.com)
European Union Sanctions Russian State Hackers (govinfosecurity.com)
Protecting America’s cyber security demands showing our teeth | CyberScoop
Russian used US systems for pre-invasion attack on Ukraine, US says - Defense One
UK government weighs action against Russian hackers over NHS records theft | NHS | The Guardian
Evolve Bank & Trust Confirms Data Was Stolen in Cyber Attack (claimsjournal.com)
Russian national indicted for role in cyber attacks on Ukraine | CyberScoop
Russian Charged With Ukrainian Cyber Attack Before Invasion - Law360
Kaspersky Denies Security Risk, After US Sales Ban | Silicon UK
The US bans Kaspersky products, citing security risks - what this means for you | ZDNET
US Bans Kaspersky Over Alleged Kremlin Links - Infosecurity Magazine (infosecurity-magazine.com)
ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor (thehackernews.com)
FBI joins hunt for hackers who stole NHS records (thetimes.com)
HUR Cyber Attack Hits Russian Internet Providers in Occupied Crimea (kyivpost.com)
Evolve Bank caught up in latest Russia-linked cyber attacks (paymentexpert.com)
North Korea
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware (thehackernews.com)
Protecting America’s cyber security demands showing our teeth | CyberScoop
Cyber operations create additional risks for people’s security and well-being | ICRC
Hackers Steal Over $2 Million in Cryptocurrency From CoinStats Wallets - SecurityWeek
CoinStats says North Korean hackers breached 1,590 crypto wallets (bleepingcomputer.com)
Tools and Controls
Cyber warfare is not insurable: Munich Re's Kreuzer - Reinsurance News
Recovery costs of cyber attacks outpacing insurance – Sophos | Insurance Times
Four steps to build cyber resilience in the public sector | TechRadar
Conditional Access - The ultimate starter guide (oceanleaf.ch)
Hybrid work prompts spike in network security threats | Computer Weekly
Why immutable data storage is key to cyber security strategy | TechRadar
What Application Security Within Shadow IT Looks Like (darkreading.com)
Cyber cover still seen as “nice to have” despite threats (emergingrisks.co.uk)
76% of Companies Improved Their Cyber Defences to Qualify (globenewswire.com)
DMARC: Why It's Moving from a Best Practice to Must-Have | Proofpoint US
UK midsize firms wary of cyber insurance: Coalition - Reinsurance News
The four phases of emergency management | TechTarget
CISOs becoming more comfortable with risk levels - Help Net Security
CISOs Growing More Comfortable With Risk, But Better C-Suite Alignment Needed (darkreading.com)
Crafting a Robust Cloud Security Strategy in 2024 | MSSP Alert
US businesses struggle to obtain cyber insurance, lawmakers are told | CyberScoop
Cisco's enterprise firewall receives ‘caution’ rating from CyberRatings - SDxCentral
A proactive cyber security policy is not just smart — it’s essential (securityintelligence.com)
The dos and don’ts of gamified cyber security training - Security Boulevard
Benefits of dark web monitoring (techtarget.com)
A Watershed Moment for Threat Detection and Response (darkreading.com)
Creating a proactive incident response plan | Microsoft Security Blog
Building an incident response strategy in 2024 | ITPro
Conducting a Comprehensive Security Posture Assessment in 2024 (att.com)
Best practices for protection from ransomware in cloud storage | TechTarget
How to construct a cyber security policy that sits alongside AI (architecture.com)
Other News
Post Office expert IT witness Gareth Jenkins resigns BCS membership | Computer Weekly
Cyber Attacks: An Unseen State Of Emergency In Healthcare (forbes.com)
New cyber threat research for SMB in 2024 | Securelist
Is Defence Winning? A Look at Decades of Playing Catch Up (darkreading.com)
Beat the Heat and Cyber Threats this Summer | MSSP Alert
Cyber Europe 2024 tests resilience of EU Energy Sector (techmonitor.ai)
Hijacked spacecraft, hacked life support systems: the cyber risks of space | Cybernews
New Trends in Maritime Cyber Security in 2024 (maritime-executive.com)
Estimated cyber crime up almost 120 per cent in four years | The Herald (heraldscotland.com)
Windows 10 will get five years of additional support thanks to 0patch - Neowin
Cracking down on cybercrime: Who you gonna call? - Help Net Security
Why cyber attack cases against journalists are increasing | WKMS
How to navigate retail’s changing cyber threats | Retail Technology Review
Cyber Threats in Construction and Manufacturing: Securing your Organisation (att.com)
Cyber security for schools: What you need to know | Edexec
Nine ways construction companies can modernize and mitigate cyber risks | SC Media (scmagazine.com)
Vulnerability Management
75% of new vulnerabilities exploited within 19 days - Help Net Security
Vulnerabilities
MOVEit Transfer Flaws Push Security Defence Into a Race With Attackers (darkreading.com)
Phoenix UEFI bug affects long list of Intel chip families • The Register
New attack uses MSC files and Windows XSS flaw to breach networks (bleepingcomputer.com)
Fresh MOVEit Bug Under Attack Mere Hours After Disclosure (darkreading.com)
VMware ESXi Flaw Allows Attackers to Bypass Authentication (cybersecuritynews.com)
MoveIt Transfer vulnerability targeted amid disclosure drama | TechTarget
New MOVEit Transfer critical bug is actively exploited (securityaffairs.com)
ESET Security Products - Windows Vulnerable Privilege Escalation (cybersecuritynews.com)
Chrome 126 Update Patches Memory Safety Bugs - SecurityWeek
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts (thehackernews.com)
Plugins on WordPress.org backdoored in supply chain attack (bleepingcomputer.com)
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping (thehackernews.com)
Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released (bleepingcomputer.com)
WordPress Fights Off Malware Attack, 5 Plugins Infected | MSSP Alert
GitLab Security Updates Patch 14 Vulnerabilities - SecurityWeek
Windows 10 will get five years of additional support thanks to 0patch - Neowin
'Mirai-like' botnet observed attacking EOL Zyxel NAS devices • The Register
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.