Black Arrow Cyber Threat Intelligence Briefing 28 March 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Summary
Our summary of threat intelligence this week highlights how attackers exploit your trust in third parties, well-known brands, or cloud collaboration platforms, including Dropbox, SharePoint and DocuSign, to gain access to your information or systems including in ransomware attacks. Criminals are innovating through new social engineering and phishing-as-a-service platforms, combined with voice-phishing and AI. Organisations can help reduce these risks through enhanced employee training and multi-factor-authentication (MFA), and stronger defences against ransomware.
Also this week, the UK’s Information Commissioner’s Office (ICO) imposed a fine of £3m on an IT provider who experienced a cyber incident because they did not have basic cyber security in place such as MFA and vulnerability management. The ICO has warned that it will impose higher fines for similar cases in future.
There has been a continued increase in cyber threats from both domestic and state-aligned actors, including criminal gangs now operating with the speed and sophistication of nation states. The UK government is expanding its cyber capabilities in response, but for organisations, the message is clear: the threat landscape is evolving faster than ever, and both vigilance and adaptability are essential.
Top Cyber Stories of the Last Week
Third-Party Security Issues Could Be the Biggest Threat Facing Your Business
New research has revealed that over a third (35%) of all breaches in 2024 were linked to third-party suppliers; a figure likely to be understated due to underreporting. The report highlights a shift in attack surfaces, with fewer breaches involving traditional technology products and services. More than two in five ransomware attacks now originate through third parties. Experts warn that organisations must move beyond periodic vendor assessments and adopt real-time monitoring to stay ahead of evolving third-party cyber security threats.
New Morphing Meerkat Phishing Kit Mimics 114 Brands
A new phishing-as-a-service platform, dubbed Morphing Meerkat, has been uncovered, targeting users across the globe by mimicking login pages for 114 well-known brands. The phishing kit uses victims’ mail exchange records to tailor fake login pages to their email providers, making the attack more convincing. Thousands of phishing emails have been distributed using compromised websites and advertising redirects to bypass security filters. The kit also supports over a dozen languages and includes anti-analysis features, making detection and investigation more difficult. Stolen credentials are exfiltrated using tools like Telegram, increasing the speed and scale of data theft.
NCA Warns of Sadistic Online “Com” Networks
The UK’s National Crime Agency has warned of a sharp rise in “Com” networks: online groups of sadistic teenage boys engaged in cyber attacks, fraud, extremism and serious abuse. Reports of these threats increased six-fold in the UK between 2022 and 2024. These English-speaking groups operate openly on mainstream platforms and have been linked to ransomware, phishing, SIM swapping and social engineering. While most threats still originate abroad, the NCA highlights a growing domestic risk. The groups target young girls in particular, often coercing them into serious self-harm, with motivations ranging from profit and notoriety to status within these networks.
Threat Actors Abuse Trust in Cloud Collaboration Platforms
Cofense Intelligence has reported a sharp rise in phishing attacks that abuse trusted online document platforms to bypass secure email gateways and steal credentials. In 2024, these platforms were linked to 8.8% of all credential phishing campaigns, with 79% aiming to harvest user credentials. Dropbox was the most exploited at 25%, followed by Adobe, SharePoint and DocuSign. Features like automatic email notifications and delayed takedowns help attackers evade detection. The report recommends organisations enhance user awareness, apply behavioural analysis tools, and adopt multi-factor authentication to better defend against these increasingly sophisticated phishing threats.
Report Reveals How Breaches Are Fuelling Hyper-Personalised Email Attacks
Fortra’s latest report highlights a sharp rise in highly personalised email attacks, with 99% of threats in 2024 involving social engineering or phishing without malware. Over 1 billion records were breached last year, enabling cyber criminals to combine stolen and publicly available data to make scams more convincing. Abuse of legitimate platforms surged by 200%, particularly targeting e-signature services like DocuSign and free developer tools. Hybrid vishing, combining phishing with phone-based deception, emerged as the most common scam, with one in three impersonating PayPal in late 2024. The report warns that generative AI will intensify these threats in 2025.
No MFA? Expect Hefty Fines, UK’s ICO Warns
The UK Information Commissioner’s Office (ICO) has warned that failing to implement basic cyber security measures like multi-factor authentication (MFA) could result in significant fines. This follows a £3.07m penalty issued to IT provider Advanced after a 2022 ransomware attack exposed sensitive data of over 79,000 individuals and severely disrupted NHS services. Hackers exploited a customer account without MFA, highlighting broader failings in patching and vulnerability management. While the fine was reduced from an initial £6.1m due to the firm’s cooperation, the ICO stressed that future penalties may be higher for similar incidents where fundamental protections are missing.
Mobsters Now Overlap with Cyber Crime Gangs and Use AI for Evil, Europol Warns
Europol’s latest threat assessment reveals that organised crime groups are increasingly adopting digital technologies, with AI now central to their operations. These networks are using AI to scale criminal activities, evade detection, and exploit digital platforms and illicit financial systems. Europol warns that organised crime is now deeply embedded online, with the internet serving as its primary arena and data becoming its most valuable asset. The report also highlights growing collaboration between criminal groups and state-aligned hybrid threat actors, amplifying the threat to the EU’s institutions and social cohesion through shared tools, expertise, and protection.
Ransomware Attacks Surge Despite Payments Being Down
Ontinue’s latest threat intelligence report reveals a 132% rise in ransomware attacks, despite ransom payments falling by 35%, indicating a shift in attacker tactics. Vishing (voice enabled phishing) attacks have surged by 1,633% in just one quarter, now fuelled by AI-powered voice cloning to impersonate trusted individuals. Adversary-in-the-Middle attacks are also on the rise, enabling cyber criminals to bypass multi-factor authentication. Meanwhile, the misuse of legitimate tools such as Microsoft Quick Assist and the targeting of Windows Hello authentication keys highlight an evolving threat landscape. The report urges firms to strengthen defences against ransomware, phishing, and credential theft.
High-Severity Cloud Security Alerts Tripled in 2024
Palo Alto Networks reported a 235% surge in high-severity cloud security alerts in 2024, contributing to a 388% overall rise in incidents across the year. Organisations now face an average of 20 serious daily alerts, with the most common linked to suspicious identity use and disabled data protections. Notably, suspicious large downloads rose by 305% and abnormal user activity by over 100%. The focus of cloud security is shifting from misconfigurations to threats occurring in real-time as systems operate, highlighting the growing need for runtime visibility to detect and respond to active threats more effectively.
If You Think You’re Immune to Phishing Attempts, You’re Wrong!
Cyber security expert Troy Hunt has publicly admitted falling victim to a convincing phishing attack that compromised his Mailchimp account and exposed the email addresses, IPs, and geolocation data of newsletter subscribers. Despite recognising warning signs in hindsight, Hunt’s experience highlights how sophisticated and automated such attacks have become. Notably, the attack bypassed two-factor authentication via one-time passcodes, underlining the limitations of commonly used security controls. Hunt stressed the importance of phishing-resistant authentication and the need for stronger default protections from service providers. His transparency serves as a timely reminder that no individual is immune, regardless of expertise.
UK Expanding Cyber Capabilities Amid US Pause
The UK government has reaffirmed its commitment to expanding cyber capabilities in response to the growing threat landscape and a shift in US policy on offensive cyber operations. Armed Forces Minister Luke Pollard confirmed increased investment in both defensive and offensive cyber forces, including a new direct entry pathway for cyber specialists. The 77th Brigade remains central to countering Russian disinformation in Eastern Europe. In 2024, the UK’s National Cyber Security Centre received 1,957 cyber attack reports, including 89 nationally significant incidents and 12 severe cases, underscoring the urgency of strengthening the UK’s cyber resilience.
Sources:
https://thehackernews.com/2025/03/new-morphing-meerkat-phishing-kit.html
https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/
https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/
https://informationsecuritybuzz.com/fortra-report-reveals-how-breaches/
https://www.infosecurity-magazine.com/news/mfa-expect-hefty-fines-uk-ico/
https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/
https://betanews.com/2025/03/25/ransomware-attacks-surge-despite-payments-being-down/
https://www.darkreading.com/cyber-risk/high-severity-cloud-security-alerts-tripled-2024
https://www.helpnetsecurity.com/2025/03/26/troy-hunt-mailchimp-phishing-email/
https://ukdefencejournal.org.uk/uk-expanding-cyber-capabilities-amid-us-pause/
Threats
Ransomware, Extortion and Destructive Attacks
Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame
Ransomware attacks surge despite payments being down
Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs - SecurityWeek
Half of firms have been hit by a cyber attack - Digital Journal
Albabat Ransomware Evolves to Target Linux and macOS - Infosecurity Magazine
Building ransomware resilience to avoid paying out | ITPro
Ransomware hackers are desperate lying liars | Cybernews
Russian Ransomware Gang Exploited Windows Zero-Day Before Patch - SecurityWeek
Ransomware Groups Increasingly Adopting EDR Killer Tools - SecurityWeek
Medusa Ransomware Uses Malicious Driver to Disable Security Tools - SecurityWeek
New VanHelsing ransomware targets Windows, ARM, ESXi systems
VMware Vulnerabilities Exploited Actively to Deploy Ransomware
RedCurl cyber spies create ransomware to encrypt Hyper-V servers
BlackLock Ransomware Targeted by Cyber Security Firm
Russian Espionage Group Using Ransomware in Attacks - SecurityWeek
VSCode extensions found downloading early-stage ransomware
Resecurity turns the table on BlackLock ransomware • The Register
Vampire Cosplay and Brand Revival: Ransomware in 2025
Winning the war on ransomware with multi-layer security | TechRadar
Ransomware Victims
UK fines software provider £3.07 million for 2022 ransomware breach
UK ICO fines Advanced Computer £3.07m after NHS data breach
WoW! A Ransomware Gang Just Took Over One Of America’s Largest ISPs
Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover - SecurityWeek
Cloak ransomware group hacked the Virginia Attorney General’s Office
New Ransomware Group Claims Attack on US Telecom Firm WideOpenWest - SecurityWeek
Phishing & Email Based Attacks
Half of firms have been hit by a cyber attack - Digital Journal
If you think you're immune to phishing attempts, you're wrong! - Help Net Security
Microsoft Teams Phishing Attacks: What to Know and What to Do | MSSP Alert
Cloud collaboration platforms exploited in phishing attacks
Threat Actors Abuse Trust in Cloud Collaboration Platforms - Infosecurity Magazine
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims' DNS Email Records
Fortra Report Reveals How Breaches Are Fuelling Hyper-Personalized Email Attacks
Intro to Deceptionology: Why Falling for Scams is Human Nature - Security Boulevard
The Rise of Mobile Phishing and How to Prevent Mobile Phishing - Security Boulevard
These phishing attacks are now targeting Mac browsers - how to protect yourself | ZDNET
Why are the young so vulnerable to phishing scams? Blame fomo | BusinessDesk
Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!
Famous Data Breaches & Phishing Attacks: What We Can Learn - Security Boulevard
New phishing campaign uses scareware to steal Apple credentials | CSO Online
'Lucid' Phishing Tool Exploits Faults in iMessage, RCS
Cyber Security Gaps Leave Doors Wide Open
Business Email Compromise (BEC)/Email Account Compromise (EAC)
DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union
Other Social Engineering
Intro to Deceptionology: Why Falling for Scams is Human Nature - Security Boulevard
Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness - Infosecurity Magazine
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit - SecurityWeek
New phishing campaign uses scareware to steal Apple credentials | CSO Online
Artificial Intelligence
Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame
How AI, corruption and digital tools fuel Europe's criminal underworld - Help Net Security
Mobsters now overlap with cyber crime gangs, says Europol • The Register
Enterprises walk a tightrope between AI innovation and security - Help Net Security
89% of Enterprises GenAI Usage Is Untracked, Posing Security Risks - Security Boulevard
Dark Web Mentions of Malicious AI Tools Spike 200% - Infosecurity Magazine
3 in 4 Enterprise Users Upload Data to GenAI Including passwords and keys
NIST Warns of Significant Limitations in AI/ML Security Mitigations - Infosecurity Magazine
AI Agents Will Cut Account Exploitation Time By 50%
The Human Factor: Redefining Cyber Security In The Age Of AI
A CISO’s guide to securing AI models - Help Net Security
Overcoming Cyber Security Challenges In Agentic AI
AI vs. Cyber Criminals: Who Wins the Race in Next-Gen Threat Detection? - Security Boulevard
North Korea launches new unit with a focus on AI hacking, per report | TechCrunch
How governments can strengthen cyber security in the age of AI and hybrid threats - e-Estonia
WhatsApp's Meta AI is now rolling out in Europe, and it can't be turned off
Fake DeepSeek Ads Spread Malware to Google Users
2FA/MFA
Massive Surge In Ransomware Attacks—AI And 2FA Bypass To Blame
No MFA? Expect Hefty Fines, UK’s ICO Warns - Infosecurity Magazine
NCSC taps influencers to make 2FA go viral • The Register
Malware
Cyber Criminals Exploit CheckPoint Driver Flaws in Malicious Campaign - Infosecurity Magazine
How Businesses Can Protect Themselves Against Infostealers
Windows users targeted with CoffeeLoader | Cybernews
SpyX Breach Shows Apple Users Aren’t Invulnerable And Silence Is Deafening
New macOS Malware 'ReaderUpdate' Upgraded Arsenal With Nim and Rust Variants
Fake DeepSeek Ads Spread Malware to Google Users
CoffeeLoader Malware Loader Linked to SmokeLoader Operations - Infosecurity Magazine
Valve just pulled a malicious game demo spreading info-stealing malware from Steam | Tom's Guide
Malware strikes again. I'm starting to worry about Steam's lax security | PCWorld
New Linux Kernel Rust Module Unveiled to Detect Rootkits
Mobile
The Rise of Mobile Phishing and How to Prevent Mobile Phishing - Security Boulevard
Research: Rooting Tools Vs The Mobile Security Industry
Microsoft’s .NET MAUI Tool Leveraged for Android Malware Deployment | MSSP Alert
'Lucid' Phishing Tool Exploits Faults in iMessage, RCS
Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit - SecurityWeek
Do you use Android? This secret Google technique could protect you - Talk Android
Denial of Service/DoS/DDoS
How to protect your site from DDoS attacks - before it's too late | ZDNET
Internet of Things – IoT
IoT Security Gaps Put Enterprises at Risk - DataBreachToday
Data Breaches/Leaks
Inside the CIA's use of Signal and how America's enemies try to hack it - Washington Times
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Here Are the Attack Plans That Trump’s Advisers Shared on Signal - The Atlantic
The Atlantic releases screenshots of timing, weapons used in Yemen war plans Signal chat - POLITICO
How does your data end up on the dark web? - Help Net Security
Famous Data Breaches & Phishing Attacks: What We Can Learn - Security Boulevard
Oracle’s Data Breach Denial Unravels As Leaked Info Checks Out
Coinbase was primary target of recent GitHub Actions breaches
23andMe files for bankruptcy protection • The Register
Three rules potentially broken by Trump team's Signal group chat leak - BBC News
Dark Web Intelligence: A Critical Layer in Modern Cyber Security Strategy | MSSP Alert
Widespread Keenetic Router Data Breach Uncovered | MSSP Alert
Organised Crime & Criminal Actors
2025 Risk Survey: Cyber Security, Fraud at the Forefront | Bank Director
How AI, corruption and digital tools fuel Europe's criminal underworld - Help Net Security
Mobsters now overlap with cyber crime gangs, says Europol • The Register
Ransomware hackers are desperate lying liars | Cybernews
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cyber Crime Bust
How Scammers Launder Money and Get Away With It - The New York Times
New Cyber Crime Tool 'Atlantis AIO' Amps Up Credential Stuffing Attacks
NCA Warns of Sadistic Online “Com” Networks - Infosecurity Magazine
Alleged Snowflake hacker agrees to be extradited to the US | The Verge
Furry Hackers Fear Leader Raided by FBI
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
US Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
Fewer than 500 people are responsible for $3.2 trillion of artificial crypto trading - Fast Company
Coinbase was primary target of recent GitHub Actions breaches
Insider Risk and Insider Threats
The Human Factor: Redefining Cyber Security In The Age Of AI
Cyber security Gaps Leave Doors Wide Open
Insurance
Threat of state-sponsored cyber attacks could make UK terror insurer ‘obsolete’
Cyber insurance isn't always what it seems - Help Net Security
Supply Chain and Third Parties
Third-party security issues could be the biggest threat facing your business | TechRadar
SecurityScorecard Observes Surge in Third-Party Breaches - Infosecurity Magazine
UK ICO fines Advanced Computer £3.07m after NHS data breach
Will your supply chain stand up to a nation-state hack? • The Register
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
US defence contractor settles whistleblower suit for $4.6M • The Register
Coinbase was primary target of recent GitHub Actions breaches
Cloud/SaaS
Cloud providers aren’t delivering on security promises - Help Net Security
Microsoft Teams Phishing Attacks: What to Know and What to Do | MSSP Alert
Cloud collaboration platforms exploited in phishing attacks
Threat Actors Abuse Trust in Cloud Collaboration Platforms - Infosecurity Magazine
High-Severity Cloud Security Alerts Tripled in 2024
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
Hijacked Microsoft Stream classic domain "spams" SharePoint sites
Oracle Cloud denies claims of server intrusion • The Register
Outages
Lessons from CrowdStrike – a particular focus on financial services
Identity and Access Management
Encryption
Prepping for post-quantum: a beginner’s guide to lattice cryptography
Ex-UK cyber chief says asking Apple to break encryption was 'naive' | New Scientist
A Win for Encryption: France Rejects Backdoor Mandate | Electronic Frontier Foundation
Linux and Open Source
Albabat Ransomware Evolves to Target Linux and macOS - Infosecurity Magazine
Cyber security and open-source software in products with digital elements
New Linux Kernel Rust Module Unveiled to Detect Rootkits
EU OS takes a 'layered' approach to its new Linux distro for the public sector | ZDNET
Passwords, Credential Stuffing & Brute Force Attacks
How to Balance Password Security Against User Experience
New Cyber Crime Tool 'Atlantis AIO' Amps Up Credential Stuffing Attacks
Google Account Hijackers Target Victims Via Semrush Ads - Infosecurity Magazine
New phishing campaign uses scareware to steal Apple credentials | CSO Online
Social Media
How to protect your phone and data privacy at the US border | US immigration | The Guardian
What travelers should know about their rights when entering the U.S. - The Washington Post
Travelers fear social media and photos may now trigger deportation
Malvertising
Google Account Hijackers Target Victims Via Semrush Ads - Infosecurity Magazine
Training, Education and Awareness
70% of South African businesses lack basic cyber security awareness
Regulations, Fines and Legislation
UK fines software provider £3.07 million for 2022 ransomware breach
UK ICO fines Advanced Computer £3.07m after NHS data breach
No MFA? Expect Hefty Fines, UK’s ICO Warns - Infosecurity Magazine
Analysis: ‘We’re Choosing to Blind Ourselves’ – US Backs Off Russian Threats, PART I
Ex-UK cyber chief says asking Apple to break encryption was 'naive' | New Scientist
EU Cyber Resilience Act: What You Need to Know - Security Boulevard
Monitoring preparedness and governance under EU cyber security legislation
The importance of cyber security compliance – an overview of the EU regulatory framework
Digital resilience and cyber security reporting requirements in the UK and EU
Our Leaders Don't Take Information Security Seriously | National Review
UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats - Infosecurity Magazine
Adapting the UK’s cyber ecosystem | TechRadar
Inside the CIA's use of Signal and how America's enemies try to hack it - Washington Times
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Here Are the Attack Plans That Trump’s Advisers Shared on Signal - The Atlantic
What CISA's Red Team Disarray Means for US Cyber Defences
Proof of Concept: Is the US Losing Its Cyber Grip?
Ex-NSA boss: Election security focus helped dissuade Russia • The Register
Cyber security and open-source software in products with digital elements
Lessons from CrowdStrike – a particular focus on financial services
Marco Rubio Says Someone in Signal Chat Made ‘Big Mistake’ in Adding Journalist - The New York Times
How DORA compliance future-proofs your organisation: By Steven Rackham
The EU AI Act: A Critical Overview Of A Necessary Act?
Preparing for Cyber Security Disclosure as a Public Company | WilmerHale - JDSupra
US lifts sanctions on Tornado Cash cryptocurrency mixer • The Register
China poses biggest military threat to US: intel report - Digital Journal
US Cyber Security Weakness Benefits China – Foreign Policy
A Win for Encryption: France Rejects Backdoor Mandate | Electronic Frontier Foundation
Models, Frameworks and Standards
EU Cyber Resilience Act: What You Need to Know - Security Boulevard
Monitoring preparedness and governance under EU cyber security legislation
The importance of cyber security compliance – an overview of the EU regulatory framework
Digital resilience and cyber security reporting requirements in the UK and EU
How DORA compliance future-proofs your organisation: By Steven Rackham
NIST 2.0 Demands Strategic Reset, Not a Compliance Patch
Backup and Recovery
Data Protection: Top Trends In Backup And Recovery
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
Careers, Working in Cyber and Information Security
60% of cyber security pros looking to change employers | CSO Online
Which Top Cyber Security Role of 2024 Was Featured in 64,000+ Job Postings? | TechRepublic
A closer look at The Ultimate Cyber Security Careers Guide - Help Net Security
11 hottest IT security certs for higher pay today | CSO Online
These cyber security specialists are the most sought-after, according to a report | Cybernews
Law Enforcement Action and Take Downs
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cyber Crime Bust
Alleged Snowflake hacker agrees to be extradited to the US | The Verge
DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union
Furry Hackers Fear Leader Raided by FBI
Misinformation, Disinformation and Propaganda
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
RedCurl cyber spies create ransomware to encrypt Hyper-V servers
'We are in a state of war': The UK needs to prepare for a future without Nato
Nation State Actors
Threat of state-sponsored cyber attacks could make UK terror insurer ‘obsolete’
Will your supply chain stand up to a nation-state hack? • The Register
China
Chinese hackers are getting bigger, better and stealthier
China, Beijing's ties with Russia main threats to US: intel report - Digital Journal
US Intelligence identifies China as top military, cyber threat
China's FamousSparrow flies back, breaches US org • The Register
Chinese APT Weaver Ant infiltrated a telco for over four years
Cyber Threats Jeopardize US Military Mobility, Report Warns
Chinese Hacker Group Tracked Back to iSoon APT Operation
China poses biggest military threat to US: intel report - Digital Journal
US Cyber Security Weakness Benefits China – Foreign Policy
China bans facial recognition in hotels, bathrooms • The Register
Commerce limits 19 Chinese, Taiwanese companies from buying U.S. tech | CyberScoop
Chinese Hackers Exploit Unpatched Servers in Taiwan
Russia
UK expanding cyber capabilities amid US pause
Analysis: ‘We’re Choosing to Blind Ourselves’ – US Backs Off Russian Threats, PART I
Russian Espionage Group Using Ransomware in Attacks - SecurityWeek
China, Beijing's ties with Russia main threats to US: intel report - Digital Journal
US Intelligence identifies China as top military, cyber threat
Our Leaders Don't Take Information Security Seriously | National Review
What CISA's Red Team Disarray Means for US Cyber Defences
Proof of Concept: Is the US Losing Its Cyber Grip?
Ex-NSA boss: Election security focus helped dissuade Russia • The Register
Ukraine to establish national cyber attack response system
Ukrainian Railways Faced Massive Cyber Attack Over the Weekend
Russian hackers shut down major Belgian websites | Cybernews
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
Poland raises defences against cyber attacks before the vote | Stars and Stripes
Widespread Keenetic Router Data Breach Uncovered | MSSP Alert
Russia subjected to suspected joint Head Mare, Twelve attacks | SC Media
Iran
Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen
North Korea
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
North Korea launches new unit with a focus on AI hacking, per report | TechCrunch
Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence
Russia subjected to suspected joint Head Mare, Twelve attacks | SC Media
Tools and Controls
Cloud providers aren’t delivering on security promises - Help Net Security
Cyber security spending set to jump 12.2% in 2025 - Help Net Security
Cyber criminals Exploit CheckPoint Driver Flaws in Malicious Campaign - Infosecurity Magazine
Prepping for post-quantum: a beginner’s guide to lattice cryptography
How to Balance Password Security Against User Experience
Data Protection: Top Trends In Backup And Recovery
Spring clean your security data: The case for cyber security data hygiene - Help Net Security
10 Critical Network Pentest Findings IT Teams Overlook
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
Ransomware Groups Increasingly Adopting EDR Killer Tools - SecurityWeek
What is Infrastructure Intelligence? - Security Boulevard
Threat Intelligence: Are UK Organisations Flying Blind? | SC Media UK
8 Expert Tips and Resources to Stay Ahead of Security Threats - DevX
How Cyber Security Pros Stay Ahead of the Curve – Insights from Experts - DevX
Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
The hidden costs of security tool bloat and how to fix it - Help Net Security
53% of security teams lack continuous and up-to-date visibility - Help Net Security
AI vs. Cyber Criminals: Who Wins the Race in Next-Gen Threat Detection? - Security Boulevard
Dark Web Intelligence: A Critical Layer in Modern Cyber Security Strategy | MSSP Alert
Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch
Other News
UK CNI’s Overconfidence Puts National Security At Risk
Security experts warn of ‘contradictory confidence’ over critical infrastructure threats | ITPro
Estonia’s bold approach to cyber security: a holistic model for Europe - e-Estonia
Threat of war and disease means Europeans need 3 days’ supplies, Commission to warn – POLITICO
UK NCSC offers security guidance for domain and DNS registrars - Help Net Security
UK says security ties with US are as strong as ever | Reuters
'We are in a state of war': The UK needs to prepare for a future without Nato
How governments can strengthen cyber security in the age of AI and hybrid threats - e-Estonia
Healthcare's alarming cyber security reality - Help Net Security
OT systems are strategic targets in global power struggles - Help Net Security
Single points of failure for our national infrastructure, like Heathrow, can no longer be tolerated
Dozens of solar inverter flaws could be exploited to attack power grids
Is the Middle East's Race to Digitize a Threat?
Cyber attack threat not taken seriously by food and beverage
ENISA Probes Space Threat Landscape in New Report - Infosecurity Magazine
Vulnerability Management
NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD - SecurityWeek
Cyber security Gaps Leave Doors Wide Open
Chinese Hackers Exploit Unpatched Servers in Taiwan
Vulnerabilities
It's time to update Chrome ASAP - again! - to fix this critical flaw | ZDNET
Cyber Criminals Exploit CheckPoint Driver Flaws in Malicious Campaign - Infosecurity Magazine
Russian Ransomware Gang Exploited Windows Zero-Day Before Patch - SecurityWeek
VMware Vulnerabilities Exploited Actively to Deploy Ransomware
CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825) - Help Net Security
Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!
Public-facing Kubernetes clusters at risk of total takeover • The Register
Mozilla warns Windows users of critical Firefox sandbox escape flaw
VSCode extensions found downloading early-stage ransomware
Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.
E&OE