Black Arrow Cyber Threat Intelligence Briefing 06 June 2025

 Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

Our review this week includes the complexity of cyber risk, with UK organisations reporting a sharp rise in supply chain-related incidents and limited visibility across third-party networks. As we discuss in our training events, vendor email compromise (VEC) is growing in prominence alongside BEC, exploiting trust in external partners to evade detection. Organisations need to review their control framework, including training staff and leaders on identifying and reporting suspicious communications, and adhering to the letter and spirit of operational controls that attackers seek to exploit.

We also explore the shifting role of the CISO, now increasingly embedded in strategic business leadership. As AI becomes more integrated into operations, CISOs must balance innovation with governance, mastering risk management to promote responsible adoption. The rise of fractional CISOs offers small and medium firms access to broad expertise at lower cost, which we provide for our clients. Threat actors continue to evolve, with ransomware groups like Play expanding their reach, and teenage hackers blurring the line between mischief and organised crime.

The UK’s Ministry of Defence has disclosed a thwarted spear-phishing campaign by Russia-linked actors posing as journalists, part of over 90,000 state-linked threats in two years. This highlights the growing use of cyber operations in geopolitical conflict. Finally, the unmonitored use of generative AI tools is accelerating, raising concerns about data loss and regulatory breaches. Black Arrow recommends that leaders prioritise visibility across supply chains, invest in adaptive security training by experts, and align AI and threat intelligence strategies with robust governance frameworks.


Top Cyber Stories of the Last Week

Half of Firms Suffer Two Supply Chain Incidents in Past Year

New research reveals that nearly half of UK organisations have faced two or more supply chain-related cyber incidents in the past year, highlighting growing concerns over third-party vulnerabilities. Despite 90% identifying supply chain threats as a top priority for 2025, only 37% felt their current risk management strategies were truly effective. The report points to poor collaboration between stakeholders and inconsistent visibility across sectors, with just 14% of organisations having full visibility into all supply chain tiers. As the UK prepares to introduce new cyber resilience legislation, firms are calling for stronger regulatory powers and incentives to drive better cross-industry coordination.

https://www.infosecurity-magazine.com/news/half-supply-chain-incidents/

Vendor Email Compromise (VEC) Attacks Outpace Business Email Compromise (BEC) in EMEA

New research shows that Vendor Email Compromise (VEC) attacks are now outpacing traditional Business Email Compromise (BEC) across EMEA, with nearly half of recipients engaging with VEC emails, almost double the rate of BEC. VEC exploits trust in external vendors, making it harder to detect and rarely reported by users. With reporting rates as low as 0.2% in EMEA, these scams pose a growing challenge. The findings highlight the need for enhanced email security platforms, third-party behaviour monitoring, and targeted user education to better defend against increasingly sophisticated impersonation threats.

https://www.msspalert.com/brief/vec-attacks-outpace-bec-in-emea-a-growing-challenge-for-mssps

UK SMBs Are Ramping Up Cyber Security Spending

Over half of UK small businesses increased their cyber security spending last year. Phishing, ransomware, and denial-of-service attacks remain key risks. Meanwhile, growing interest in generative AI is prompting fresh concerns around data protection, regulatory uncertainty, and staff readiness, with many SMBs expressing caution over privacy, reliability, and the potential loss of personalised service.

https://www.itpro.com/security/uk-smbs-are-ramping-up-cybersecurity-spending-and-its-about-time

CISO Roles Expand Beyond Cyber Security as Organisations Embrace Strategic Security Leadership

The role of the Chief Information Security Officer (CISO) is undergoing a strategic shift, moving beyond technical oversight to encompass broader business responsibilities including risk management, IT, and digital transformation. Nearly 40% of CISOs now hold senior executive titles, with over half engaging regularly with boards, rising to 65% in large enterprises. Research shows three clear CISO types: Strategic, Functional, and Tactical, with Strategic CISOs earning significantly higher compensation and reporting the greatest job satisfaction. This transformation reflects growing recognition that effective cyber security leadership is now integral to overall business success and long-term resilience. A good outsourced fractional CISO with cost-effective expertise across Strategic, Functional, and Tactical, can benefit organisations with fewer resources, often providing a much wider range of skills and experience than available from an individual.

https://cybersecuritynews.com/ciso-roles-expand-beyond-cybersecurity/

CISO 3.0: Leading AI Governance and Security in the Boardroom

CISOs are evolving into strategic advisors as AI becomes embedded across business operations, with 85% of IT leaders believing AI can enhance cyber security. However, practical challenges persist around system visibility, false positives, and integration with legacy infrastructure. To govern AI effectively, CISOs must gain fluency in data science and risk modelling, ensuring AI tools are explainable and accountable. Building a security culture that embraces AI starts with education, using adaptive and immersive training to close skills gaps. Successful adoption hinges on choosing trustworthy vendors and aligning tools with governance frameworks and business needs.

https://www.helpnetsecurity.com/2025/06/02/aaron-mccray-cdw-cisos-ai-security/

Play Ransomware Breached 900 Victims, Including Critical Orgs

The Play ransomware group has now impacted around 900 organisations globally, including critical infrastructure, marking a threefold increase in victims since late 2023. Active since 2022, the group is known for stealing sensitive data before encrypting systems, using email for extortion rather than dark web platforms. Their attacks are made harder to detect by constantly altering their malware and exploiting known software flaws. Authorities urge organisations to keep systems updated, use multifactor authentication on key services, and ensure offline backups and recovery plans are in place to mitigate the growing risk of ransomware attacks.

https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/

Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady

Cowbell’s latest report highlights a sharp rise in cyber claims, driven by increasingly sophisticated attacks. Ransomware remains a consistent threat, making up nearly one in five claims.  The most damaging incidents stemmed from just five criminal groups, often exploiting basic weaknesses like unpatched systems or misconfigured email. Phishing continues to be the top entry point for wider breaches and fraud. Professional services, healthcare, education, construction and manufacturing were the most targeted, underscoring the growing impact of cyber attacks on sectors reliant on sensitive data and operational continuity.

https://www.claimsjournal.com/news/national/2025/06/06/330974.htm

Role of Threat Intelligence in Proactive Defence Strategies

Organisations are increasingly shifting from reactive to proactive cyber security strategies, with threat intelligence now central to anticipating and preventing attacks. By integrating strategic, operational, and technical insights into existing defences, businesses are improving detection speeds and reducing attack success rates by over 97%. The use of real-time threat data, predictive analytics, and advanced threat hunting helps organisations detect adversaries earlier and act faster. With the average breach costing nearly USD 4.9 million, the economic case for investing in threat intelligence is growing, offering both financial resilience and enhanced protection in a rapidly evolving threat landscape.

https://cybersecuritynews.com/threat-intelligence-3/

Beware GenAI Use is Outpacing Security Controls

Palo Alto Networks has found that employees in every organisation are now using an average of 6.6 high-risk generative AI tools, often without the knowledge of security teams. In some firms, over 60 different AI applications are present in the environment, with writing assistants and chatbots being the most common. Alarmingly, incidents involving data loss linked to these tools have more than doubled in the past year. Experts warn that without clear policies and real-time monitoring, organisations risk data leaks, regulatory breaches, and even reward the misuse of shadow AI through unintentional incentives for output quality.

https://www.csoonline.com/article/4002103/cisos-beware-genai-use-is-outpacing-security-controls.html

Why Teenage Hackers Pose More Danger Than Ever

Recent high-profile cyber attacks on UK retailers such as M&S and Co-op have exposed a growing and alarming trend: many of these incidents are not the work of overseas state-backed groups, but of teenage hackers operating from bedrooms in the UK and US. Often meeting online through chat forums, these individuals, sometimes referred to as collectives like Scattered Spider, launch attacks for thrill, money, and status. This new generation of hackers combines social manipulation techniques with access to professional criminal tools, blurring the line between youthful mischief and serious organised crime. Tackling this rising threat requires a shift in how we understand and deter cyber crime.

https://www.thetimes.com/comment/columnists/article/why-teenage-hackers-pose-more-danger-than-ever-sc9whvzs6

‘Nation States don’t do hacking for fun’ UK NCSC Urges Businesses to Follow Geopolitics as Defensive Strategy

The UK National Cyber Security Centre (NCSC) has warned that nation states are increasingly using cyber attacks as tools of sabotage and espionage, often targeting supply chains and critical infrastructure. Russia’s offensive cyber capabilities have advanced significantly, with recent attacks timed to coincide with military operations, while China is believed to be embedding threat groups within key systems to prepare for possible future conflict. The NCSC urged businesses to understand how global geopolitical tensions intersect with their own cyber risk exposure. Despite this, financially motivated cyber criminals remain the most common threat, with many incidents causing unintended collateral damage to private firms.

https://www.itpro.com/security/cyber-attacks/states-dont-do-hacking-for-fun-ncsc-expert-urges-businesses-to-follow-geopolitics-as-defensive-strategy

Damascened Peacock: Russian Hackers Targeted UK Ministry of Defence

The UK’s Ministry of Defence has disclosed a sophisticated cyber attack attempt by Russia-linked hackers posing as journalists in a spear phishing campaign dubbed “Damascened Peacock”. The attackers aimed to deploy malware through deceptive emails disguised as urgent media or financial requests. Although the attack was thwarted, it is part of over 90,000 state-linked cyber threats against UK defence in the past two years. The malware used was new and linked to a known Russian group previously active in targeting military and government entities across the West. The UK is now investing in stronger cyber capabilities to counter such threats.

https://www.bitdefender.com/en-us/blog/hotforsecurity/damascened-peacock-russian-hackers-targeted-uk-ministry-of-defence



Threats

Ransomware, Extortion and Destructive Attacks

FBI: Play ransomware breached 900 victims, including critical orgs

Mandatory Ransomware Payment Disclosure Begins in Australia - Infosecurity Magazine

Do-It-Yourself Cyber Attack Tools Are Booming - WSJ

6 rising malware trends every security pro should know | CSO Online

Scattered Spider: Three things the news doesn’t tell you

Play ransomware groups use SimpleHelp flaw: FBI • The Register

Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady

Mysterious leaker outs Conti ransomware kingpins • The Register

Interlock ransomware: what you need to know | Tripwire

Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin | WIRED

New ChatGPT Scam Infects Users With Ransomware: ‘Exercise Extreme Caution’

When ransomware listings create confusion as to who the victim was – DataBreaches.Net

Cyber attacks: What do hackers do with your data?

Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek

ViLE gang members sentenced for DEA portal breach, extortion

Space assets could be held ransom. Will we have any choice but to pay? - SpaceNews

Ransomware and USB attacks are hammering OT systems - Help Net Security

Ransomware Victims

FBI: Play ransomware breached 900 victims, including critical orgs

Two thirds of UK consumers are changing online shopping habits due to recent retail cyber attacks

M&S hackers sent abuse and ransom demand directly to CEO - BBC News

Volkswagen investigates hacker data breach claims | Cybernews

Victoria's Secret Says It Will Postpone Earnings Report After Recent Security Breach - SecurityWeek

Interlock ransomware claims Kettering Health breach, leaks stolen data

After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers – DataBreaches.Net

A cyber attack hit hospitals operated by Covenant Health

Next beefs up customer security amid retail hacking crisis - UKTN

Phishing & Email Based Attacks

Do-It-Yourself Cyber Attack Tools Are Booming - WSJ

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Crims breached 100k UK tax accounts to steal £43M from HMRC • The Register

Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware - Infosecurity Magazine

VEC Attacks Outpace BEC in EMEA: A Growing Challenge for MSSPs | MSSP Alert

Cyber attacks: What do hackers do with your data?

Fred Hutch to pay $50M+ in 2023 data raid settlement • The Register

Beware of Device Code Phishing

Where Did The Name 'Phishing' Come From?

Business Email Compromise (BEC)/Email Account Compromise (EAC)

VEC Attacks Outpace BEC in EMEA: A Growing Challenge for MSSPs | MSSP Alert

Other Social Engineering

Beware of Device Code Phishing

North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ

Thwart nation-state threat actors with these CISO tips | TechTarget

Vishing Crew Targets Salesforce Data

ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware - SecurityWeek

Fraud, Scams and Financial Crime

Crims breached 100k UK tax accounts to steal £43M from HMRC • The Register

FBI Warns of Filipino Tech Company Running Crypto Scams

Why Scamming Can't Be Stopped—But It Can Be Managed - SecurityWeek

Law enforcement seized the carding marketplace BidenCash

DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop

Google survey shows Americans are changing how they fight scams - Help Net Security

Scammer Reported To FBI & Cyber Crime Agency After Conning TV Writers

Airbnb scams: new book explores thriving criminal activity on big tech platforms

Artificial Intelligence

British businesses increasingly adopting AI despite rise in cyber security risks: QBE - Reinsurance News

Vibe coding is here to stay. Can it ever be secure?  | CyberScoop

CISOs beware: genAI use is outpacing security controls | CSO Online

Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware

Preparing for AI: The CISO’s role in security, ethics and compliance | Computer Weekly

The hidden security risks of open source AI | Computer Weekly

AI Emerges as the Top Concern for Security Leaders | Security Magazine

Combatting the Threat of AI Misuse | SC Media UK

The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare | WIRED

96% of IT pros say AI agents are a security risk, but they're deploying them anyway | ZDNET

Companies Are Discovering a Grim Problem With "Vibe Coding"

The security debt of browsing AI agents | TechRadar

Researchers Bypass Deepfake Detection With Replay Attacks

AI agents make great teammates, but don't let them code alone - here's why | ZDNET

Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target | IT Pro

2FA/MFA

Stolen Credentials and Missing MFA Continue to Fuel Breaches, Create MSSP Risk and Opportunity | MSSP Alert

Malware

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

6 rising malware trends every security pro should know | CSO Online

Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware

Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target | IT Pro

Sophisticated Malware Campaign Targets Windows and Linux Systems - Infosecurity Magazine

International operation takes down crypting sites used for testing malware | The Record from Recorded Future News

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

New versions of Chaos RAT target Windows and Linux systems

FBI: BADBOX 2.0 Android malware infects millions of consumer devices

ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware - SecurityWeek

Backdoored Open Source Malware Repositories Target Novice Cyber Criminals - SecurityWeek

US offers $10M for tips on state hackers tied to RedLine malware

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware

Hacker targets other hackers and gamers with backdoored GitHub code

Mobile

Dangerous new Android malware adds fake contacts to your phone while draining bank accounts — how to stay safe | Tom's Guide

Android banking trojan Crocodilus rapidly evolves and goes global

FBI Wants Access To Encrypted iPhone And Android Data—So Does Europe

Google addresses 34 high-severity vulnerabilities in June’s Android security update | CyberScoop

Android malware trends: Stealthier, easier-to-use | Intel 471

Beware of Device Code Phishing

Denial of Service/DoS/DDoS

Major DDoS attack disrupts Moscow’s internet services | SC Media

Internet of Things – IoT

FBI: BADBOX 2.0 Android malware infects millions of consumer devices

Your Amazon light bulb cameras are secretly beaming footage to Chinese servers without consent

Data Breaches/Leaks

ConnectWise Breached, ScreenConnect Customers Targeted

Fred Hutch to pay $50M+ in 2023 data raid settlement • The Register

Volkswagen investigates hacker data breach claims | Cybernews

Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek

ViLE gang members sentenced for DEA portal breach, extortion

Cartier discloses data breach amid fashion brand cyber attacks

The North Face warns customers of April credential stuffing attack

Hackers Leak 86 Million AT&T Records with Decrypted SSNs

Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack – DataBreaches.Net

Organised Crime & Criminal Actors

Do-It-Yourself Cyber Attack Tools Are Booming - WSJ

Why teenage hackers pose more danger than ever

Websites selling hacking tools to cyber criminals seized – DataBreaches.Net

US DoJ Seizes 4 Domains Supporting Cyber Crime Crypting Services in Global Operation

How global collaboration is hitting cyber criminals where it hurts - Help Net Security

Infosecurity 2025: NCA cyber intelligence head spells out trends | Computer Weekly

Cyber attacks: What do hackers do with your data?

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

FBI Warns of Filipino Tech Company Running Crypto Scams

Hacker arrested for breaching 5,000 hosting accounts to mine crypto

DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop

BitMEX discovers cybersecurity lapses in North Korea hacker group

The US government is now a bitcoin whale. That has consequences | American Banker

Insider Risk and Insider Threats

North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ

FBI arrests DoD IT worker, claim he tried to leak intel • The Register

Thwart nation-state threat actors with these CISO tips | TechTarget

Insurance

Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady

Companies Looking to Cyber Liability Insurance

Supply Chain and Third Parties

ConnectWise Breached, ScreenConnect Customers Targeted

Play ransomware groups use SimpleHelp flaw: FBI • The Register

What is Fourth-Party Risk Management (FPRM)? | Definition from TechTarget

Half of Firms Suffer Two Supply Chain Incidents in Past Year - Infosecurity Magazine

Outages

SentinelOne: Last week’s 7-hour outage caused by software flaw

Identity and Access Management

Don’t let dormant accounts become a doorway for cyber criminals

Encryption

FBI Wants Access To Encrypted iPhone And Android Data—So Does Europe

MITRE Publishes Post-Quantum Cryptography Migration Roadmap - SecurityWeek

Inside The Coming Quantum Crisis: Why CEOs Must Prepare For Q-Day Now

The EU’s “Encryption Roadmap” Makes Everyone Less Safe | Electronic Frontier Foundation

Linux and Open Source

Sophisticated Malware Campaign Targets Windows and Linux Systems - Infosecurity Magazine

New versions of Chaos RAT target Windows and Linux systems

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Passwords, Credential Stuffing & Brute Force Attacks

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Account Lockout Policy: Setup and Best Practices Explained | TechTarget

Don’t let dormant accounts become a doorway for cyber criminals

Stolen Credentials and Missing MFA Continue to Fuel Breaches, Create MSSP Risk and Opportunity | MSSP Alert

Social Media

Meta is now a defence contractor • The Register

Training, Education and Awareness

Is HR running your employee security training? Here’s why that’s not always the best idea | CSO Online

Building a Scalable Cyber Security Training Program

Regulations, Fines and Legislation

Mandatory Ransomware Payment Disclosure Begins in Australia - Infosecurity Magazine

The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses - Infosecurity Magazine

Vodafone Germany Fined $51 Million Over Privacy, Security Failures - SecurityWeek

Data watchdog put cops on naughty step for lost CCTV footage • The Register

US Banks Seek to Limit Cyber Attack Disclosures

Trump budget proposal would slash more than 1,000 CISA jobs | CyberScoop

‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says - Nextgov/FCW

Slashing CISA Is a Gift to Our Adversaries

The EU’s “Encryption Roadmap” Makes Everyone Less Safe | Electronic Frontier Foundation

Trump's Cyber Pick Vows Interagency Cooperation if Confirmed

Senator hounds Trump’s cyber pick over CISA cuts • The Register

Models, Frameworks and Standards

The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses - Infosecurity Magazine

MITRE Publishes Post-Quantum Cryptography Migration Roadmap - SecurityWeek

Data Protection

Data watchdog put cops on naughty step for lost CCTV footage • The Register

Careers, Working in Cyber and Information Security

Cyber Security Market Industry Report 2025 | Rising Demand for Cyber Security Professionals, Over 3.5 Million Positions Unfilled Globally - ResearchAndMarkets.com

CIOs get serious about closing the skills gap — mainly from within | CIO

PTSD Resolution and CIISec to offer therapy to cyber workers

53% of cyber department leaders eyeing the exit | CSO Online

Law Enforcement Action and Take Downs

Hacker arrested for breaching 5,000 hosting accounts to mine crypto

Websites selling hacking tools to cyber criminals seized – DataBreaches.Net

US DoJ Seizes 4 Domains Supporting Cyber Crime Crypting Services in Global Operation

How global collaboration is hitting cyber criminals where it hurts - Help Net Security

Infosecurity 2025: NCA cyber intelligence head spells out trends | Computer Weekly

International operation takes down crypting sites used for testing malware | The Record from Recorded Future News

Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek

ViLE gang members sentenced for DEA portal breach, extortion

Law enforcement seized the carding marketplace BidenCash


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

UK CyberEM Command to spearhead new era of armed conflict • The Register

The UK Brings Cyberwarfare Out of the Closet - SecurityWeek

Nation State Actors

‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy | IT Pro

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names - SecurityWeek

Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?

New Crucial Guidance To Empower Nations To Develop Legal Positions On Cyber Operations – Eurasia Review

China

China accuses Taiwan and the US of being feeble hackers • The Register

Your Amazon light bulb cameras are secretly beaming footage to Chinese servers without consent

Russia

Damascened Peacock: Russian hackers targeted UK Ministry of Defence

Russian hybrid warfare: Ukraine's success offers lessons for Europe - Atlantic Council

Ukraine's enduring cyber defence: Assessing resilience and impact of shifting international support

US offers $10M for tips on state hackers tied to RedLine malware

Russian hackers target Greek company | Ukrainska Pravda

Ukraine's military intelligence claims cyber attack on Russian strategic bomber maker | The Record from Recorded Future News

Ukraine takes second strike at Russians with Tupolev hack • The Register

Major DDoS attack disrupts Moscow’s internet services | SC Media

Moscow Poses No Threat to Britain, Says Russia's UK Embassy

Iran

Iranian APT 'BladedFeline' Hides in Network for 8 Years

North Korea

North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ

DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop

BitMEX discovers cyber security lapses in North Korea hacker group


Tools and Controls

What Is Cyber Threat Intelligence: Quick Guide For CISOs 

Vibe coding is here to stay. Can it ever be secure?  | CyberScoop

Companies Are Discovering a Grim Problem With "Vibe Coding"

From Reactive to Resilient: Achieving Compliance and Driving ROI Through Threat... | SC Media UK

Bitdefender report finds 84% of major attacks now involve legitimate tools - SiliconANGLE

Role of Threat Intelligence in Proactive Defence Strategies

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names - SecurityWeek

Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?

Play ransomware groups use SimpleHelp flaw: FBI • The Register

What is Fourth-Party Risk Management (FPRM)? | Definition from TechTarget

The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare | WIRED

AI agents make great teammates, but don't let them code alone - here's why | ZDNET

CISO Stature Rises, but Budgets Remain Tight

Building a Cyber-Resilient Organisation CISOs Roadmap

Cyber security top investment priority with tech leaders

Why hacking yourself first is essential for proactive cyber security | TechRadar

Beyond the Broken Wall: Why the Security Perimeter Is Not Enough

A comprehensive new guide to today’s hazards | UNDRR

CISOs need better tools to turn risk into action - Help Net Security

Account Lockout Policy: Setup and Best Practices Explained | TechTarget

Don’t let dormant accounts become a doorway for cyber criminals

96% of IT pros say AI agents are a security risk, but they're deploying them anyway | ZDNET

Why Scamming Can't Be Stopped—But It Can Be Managed - SecurityWeek

48% of security pros are falling behind compliance requirements - Help Net Security

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware

Researchers Bypass Deepfake Detection With Replay Attacks

Agentic AI and the risks of unpredictable autonomy - Help Net Security

DNS Hijacking, A Major Cyber Threat for the UK Government - Infosecurity Magazine




Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Previous
Previous

Black Arrow Cyber Advisory 11 June 2025 – Security Updates from Microsoft, Adobe, Ivanti, Salesforce, SAP, and Google

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 30 May 2025