Black Arrow Cyber Threat Intelligence Briefing 06 June 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
Our review this week includes the complexity of cyber risk, with UK organisations reporting a sharp rise in supply chain-related incidents and limited visibility across third-party networks. As we discuss in our training events, vendor email compromise (VEC) is growing in prominence alongside BEC, exploiting trust in external partners to evade detection. Organisations need to review their control framework, including training staff and leaders on identifying and reporting suspicious communications, and adhering to the letter and spirit of operational controls that attackers seek to exploit.
We also explore the shifting role of the CISO, now increasingly embedded in strategic business leadership. As AI becomes more integrated into operations, CISOs must balance innovation with governance, mastering risk management to promote responsible adoption. The rise of fractional CISOs offers small and medium firms access to broad expertise at lower cost, which we provide for our clients. Threat actors continue to evolve, with ransomware groups like Play expanding their reach, and teenage hackers blurring the line between mischief and organised crime.
The UK’s Ministry of Defence has disclosed a thwarted spear-phishing campaign by Russia-linked actors posing as journalists, part of over 90,000 state-linked threats in two years. This highlights the growing use of cyber operations in geopolitical conflict. Finally, the unmonitored use of generative AI tools is accelerating, raising concerns about data loss and regulatory breaches. Black Arrow recommends that leaders prioritise visibility across supply chains, invest in adaptive security training by experts, and align AI and threat intelligence strategies with robust governance frameworks.
Top Cyber Stories of the Last Week
Half of Firms Suffer Two Supply Chain Incidents in Past Year
New research reveals that nearly half of UK organisations have faced two or more supply chain-related cyber incidents in the past year, highlighting growing concerns over third-party vulnerabilities. Despite 90% identifying supply chain threats as a top priority for 2025, only 37% felt their current risk management strategies were truly effective. The report points to poor collaboration between stakeholders and inconsistent visibility across sectors, with just 14% of organisations having full visibility into all supply chain tiers. As the UK prepares to introduce new cyber resilience legislation, firms are calling for stronger regulatory powers and incentives to drive better cross-industry coordination.
https://www.infosecurity-magazine.com/news/half-supply-chain-incidents/
Vendor Email Compromise (VEC) Attacks Outpace Business Email Compromise (BEC) in EMEA
New research shows that Vendor Email Compromise (VEC) attacks are now outpacing traditional Business Email Compromise (BEC) across EMEA, with nearly half of recipients engaging with VEC emails, almost double the rate of BEC. VEC exploits trust in external vendors, making it harder to detect and rarely reported by users. With reporting rates as low as 0.2% in EMEA, these scams pose a growing challenge. The findings highlight the need for enhanced email security platforms, third-party behaviour monitoring, and targeted user education to better defend against increasingly sophisticated impersonation threats.
https://www.msspalert.com/brief/vec-attacks-outpace-bec-in-emea-a-growing-challenge-for-mssps
UK SMBs Are Ramping Up Cyber Security Spending
Over half of UK small businesses increased their cyber security spending last year. Phishing, ransomware, and denial-of-service attacks remain key risks. Meanwhile, growing interest in generative AI is prompting fresh concerns around data protection, regulatory uncertainty, and staff readiness, with many SMBs expressing caution over privacy, reliability, and the potential loss of personalised service.
https://www.itpro.com/security/uk-smbs-are-ramping-up-cybersecurity-spending-and-its-about-time
CISO Roles Expand Beyond Cyber Security as Organisations Embrace Strategic Security Leadership
The role of the Chief Information Security Officer (CISO) is undergoing a strategic shift, moving beyond technical oversight to encompass broader business responsibilities including risk management, IT, and digital transformation. Nearly 40% of CISOs now hold senior executive titles, with over half engaging regularly with boards, rising to 65% in large enterprises. Research shows three clear CISO types: Strategic, Functional, and Tactical, with Strategic CISOs earning significantly higher compensation and reporting the greatest job satisfaction. This transformation reflects growing recognition that effective cyber security leadership is now integral to overall business success and long-term resilience. A good outsourced fractional CISO with cost-effective expertise across Strategic, Functional, and Tactical, can benefit organisations with fewer resources, often providing a much wider range of skills and experience than available from an individual.
https://cybersecuritynews.com/ciso-roles-expand-beyond-cybersecurity/
CISO 3.0: Leading AI Governance and Security in the Boardroom
CISOs are evolving into strategic advisors as AI becomes embedded across business operations, with 85% of IT leaders believing AI can enhance cyber security. However, practical challenges persist around system visibility, false positives, and integration with legacy infrastructure. To govern AI effectively, CISOs must gain fluency in data science and risk modelling, ensuring AI tools are explainable and accountable. Building a security culture that embraces AI starts with education, using adaptive and immersive training to close skills gaps. Successful adoption hinges on choosing trustworthy vendors and aligning tools with governance frameworks and business needs.
https://www.helpnetsecurity.com/2025/06/02/aaron-mccray-cdw-cisos-ai-security/
Play Ransomware Breached 900 Victims, Including Critical Orgs
The Play ransomware group has now impacted around 900 organisations globally, including critical infrastructure, marking a threefold increase in victims since late 2023. Active since 2022, the group is known for stealing sensitive data before encrypting systems, using email for extortion rather than dark web platforms. Their attacks are made harder to detect by constantly altering their malware and exploiting known software flaws. Authorities urge organisations to keep systems updated, use multifactor authentication on key services, and ensure offline backups and recovery plans are in place to mitigate the growing risk of ransomware attacks.
Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady
Cowbell’s latest report highlights a sharp rise in cyber claims, driven by increasingly sophisticated attacks. Ransomware remains a consistent threat, making up nearly one in five claims. The most damaging incidents stemmed from just five criminal groups, often exploiting basic weaknesses like unpatched systems or misconfigured email. Phishing continues to be the top entry point for wider breaches and fraud. Professional services, healthcare, education, construction and manufacturing were the most targeted, underscoring the growing impact of cyber attacks on sectors reliant on sensitive data and operational continuity.
https://www.claimsjournal.com/news/national/2025/06/06/330974.htm
Role of Threat Intelligence in Proactive Defence Strategies
Organisations are increasingly shifting from reactive to proactive cyber security strategies, with threat intelligence now central to anticipating and preventing attacks. By integrating strategic, operational, and technical insights into existing defences, businesses are improving detection speeds and reducing attack success rates by over 97%. The use of real-time threat data, predictive analytics, and advanced threat hunting helps organisations detect adversaries earlier and act faster. With the average breach costing nearly USD 4.9 million, the economic case for investing in threat intelligence is growing, offering both financial resilience and enhanced protection in a rapidly evolving threat landscape.
https://cybersecuritynews.com/threat-intelligence-3/
Beware GenAI Use is Outpacing Security Controls
Palo Alto Networks has found that employees in every organisation are now using an average of 6.6 high-risk generative AI tools, often without the knowledge of security teams. In some firms, over 60 different AI applications are present in the environment, with writing assistants and chatbots being the most common. Alarmingly, incidents involving data loss linked to these tools have more than doubled in the past year. Experts warn that without clear policies and real-time monitoring, organisations risk data leaks, regulatory breaches, and even reward the misuse of shadow AI through unintentional incentives for output quality.
https://www.csoonline.com/article/4002103/cisos-beware-genai-use-is-outpacing-security-controls.html
Why Teenage Hackers Pose More Danger Than Ever
Recent high-profile cyber attacks on UK retailers such as M&S and Co-op have exposed a growing and alarming trend: many of these incidents are not the work of overseas state-backed groups, but of teenage hackers operating from bedrooms in the UK and US. Often meeting online through chat forums, these individuals, sometimes referred to as collectives like Scattered Spider, launch attacks for thrill, money, and status. This new generation of hackers combines social manipulation techniques with access to professional criminal tools, blurring the line between youthful mischief and serious organised crime. Tackling this rising threat requires a shift in how we understand and deter cyber crime.
‘Nation States don’t do hacking for fun’ UK NCSC Urges Businesses to Follow Geopolitics as Defensive Strategy
The UK National Cyber Security Centre (NCSC) has warned that nation states are increasingly using cyber attacks as tools of sabotage and espionage, often targeting supply chains and critical infrastructure. Russia’s offensive cyber capabilities have advanced significantly, with recent attacks timed to coincide with military operations, while China is believed to be embedding threat groups within key systems to prepare for possible future conflict. The NCSC urged businesses to understand how global geopolitical tensions intersect with their own cyber risk exposure. Despite this, financially motivated cyber criminals remain the most common threat, with many incidents causing unintended collateral damage to private firms.
Damascened Peacock: Russian Hackers Targeted UK Ministry of Defence
The UK’s Ministry of Defence has disclosed a sophisticated cyber attack attempt by Russia-linked hackers posing as journalists in a spear phishing campaign dubbed “Damascened Peacock”. The attackers aimed to deploy malware through deceptive emails disguised as urgent media or financial requests. Although the attack was thwarted, it is part of over 90,000 state-linked cyber threats against UK defence in the past two years. The malware used was new and linked to a known Russian group previously active in targeting military and government entities across the West. The UK is now investing in stronger cyber capabilities to counter such threats.
Governance, Risk and Compliance
CISO Roles Expand Beyond Cyber Security as Organisations Embrace Strategic Security Leadership
CISO 3.0: Leading AI governance and security in the boardroom - Help Net Security
CISO Stature Rises, but Budgets Remain Tight
UK SMBs are ramping up cyber security spending – and it’s about time | IT Pro
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
Building a Cyber-Resilient Organisation CISOs Roadmap
Is Your CISO Navigating Your Flight Path?
What is Fourth-Party Risk Management (FPRM)? | Definition from TechTarget
Breaking Down Silos Aligning IT and Security Teams
Cyber security top investment priority with tech leaders
Are you cyber resilient? Five traits that define the leaders of 2025 | SC Media
Preparing for AI: The CISO’s role in security, ethics and compliance | Computer Weekly
Creating the right organisational culture for cyber security - NCSC.GOV.UK
6 hard truths security pros must learn to live with | CSO Online
Why hacking yourself first is essential for proactive cyber security | TechRadar
From Reactive to Resilient: Achieving Compliance and Driving ROI Through Threat... | SC Media UK
What Is Cyber Threat Intelligence: Quick Guide For CISOs
Cyber and digital get over £1bn to enhance UK’s national security | Computer Weekly
53% of cyber department leaders eyeing the exit | CSO Online
Cyber security Needs Satellite Navigation, Not Paper Maps - Security Boulevard
Threats
Ransomware, Extortion and Destructive Attacks
FBI: Play ransomware breached 900 victims, including critical orgs
Mandatory Ransomware Payment Disclosure Begins in Australia - Infosecurity Magazine
Do-It-Yourself Cyber Attack Tools Are Booming - WSJ
6 rising malware trends every security pro should know | CSO Online
Scattered Spider: Three things the news doesn’t tell you
Play ransomware groups use SimpleHelp flaw: FBI • The Register
Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady
Mysterious leaker outs Conti ransomware kingpins • The Register
Interlock ransomware: what you need to know | Tripwire
Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin | WIRED
New ChatGPT Scam Infects Users With Ransomware: ‘Exercise Extreme Caution’
When ransomware listings create confusion as to who the victim was – DataBreaches.Net
Cyber attacks: What do hackers do with your data?
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek
ViLE gang members sentenced for DEA portal breach, extortion
Space assets could be held ransom. Will we have any choice but to pay? - SpaceNews
Ransomware and USB attacks are hammering OT systems - Help Net Security
Ransomware Victims
FBI: Play ransomware breached 900 victims, including critical orgs
Two thirds of UK consumers are changing online shopping habits due to recent retail cyber attacks
M&S hackers sent abuse and ransom demand directly to CEO - BBC News
Volkswagen investigates hacker data breach claims | Cybernews
Victoria's Secret Says It Will Postpone Earnings Report After Recent Security Breach - SecurityWeek
Interlock ransomware claims Kettering Health breach, leaks stolen data
A cyber attack hit hospitals operated by Covenant Health
Next beefs up customer security amid retail hacking crisis - UKTN
Phishing & Email Based Attacks
Do-It-Yourself Cyber Attack Tools Are Booming - WSJ
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
Crims breached 100k UK tax accounts to steal £43M from HMRC • The Register
Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware - Infosecurity Magazine
VEC Attacks Outpace BEC in EMEA: A Growing Challenge for MSSPs | MSSP Alert
Cyber attacks: What do hackers do with your data?
Fred Hutch to pay $50M+ in 2023 data raid settlement • The Register
Beware of Device Code Phishing
Where Did The Name 'Phishing' Come From?
Business Email Compromise (BEC)/Email Account Compromise (EAC)
VEC Attacks Outpace BEC in EMEA: A Growing Challenge for MSSPs | MSSP Alert
Other Social Engineering
Beware of Device Code Phishing
North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ
Thwart nation-state threat actors with these CISO tips | TechTarget
Vishing Crew Targets Salesforce Data
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware - SecurityWeek
Fraud, Scams and Financial Crime
Crims breached 100k UK tax accounts to steal £43M from HMRC • The Register
FBI Warns of Filipino Tech Company Running Crypto Scams
Why Scamming Can't Be Stopped—But It Can Be Managed - SecurityWeek
Law enforcement seized the carding marketplace BidenCash
DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop
Google survey shows Americans are changing how they fight scams - Help Net Security
Scammer Reported To FBI & Cyber Crime Agency After Conning TV Writers
Airbnb scams: new book explores thriving criminal activity on big tech platforms
Artificial Intelligence
Vibe coding is here to stay. Can it ever be secure? | CyberScoop
CISOs beware: genAI use is outpacing security controls | CSO Online
Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware
Preparing for AI: The CISO’s role in security, ethics and compliance | Computer Weekly
The hidden security risks of open source AI | Computer Weekly
AI Emerges as the Top Concern for Security Leaders | Security Magazine
Combatting the Threat of AI Misuse | SC Media UK
The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare | WIRED
96% of IT pros say AI agents are a security risk, but they're deploying them anyway | ZDNET
Companies Are Discovering a Grim Problem With "Vibe Coding"
The security debt of browsing AI agents | TechRadar
Researchers Bypass Deepfake Detection With Replay Attacks
AI agents make great teammates, but don't let them code alone - here's why | ZDNET
2FA/MFA
Malware
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
6 rising malware trends every security pro should know | CSO Online
Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware
Sophisticated Malware Campaign Targets Windows and Linux Systems - Infosecurity Magazine
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
New versions of Chaos RAT target Windows and Linux systems
FBI: BADBOX 2.0 Android malware infects millions of consumer devices
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware - SecurityWeek
Backdoored Open Source Malware Repositories Target Novice Cyber Criminals - SecurityWeek
US offers $10M for tips on state hackers tied to RedLine malware
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware
Hacker targets other hackers and gamers with backdoored GitHub code
Mobile
Android banking trojan Crocodilus rapidly evolves and goes global
FBI Wants Access To Encrypted iPhone And Android Data—So Does Europe
Google addresses 34 high-severity vulnerabilities in June’s Android security update | CyberScoop
Android malware trends: Stealthier, easier-to-use | Intel 471
Beware of Device Code Phishing
Denial of Service/DoS/DDoS
Major DDoS attack disrupts Moscow’s internet services | SC Media
Internet of Things – IoT
FBI: BADBOX 2.0 Android malware infects millions of consumer devices
Your Amazon light bulb cameras are secretly beaming footage to Chinese servers without consent
Data Breaches/Leaks
ConnectWise Breached, ScreenConnect Customers Targeted
Fred Hutch to pay $50M+ in 2023 data raid settlement • The Register
Volkswagen investigates hacker data breach claims | Cybernews
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek
ViLE gang members sentenced for DEA portal breach, extortion
Cartier discloses data breach amid fashion brand cyber attacks
The North Face warns customers of April credential stuffing attack
Hackers Leak 86 Million AT&T Records with Decrypted SSNs
Organised Crime & Criminal Actors
Do-It-Yourself Cyber Attack Tools Are Booming - WSJ
Why teenage hackers pose more danger than ever
Websites selling hacking tools to cyber criminals seized – DataBreaches.Net
US DoJ Seizes 4 Domains Supporting Cyber Crime Crypting Services in Global Operation
How global collaboration is hitting cyber criminals where it hurts - Help Net Security
Infosecurity 2025: NCA cyber intelligence head spells out trends | Computer Weekly
Cyber attacks: What do hackers do with your data?
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
FBI Warns of Filipino Tech Company Running Crypto Scams
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop
BitMEX discovers cybersecurity lapses in North Korea hacker group
The US government is now a bitcoin whale. That has consequences | American Banker
Insider Risk and Insider Threats
North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ
FBI arrests DoD IT worker, claim he tried to leak intel • The Register
Thwart nation-state threat actors with these CISO tips | TechTarget
Insurance
Cyber Claims Report Shows Ransomware Claims Frequency Remains Steady
Companies Looking to Cyber Liability Insurance
Supply Chain and Third Parties
ConnectWise Breached, ScreenConnect Customers Targeted
Play ransomware groups use SimpleHelp flaw: FBI • The Register
What is Fourth-Party Risk Management (FPRM)? | Definition from TechTarget
Half of Firms Suffer Two Supply Chain Incidents in Past Year - Infosecurity Magazine
Outages
SentinelOne: Last week’s 7-hour outage caused by software flaw
Identity and Access Management
Don’t let dormant accounts become a doorway for cyber criminals
Encryption
FBI Wants Access To Encrypted iPhone And Android Data—So Does Europe
MITRE Publishes Post-Quantum Cryptography Migration Roadmap - SecurityWeek
Inside The Coming Quantum Crisis: Why CEOs Must Prepare For Q-Day Now
The EU’s “Encryption Roadmap” Makes Everyone Less Safe | Electronic Frontier Foundation
Linux and Open Source
Sophisticated Malware Campaign Targets Windows and Linux Systems - Infosecurity Magazine
New versions of Chaos RAT target Windows and Linux systems
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
Passwords, Credential Stuffing & Brute Force Attacks
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
Account Lockout Policy: Setup and Best Practices Explained | TechTarget
Don’t let dormant accounts become a doorway for cyber criminals
Social Media
Meta is now a defence contractor • The Register
Training, Education and Awareness
Building a Scalable Cyber Security Training Program
Regulations, Fines and Legislation
Mandatory Ransomware Payment Disclosure Begins in Australia - Infosecurity Magazine
The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses - Infosecurity Magazine
Vodafone Germany Fined $51 Million Over Privacy, Security Failures - SecurityWeek
Data watchdog put cops on naughty step for lost CCTV footage • The Register
US Banks Seek to Limit Cyber Attack Disclosures
Trump budget proposal would slash more than 1,000 CISA jobs | CyberScoop
Slashing CISA Is a Gift to Our Adversaries
The EU’s “Encryption Roadmap” Makes Everyone Less Safe | Electronic Frontier Foundation
Trump's Cyber Pick Vows Interagency Cooperation if Confirmed
Senator hounds Trump’s cyber pick over CISA cuts • The Register
Models, Frameworks and Standards
The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses - Infosecurity Magazine
MITRE Publishes Post-Quantum Cryptography Migration Roadmap - SecurityWeek
Data Protection
Data watchdog put cops on naughty step for lost CCTV footage • The Register
Careers, Working in Cyber and Information Security
CIOs get serious about closing the skills gap — mainly from within | CIO
PTSD Resolution and CIISec to offer therapy to cyber workers
53% of cyber department leaders eyeing the exit | CSO Online
Law Enforcement Action and Take Downs
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
Websites selling hacking tools to cyber criminals seized – DataBreaches.Net
US DoJ Seizes 4 Domains Supporting Cyber Crime Crypting Services in Global Operation
How global collaboration is hitting cyber criminals where it hurts - Help Net Security
Infosecurity 2025: NCA cyber intelligence head spells out trends | Computer Weekly
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison - SecurityWeek
ViLE gang members sentenced for DEA portal breach, extortion
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
UK CyberEM Command to spearhead new era of armed conflict • The Register
The UK Brings Cyberwarfare Out of the Closet - SecurityWeek
Nation State Actors
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names - SecurityWeek
Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?
China
China accuses Taiwan and the US of being feeble hackers • The Register
Your Amazon light bulb cameras are secretly beaming footage to Chinese servers without consent
Russia
Damascened Peacock: Russian hackers targeted UK Ministry of Defence
Russian hybrid warfare: Ukraine's success offers lessons for Europe - Atlantic Council
Ukraine's enduring cyber defence: Assessing resilience and impact of shifting international support
US offers $10M for tips on state hackers tied to RedLine malware
Russian hackers target Greek company | Ukrainska Pravda
Ukraine takes second strike at Russians with Tupolev hack • The Register
Major DDoS attack disrupts Moscow’s internet services | SC Media
Moscow Poses No Threat to Britain, Says Russia's UK Embassy
Iran
Iranian APT 'BladedFeline' Hides in Network for 8 Years
North Korea
North Korea Infiltrates US Remote Jobs—With the Help of Everyday Americans - WSJ
DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme | CyberScoop
BitMEX discovers cyber security lapses in North Korea hacker group
Tools and Controls
What Is Cyber Threat Intelligence: Quick Guide For CISOs
Vibe coding is here to stay. Can it ever be secure? | CyberScoop
Companies Are Discovering a Grim Problem With "Vibe Coding"
From Reactive to Resilient: Achieving Compliance and Driving ROI Through Threat... | SC Media UK
Bitdefender report finds 84% of major attacks now involve legitimate tools - SiliconANGLE
Role of Threat Intelligence in Proactive Defence Strategies
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names - SecurityWeek
Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?
Play ransomware groups use SimpleHelp flaw: FBI • The Register
What is Fourth-Party Risk Management (FPRM)? | Definition from TechTarget
The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare | WIRED
AI agents make great teammates, but don't let them code alone - here's why | ZDNET
CISO Stature Rises, but Budgets Remain Tight
Building a Cyber-Resilient Organisation CISOs Roadmap
Cyber security top investment priority with tech leaders
Why hacking yourself first is essential for proactive cyber security | TechRadar
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
A comprehensive new guide to today’s hazards | UNDRR
CISOs need better tools to turn risk into action - Help Net Security
Account Lockout Policy: Setup and Best Practices Explained | TechTarget
Don’t let dormant accounts become a doorway for cyber criminals
96% of IT pros say AI agents are a security risk, but they're deploying them anyway | ZDNET
Why Scamming Can't Be Stopped—But It Can Be Managed - SecurityWeek
48% of security pros are falling behind compliance requirements - Help Net Security
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware
Researchers Bypass Deepfake Detection With Replay Attacks
Agentic AI and the risks of unpredictable autonomy - Help Net Security
DNS Hijacking, A Major Cyber Threat for the UK Government - Infosecurity Magazine
Other News
A comprehensive new guide to today’s hazards | UNDRR
Bitdefender report finds 84% of major attacks now involve legitimate tools - SiliconANGLE
Two thirds of UK consumers are changing online shopping habits due to recent retail cyber attacks
Cyber and digital get over £1bn to enhance UK’s national security | Computer Weekly
UK Defence Review: “Making Britain safer/secure at home, and strong abroad” - EDR Magazine
New spying claims emerge in Silicon Valley corporate espionage scandal
Danish energy sector probes removes concerns about solar involvement – pv magazine International
Cyber Security Needs Satellite Navigation, Not Paper Maps - Security Boulevard
Space assets could be held ransom. Will we have any choice but to pay? - SpaceNews
CISOs Guide to Navigating the 2025 Threat Landscape
The Secret Defence Strategy of Four Critical Industries Combating Advanced Cyber Threats
Vulnerability Management
Filling the Gap with the European Vulnerability Database
Future-ready cyber security: Lessons from the MITRE CVE crisis | CyberScoop
Trump budget proposal would slash more than 1,000 CISA jobs | CyberScoop
Slashing CISA Is a Gift to Our Adversaries
Seven Steps to Building a Mature Vulnerability Management Program - Infosecurity Magazine
Vulnerabilities
Technical Details Published for Critical Cisco IOS XE Vulnerability - SecurityWeek
Two Linux flaws can lead to the disclosure of sensitive data
SentinelOne: Last week’s 7-hour outage caused by software flaw
Google addresses 34 high-severity vulnerabilities in June’s Android security update | CyberScoop
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
Microsoft ships emergency patch to fix Windows 11 startup failures
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
Questions Swirl Around ConnectWise Flaw Used in Attacks
Hackers are exploiting critical flaw in vBulletin forum software
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU
vBulletin Vulnerability Exploited in the Wild - SecurityWeek
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass
Why SAP security updates are a struggle for large enterprises - Help Net Security
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.