SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Advanced Persistent Threat (APT) stories

04062026001

China-aligned TA416 resumes spying on EU & Mideast

Last week
#
phishing
#
email security
#
cybersecurity
China-linked TA416 returns to spying on European diplomats and later expands attacks to Middle Eastern government targets after Iran conflict.
Flux result 640ebcf8 edab 4bf1 b6c7 58f2aaec8489

OT downtime costs firms up to GBP £5 million, survey finds

This month
#
malware
#
ransomware
#
iot security
Survey finds most OT outages in industry and critical infrastructure cost up to GBP £5 million, as firms fear nation-state attacks and long delays to detection.
Flux result 6459960a 8b91 4ad1 9ab4 cab1e0e740d2

DeepLoad malware steals credentials via ClickFix campaign

This month
#
malware
#
firewalls
#
network infrastructure
ReliaQuest flags DeepLoad malware stealing live credentials in enterprise networks, with AI-style obfuscation, USB spread and hidden WMI persistence.
Flux result de21b3c2 1302 490f a498 b9e86bb7230c

Commvault adds threat-hunting tools to backup scans

Last month
#
data protection
#
dr
#
ransomware
Commvault adds Hyper Threat Hunting and Deep Inspection to Cloud Threat Scan, linking backup scanning with verified clean recovery after cyber attacks.
Flux result 171281d8 fa44 459c a8d5 363abbfe16a0

China-linked Red Menshen hides inside telecoms networks

Last month
#
uc
#
advanced persistent threat protection
#
supply chain
Rapid7 says China-linked Red Menshen has planted dormant “sleeper cells” inside global telecoms networks to quietly maintain long-term access.
Editorial world map middle east highlight network warning lines

NCC Group warns Iran cyber threats spread worldwide

Last month
#
gaming
#
firewalls
#
network security
Iran-linked cyber attacks are spreading beyond the Middle East, with firms tied to Israel or the US warned they face heightened global risk.
Dark cyberattack control room western critical infra collapse

Iranian cyber shift raises risk to Western infrastructure

Last month
#
ddos
#
dr
#
ransomware
Iranian state-aligned hackers are shifting from spying to destructive cyber strikes, putting Western critical infrastructure on high alert.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last month
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last month
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Untitled design   2026 03 10t221350.377

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Last month
#
storage
#
endpoint protection
#
phishing
A stealthy BlackSanta malware campaign is hijacking CVs and HR hiring flows to kill EDR tools at kernel level and exfiltrate data.
Aditya

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Last month
#
storage
#
phishing
#
hcm
A stealthy BlackSanta malware spree is hijacking HR recruitment workflows, killing endpoint defence tools and exfiltrating sensitive data.
Telecom server room dragon shadow sliced by cyber shield

Google disrupts China-linked cyber espionage on telecoms

Thu, 26th Feb 2026
#
malware
#
firewalls
#
data protection
Google says it has crippled a China-linked cyber espionage group accused of hacking telecoms and governments in at least 42 countries.
Dim corporate server room mixed os racks chained ransomware lock

LockBit 5.0 ransomware targets Windows, Linux, ESXi

Wed, 18th Feb 2026
#
malware
#
virtualisation
#
data protection
New LockBit 5.0 ransomware hits Windows, Linux and ESXi in single campaigns, widening blast radius across mixed and virtualised environments.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Fri, 13th Feb 2026
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Untitled design  24

Espionage Without Noise: Understanding APT36's Enduring Campaigns

Wed, 11th Feb 2026
#
ddos
#
surveillance
#
supply chain
Indian defence faces a decade-long silent siege as APT36 refines cross-platform cyber espionage with stealthy, persistent RAT campaigns.
Crowdstrike

CrowdStrike splits LABYRINTH CHOLLIMA into three units

Fri, 30th Jan 2026
#
malware
#
manufacturing
#
crypto
CrowdStrike has split North Korea-linked LABYRINTH CHOLLIMA into three units, two for crypto theft and one for industrial espionage.
Office pc social network warning suspicious file download cursor

LinkedIn DMs abused to spread Python-based malware

Wed, 21st Jan 2026
#
firewalls
#
endpoint protection
#
devops
Attackers are abusing LinkedIn private messages to deliver Python-based malware via booby-trapped archives, ReliaQuest has warned.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Tue, 13th Jan 2026
#
uc
#
encryption
#
iot security
NCC Group links Silver Fox's false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.