SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Cyber espionage stories

Dark cyberattack control room western critical infra collapse

Iranian cyber shift raises risk to Western infrastructure

Last week
#
ddos
#
dr
#
ransomware
Iranian state-aligned hackers are shifting from spying to destructive cyber strikes, putting Western critical infrastructure on high alert.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last week
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last week
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last week
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Untitled design   2026 03 10t211837.920

Wireless CVEs surge, exposing hidden risks for AI centres

Last week
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

This month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Cinematic cloud server room ai identity theft masked attackers

Cloudflare flags AI-fuelled identity & SaaS attacks

This month
#
saas
#
firewalls
#
ddos
Cloudflare warns AI-driven identity fraud and SaaS abuse are reshaping cybercrime, as global costs hit USD $10.5 trillion a year.
Telecom server room dragon shadow sliced by cyber shield

Google disrupts China-linked cyber espionage on telecoms

Last month
#
malware
#
firewalls
#
data protection
Google says it has crippled a China-linked cyber espionage group accused of hacking telecoms and governments in at least 42 countries.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Last month
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Moody ai cyber ops room global map pulsing network lines

AI drives shift to persistent, low‑level cyber conflict

Last month
#
malware
#
firewalls
#
network infrastructure
Cyber operations have become constant, covert pressure in geopolitics, with AI-fuelled identity abuse replacing headline-grabbing cyberattacks.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Last month
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.
Untitled design  24

Espionage Without Noise: Understanding APT36's Enduring Campaigns

Last month
#
ddos
#
surveillance
#
supply chain
Indian defence faces a decade-long silent siege as APT36 refines cross-platform cyber espionage with stealthy, persistent RAT campaigns.
Crowdstrike

CrowdStrike splits LABYRINTH CHOLLIMA into three units

Fri, 30th Jan 2026
#
malware
#
manufacturing
#
crypto
CrowdStrike has split North Korea-linked LABYRINTH CHOLLIMA into three units, two for crypto theft and one for industrial espionage.
Smart home night shield blocks botnet global network takedown

Google disrupts IPIDEA's global hijacked device network

Thu, 29th Jan 2026
#
malware
#
firewalls
#
data protection
Google has dismantled IPIDEA's vast residential proxy network, which hijacked millions of consumer devices for global cyber operations.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Tue, 13th Jan 2026
#
uc
#
encryption
#
iot security
NCC Group links Silver Fox's false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.
Office worker phishing qr code lock icon cloud account attack

Proofpoint warns of surge in Microsoft device code phishing

Thu, 8th Jan 2026
#
edutech
#
mfa
#
cloud security
Proofpoint flags a sharp rise in Microsoft 365 account takeovers via device code phishing, hitting firms from finance to government.
Ai cyber espionage ransomware small business office night scene

AI & state-backed cyber spies to drive 2026 threats

Tue, 23rd Dec 2025
#
ransomware
#
drones
#
iot security
AI-fuelled hacks and state cyber spies are tipped to dominate 2026, targeting drones, defence firms and vulnerable smaller businesses.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Ciso boardroom ai cyber threats glowing screens city night

CISOs face rising scrutiny as AI escalates cyber risk

Wed, 17th Dec 2025
#
malware
#
data protection
#
dr
CISOs are warned 2026 will bring harsher board scrutiny, AI-fuelled attacks, bigger budgets - and far less tolerance for cyber failure.