Visualização normal

Antes de ontemStream principal
  • ✇Blog – Cyble
  • Four Nationally Significant Cyberattacks Every Week — Is the UK Ready? Ashish Khaitan
    The tempo of UK cyberattacks has shifted from sporadic disruption to something far more systemic. When incidents reach a frequency of four national events each week, the issue stops being purely technical and becomes structural. It raises a more uncomfortable question than whether attacks will happen; it asks whether UK cybersecurity readiness is evolving fast enough to keep pace with a threat environment that is no longer linear, but compounding. The latest assessment from the National Cybe
     

Four Nationally Significant Cyberattacks Every Week — Is the UK Ready?

17 de Abril de 2026, 10:51

UK Cyberattacks

The tempo of UK cyberattacks has shifted from sporadic disruption to something far more systemic. When incidents reach a frequency of four national events each week, the issue stops being purely technical and becomes structural. It raises a more uncomfortable question than whether attacks will happen; it asks whether UK cybersecurity readiness is evolving fast enough to keep pace with a threat environment that is no longer linear, but compounding.

The latest assessment from the National Cyber Security Centre (NCSC) reveals a sharp escalation in UK national cyber threats. In the 12 months leading to September 2025, 204 incidents were classified as nationally significant, more than double the 89 recorded in the previous year. This is the highest figure on record.

The Acceleration of UK National Cyber Threats

In total, 429 cyber incidents required NCSC intervention during this period. Among them, 18 were categorized as “highly significant,” meaning they carried the potential to severely disrupt essential services or compromise national security. That figure alone notes an almost 50% increase compared with the previous year, continuing a three-year trend of intensifying severity in cyberattacks in the UK.

These are not isolated breaches caused by opportunistic threat actors. A large share of activity is linked to advanced persistent threat (APT) groups, well-funded, highly capable operators that pursue long-term access to critical systems. Their objectives range from strategic intelligence gathering to financial gain and, in some cases, deliberate disruption.

Dr Richard Horne, Chief Executive of the NCSC, has made the situation explicit: the growing frequency of serious incidents demonstrates that the UK’s exposure to cyber risk is rapidly. He has warned that delays in strengthening defenses are no longer neutral, they actively increase vulnerability.

When Cybersecurity Becomes a Boardroom Issue 

The rising intensity of UK cyberattacks has prompted direct intervention from the government. Senior executives across major UK businesses, including those in the FTSE 350, have been formally urged to treat cyber resilience as a board-level responsibility rather than a technical afterthought. 

This shift is not symbolic. It reflects recognition that cyber risk now sits alongside financial and operational risk. Organizations are being pushed to integrate security into strategic decision-making, rather than relegating it to IT departments. 

To support this, the NCSC has introduced tools aimed at improving baseline protections, particularly for smaller businesses that often lack dedicated security resources. The Cyber Essentials programme has been positioned as an accessible entry point, with added incentives such as free cyber insurance for eligible firms to encourage adoption. 

Energy Transformation and the Expanding Attack Surface 

One of the less obvious drivers behind the rise in UK national cyber threats is the transformation of the energy sector. The UK’s clean energy ambitions, particularly under the Clean Power 2030 initiative, are reshaping infrastructure at speed. 

Battery storage capacity is expected to increase sixfold, while wind and solar generation could nearly triple. At the same time, the system is becoming more decentralized, introducing a wider range of operators and digital interfaces. 

From a cybersecurity perspective, this creates a paradox. The energy system becomes more resilient in terms of generation diversity, but more vulnerable in terms of digital exposure. Each new connection, whether a distributed solar installation or a grid-scale battery, adds another potential entry point for attackers. 

This is why UK critical infrastructure attacks are increasingly focused on non-traditional targets. Recent incidents in Europe have shown adversaries probing distributed renewable assets, exploiting the reliance on remote management and interconnected control systems. 

The Cascading Risk of Infrastructure Disruption 

Energy systems do not operate in isolation. They underpin transport networks, healthcare services, communications, and financial systems. A disruption in energy supply can trigger cascading failures across multiple sectors. 

Even non-cyber incidents put a spotlight on this fragility. The 2025 North Hyde substation fire demonstrated how quickly a localized event can create broader disruption. In the case of coordinated cyberattacks, the potential for systemic impact is higher. 

This interconnectedness is what makes cyberattacks in the UK particularly concerning. The risk is not just service interruption, but the amplification of disruption across dependent systems. 

Rethinking Regulation for Modern Threats 

To address these challenges, the UK government is reassessing its regulatory framework, particularly the Network and Information Systems (NIS) Regulations. Introduced in 2018, these rules were designed for a more centralized energy system and may no longer reflect current realities. 

The key issue is scope. Many organizations that contribute to system stability fall outside NIS requirements because they do not meet existing thresholds or have not been formally designated as critical operators. 

The proposed reforms aim to close this gap through two primary measures: 

  • Expanding NIS coverage under the Cyber Security and Resilience Bill to better capture modern critical infrastructure  

  • Introducing baseline cyber resilience requirements for all Ofgem licensees in the downstream gas and electricity sector  

This dual approach acknowledges that UK cybersecurity readiness cannot rely solely on protecting the largest players. In a decentralized system, smaller entities can represent equally critical points of failure. 

Baseline Security: Necessary but Not Sufficient 

The proposed baseline requirements are designed to establish a minimum standard of cyber hygiene across the sector. These measures are expected to be proportionate and widely applicable, focusing on preventing common attack vectors rather than enforcing advanced capabilities. 

They align closely with the Cyber Essentials framework, which emphasizes five core controls: firewalls, secure configuration, access management, malware protection, and patching. 

However, this approach has limitations. Cyber Essentials is primarily tailored to IT environments and does not fully address operational technology (OT), which is central to energy infrastructure. OT systems require different security models, as they interact directly with physical processes. 

Recognizing this, policymakers are considering a hybrid model that extends beyond technical controls to include governance, supply chain security, and incident response planning. This reflects a more mature understanding of UK national cyber threats, where organizational resilience is as important as technical defense. 

Conclusion 

With UK cyberattacks occurring at a rate of four national incidents per week, the financial impact of significant cyberattacks in the UK, often exceeding £436,000 per breach, makes gaps in UK cybersecurity readiness a measurable risk. As UK national cyber threats grow and UK critical infrastructure attacks become more likely, organizations need timely threat intelligence and faster response. 

Cyble provides real-time threat intelligence and automated detection to help identify and mitigate risks earlier. Schedule a demo to see how Cyble can support your security operations. 

References: 

The post Four Nationally Significant Cyberattacks Every Week — Is the UK Ready? appeared first on Cyble.

  • ✇Blog – Cyble
  • UK Businesses Are Being Targeted Through Their Middle East Supply Chains — What to Do Now Ashish Khaitan
    The conversation around cyber risk in the UK has shifted. It is no longer confined to domestic networks, internal systems, or even direct attacks on British infrastructure. The weak link sits thousands of miles away, embedded within third-party vendors, logistics partners, and digital dependencies across the Middle East. This growing exposure has created a new layer of Middle East supply chain risk, one that is proving difficult to monitor and even harder to control.  Recent warnings from th
     

UK Businesses Are Being Targeted Through Their Middle East Supply Chains — What to Do Now

6 de Abril de 2026, 09:10

Middle East supply chain risk

The conversation around cyber risk in the UK has shifted. It is no longer confined to domestic networks, internal systems, or even direct attacks on British infrastructure. The weak link sits thousands of miles away, embedded within third-party vendors, logistics partners, and digital dependencies across the Middle East. This growing exposure has created a new layer of Middle East supply chain risk, one that is proving difficult to monitor and even harder to control. 

Recent warnings from the UK’s National Cyber Security Centre (NCSC) noted that organizations are not just facing isolated incidents, but a widening threat landscape where geopolitical tensions, hacktivism, and supply chain interdependencies intersect. The result is a sharp rise in UK business supply chain threats, particularly those that exploit indirect access points. 

A Threat That Travels Through the Supply Chain 

The most concerning aspect of today’s cyber environment is how attacks propagate. Threat actors are no longer required to breach a UK-based system directly. Instead, they can compromise a supplier, disrupt a regional service provider, or exploit a shared platform operating in the Middle East. 

This is where the Middle East supply chain disruption in the UK becomes a critical concern. Organizations with operations, vendors, or infrastructure in the region are now exposed to “collateral cyber risk”. Attacks that are not aimed at them specifically but still affect their operations. 

At the same time, pro-Russian hacktivist groups have intensified their campaigns. Since March 2022, groups such as NoName057(16) have targeted NATO-aligned countries using distributed denial-of-service (DDoS) attacks. These attacks are not financially motivated; they are ideological, designed to disrupt services and undermine confidence. 

Their methods are relatively less technical but highly effective on scale. By leveraging publicly distributed tools and coordinating through online communities, they can overwhelm services, take down websites, and degrade operational systems. This pattern has already contributed to a rise in supply chain cyberattack scenarios in the UK, where disruption spreads across interconnected systems. 

Why the Middle East Supply Chain Risk Matters More Than Ever 

While the direct cyber threat from nation-states like Iran to the UK remains under constant assessment, the indirect risk is already evident. The ongoing instability in the Middle East has increased the likelihood of cyber spillover, where regional conflicts trigger digital consequences beyond their borders. 

For UK organizations, this translates into heightened UK supply chain security risks, particularly in sectors reliant on international logistics, energy infrastructure, or outsourced technology services. The issue is not just connectivity, it’s dependency. Many UK businesses rely on third-party providers for critical operations, from cloud hosting to industrial control systems.  

If those providers are affected by cyber incidents or operational disruptions in the Middle East, the downstream impact can be immediate. 

The Evolution of Attack Tactics 

Modern attacks are evolving in both intent and execution. Traditional cybercrime focused on financial gain, ransomware, fraud, and data theft. Today’s threat actors are driven by political alignment, using disruption as a weapon. 

DDoS attacks, in particular, have become a preferred tactic. They are relatively easy to execute, difficult to attribute, and capable of causing significant operational damage. The NCSC has repeatedly warned that UK organizations must strengthen their defenses against these attacks, especially as they become more frequent and coordinated. 

What makes this more complex is the growing overlap between IT and operational technology (OT). Many attacks now target systems that control physical processes, energy grids, transport networks, and manufacturing systems. This convergence expands the potential impact of a successful breach. 

Building Resilience Against Distributed Threats 

Addressing Middle East supply chain risk requires more than perimeter security. It demands a shift in how organizations think about resilience. 

  • Understand the Full-Service Chain: Every service has multiple pressure points where resources can be exhausted. Organizations need to map these dependencies, both internal and external, and identify where attacks are most likely to occur. 

  • Strengthen Upstream Defenses: Internet service providers and third-party platforms play a crucial role in mitigating attacks before they reach core systems. Businesses should evaluate what protections are already in place and where additional safeguards, such as content delivery networks or dedicated DDoS mitigation services, are needed. 

  • Design for Scalability: Systems must be able to absorb unexpected surges in traffic. Cloud-native architectures offer a clear advantage here, allowing dynamic scaling during an attack. However, even private infrastructure can be adapted with sufficient planning and spare capacity. 

  • Plan for Degraded Operations: No system is immune. The goal should not be absolute prevention, but controlled failure. Services should be able to continue operating at reduced capacity, maintaining critical functionality even during an attack. 

The Role of Monitoring and Threat Intelligence 

Improved visibility is essential in tackling UK business supply chain threats. Increased monitoring, however, comes with its own challenges: more alerts, more noise, and greater demand for security teams. 

Organizations are being encouraged to adopt proactive threat hunting, rather than relying solely on automated detection. This includes: 

  • Analyzing log data to identify anomalies. 

  • Monitoring traffic patterns across both cloud and on-premises systems. 

  • Simulating attacks to test detection and response capabilities. 

For operational technology (OT) environments, this level of monitoring becomes even more important. Unlike traditional IT systems, OT networks tend to operate with highly predictable traffic patterns. Even minor deviations can indicate a potential compromise, especially in the context of a supply chain cyber-attack UK scenario where attackers exploit trusted connections. 

To operationalize this level of visibility at scale, organizations are turning to platforms like Cyble, which combine threat intelligence with real-time monitoring. By correlating external threat signals, such as dark web activity, emerging vulnerabilities, and attacker infrastructure, with internal telemetry, such platforms help security teams prioritize what matters.  

This is particularly valuable when dealing with Middle East supply chain disruption in the UK, where early indicators often surface outside traditional security boundaries. As UK supply chain security risks continue to expand, organizations need more than visibility; they need context, speed, and the ability to act decisively. Platforms like Cyble are designed to bridge that gap, enabling teams to detect, correlate, and respond to threats before they cascade across the supply chain. 

For organizations navigating UK business supply chain threats and rising Middle East supply chain risk, now is the time to move beyond reactive defense. Book a demo with Cyble to see how AI-driven threat intelligence can help identify hidden risks, strengthen monitoring, and stay ahead of supply chain cyber threats. 

References:

The post UK Businesses Are Being Targeted Through Their Middle East Supply Chains — What to Do Now appeared first on Cyble.

  • ✇Firewall Daily – The Cyber Express
  • A Compromised Tool Opened the Door to a 91GB European Commission Data Leak Samiksha Jain
    The European Commission cloud breach did not begin with a dramatic system hack or a visible outage. It started quietly, with a trusted tool, a routine update, and a single compromised credential. Within days, that was enough to expose nearly 91.7 GB of data and drag multiple EU entities into a widening cybersecurity incident. Disclosed publicly on March 27, the European Commission cloud breach is now being treated as a clear example of how supply-chain attacks are reshaping risk in cloud envi
     

A Compromised Tool Opened the Door to a 91GB European Commission Data Leak

European Commission cloud breach

The European Commission cloud breach did not begin with a dramatic system hack or a visible outage. It started quietly, with a trusted tool, a routine update, and a single compromised credential. Within days, that was enough to expose nearly 91.7 GB of data and drag multiple EU entities into a widening cybersecurity incident. Disclosed publicly on March 27, the European Commission cloud breach is now being treated as a clear example of how supply-chain attacks are reshaping risk in cloud environments. Not because defenses were absent, but because the entry point looked legitimate.

European Commission Cloud Breach Traced to Compromised Trivy Tool

Investigators from CERT-EU say, with high confidence, that the European Commission cloud breach began with a supply-chain compromise involving Trivy, a widely used security scanning tool. The malicious version, attributed to a threat actor known as TeamPCP, was unknowingly used within the Commission’s environment after being delivered through standard update channels. On March 19, the attacker obtained an AWS secret, an API key—with management-level permissions. That single key became the gateway into the Commission’s cloud infrastructure. From there, the activity was deliberate. The attacker attempted to uncover more credentials using TruffleHog, a tool designed to scan for secrets and validate access through AWS Security Token Service (STS). They also created a new access key tied to an existing user, an attempt to maintain access while avoiding detection. The European Commission cloud breach did not rely on breaking in. It relied on blending in.

Data Theft and Dark Web Leak

The impact became clearer days later. A large volume of data, around 91.7 GB compressed, or roughly 340 GB uncompressed—was exfiltrated from the compromised AWS account. On March 28, the data extortion group ShinyHunters published the dataset on its dark web leak site. The group claimed it included “data dumps of mail servers, datavases [sic], confidential documents, contracts, and much more sensitive material”. Early analysis confirms that the European Commission cloud breach exposed personal data, including names, usernames, and email addresses. The dataset also contains more than 51,000 files linked to outbound email communications. While most of these emails are automated notifications, some “bounce-back” messages may include original user-submitted content. That detail matters, as it raises the risk of unintended personal data exposure across systems that rely on user interaction.

Wider Impact Across EU Entities

The European Commission cloud breach goes beyond a single institution. The compromised AWS account is part of the infrastructure behind the “europa.eu” web hosting platform, which supports dozens of websites. Data linked to up to 71 clients may be affected, 42 internal European Commission services and at least 29 other Union entities. This shared infrastructure model is efficient, but it also means that one compromised component can have a broader footprint. Despite this, officials have confirmed that no websites were defaced, taken offline, or altered during the incident. There were no service disruptions. But the absence of visible damage should not be mistaken for limited impact.

Timeline Shows Speed of Supply-Chain Attacks

The timeline of the European Commission cloud breach highlights how quickly such incidents can unfold:
  • March 19: AWS credential obtained via compromised Trivy tool
  • March 24: Alerts triggered over unusual API activity and traffic spikes
  • March 25: CERT-EU notified; access secured and keys revoked
  • March 27: Public disclosure by the European Commission
  • March 28: Data published by ShinyHunters
In less than ten days, the attack moved from initial access to public data exposure.

Response and Containment Efforts

The European Commission acted quickly once the breach was identified. The compromised AWS secret was secured, newly created access keys were disabled, and all known exposed credentials were deactivated or deleted. Authorities also followed regulatory protocol, informing data protection bodies, including the European Data Protection Supervisor (EDPS), and notifying impacted entities. Direct communication with affected clients began on March 31. Importantly, the Commission has stated that its internal systems were not affected. However, the European Commission cloud breach remains under active investigation, particularly as analysis of the exposed databases continues.

A Familiar Weakness, Repeating

If the European Commission cloud breach feels familiar, it’s because the pattern is becoming more common. Attackers are no longer forcing their way in, they are entering through trusted software, CI/CD pipelines, and third-party tools. The compromised Trivy version was not flagged as malicious during installation. It behaved as expected—until it didn’t. This is the real shift. Security teams are being asked to defend not just their infrastructure, but every dependency connected to it.

What This Breach Really Signals

The European Commission cloud breach is not just about one incident or one tool. It reflects a deeper issue: the growing difficulty of verifying trust in modern software ecosystems. Cloud environments, automation pipelines, and open-source tools have made operations faster and more efficient. But they have also introduced new blind spots. The lesson here is uncomfortable but clear—security controls worked, but they worked late. Detection came after access had already been established and data had already moved. And that is where the real risk lies.
  • ✇Firewall Daily – The Cyber Express
  • After Funding Jolt, EU Moves to Back the CVE Vulnerability System Ashish Khaitan
    The European Union is stepping forward to reinforce what many experts describe as a bedrock cyber vulnerability tracking system, as questions linger over the long-term sustainability of the Common Vulnerabilities and Exposures Program. The initiative, widely relied upon by cybersecurity professionals worldwide, has come under renewed scrutiny following a contracting scare involving MITRE, prompting discussions about diversification of support and governance.  The vulnerability cataloging syst
     

After Funding Jolt, EU Moves to Back the CVE Vulnerability System

27 de Março de 2026, 05:06

bedrock cyber vulnerability

The European Union is stepping forward to reinforce what many experts describe as a bedrock cyber vulnerability tracking system, as questions linger over the long-term sustainability of the Common Vulnerabilities and Exposures Program. The initiative, widely relied upon by cybersecurity professionals worldwide, has come under renewed scrutiny following a contracting scare involving MITRE, prompting discussions about diversification of support and governance.  The vulnerability cataloging system, first launched in 1999, provides a standardized framework for identifying publicly known cybersecurity flaws. Each vulnerability is assigned to a unique identifier, enabling researchers, vendors, and government officials to communicate about specific issues clearly. Over time, the program has become a foundational reference point in global cybersecurity operations. 

ENISA’s Role in Strengthening a Bedrock Cyber Vulnerability System 

Speaking at the RSAC Conference in California, Hans de Vries, cybersecurity and operational chief at the European Union Agency for Cybersecurity, highlighted the EU’s intent to support and modernize this bedrock mechanism for addressing cyber vulnerabilities. He noted that the goal is to “build upon” the program’s existing foundation and preserve the “great work that has been done there.”  The renewed focus comes after a tense moment last spring when MITRE warned that federal funding for the Common Vulnerabilities and Exposures Program could abruptly end. Although the issue was resolved within hours following strong backlash from the cybersecurity community, it exposed structural risks tied to reliance on a single U.S. government contract. In response, EU member states tasked ENISA with exploring ways to strengthen the system. De Vries highlighted the importance of ensuring continuity: “We cannot build on one contract alone, so we have to strengthen it, and make sure that foundation, that basic mechanism, and it’s a huge program, but that mechanism stays, and stays to the core that we want to build on.”

Legislative and Governance Challenges 

Concerns about the resilience of the Common Vulnerabilities and Exposures Program are not limited to Europe. In the United States, congressional staff have begun drafting legislation aimed at formalizing the program’s structure and clarifying oversight responsibilities. The effort includes defining a stronger role for the Cybersecurity and Infrastructure Security Agency (CISA).  Moira Bergin, who leads cyber policy work for Democratic members of the House Homeland Security Committee, highlighted a key issue: while CISA is authorized to run the program, it is not explicitly mandated to do so. “That makes it harder for us to hold an agency accountable,” she said, adding that stakeholders lack clear expectations for how the program should operate.  The proposed legislative approach also aims to shield governance from political fluctuations. Bergin explained that draft provisions seek to “inoculate the [CVE] board membership from political cycles,” reducing the risk of instability in managing this bedrock cyber vulnerability framework. 

AI, Speed, and the Evolution of Vulnerability Tracking 

The discussion around strengthening this bedrock cyber vulnerability system also reflects broader changes in the threat landscape. Industry experts recognize that artificial intelligence is accelerating the speed and scale of cyberattacks.  Bob Lord, a former CISA official involved in the Secure by Design initiative, pointed out that some still assume CVE records are primarily for human interpretation. However, modern threats demand machine-readable, high-quality data from the outset. Under the current model, vulnerability records are created when flaws are first disclosed, with additional “enrichment” added later, such as severity ratings and exploitability details. But experts argue that delays in completing records can leave defenders exposed in an era of machine-speed attacks. “Today, we’re going to really need to talk a lot more about record quality at the time of issuance, not enrichment later, but at the time of issuance,” Lord said. 

Continued Support from MITRE and CISA 

Despite earlier concerns, U.S. authorities have taken steps to stabilize the program. A spokesperson for CISA confirmed that a “broad internal contracting review caused a brief renewal delay in April 2025, but operations continued without disruption,” and MITRE remains the operator of the Common Vulnerabilities and Exposures Program.  The Department of Homeland Security and CISA have since implemented measures to ensure continuity, maintain global vulnerability tracking, and expand usage. A spokesperson for MITRE reiterated the organization’s commitment, describing the program as a “critical global resource.” 
  • ✇Blog – Cyble
  • Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026 Ashish Khaitan
    Russia-linked hacktivist activity has entered a noticeably different phase. While earlier campaigns leaned heavily on disruption through denial-of-service and opportunistic scanning of exposed systems, the current trajectory shows a stronger dependence on credential-based intrusions and identity-based cyber attacks. For security leaders, this evolution matters because it lowers the technical barrier to entry while increasing the blast radius of compromise. In 2026, CISOs are no longer dealin
     

Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026

19 de Março de 2026, 07:39

Russia credential-Based Intrusions

Russia-linked hacktivist activity has entered a noticeably different phase. While earlier campaigns leaned heavily on disruption through denial-of-service and opportunistic scanning of exposed systems, the current trajectory shows a stronger dependence on credential-based intrusions and identity-based cyber attacks. For security leaders, this evolution matters because it lowers the technical barrier to entry while increasing the blast radius of compromise.

In 2026, CISOs are no longer dealing with isolated intrusion attempts. They are facing an ecosystem where credential-based attacks, credential stuffing attacks, and stolen credentials cyber attacks are becoming the primary access vectors into operational technology (OT) and industrial environments, often followed by rapid escalation into account takeover attacks on human-machine interfaces (HMIs) and control systems.

The Shift From Exposure Hunting to Credential-Based Intrusions 

A key inflection point appears in a series of joint intelligence efforts culminating in a Dec 10, 2025, Cybersecurity Advisory. This advisory expanded upon the May 6, 2025, CISA joint fact sheet “Primary Mitigations to Reduce Cyber Threats to Operational Technology”, while also aligning with findings from the European Cybercrime Centre’s Operation Eastwood (EC3). The effort involved multiple agencies, including the FBI, CISA, NSA, Department of Energy (DOE), Environmental Protection Agency (EPA), and European partners. 

The advisory highlighted sustained targeting of industrial control systems (ICS) and OT environments across critical infrastructure sectors such as water treatment, energy, and agriculture. Earlier intrusions often relied on exposed remote services like virtual network computing (VNC) endpoints on ports 5900–5910, combined with brute-force attempts and default credentials. However, by 2026, these behaviors resemble structured credential-based intrusions, where attackers prioritize authentication weaknesses over pure network exposure. 

This evolution is significant: instead of merely scanning for open systems, adversaries are now systematically exploiting weak identity layers, reused passwords, and leaked authentication data to execute identity-based cyber attacks at scale. 

The Hacktivist Ecosystem Driving Credential-Based Attacks 

The advisory identifies a loosely connected ecosystem of pro-Russia hacktivist groups that have accelerated this shift. These include Cyber Army of Russia Reborn (CARR), NoName057(16), Z-Pentest, and Sector16. 

CARR is assessed to have had early support linked to Russia’s GRU Unit 74455, particularly in its formative stage. While initially focused on distributed denial-of-service (DDoS) activity, the group later expanded into OT intrusions involving industrial environments. 

  1. NoName057(16) remains one of the most persistent actors, widely known for its DDoS tool “DDoSia,” distributed via Telegram and GitHub. Although traditionally disruption-focused, its campaigns now frequently overlap with credential exploitation activity that enables follow-on access. 
  2. Z-Pentest, formed in late 2024 through the fragmentation of earlier groups, represents a turning point. It blends propaganda-driven operations with direct intrusions into OT systems. By 2025, it was already demonstrating repeated access to industrial interfaces through compromised authentication pathways, aligning closely with credential stuffing attacks and reused password exploitation patterns. 
  3. Sector16, emerging in 2025, reflects a newer wave of less experienced operators who still manage to achieve access through opportunistic stolen credentials cyber attacks and weak authentication controls. 

How Credential-Based Intrusions Actually Work in OT Environments 

The mechanics behind modern credential-based intrusions are not complex, but they are effective. Attackers typically begin with broad scanning of exposed services, particularly VNC endpoints used for remote industrial monitoring. Tools such as Nmap and OpenVAS are frequently referenced in advisory reporting. 

Once exposed interfaces are identified, attackers shift toward authentication abuse: 

  • Password spraying against operator accounts 

  • Exploitation of default or unchanged credentials 

  • Reuse of previously leaked credentials from unrelated breaches 

  • Automated login attempts resembling credential stuffing attacks 

After gaining access, adversaries often reach HMIs that control industrial processes. From there, account takeover attacks become operational rather than theoretical: attackers manipulate system parameters, disable alarms, or intentionally create a “loss of view,” forcing operators into manual control. 

What makes these identity-based cyber attacks particularly dangerous is their simplicity. No advanced malware is required. In many cases, legitimate administrative interfaces are being used exactly as intended, just by the wrong user. 

Measured Impact Across Critical Infrastructure 

The scale of activity has increased steadily across 2025. Previously, Cyble reported that ICS-related attacks accounted for 25% of all hacktivist operations, nearly doubling from Q2 levels. Earlier in 2025, ICS, data leaks, and access-based intrusions collectively represented 31% of hacktivist activity, compared to just 15% for website defacements and 54% for DDoS attacks

This shift reflects a migration away from surface disruption toward deeper credential-based attacks and infrastructure compromises. 

Specific group activity underscores this trend: 

  • Z-Pentest conducted 38 ICS attacks in Q2 2025, up from 15 in the previous quarter 

  • Dark Engine was linked to 26 ICS incidents 

  • Sector16 accounted for 14 attacks in the same period 

In parallel, hacktivist campaigns expanded across sectors including energy, manufacturing, transportation, and telecommunications, with Italy, the United States, and NATO-aligned countries frequently targeted. 

More advanced incidents also emerged, including claims by Cyber Partisans BY and Silent Crow of a breach involving Russian airline systems and the exfiltration of over 22TB of data, alongside operations reported by Ukrainian Cyber Alliance and BO Team against industrial environments. 

Why Credential-Based Intrusions Matter More Than Exploits 

For CISOs, the most important shift is conceptual. Traditional security models often focus on patching vulnerabilities and reducing exposed services. However, credential-based intrusions bypass much of this logic. 

If attackers already possess valid credentials, whether through phishing, reuse, leakage, or automated credential stuffing attacks, then perimeter defenses become significantly less relevant. 

This is particularly dangerous in OT environments where: 

  • Identity management is inconsistent 

  • Shared accounts are common 

  • Multi-factor authentication is often absent 

  • Legacy systems cannot easily enforce modern authentication 

In such environments, stolen credentials cyber attacks effectively collapse the security boundary. 

Strategic Implications for CISOs in 2026 

The convergence of hacktivist coordination and identity-driven access patterns creates a predictable outcome: more frequent account takeover attacks leading to operational disruption rather than traditional data theft. 

The Dec 10, 2025 advisory emphasized mitigation steps that now define baseline OT security maturity: 

  • Eliminating exposed VNC services from the public internet 

  • Enforcing strong authentication and eliminating default credentials 

  • Segmenting IT and OT environments to contain lateral movement 

  • Continuous monitoring of industrial control traffic 

  • Treating any system with weak credentials as potentially compromised 

More importantly, organizations are being pushed toward identity-centric security models where identity based cyber attacks are treated as primary threat vectors, not secondary concerns. 

Credential Warfare Becomes the Default Entry Point 

The trajectory of Russia-linked hacktivist operations suggests a sustained move toward scalable, low-friction intrusion methods. While these groups may lack the sophistication of advanced persistent threats, their ability to coordinate, amplify, and reuse credential-based attacks across multiple targets makes them disproportionately impactful. 

As 2026 unfolds, the defining challenge for defenders will not be detecting exotic exploits but controlling identity exposure. In this environment, credential stuffing attacks, stolen credentials cyber attacks, and rapid account takeover attacks will continue to serve as the most reliable entry point into critical infrastructure networks. 

References: 

The post Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026 appeared first on Cyble.

Europe’s ManoMano Hit: 38M Customer Records Compromised in Vendor Breach

27 de Fevereiro de 2026, 05:14

ManoMano is notifying 38 million customers after a third-party customer service breach exposed personal data, highlighting growing supply chain security risks.

The post Europe’s ManoMano Hit: 38M Customer Records Compromised in Vendor Breach appeared first on TechRepublic.

  • ✇Blog – Cyble
  • ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act Ashish Khaitan
    The European Union Agency for Cybersecurity (ENISA) released its updated cybersecurity exercise methodology, providing organizations and governments across Europe with a structured framework for planning, executing, and evaluating cybersecurity exercises. Designed to be both practical and theoretically robust, this methodology offers an end-to-end approach to enhancing preparedness against cyber threats while ensuring alignment with major European regulations, including NIS2 and the EU Cyberse
     

ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act

26 de Fevereiro de 2026, 08:09

Cybersecurity Exercise Methodology

The European Union Agency for Cybersecurity (ENISA) released its updated cybersecurity exercise methodology, providing organizations and governments across Europe with a structured framework for planning, executing, and evaluating cybersecurity exercises. Designed to be both practical and theoretically robust, this methodology offers an end-to-end approach to enhancing preparedness against cyber threats while ensuring alignment with major European regulations, including NIS2 and the EU Cybersecurity Act. 

The Purpose of a Cybersecurity Exercise Methodology 

The ENISA methodology serves as a blueprint for organizations seeking to strengthen their cyber resilience. It is specifically crafted for cybersecurity professionals, organizational planners, and government entities aiming to: 

  • Understand the intricacies of organizing and planning cybersecurity exercises. 

  • Evaluate current cyberattack response capabilities. 

  • Demonstrate the strategic importance of exercises to senior management. 

  • Test operational skills, incident response procedures, and regulatory compliance. 

By offering a combination of theoretical insights, lessons learned from past exercises, and industry best practices, ENISA equips planners with a framework that ensures the right stakeholders and expertise are involved at the appropriate stages. This framework is complemented by a practical support toolkit containing templates, checklists, and guiding materials to streamline the planning process. 

Aligning with European Standards and Regulations 

The methodology is intentionally designed to be flexible while maintaining compliance with established standards such as ISO 22398:2013 and ISO 22361:2022. Its alignment with European regulations, including NIS2, the EU Cybersecurity Act, the Cyber Resilience Act, the Digital Operational Resilience Act, and the GDPR, ensures that exercises do not simply simulate threats but also test an organization's regulatory readiness. This dual focus on operational effectiveness and compliance is increasingly vital in a landscape where cyberattacks can have both technical and legal consequences. 

Core Principles of the ENISA Methodology 

The ENISA cybersecurity exercise methodology rests on several foundational principles: 

  1. Structured Planning: Exercises follow a systematic, user-friendly process covering all dimensions from compliance to operational execution. 

  1. Capacity Building: Organizations can identify skill gaps, procedural weaknesses, and technological vulnerabilities through clear, measurable objectives. 

  1. Flexibility: The methodology adapts to organizational maturity, exercise complexity, and scale, supporting both national-level and sector-specific simulations. 

  1. Resource Ecosystem: Planners gain access to templates, checklists, and guidance aligned with the European Cybersecurity Skills Framework (ECSF), which defines 12 standard professional cybersecurity roles across the EU. 

  1. Community Collaboration: ENISA maintains a network of workshops and expert forums, ensuring knowledge exchange and continual evolution of the methodology. 

Phases and Practical Components 

ENISA’s approach divides a cybersecurity exercise into six critical phases, guiding organizations from conceptualization to post-exercise evaluation. Each phase is supplemented by the support toolkit to ensure exercises are realistic, actionable, and aligned with organizational goals. Key components include: 

  • Exercise Plan: Serves as the blueprint, detailing objectives, logistics, timelines, roles, and scope. This ensures that every participant understands their responsibilities and expected outcomes. 

  • Evaluation Plan: Defines capability targets, evaluator roles, assessment tools, and timelines for before, during, and after the exercise. 

  • Communications Plan: Establishes channels and protocols to ensure stakeholders remain informed and engaged throughout the exercise lifecycle. 

  • Master Scenario Event List (MSEL): Provides a sequenced structure of events, incidents, and injects to simulate cyber crises in a controlled environment. 

  • After-Action Report (AAR): Captures findings, lessons identified, recommendations, and performance metrics to inform continuous improvement. 

Real-World Implications 

Organizations that adopt the ENISA methodology gain measurable benefits. Structured planning reduces preparation time and prevents common oversights, while the evaluation framework helps translate exercise outcomes into actionable improvements. By integrating the methodology with NIS2 and the EU Cybersecurity Act, planners can also demonstrate compliance with regulators and build internal confidence in cyber readiness. 

Furthermore, the methodology encourages a culture of continuous improvement. Lessons identified in one exercise feed directly into future scenarios, enhancing resilience over time. The support from ENISA’s workshops and expert community ensures that even complex national-level exercises can draw on shared expertise and practical insights. 

The ENISA cybersecurity exercise methodology is more than a theoretical guide; it is a practical framework that empowers organizations to prepare and respond to cyber threats systematically. Its integration with the EU Cybersecurity Act, NIS2, and other EU directives ensures exercises serve both operational and regulatory objectives. By combining structured planning, flexible execution, and a supportive community ecosystem, ENISA enables organizations to strengthen cyber resilience, improve regulatory compliance, and continuously evolve their cybersecurity posture. 

References: 

The post ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act appeared first on Cyble.

European Officials Warn of Russian Satellites Intercepting Communications

5 de Fevereiro de 2026, 08:05

Russian Luch “inspector” satellites are suspected of shadowing European GEO spacecraft, raising fears of interception, jamming, and orbital risk.

The post European Officials Warn of Russian Satellites Intercepting Communications appeared first on TechRepublic.

  • ✇Blog – Cyble
  • France’s Cybersecurity Roadmap: Talent, Deterrence, and European Digital Sovereignty Ashish Khaitan
    Introduction  France has released its National Cybersecurity Strategy for 2026-2030, and the document reveals an ambitious vision that extends far beyond traditional defense postures. Under the directive of President Emmanuel Macron, who frames cybersecurity as "a prerequisite for freedom" and "a strategic imperative," France is positioning itself not merely as a secure nation, but as Europe's cybersecurity powerhouse.  The strategy's structure is telling. While most national cybersecurity
     

France’s Cybersecurity Roadmap: Talent, Deterrence, and European Digital Sovereignty

5 de Fevereiro de 2026, 08:42

France National Cybersecurity Strategy

Introduction 

France has released its National Cybersecurity Strategy for 2026-2030, and the document reveals an ambitious vision that extends far beyond traditional defense postures. Under the directive of President Emmanuel Macron, who frames cybersecurity as "a prerequisite for freedom" and "a strategic imperative," France is positioning itself not merely as a secure nation, but as Europe's cybersecurity powerhouse. 

The strategy's structure is telling. While most national cybersecurity frameworks lead with infrastructure protection or threat response, France places talent development as Pillar 1—the foundational priority before all others. This sequencing isn't accidental. It signals a fundamental recognition that sustainable cybersecurity advantage isn't built on technology alone, but on the human capital capable of wielding it. 

Pillar 1: Building Europe's Largest Cyber Talent Pool 

France's most ambitious commitment is becoming "the largest pool of cyber talent in Europe," backed by initiatives addressing the global cybersecurity labor shortage at its roots. The strategy confronts persistent barriers directly: the perception of cybersecurity as "male-dominated, solitary, essentially technical, and accessible only to those with high education." 

The approach spans the entire talent pipeline. Mentoring programs will target young women. Cybersecurity will integrate into civic engagement programs for youth. A national platform will coordinate public and private efforts guiding people toward cyber careers. MOOCs and self-training tools will democratize access to cybersecurity knowledge. 

Most notably, France commits to "bridge strategies" between cyber and non-cyber scientific disciplines—recognizing that tomorrow's challenges require expertise spanning AI, quantum computing, cryptography, and emerging domains. At the European level, France will champion harmonized training courses across all EU member states and promote professional mobility, establishing itself as the gravitational center of European cyber talent development. 

Pillar 2: National Resilience Through Proportionate Protection 

France's second pillar acknowledges that cyber threats "affect all sectors of the economy and society," requiring resilience extending beyond government to encompass the entire economic and social fabric. The framework operates on proportionate principles: vital services receive the highest protection capable of withstanding sophisticated threats, while broader entities face cybersecurity obligations aligned with the European NIS2 Directive. 

Beyond mandatory requirements, a trust label system will allow businesses, local authorities, and associations to demonstrate security efforts to stakeholders, creating market incentives for voluntary investment. A national portal for everyday cybersecurity will provide a single access point for information and resources, while the 17Cyber platform will function as a public service desk for incident victims. 

Critically, France commits to national cyber crisis exercises testing coordination and response efficiency at territorial, sectoral, national, European, and international levels—ensuring resilience isn't merely documented but operationally validated. 

Pillar 3: Multi-Lever Deterrence 

France explicitly states its determination "to halt the expansion of this cyber threat" by mobilizing judicial, technical, diplomatic, military, and economic instruments to "increase the financial, human and reputational cost for potential adversaries." 

The Cyber Crisis Coordination Centre (C4) brings together ANSSI, COMCYBER, and intelligence services DGSE and DGSI. Its mandate will expand to activate broader response measures and propose options to political authorities—including public attribution of attacks. France will coordinate with European partners in implementing the EU's cyber-diplomatic toolbox, particularly its sanctions regime. 

Uniquely, France will mobilize private sector participation in national cyber defense. Internet operators will implement protective measures to detect, characterize, and potentially block attacks early. A cybersecurity filter will prevent public access to malicious websites. Technical threat information sharing between government and private actors will strengthen through InterCERT France.       

Pillar 4: Technological Sovereignty and Industrial Consolidation 

France's fourth pillar addresses dependence on digital technologies potentially controlled by foreign entities or vulnerable to sophisticated attacks. The approach centers on maintaining "autonomy of judgement and freedom of action in cyberspace" through sustained mastery of critical technologies and autonomous assessment capabilities.       

Investment focuses on critical cryptography technologies and products capable of countering advanced threats for sovereign uses. Industrial policy instruments will stimulate European sector consolidation, supporting the emergence of world-leading cyber industrial players. France will leverage European funds and private partnerships to drive investment in world-class companies, including specialized investment funds. 

The European certification framework for cybersecurity products and services will structure this industrial development. France will also continue developing its internationally recognized security evaluation sector while promoting autonomous European evaluation capability. 

Pillar 5: International Cooperation Without Geopolitical Blocs 

France's fifth pillar promotes cyberspace security and stability while explicitly rejecting "the logic of geopolitical blocs." The governance approach combines multilateral frameworks with multi-stakeholder participation—states, private sector, research, and civil society. 

France will continue leading initiatives like the Paris Call (over 1,200 stakeholders around nine principles for open, secure cyberspace) and the Pall Mall Process addressing commercial cyber intrusion capability proliferation (27 governments endorsed its code of best practices by August 2025). Within the UN, France supports establishing a Global Cybersecurity Mechanism by 2026 to operationalize 2015 UN standards of responsible behavior. 

At the European level, France regards the EU as "essential and preferred" for safeguarding its cyberspace initiative and action. France will strengthen EU strategic autonomy through full involvement in cooperation forums like the CSIRT Network, CyCLONe, and CYBERCO, emphasizing threat information sharing to achieve greater European autonomy. 

France will also develop cyber solidarity capabilities through structural cooperation (long-term capacity building via advice, training, logistical support) and operational cooperation (specific assistance through IT audits and incident response). The EU Cyber Reserve, operational by 2026, will deploy incident response services from trusted private providers to help EU member states and associated third countries. 

The Distinctive Governance Model 

France's organizational approach explicitly separates defensive and offensive cyber missions while ensuring effective coordination—guaranteeing civil liberties while maintaining operational effectiveness. 

Defensive governance operates across three missions: "The State defends the Nation" (understanding threats and developing responses), "The State secures itself" (protecting state systems and critical operators), and "The Nation strengthens itself" (coordinating public action and private efforts across individuals, businesses, associations, and local authorities). 

This multi-stakeholder governance integrates professional sectors, local government, academia, and civil society as both victims and essential partners in response development—recognizing cyber threats affect all areas of society, economy, and national territory. 

Strategic Implications 

France's strategy arrives amid heightened geopolitical tension, explicitly acknowledging Russia's war in Ukraine and the "increasingly fragmented world." The emphasis on deterrence, technological sovereignty, and European cooperation reflects assessment that cybersecurity has become inseparable from national sovereignty and international power dynamics. 

The talent development prioritization deserves particular attention. While other nations focus primarily on defensive capabilities and threat response, France recognizes sustainable advantage requires building human infrastructure capable of continuous innovation. Becoming Europe's largest cyber talent pool isn't subsidiary to technical capabilities—it's the foundation enabling all other strategic objectives. 

The European dimension permeates every pillar. France consistently frames cybersecurity advancement as contribution to European strategic autonomy rather than purely national capability, positioning itself as architect and leader of European cyber policy. 

The timeline extending to 2030 provides sufficient horizon for structural changes in talent pipelines, industrial capabilities, and international frameworks to materialize—allowing investments whose benefits compound over time. 

From Vision to Execution 

Implementation challenges are substantial. Talent development initiatives require long-term cultural shifts that educational programs alone cannot achieve—industry must provide accessible entry points, competitive compensation, and inclusive workplace cultures. The deterrence posture requires careful calibration to avoid escalation while maintaining credibility. The multi-stakeholder governance demands coordination across fragmented communities with divergent interests.       

For organizations observing France's strategic evolution, implications extend beyond French borders. European cooperation, standardization, and industrial consolidation will shape the continental cybersecurity market. Talent pipeline investments will affect where expertise concentrates. Regulatory frameworks aligned with NIS2 will establish compliance baselines affecting multinational operations. 

France's 2026-2030 National Cybersecurity Strategy represents one of the most comprehensive national frameworks released by any country. Its success depends not just on French execution, but on European coordination, private sector engagement, and the broader international community's response to the governance models and cooperation frameworks France promotes. 

Strengthening Organizational Resilience 

As nations like France invest in comprehensive cybersecurity strategies emphasizing talent, deterrence, and digital sovereignty, organizations worldwide face similar imperatives at the enterprise level. Building resilience requires understanding attack surfaces, monitoring threats across surface and dark web channels, and maintaining continuous visibility over evolving risks.  

Cyble's threat intelligence platform provides capabilities aligned to these strategic priorities—from attack surface management and dark web monitoring to vulnerability intelligence and incident response support.  

Request a demo to explore comprehensive threat intelligence solutions. 

The post France’s Cybersecurity Roadmap: Talent, Deterrence, and European Digital Sovereignty appeared first on Cyble.

EU’s New Cybersecurity Act Could Ban High-Risk Suppliers

21 de Janeiro de 2026, 08:44

This sweeping update introduces measures to identify and potentially exclude "high-risk" third countries and companies across 18 essential sectors.

The post EU’s New Cybersecurity Act Could Ban High-Risk Suppliers appeared first on TechRepublic.

❌
❌