Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 06, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: UK Defence Contractors Warn Staff Against Chinese EVs UK defence firms, including Lockheed Martin and Thales, have advised staff against connecting mobile phones to Chinese-made electric vehicles (EVs) due to concerns over potential espionage and data theft. These vehicles, equipped with cameras, microphones, and internet connectivity, could be exploited by hostile states to collect sensitive information.

People, Process, Technology: How Cybersecurity Automation Fuels the Virtuous Circle

Cybersecurity isn’t just about tools and firewalls — it’s about people. Cybersecurity automation is proving to be a game-changer, not only for security outcomes but also for the people behind them. For many organizations, automation is now tightly aligned with employee satisfaction and retention. In fact, 47% of organizations see workforce morale as a key performance indicator (KPI) when evaluating the return on investment (ROI) of their cybersecurity automation efforts.
Featured Post

How to keep major worldwide sporting events on secure ground using threat intelligence reporting

As we look at the sporting calendar for 2025 with the UEFA Women's European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable. To put this into context, the Olympic Games are one of the most widely covered sporting events in the world, with an audience of more than 4 billion viewers.

Analyzing Advanced Persistent Threats (APTs) in Threat Intelligence for Government Agencies

It doesn’t matter which industry you belong to; cybersecurity is one of the most important factors you should always be cautious about. When it comes to government agencies, the stakes are even higher! Government agencies are prime targets for cybercriminals, including state-sponsored actors and APT groups. These APT attackers often utilize Advanced Persistent Threats (APTs), which are designed to infiltrate target networks and gain access to sensitive data over extended periods.

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats. Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively identifying and mitigating cyber risks.

A Brief History of Threat Intelligence: How We Got Here

Although cyber threat intelligence has become increasingly important in the modern era, driven by the exponential rise in cybercrime and global dependence on digital infrastructure, the foundational concept of threat intelligence is not a recent development. In 2024, just over four in ten businesses (43%) and three in ten charities (30%) reported experiencing some form of cybersecurity breach or attack in the previous 12 months, highlighting the scale of today’s threat landscape.

5 Ways Cyber Threat Intelligence Boosts Cyber Risk Prioritization

As cyber risk leaders are called to balance the responsibility of managing risk in the face of both broader attack surfaces and increased regulatory and budgetary scrutiny, prioritization of work is everything. Cybersecurity resources are finite, while the vulnerabilities and threats just keep growing. The best way for modern security programs to keep up is by directing resources to the risks that matter most to their specific organizations.

Security Bulletin: CVE Program Funding Concerns and Emerging Alternatives

On April 16, 2025, a critical moment unfolded in the cybersecurity world when the U.S. Department of Homeland Security’s funding for the Common Vulnerabilities and Exposures (CVE) Program, operated by MITRE, was set to expire. The CVE system is a globally relied-upon database for cataloging known cyber vulnerabilities and has been a cornerstone of vulnerability management for over 25 years since its public launch in 1999.

April 28, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: POC Exploit Released for Erlang CVSS 10 Vulnerability The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication. NTLM Hash Leaking Vulnerability Actively Exploited Checkpoint researchers report that they have detected active exploitation of CVE-2025-24054, a hash disclosure via spoofing vulnerability that was patched as part of Microsoft’s March patching cycle.