πŸ—³οΈ Vote for us on PodRadar Security Theatre Exposed β€” Passkeys, the CISA Leak & Your Cyber Insurance Vote now β†’

Blog › Category

Threat Intelligence

31 articles

The Back Button That Broke Companies House: How Five Million Directors Had Their Home Addresses Exposed for Five Months

The Back Button That Broke Companies House: How Five Million Directors Had Their Home Addresses Exposed for Five Months

For five months, anyone with a Companies House login could access the private dashboard of any of the five million registered UK companies. Home addresses. Dates of birth. Email addresses. All the personal data fraudsters need to impersonate a director, open accounts in your company's name, or reroute your banking. Not by hacking. Not by sophisticated exploit. By pressing the back button. That is the entirety of the technical skill required. The government body responsible for the UK's corporate

Read more →
Your Developers Are Being Hunted: The Fake Job Interview Malware Campaign Every UK Business Owner Needs to Know About

Your Developers Are Being Hunted: The Fake Job Interview Malware Campaign Every UK Business Owner Needs to Know About

Microsoft's Defender Experts published research yesterday on a campaign called Contagious Interview. Attackers pose as recruiters, walk your developers through a convincing fake job interview, then get them to clone and run a malicious code repository. The moment they do, your cloud credentials, API tokens, signing keys, and password manager databases are on their way out the door. This campaign has been running since at least December 2022. Your developers are the target. Your infrastructure is

Read more →
March Patch Tuesday 2026: No Zero-Days, No Excuses

March Patch Tuesday 2026: No Zero-Days, No Excuses

Microsoft shipped March 2026 Patch Tuesday on 10 March with no actively exploited zero-days. And I can already hear the conversation in the finance department: "Quiet month, push it to next quarter." Wrong. This month's release covers six Windows elevation-of-privilege flaws that Microsoft itself rates as Exploitation More Likely, a critical Excel bug that can hijack Copilot Agent to exfiltrate data with near zero user interaction, and two Office remote code execution issues that fire through th

Read more →
Russian Hackers Are Silently Reading Your WhatsApp Messages Right Now

Russian Hackers Are Silently Reading Your WhatsApp Messages Right Now

Hello, Mauven here. Yesterday, Dutch military and domestic intelligence confirmed what European security agencies have been circling for weeks: Russian state-sponsored hackers are running a large-scale global campaign to take over Signal and WhatsApp accounts. Not by breaking the encryption. By asking for the keys. Two governments have now issued formal warnings. Dutch officials have confirmed their own employees are among the victims. And the attack method is devastatingly simple. If your busin

Read more →
Attackers Aren't Hacking In. They're Logging In. Here's the Data.

Attackers Aren't Hacking In. They're Logging In. Here's the Data.

I spent time with Mauven this week working through the Unit 42 Global Incident Response Report 2026. Seven hundred and fifty incident response engagements. Fifty-plus countries. Real cases. The headline statistic, 89% of investigations involving identity as a material factor, is striking. But it's not the number that should concern you most. It's what that number tells us about where organisations are spending their security budgets versus where attackers are actually operating. They are not in

Read more →
Your Wi-Fi Guest Network Is a Lie

Your Wi-Fi Guest Network Is a Lie

Last week, researchers proved something that should make every small business owner put down their coffee. Your Wi-Fi guest network, the one you set up so visitors don't touch your business systems, doesn't actually protect you. A new attack called AirSnitch lets anyone already on your network spy on every device connected to the same physical router, regardless of which network name they joined, regardless of whether you're running WPA2 or WPA3. Every single router tested failed. Here's what it

Read more →
Is your cloud provider a hidden national security risk in 2026?

Is your cloud provider a hidden national security risk in 2026?

Switzerland looked at Palantir and said no. The UK leaned in. That should worry you. Your business runs on the same US owned platforms that governments argue about. Email, files, chat, identity, backups. The CLOUD Act means a provider can face legal demands for data, even when the servers sit outside the US. UK hosting does not always mean UK control. This teaser sets up the real question: if access rules changed tomorrow, could you prove who can touch your data, and how you would know? Could yo

Read more →
That Cheap Router on Your Desk? The US Just Called It a National Security Threat.

That Cheap Router on Your Desk? The US Just Called It a National Security Threat.

That TP-Link router you bought because it was Β£40 cheaper than the alternatives? Two days ago, the state of Texas sued the manufacturer for allegedly handing the Chinese Communist Party access to Americans' devices. A US federal ban is on the table. Sixteen thousand routers worldwide have already been conscripted into a Chinese state-sponsored attack network. And the UK? Doing absolutely nothing. This isn't paranoia. This is documented, court-filed, backed-by-three-US-federal-departments reality

Read more →
Chinese State Hackers Lived Inside Defence Networks for 393 Days: What Google's Report Means for Your 50-Person Business

Chinese State Hackers Lived Inside Defence Networks for 393 Days: What Google's Report Means for Your 50-Person Business

Three hundred and ninety-three days. That's how long Chinese state hackers camped inside defence networks before anyone bloody noticed. Over a year. Reading emails. Mapping systems. Making themselves at home while everyone assumed the firewall was doing its job. Google just published the receipts, and the uncomfortable truth is this: manufacturing is the most targeted sector on ransomware leak sites. Not banks. Not hospitals. Factories. Your VPN appliance is the front door nobody's watching, and

Read more →
Your AI Chatbot Just Became a Backdoor: What UK Small Businesses Need to Know About Promptware

Your AI Chatbot Just Became a Backdoor: What UK Small Businesses Need to Know About Promptware

Your business just plugged an AI chatbot into its website, an AI assistant into email, or a coding copilot into your dev team. Congratulations. You may have just installed a backdoor. A landmark research paper from Bruce Schneier, Ben Nassi, and their colleagues has mapped a full malware kill chain for AI systems. They call it promptware. It is not theoretical. Twenty-one documented attacks already cross four or more stages of this kill chain, in live production systems. The NCSC agrees the thre

Read more →
Six Zero-Days, One Tuesday, and Your Approval Process Is Still Broken

Six Zero-Days, One Tuesday, and Your Approval Process Is Still Broken

Graham here. Microsoft dropped six actively exploited zero-days on us yesterday, three of them publicly disclosed before the patch even landed. That means attackers had working exploits before you had fixes. Three bypass your security warnings entirely. One gives SYSTEM access through Remote Desktop Services. CrowdStrike confirmed active abuse in the wild. Meanwhile, SAP shipped a CVSS 9.9 code injection flaw and Adobe patched 44 vulnerabilities across nine products. If your patching approval pr

Read more →
When Sandworm Tried to Kill the Lights in Poland: Why the NCSC Is Warning UK Businesses Right Now

When Sandworm Tried to Kill the Lights in Poland: Why the NCSC Is Warning UK Businesses Right Now

Russia's Sandworm hacking group just attempted the largest cyber attack on Poland's energy infrastructure in years, deploying custom wiper malware called DynoWiper against 30 wind farms, solar installations, and a heat plant serving half a million people. The attack failed, but only barely. The NCSC is now warning UK critical infrastructure operators to act immediately. If you think nation-state attacks on power grids are somebody else's problem, think again. Every UK business sitting in those s

Read more →
Your VPN Is a Nation-State Doorway: What Google's Defence Report Means for Every UK Business

Your VPN Is a Nation-State Doorway: What Google's Defence Report Means for Every UK Business

Google just dropped a report that should make every UK business owner physically uncomfortable. Chinese state-sponsored hackers have exploited more than two dozen zero-day vulnerabilities in VPNs, routers, and firewalls since 2020. From ten different vendors. The average time they sit inside your network before anyone notices? 393 days. Over a year of unfettered access. And if you think "I'm not a defence contractor, this doesn't affect me," think again. Manufacturing has been the single most ta

Read more →
Four Campaigns, One Week, Zero Excuses: New Episode Out Now

Four Campaigns, One Week, Zero Excuses: New Episode Out Now

Four concurrent cyberattack campaigns hit last week. Russian military intelligence weaponised a critical Microsoft Office vulnerability within 24 hours of the patch dropping. Commodity criminals started selling the same capability for Β£50 a month. A Chinese-linked group compromised Notepad++ updates for six months. Three separate macOS infostealer campaigns ran simultaneously. And while all of that was unfolding, the UK's biggest data protection law change since Brexit went live with 48 hours' n

Read more →
The Slopocalypse in the Apple App Store: When Five-Star Apps Leak Your Life

The Slopocalypse in the Apple App Store: When Five-Star Apps Leak Your Life

The Apple App Store feels safe. That is the story many people tell themselves. Firehound and Vulnu show why that comfort can be dangerous. Researchers have flagged this week insecure iPhone apps that expose user data through badly secured cloud storage. Some leak private chats, email addresses, and location traces. Many of these apps look polished and carry strong ratings. That is the trap. In this guest post, Corrine Jefferson explains how slop apps slip through review, why AI apps raise the st

Read more →
Your MFA Is Being Bypassed Right Now: The 146% Surge in Attacks Nobody's Talking About

Your MFA Is Being Bypassed Right Now: The 146% Surge in Attacks Nobody's Talking About

You've got MFA turned on. Authenticator app, text codes, the lot. You think you're protected. Now picture this: your finance director clicks a legitimate-looking link, signs in, approves the MFA request like always, and boomβ€”an attacker just stole her session token. Full access to Microsoft 365. No more MFA prompts needed. Welcome to 2026, where adversary-in-the-middle attacks surged 146% in the past year. Nearly 40,000 incidents daily. Your traditional MFA? Doing precisely nothing to stop them.

Read more →
When the Panic Becomes Obvious

When the Panic Becomes Obvious

Three Mile Island. You remember it, right? The 1979 nuclear accident that terrified an entire generation and effectively killed nuclear power plant construction in America for 40 years? Microsoft just spent $1.6 billion to restart Unit 1. Not for clean energy virtue signaling. Because they're bloody desperate. Google committed to 500 megawatts of Small Modular Reactors. Amazon's all-in on multiple nuclear projects. Meta wants up to 4 gigawatts. Billions in nuclear investment. Timeline: 2028 to 2

Read more →
The Frankenstein Computer That's Actually Real

The Frankenstein Computer That's Actually Real

There's a lab in Switzerland where they're building computers out of living human neurons. Sounds completely barking mad, right? Here's the thing: these brain cells compute using one million times less energy than silicon. Meanwhile, training a single AI model now produces the carbon emissions of 500 cars over their entire lifetimes. Microsoft, Google, and Amazon just committed billions to restart nuclear power plants because they can't keep the lights on. And your business? You're paying for ev

Read more →
The British Library's Β£7 Million MFA Decision

The British Library's Β£7 Million MFA Decision

The British Library decided not to implement MFA on administrator accounts. Their reasoning: "practicality, cost and impact on ongoing programmes." That decision cost them Β£7 million in recovery, 600GB of staff data dumped on the dark web, and over a year of service disruption. This is Mauven's Take on one of the clearest examples of the doorman fallacy in UK history. When cost-cutting decisions focus narrowly on immediate expense whilst ignoring catastrophic downside risk, you get exactly this

Read more →
Still Letting Your Help Desk Reset MFA? Scattered Spider Says Thanks

Still Letting Your Help Desk Reset MFA? Scattered Spider Says Thanks

Your help desk just became your biggest security liability. Scattered Spider criminals are ringing UK support teams, impersonating executives, and convincing staff to reset multi-factor authentication. Within hours, they're inside your network deploying DragonForce ransomware. The July 2025 IC3/CISA advisory exposes how these English-speaking social engineers are systematically destroying businesses through basic phone manipulation. If your Tier 1 support can reset MFA without proper verificatio

Read more →
The CVE-2025-53770 Crisis: Why Your SharePoint Response Reveals More About Human Psychology Than Technical Competence

The CVE-2025-53770 Crisis: Why Your SharePoint Response Reveals More About Human Psychology Than Technical Competence

After analyzing the global response to CVE-2025-53770, the critical SharePoint zero-day that's compromised 75+ organizations in 48 hours, I'm convinced this isn't about technical competence. It's about human psychology. Right now, IT administrators who know their systems are vulnerable (CVSS 9.8) are doing nothing because of normalcy bias, sunk cost fallacy, and optimism bias. The organizations getting breached aren't those lacking knowledge - they're the ones whose psychology prevents acting on

Read more →
What the White House CIO Sees That UK SMBs Don't: The Threat Landscape Reality Check

What the White House CIO Sees That UK SMBs Don't: The Threat Landscape Reality Check

The White House CIO has access to threat intelligence that would make UK SMB owners lose sleep for weeks. While British businesses worry about basic phishing, US government analysts are tracking systematic campaigns targeting supply chains, MSPs, and small businesses as stepping stones to bigger targets. They're seeing patterns you've never heard of: criminal groups spending months mapping your vendor relationships, state actors using SMBs to access critical infrastructure, and ransomware cartel

Read more →
Catwatchful Exposed: When Surveillance Technology Becomes a Weapon

Catwatchful Exposed: When Surveillance Technology Becomes a Weapon

Former UK Government Cyber analyst Mauven MacLeod exposes the disturbing Catwatchful stalkerware operation that suffered a massive breach in June 2025, revealing 62,000 customer accounts and 26,000 monitored victims across seven countries. This isn't just cybersecurity failure - it's weaponised surveillance technology enabling domestic abuse and stalking. The breach exposed plaintext passwords, comprehensive victim data dating to 2018, and the operation's Uruguay-based administrator. From a government security

Read more →
When Janet Jackson Accidentally Became a Cyber Weapon: The Pop Song That Crashed Laptops

When Janet Jackson Accidentally Became a Cyber Weapon: The Pop Song That Crashed Laptops

Janet Jackson's "Rhythm Nation" music video could crash laptops just by playing the audio. Not through software exploits or malware, but because the bloody song contained the exact resonant frequency that turned 5400 RPM hard drives into expensive paperweights. Even better: playing the video on one laptop could crash OTHER laptops sitting nearby through pure acoustic warfare. Microsoft engineers had to add secret audio filters to prevent pop music from destroying computers. If a 1989 dance track

Read more →
Middle East Conflict Escalation Creates Immediate Cyber Threats for UK Small Businesses

Middle East Conflict Escalation Creates Immediate Cyber Threats for UK Small Businesses

Last Friday, it was someone else's war. Over the weekend, Iranian hackers considered your Microsoft 365 account enemy infrastructure. American B-2 bombers dropped 14 bunker-busters on Iranian nuclear facilities over the weekend. The cyber retaliation has already begun, and UK small businesses as we all use US cloud services are the in the firing line primary targets. Remember NotPetya? Ukrainian attack, global devastation. Windows is Windows regardless of location. Your customer database could b

Read more →
Week Ahead Preview: Microsoft's Monthly Security Roulette

Week Ahead Preview: Microsoft's Monthly Security Roulette

This week we explored compliance theatre vs real security. Next week, we're diving into the monthly war zone that every IT team knows: Microsoft's Patch Tuesday roulette where one wrong decision can sink your business. Monday's podcast takes you inside the 6 PM chaos when UK teams scramble with late-breaking updates, and Tuesday's deep-dive exposes why traditional patch management advice is built for enterprises that don't exist. Plus, practical survival strategies for when you're fighting attac

Read more →
Stolen Credentials Are the New Normal: Why Your Authentication Is Already Broken (And What This Means for Your Business)

Stolen Credentials Are the New Normal: Why Your Authentication Is Already Broken (And What This Means for Your Business)

Your passwords are already for sale. The only question is whether you know it yet. Stolen credentials jumped from 10% to 16% of all cyberattacks in just one year, making it the second most common attack vector behind exploits. With 3.9 billion passwords compromised by infostealer malware and 94% of people reusing the same credentials across multiple sites, your business authentication isn't just vulnerable; it's already broken. While you're investing in firewalls and endpoint protection, crimina

Read more →
Microsoft Teams: Now Available in Phish-Flavoured

Microsoft Teams: Now Available in Phish-Flavoured

Microsoft Teams is the new darling of UK business. It’s chat, calls, meetings, file sharing and productivity all in one app. Unfortunately, it’s also a goldmine for attackers, and they know it. With the Tycoon 2FA phishing kit now targeting Microsoft 365 users through fake Teams login prompts, criminals are bypassing multifactor authentication in real time. It’s slick. It’s scary. And worst of all, it works. If your business still believes Teams is β€œsafe because it’s Microsoft,” you’re dangerous

Read more →