Skip to main content
Advanced Malware and Supply Chain Shocks

Advanced Malware and Supply Chain Shocks

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

Microsoft Azure Withstands Largest Ever DDoS Attack (15.7 Tbps)

Azure Withstands Largest Cloud-Based DDoS Assault Ever

Azure stopped a record 15.7 Tbps DDoS attack from the Aisuru botnet. No downtime reported, proving the need for automated cloud defences.

Gainsight-Salesforce Integration Breach Exposes Data of 1,000 Firms

Gainsight–Salesforce Apps Breach Sees Data Stolen

ShinyHunters breached Gainsight apps to access Salesforce data of 1,000 firms. Tokens revoked. Review third-party SaaS integrations now.

Garden Finance Loses $11M in DeFi Solver Exploit

Company Loses US$ 11 Million After Solver Exploit Exposes Risks in DeFi Bridges

DeFi bridge Garden Finance loses $11m after a solver exploit. Experts question system autonomy as the firm offers a bounty for return of funds.

China-Linked Hackers Exploit Cisco Zero-Day Vulnerabilities

China-Linked Hackers Target Cisco Firewalls in Global Campaign

China-linked Storm-1849 targets Cisco ASA firewalls via zero-days. Attackers implant persistent malware. Immediate patching and forensic audit needed.

Europol Dismantles €600M Crypto-Fraud Ring in Europe

Major Crypto-Fraud Ring Uncovered by Europol

Europol and Eurojust dismantled a €600m crypto-fraud ring. The October 2025 operation led to 9 arrests and seizure of criminal assets across Europe.

Curly COMrades Group Hides Malware in Virtual Machines

Hackers Using Hidden Virtual Machines for Stealth Malware

Russian group Curly COMrades hides malware in Alpine Linux VMs on compromised hosts. This stealth technique evades standard EDR tools.

Microsoft Teams Flaws Allow Message Tampering & Impersonation (2025)

Flaws in Microsoft Teams Open Door for Attackers

New MS Teams flaws allow attackers to rewrite chats and spoof IDs. Patched Oct 2025—ensure all clients are updated to prevent social engineering.

2025 Cyber Round-Up: The Threat Evolution

2025 Cyber Round-Up: The Threat Evolution

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

Why Hackers Love Christmas as much as the rest of Us

Why Hackers Love Christmas as much as the rest of Us

The Christmas trading period brings huge opportunity, but it also brings heightened cyber risk.