Supply Chain Risk in 2026: The Hidden Threats Beyond Your Estate

Supply Chain Risk in 2026: The Hidden Threat Beyond Your Estate

Organisations are connected to more than ever before meaning supply chains have expanded and so too has the level of risk associated with these diverse supply chains.

Cloud services, managed service providers, SaaS platforms, open source software and outsourced business functions now form part of an extended digital supply chain that sits well beyond the traditional network perimeter. According to recent industry analysis by DeepStrike, third party involvement is now present in approximately 30% of all data breaches, double the proportion seen just a few years ago.

More concerning still, research from IBM shows that breaches involving supply chain compromise are typically more expensive and take longer to contain than other incidents. While the global average cost of a data breach currently sits at roughly $4.44 million, breaches via supply chains are uniquely more damaging. A supply chain compromise is one of the most significant factors that amplifies the total cost of a breach. In the UK it can cost an organisation an additional average of £241,620. (source: DeepStrike)

According To IBM’s Cost of a Data Breach Report 2025 it takes an average of 267 days to identify and contain a breach. As attackers increasingly exploit trusted relationships, instead of relying solely on technical vulnerabilities, supply-chain risk is now one of the most critical cyber security challenges for organisations of any size.


Understanding Your Supply Chain Risk

Supply chain cyber risk refers to the exposure an organisation faces as a result of its reliance on third‑party suppliers, vendors, partners, and software components. Rather than attacking a target directly, threat actors compromise a supplier and leverage the trust relationship to gain access to downstream victims.

Supply chain attacks have become an increasingly common and damaging tactic among cyber criminals. These breaches highlight just how vulnerable organisations can be when the security of their partners, vendors, and software providers is compromised.

Understanding supply chain risk begins with achieving full visibility across all third-party services and suppliers your organisation relies upon. Identifying these critical relationships is essential, as gaps in awareness can expose internal systems and sensitive data to external threats.

Assessing each supplier’s security maturity and posture helps clarify potential vulnerabilities, while evaluating how easily attackers might exploit these connections provides insight into your overall risk profile.

Importantly, your industry or sector also shapes the likelihood and nature of supply chain attacks. Certain fields, such as finance or healthcare, face heightened targeting due to the value of their assets and data. Proactive supply chain risk assessment empowers organisations to anticipate, mitigate, and respond to threats more effectively.


Supply Chain Sorted, with HackRisk

HackRisk’s Supply Chain Security tools proactively manage your third-party risk, monitor vendor posture, and strengthen your supply chain security.

Our Supply Chain Security tool gives you real-time insight into third-party risk across your ecosystem. Invite your suppliers to join HackRisk, share your HackRisk Scores and encourage your suppliers to invite their own vendors to build a stronger, more resilient supply chain.

Get Your Free Report

Why Supply Chain Risk Management Matters

Supply chain attacks are no longer rare, isolated incidents. Industry reporting throughout 2024 and 2025 shows sustained growth in both the frequency and impact of supply‑chain driven breaches, particularly those involving software vendors, open‑source ecosystems and managed service providers. This surge has prompted organisations to turn to established frameworks and risk models for guidance in managing supply chain cyber risk.

NIST Framework

One of the most widely recognised frameworks is the NIST Cybersecurity Framework (CSF), which provides a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats, including those originating from the supply chain.

NIST has published dedicated guidance, such as NIST SP 800-161 Revision 1: “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations”, which outlines best practices for assessing, monitoring, and mitigating risks associated with third-party vendors, software components, and service providers. The framework emphasizes the importance of integrating supply chain risk management (SCRM) into overall cybersecurity strategy, including activities like supplier risk assessments, contract security requirements, continuous monitoring, and incident response planning.

Other Frameworks

Other notable frameworks include the ISO/IEC 27001 and ISO/IEC 27036 series, which address information security management and specific guidelines for managing risks in supplier relationships. The Center for Internet Security (CIS) Controls also recommends measures such as maintaining an inventory of third-party assets, enforcing least-privilege access, and regularly validating supplier security practices.

By leveraging these frameworks, organisations can systematically identify vulnerabilities in their supply chain, implement robust controls, and foster a culture of continuous improvement and vigilance. Proactive supply chain risk management is now considered essential for defending against the evolving threat landscape, as highlighted by recent high-profile breaches and ongoing industry research.


Real‑World Supply Chain Breach Examples

XZ Utils Open‑Source Backdoor (2024): A sophisticated backdoor was discovered in a widely used Linux compression library, demonstrating how long‑term social engineering and open‑source dependency risks can threaten critical infrastructure globally. (source: Datadog Security Labs)

SolarWinds Orion Breach (2020): Perhaps the most infamous supply chain attack in recent memory, the SolarWinds incident saw hackers infiltrate the company’s software development pipeline. By compromising updates for the widely used Orion IT monitoring platform, attackers were able to insert malicious code that was subsequently pushed to approximately 18,000 customers, including major government agencies and global corporations. This breach demonstrated how a single compromised supplier can result in a cascade of downstream victims, often undetected for months. (source: NCSC)

Kaseya Ransomware Attack (2021): In another headline-grabbing example, cybercriminals targeted Kaseya, a company that provides IT management software to managed service providers (MSPs). By exploiting a vulnerability in Kaseya’s VSA platform, hackers were able to distribute ransomware to hundreds of organisations in one coordinated attack. The event underscored how attackers can use trusted software suppliers as a force multiplier to scale their impact and bypass traditional security measures. (source: PurpleSec)

Jaguar Land Rover Supply Chain Attack (2024): In a high-profile incident, attackers targeted Jaguar Land Rover by exploiting a well-known vulnerability in a third-party SAP (NetWeaver) platform used by one of the automaker’s suppliers. This breach disrupted production and supply chain operations, demonstrating how cybercriminals can leverage weaknesses in widely deployed enterprise software to compromise even mature organisations. The overall cost from the incident is estimated to be at least £1.9 billion ($2.5 billion), making it the most economically damaging cyber event ever recorded in the UK. The attack halted production at multiple sites, affected over 5,000 organisations in the supply chain, and required a £1.5 billion government loan guarantee to stabilise operations. JLR’s wholesale deliveries dropped nearly 25% year-on-year, and recovery is still ongoing in early 2026. (source: SysGroup)

These real-world cases serve as stark reminders that even the most robust internal cybersecurity practices can be undermined if third-party partners and software providers are not held to the same standards. Vigilance, continuous oversight, and a strong supply chain risk management strategy are essential to safeguarding today’s interconnected digital infrastructure.


5 Steps to Reducing Supply Chain Risk

Organisations can significantly reduce their exposure through visibility of suppliers, proportionate due diligence, least‑privilege access, continuous monitoring and robust incident response planning.

  • Supplier Visibility: Maintain an up-to-date inventory of all suppliers, vendors, and third-party service providers. Use standardised risk classification, as outlined by NIST CSF and ISO/IEC 27036, to segment suppliers based on the sensitivity and criticality of their access and services.
  • Proportionate Due Diligence: Conduct thorough risk assessments before onboarding new suppliers, scaling the depth according to their potential impact. Review security certifications, controls, and incident history to align with NIST SP 800-161 and ISO/IEC 27001 requirements for evaluation and ongoing monitoring.
  • Least-Privilege Access: Enforce strict access controls so suppliers only have the minimum necessary access to perform their duties. Both NIST CSF and CIS Controls support the least-privilege principle to limit potential damage from breaches.
  • Continuous Monitoring: Implement real-time monitoring of supplier activities and automated alerts for unusual behavior. Regularly validate supplier security practices through audits, questionnaires, or penetration testing as recommended in NIST and ISO frameworks.
  • Robust Incident Response Planning: Integrate suppliers into your incident response plans by establishing clear communication channels, escalation paths, and joint response exercises. NIST CSF emphasizes the importance of coordinated response and recovery processes that include third-party partners.

By aligning your supply chain risk management with established models like the NIST CSF and ISO/IEC standards, you can effectively identify vulnerabilities, implement targeted controls, and foster a culture of continuous improvement—significantly reducing the likelihood and impact of supply chain cyber incidents.


Get Your Free HackRisk Report

AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.

We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.

You will receive your HackRisk report within 24 hours. No card details necessary.

Get Your Free Report

How Not To Hit The Headlines in 2026

How Not To Hit The Headlines in 2026: What Recent Breaches Have Taught Us

What Recent Breaches Teach Leaders about Modern Cyber Risk

In 2025, we saw some of the most recognisable brands in the UK and beyond hit the headlines for all the wrong reasons.

Cyber attacks cost the British economy billions each year and the impact is felt far beyond the organisations that fall victim. When a major business is disrupted, the ripple effects reach suppliers, partners, and entire sectors of the economy.

In a recent webinar, Sales Director Adam Myers was joined by CTO Ryan Bradbury to unpack four major breaches – Marks and Spencer, Co-op, Jaguar Land Rover and Oracle – and what they reveal about the evolving threat landscape.

For IT leaders, CISOs and boards, the lessons are clear; cyber security resilience in 2026 is not just about the right tools; it is about removing blind spots, strengthening human behaviour, and maintaining continuous visibility.


When Trust Assumptions Break, Attackers Walk Straight in

Across all four incidents, one shared truth stood out. Attackers are not only trying to force their way through hardened perimeters, they are also exploiting small gaps in identity, communication, and process.

Rather than relying on malware or brute force, threat actors impersonated employees, targeted pressured help desk teams, and leveraged stolen credentials. These tactics work because they exploit human behaviour and the real-world pressures teams face.

For leaders, this reinforces the importance of a cyber security culture where teams feel confident to pause, challenge and verify – and where processes are stress tested, not just documented.


1. Marks and Spencer: Social Engineering at Scale

Generative AI is changing the game. Is it helping defenders more than attackers? Dive into the risks, opportunities, and real-world impact of AI on cyber security.

Dave Mareels, Senior Director of Product Management at Sophos, joins the podcast to explore how generative AI is reshaping the cyber threat landscape.


2. AI and Human Defenders Working Together

The April 2025 M&S breach began with attackers impersonating employees to a third-party IT provider. Attackers acquired passwords through social engineering, bypassing normal checks, and enabling them to move laterally to access data before launching ransomware. 

This incident highlights a reality many leaders recognise. Even with the right technical controls are in place, people under pressure can unintentionally override them. It is why traditional one-off training is no longer enough.

Organisations now need continuous security awareness programmes, realistic phishing simulations, and tabletop scenario testing to prepare teams for high-pressure decisions. 


Cyber Security Tabletop Exercises

Turn incident response planning into a focused, hands‑on exercise.

Combine a posture assessment with phishing simulations, Live Hack demo, and a HackRisk.ai scan in an engaging tabletop session for your leadership team – followed by an executive‑ready report and action plan.

Not role‑play. Real data. Real insight.

Learn More

2. Co–op: When a Pattern Becomes a Playbook

Just weeks later, Co-op faced a near identical social engineering breach. Attackers reused the same techniques because, simply, they work. This reflects a broader trend where criminal groups increasingly share successful approaches, leaked credentials and intelligence, creating an economy built on repetition. 

For CISOs and leaders, this means resilience requires continuous reinforcement. Training cannot be quarterly. Help desk teams cannot rely solely on process. Identity verification cannot rest on assumptions that someone “sounds legitimate”. 

The point is not to blame teams, but to support them with clear processes, role-specific training, and communication channels that make it easy to raise suspicions early. 


3. Jaguar Land Rover: The Hidden Cost of Unknown Exposures

The major August 2025 breach at Jaguar Land Rover was triggered by stolen credentials and allowed attackers to cause a full production shutdown. The real issue wasn’t one single vulnerability, but a chain of exposures that went unnoticed. 

Many organisations still lack full visibility of their internet facing assets or whether their credentials have already leaked. By the time a breach becomes visible, attackers may have been conducting reconnaissance for months. 

This is where continuous attack surface monitoring, dark web intelligence and automated reconnaissance become essential. Annual assessments may provide a snapshot into security, but modern attackers exploit the other 364 days too. 


4. Oracle: A Zero–Day that Exposed Global Organisations

October 2025 saw attackers exploit an unpatched zero-day vulnerability in Oracle’s eBusiness suite, affecting major organisations across the globe. This incident reinforces a tough truth; even highly mature organisations can be vulnerable when assets are not fully inventoried and internet facing systems are not continuously assessed.

For boards, this underlines the value of visibility as a strategic investment. You cannot protect what you cannot see.


What all these Breaches Have in Common

Across all four incidents, one theme appeared again and again; these breaches didn’t stem from a single technical failure. They were the result of gaps between people, process and technology. 

Leaders should consider three strategic priorities: 

  1. Strengthen human resilience
    Modern attacks target behaviour as much as systems. Regular tabletop exercises, redteam engagements and realistic training programmes help teams think clearly under pressure. 
  2. Remove visibility blind spots
    Unknown assets, exposed credentials and unmonitored suppliers are now among the most common root causes of major incidents. Visibility is no longer a technical function, but aboard level priority. 
  3. Treat cyber security as a continuous journey
    Pointintime assessments are valuable, but insufficient. Continuous scanning, dark web monitoring, and real-time risk tracking help organisations act before attackers do.  

Services like Sophos MDR provide expert-led 24/7 threat hunting, detection, and response capabilities to automatically block 99.98% of threats.   


How HackRisk Supports Leadership Decision-Making

Our HackRisk platform is supporting leaders in building proactive security strategies.

Its six interconnected security modules are designed to provide the visibility and continuous oversight the modern threat landscape demands.

Together, these insights create a security picture leaders can confidently act on. It is the difference between reacting to incidents and preventing them.

Only 13 percent of UK businesses assess cyber risks within their immediate suppliers and just 8 percent assess their wider supply chain. Yet, as the Oracle case study shows, devastating breaches now originate through partners long considered low risk.

HackRisk’s Supply Chain Security tools allow organisations to invite suppliers, review their cyber posture, assess accreditations, issue onboarding questionnaires and even run financial credit checks, all in one place. For boards and CISOs, this brings clarity to an area traditionally full of fragmented data and manual chasing.


Final Thoughts for Leaders

As Ryan concluded:

“Organisations are not failing because they are ignoring cyber security. They are failing because they cannot see where it is quietly breaking”.

– Ryan Bradbury, CTO at CyberLab

Attackers are patient. They observe. They exploit moments where process meets pressure. 

Your defences must do the same. Identify blind spots, strengthen your people, and invest in continuous visibility. These are the steps that prevent your organisation from becoming the next headline.

Get Your Free HackRisk Report

AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.

We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.

You will receive your HackRisk report within 24 hours. No card details necessary.

Get Your Free Report

CSH Transport Success Story

Securing the Logistics Sector from Cyber Threats: CSH Success Story

A CSH Transport Success Story

How CSH Transport Is Leading the Way in Cyber Resilience

As the logistics industry accelerates its digital transformation, the stakes for cyber security have never been higher. From real-time tracking systems to cloud-based warehousing and sensitive client data, third-party logistics (3PL) providers are increasingly reliant on digital infrastructure to deliver seamless, efficient services. But with this reliance comes risk -and the need for robust, proactive cyber defences.

One company that’s setting the standard is CSH Transport and Forwarding Ltd, a UK-based logistics specialist with over 40 years of experience. Operating from key locations in Blackburn and the Port of Goole, CSH is known for its reliability and expertise in dry freight, liquid bulk, hazardous and non-hazardous chemical distribution, and secure warehousing.

Read Case Study

The Cyber Threat Landscape for Logistics

The logistics sector is a prime target for cyber criminals – and the risks are growing more complex by the day.

With increasing reliance on digital systems for fleet tracking, warehousing, and client communications, logistics providers face a unique blend of vulnerabilities. Disruption to transport systems, data breaches involving sensitive contracts or hazardous materials, and ransomware attacks on operational platforms can have far-reaching consequences – not just for the business, but for the entire supply chain.

For CSH Transport, the challenge was clear: protect their Microsoft 365 environment, ensure compliance, and build a cyber security posture that could evolve with the threat landscape. But they didn’t just need a vendor – they needed a partner.

CyberLab delivered more than just tools and technology. They provided a wraparound support model that combined proactive monitoring, strategic guidance, and hands-on expertise. From securing endpoints and hardening Microsoft 365 to guiding CSH through Cyber Essentials certification, CyberLab helped CSH build a cyber security foundation that was not only resilient, but scalable.

This partnership gave CSH the confidence to operate securely in a high-risk sector, knowing they had the visibility, control, and expert support to stay ahead of evolving threats.

A Strategic Partnership for Resilience

CSH turned to CyberLab for a comprehensive, layered security solution. The partnership focused on two key pillars:

  • Microsoft 365 Security Support – CyberLab provided continuous monitoring, patching, and proactive threat detection across CSH’s M365 environment. This ensured vulnerabilities were addressed swiftly and systems remained secure.
  • Cyber Essentials Certification – CyberLab guided CSH through the certification process, helping them implement essential controls and demonstrate their commitment to cyber hygiene and compliance.

This dual approach not only protected CSH’s systems but also reinforced trust with clients and partners – an increasingly important differentiator in a competitive market.

Visibility, Control, and Confidence

With CyberLab’s support, CSH Transport gained far more than just a cyber security solution – they gained a strategic partner committed to their long-term resilience.

CyberLab provided CSH with real-time visibility into their Microsoft 365 environment through automated reporting and threat monitoring, ensuring that potential risks were identified and addressed before they could escalate. This transparency gave CSH the confidence to make informed decisions about their security posture.

But visibility was just the beginning. CyberLab’s quarterly advisory sessions offered CSH a structured opportunity to review their security landscape, assess emerging threats, and plan proactive improvements. These sessions weren’t just check-ins – they were collaborative strategy reviews, tailored to CSH’s evolving operational needs.

What truly set CyberLab apart was the wraparound security support: a dedicated team of cyber security experts on hand to provide guidance, answer questions, and respond rapidly to incidents. Whether it was navigating compliance requirements like Cyber Essentials or fine-tuning their Microsoft 365 configurations, CSH knew they had a trusted partner in their corner.

This combination of insight, strategic advice, and hands-on support empowered CSH to move forward with confidence – knowing their operations were protected, their team was supported, and their cyber resilience was continuously improving.


“Working with CyberLab has been a seamless and highly effective experience. Their expertise in securing our Microsoft 365 environment and guiding us through Cyber Essentials certification has significantly strengthened our overall security posture. The proactive monitoring and responsive support have given us the confidence to focus on delivering exceptional services to our customers, knowing that our systems are protected by a trusted partner.”

– Chris Haworth, IT Manager, CSH Transport & Forwarding


Lessons for the Industry

CSH’s journey offers a blueprint for other logistics providers navigating the cyber threat landscape:

  • Cyber security is not a one-off project – it’s an ongoing strategy.
  • Certification frameworks like Cyber Essentials are more than checkboxes – they’re trust signals.
  • Partnering with experts can accelerate resilience and free internal teams to focus on core operations.

As the logistics sector continues to digitise, companies like CSH are proving that operational excellence and cyber resilience go hand in hand.

Get Cyber Essentials

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Exploring the Dark Web: The Digital Wild West of Cyber Crime Today

The Digital Wild West

Data breaches are increasingly common, and news reports frequently highlight these incidents. Millions of email addresses and passwords have been stolen, sold, and shared across the Dark Web. But what exactly is the Dark Web, and what threat does it pose to organisations?

In this article we journey into the depths of this digital Wild West. Much like the lawless frontiers of the past, the Dark Web is a digital landscape where anonymity and illicit activities thrive beyond the reach of many authorities. We explore what the Dark Web is, its role in cyber crime, and recent reports on data leaks. In addition, we cover measures that organisations can take to prevent their most sensitive assets from ending up for sale on the Dark Web.


What is the Dark Web?

The Dark Web is a hidden part of the internet that operates outside the bounds of conventional search engines and requires specialised software, configurations, or authorisation for access.

While the Dark Web is home to many legitimate companies, it also contains message boards, online marketplaces for drugs, as well as stolen financial and private data. Transactions within this economy are often made with cryptocurrency and are completely anonymous.

The Dark Web is infamous for its role as a hub for illicit activities, providing anonymity to users engaged in cyber crime, data breaches, and other nefarious deeds. It facilitates a vast market for stolen data, compromised credentials, and hacked accounts. With corporate credit cards, criminals can cause financial damage and make unauthorised purchases. The risk is more than just financial damage from stolen credit cards, with employee details criminals can launch more sophisticated and targeted attacks. Phishing attacks are one of the most common attack methods employed by cyber criminals, and could be the entry point for further compromise to your organisation.

The Dark Web is not just stolen credentials, it also harbours platforms where individuals can hire hackers for various malicious purposes, from launching cyber attacks to conducting espionage. If you can imagine it, it’s probably out there on the Dark Web.

Recent reports from sources like CSO Online and the University of Surrey underscore the growing prevalence of cyber criminal activities on the Dark Web, posing significant threats to enterprises and individuals alike.

Tales from the CyberLab

AI’s Role in Data Protection Explained with Forcepoint


Recent Breaches on the Dark Web

Recent data breaches have highlighted the growing market for stolen data and credentials on the Dark Web.

Apple, Google, and Other Major Companies

A huge breach exposed 184 million logins for Apple, Google, and many other companies. The dataset, which was discovered in an unprotected online database, includes usernames and passwords for various online services and email providers. Jeremiah Fowler, a cyber security researcher investigating the database believes that infostealer malware may have been used to obtain and compile the compromised dataset. Infostealer malware is often deployed in phishing emails and malicious websites and used by cyber criminals to harvest data and credentials from systems they have infected. The stolen data/assets are usually then sold on the Dark Web or other illicit marketplaces. (source: PCMag)

AT&T

In another alarming incident, personal data belonging to 73 million current or former AT&T customers was leaked online. The data, including addresses, social security numbers, and passcodes, was published on the Dark Web, prompting concerns over potential misuse. AT&T has initiated an investigation into the breach, although they have not identified evidence of the data being stolen. As a precautionary measure, the company has reset customers’ passcodes and urged them to monitor their account activity and credit reports. The leaked data, which dates back to 2019 or earlier, encompasses information from 7.6 million current customers and 65.4 million former account holders. While financial information was not included in the leak, details such as full names, email addresses, and dates of birth were compromised. Even though the breach happened in 2024, the stolen data is still on the Dark Web and is being repackaged for sale (source: ZNET)

US National Public Data Breach

An enormous amount of sensitive information, including social security numbers for millions of US, UK and Canadian citizens, was stolen and released on the Dark Web. The data breach, believed to be 277.1 gigabytes of data includes names, address histories, relatives, and social security numbers dating back at least three decades. The hacking group claiming responsibility for the breach, USDoD , are apparently selling the stolen data on the Dark Web for $3.5 million. (source: USA Today Tech)

Recent Breaches on the Dark Web

The dark web serves as a digital marketplace for cyber criminals looking to exploit stolen data. Here are some of the malicious activities they can engage in:

Credential Stuffing

Cyber criminals use stolen credentials to gain unauthorised access to accounts by trying multiple username-password combinations.

Fraud

Stolen data can be used to commit various types of fraud, including identity theft and financial fraud.

Ransomware

Ransomware-as-a-service (RaaS) allows criminals to encrypt and lock victims’ data until a ransom is paid.

Distributed Denial-of-Service (DDoS) Attacks

Attackers can use stolen data, such as login credentials or network configurations, to infiltrate systems and hijack devices, turning them into bots within a larger botnet. These botnets are then coordinated to flood a target’s network or server with an overwhelming volume of traffic, causing disruptions, slowing operations, or completely paralysing the system.

Keyloggers, Trojans, and Spyware

Malware tools can be distributed to steal sensitive information from victims.


How to Protect Your Data

If your data has made it on to the Dark Web, acting quickly to assess the risk and mitigate the potential damage is essential. But how do you know if your data is out there? Dark Web Monitoring allows you to monitor any instances of your organisation’s data on the dark web and receive proactive notifications if any information from your domain is found. The platform engine monitors hidden chat rooms, private websites, P2P networks, IRC channels and thousands of botnets.

Continually scanning Dark Web databases for your company’s domain-specific data means you can act quickly if your sensitive information is made available on the Dark Web. With intelligent algorithms, sifting through the vast amounts of information, accurately identifying any instances of your company’s data. When such a potential threat is detected, it provides real-time alerts, enabling you to take immediate action to protect your business.

Few organisations have the right tools, people, and processes in-house to manage their security program around-the-clock while proactively defending against new and emerging threats. As such, organisations should consider getting an assessment of their cyber security posture to identify weaknesses. Another consideration is implementing advanced technologies for threat detection or partnering with a Managed Security Services Provider (MSSP) for services such as Managed Detection and Response (MDR).


In Conclusion

The Dark Web remains a formidable challenge in today’s digital landscape, serving as a haven for cybercriminals to exploit vulnerabilities and trade stolen data. The recent data breaches reveal the sheer scale of data that is vulnerable to being exposed on this digital black market, and underlines the importance of implementing robust cyber security controls and strategies.

By pro-actively and regularly assessing their estate for vulnerabilities, implementing robust detection and response capabilities, continuously monitoring Dark Web channels for any exposed data or credentials, and fostering a culture of cyber awareness and vigilance, organisations can better protect themselves and their informational assets against the ever-present threats posed by the Dark Web.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Retail Under Siege from Cyber Attacks

Retail Under Siege from Cyber Attacks as Criminal Tactics Evolve

What the M&S, Co-op and Harrods Cyber Attacks Reveal About Modern Threats

Recently, a wave of cyber-attacks has struck some of the UK’s most well-known retailers: Marks & Spencer, the Co-op, and Harrods. These incidents have disrupted services, forced systems offline, and cost millions in lost revenue. They are not just unfortunate timing. They are a wake-up call for not just the retail industry, but for every organisation across the UK.

The message is clear, if the “big guys” can fall victim, anyone can.


A Timeline of Disruption

Easter Weekend (29–31 March 2025)

Marks & Spencer was the first to experience a major disruption. Over the bank holiday weekend, the retailer suffered a ransomware attack reportedly carried out by the group DragonForce. The incident forced M&S to take its website and apps offline, halting Click & Collect services and disrupting contactless payments and loyalty programmes.

With online sales accounting for approximately £3.8 million per day in its clothing and home division, the financial impact was immediate and substantial. M&S later confirmed that customer data had been stolen, although it clarified that the compromised information did not include passwords or payment details. [Source: BBC]

Wednesday 7 May 2025

The Co-op revealed that it had taken parts of its IT infrastructure offline in response to suspicious activity, as a precaution against a potential cyber attack. Staff were instructed to keep cameras on during remote meetings and to verify all attendees, a signal that the company feared a deeper network compromise. The full nature and scope of the attack have not been publicly confirmed. [Source: BBC News]

Thursday 8 May 2025

Harrods became the third major retailer to confirm an incident. The company reported attempted unauthorised access to its systems. In response, its IT team restricted internet access at its stores as a protective measure. While its flagship Knightsbridge location and online store remained open and functional, the company has not disclosed further technical details or the extent of the attempted breach. [Source: BBC]

Ongoing Disruption

Cyber attacks are often widely disruptive. Customers at M&S have been unable to shop online for over a month, and reports indicate that disruption could last until July. The disruption of this cyber attack is estimated to cost M&S over £300 million. [Source: BBC]


Why are Retailers Targets for Cyber Criminals?

Retail businesses, especially large chains, have become increasingly attractive to cyber criminals.

  • They manage large volumes of customer data, including payment information, delivery details and login credentials.
  • Their operations are deeply digital, from logistics and inventory management to payment systems and loyalty apps.
  • Any downtime causes immediate and visible disruption, creating pressure to resolve incidents quickly, sometimes under ransom demands.

We Simulated a Breach and It Took Minutes

At the recent Manchester Digital E-Commerce Conference, we conducted a live hack on a demo online store to show how quickly a compromise can occur.

Within minutes, our team exposed:

  • A misconfigured ecommerce website that was vulnerable to exploitation.
  • How an SQL Injection could steal usernames and encrypted passwords.
  • How easily we decrypted the passwords due to weak passwords and poor encryption algorithm.
  • Weak login process with no 2FA which enabled us to access all details on the account – including address and payment information.

Most successful attacks do not rely on sophisticated exploits and threat actors will almost always for the path of least resistance to establish a foothold. They rely on simple oversights, poor digital hygiene or human error.

Even today, the number one, most prevalent vulnerability facing applications globally are broken access controls according to the Open Worldwide Application Security Project (OWASP) [source: OWASP Top Ten]


How Can Organisations Protect Themselves Against Cyber Attacks?

While the recent attacks are concerning, they highlight areas where many organisations can make meaningful improvements. Addressing cyber risk doesn’t require a drastic overhaul or reacting with panic.

Instead, it begins with a focused review of your current cyber security posture. You should review the technologies you use, your internal processes, and your existing policies. The priority should be to identify gaps, understand where your most critical assets lie, and take measured, practical steps to reduce risk.

Some of the key steps you should consider are:

  • Use Multi-Factor Authentication (MFA) across all admin and critical access points.
  • Patch and update all systems regularly, especially third-party plugins and platforms. Utilising patch management software can make this process faster and easier.
  • Use 24/7 log monitoring and alerting tools such as a Security Information and Events Management (SIEM) and Early Detection and Response (EDR) solutions across your applications and endpoints that can detect and record anomalous activity such as repeated attempted login failures in real time.
  • Conduct regular security audits, penetration tests, and code reviews.
  • Segment networks and use monitoring tools to detect abnormal behaviour early.
  • Train staff on phishingsocial engineering, and access protocols.
  • Have an incident response plan in place and test it regularly.


It’s Not “If” But “When”

The recent incidents at M&S, Co-op, and Harrods are not anomalies. They are signs of a threat landscape that is growing more aggressive and opportunistic. For any organisation operating online or relying on digital systems, the risk is very real.

At CyberLab, we help businesses strengthen their defences, uncover vulnerabilities before attackers do, and stay ahead of the threat curve.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Festive Season Cyber Crime

Cyber Crime and the Festive Season: Protecting Businesses During Peaks

A Dangerous Spike in Cyber Threats

As the festive season approaches, the excitement surrounding Black Friday, Cyber Monday, and Christmas shopping often leads to a sharp increase in cyber threats. During this time, online consumer behaviour changes drastically- shoppers are eager for deals, working against the clock, and spending more time online.

This frenzy presents an ideal opportunity for cyber criminals, who take advantage of increased online traffic, distracted users, and businesses operating out-of-hours to launch attacks. For organisations, this shift introduces unique risks and demands heightened security measures.

This month, we are focusing on the elevated cyber risks associated with the festive season. We will explore how cyber criminals exploit holiday shopping habits and changes in consumer behaviour, provide examples of high-profile incidents, and offer best practices that organisations can implement to safeguard their operations during this critical period.


Why Cyber Criminals Love the Festive Season

During peak shopping times like Black Friday and Christmas, cyber crime rises as consumers spend billions online. A recent report by ThriveDX found that ransomware attacks increase by 30% during the holidays compared to regular months.

Cyber criminals know that consumers are often distracted while hunting for deals, leaving them vulnerable to phishing attacks and other scams. According to Forbes, in 2022 37% of data breaches in retail involved stolen payment card data, and ransomware accounted for 24% of breaches, with retailers often pressured to pay to avoid disruptions during their busiest sales periods.

A notable example of cyber criminals exploiting the festive period to steal payment card data is the Target breach, which affected approximately 40 million credit and debit card accounts during the holiday shopping period. The attack, facilitated by malware installed through an HVAC subcontractor, led to widespread customer distrust and hefty fines. This incident is a stark reminder that even well-established businesses with strong security frameworks can fall victim to cyber crime during the holidays.


Top 5 Most Common Threats During the Festive Season

Phishing Scams

Cyber criminals take advantage of consumers’ increased reliance on online shopping by sending emails that mimic trusted brands. These emails often include malicious files or links to fake websites where users unknowingly provide personal and payment information.

A report by DataProt found that over 70% of phishing emails were opened by recipients in 2023, especially during periods like Black Friday and Christmas when consumers are bombarded with promotional emails.

Ransomware

Between December and January, attempted ransomware attacks rose by 70%, as businesses were more willing to pay to prevent operational disruption. The combination of out-of-hours operations and an influx of temporary workers makes organisations more vulnerable to these attacks. [source: Darktrace]

Typosquatting

Cyber criminal websites that resemble legitimate retailers, often relying on common typos in domain names to trick consumers into entering their personal details. During Black Friday and Cyber Monday, these schemes become even more prevalent as users rush to make purchases. [source: Forbes]

Out-of-hours Attacks

According to Darktrace, in 76% of detected ransomware infections, the encryption process begins after hours or during the weekend.

Cyber criminals and threat actors alike often increase attack attempts during off-hours, particularly on weekends or holidays, when fewer staff are available to monitor security alerts in real time, making it easier to exploit standard organisational processes and human vulnerability.

With fewer personnel on-hand to respond, threat actors are often afforded more time to establish a deeper foothold within internal networks before being detected. For example, ransomware attacks tend to peak during these times, knowing that quick responses are more challenging.

AI-Enhanced Scams

The National Cyber Security Centre (NCSC) has warned that AI-generated scams will play a significant role this festive season, producing more polished and convincing phishing emails and fake websites.

According to NCSC, 72% of British people are concerned about AI making it easier for criminals to commit fraud. The misuse of AI to bolster scams, such as creating fake advertisements and fraudulent emails, makes it harder for consumers to discern between legitimate offers and cyber threats. [source: NCSC]


Best Practices to Protect Your Organisation

Due to the rise in cyber threats during the festive season, businesses must remain vigilant and proactive. Here are some best practices to consider:

1. Ensure Regular System Updates and Patching

Cyber criminals often exploit known vulnerabilities, so it’s crucial to keep all software and systems up to date with the latest security patches.

Protect your operating systems and third-party software from vulnerabilities with vRx from Vicarius.

A complete patch management system that discovers, prioritises, and remediates software vulnerabilities across your estate, including the smaller applications that are often forgotten.

2. Strengthen Employee Awareness and Training

Seasonal hires, in particular, are vulnerable to phishing attacks and social engineering as they are typically only contracted to work over the busy festive periods and so are less likely to be fully integrated into organisations’ policies and processes, meaning they may not have as much exposure or training to become vigilant to suspicious behaviours or cyber criminal activity.

Training employees to identify suspicious emails or websites can reduce the risk of human error. Verizon’s 2023 Data Breach Investigations Report found that human error played a role in 74% of breaches, highlighting the need for continual employee awareness. For temporary staff, provide quick, engaging onboarding modules that put emphasise on detecting phishing attempts and other social engineering tactics.

3. Implement Multi-Factor Authentication (MFA)

MFA adds an additional layer of security, which makes it more difficult for attackers to access systems even if they possess stolen credentials. SecurEnvoy helps to fortify your security and reduce the risk of data breaches by keeping track of where your data resides and making sure that only authorised users can access critical systems and information.

4. Monitor Network Traffic

Increased traffic during the festive period can strain your networks. Deploy monitoring tools to detect abnormal activity and prevent distributed denial of service (DDoS) attacks.

5. Consider Managed Security Services

If your business lacks in-house expertise, consider partnering with a Managed Security Service Provider (MSSP) for services such as threat detection and response, penetration testing, and incident response.

6. Dark Web Monitoring

Services such as HackRisk can help detect if any of your organisation’s data has been exposed on the dark web and provide real-time alerts to mitigate risks.

7. Prepare an Incident Response Plan

With out-of-hours attacks more common during the holidays, having a robust incident response plan is critical. Outsourcing to a retainer service, such as those offered by Sophos, can reduce the pressure on internal teams by providing expert guidance in handling incidents.


Conclusion

As the holiday season ramps up, so do the threats from cyber criminals eager to exploit changes in consumer behaviour and the operational vulnerabilities of businesses. By understanding the tactics used by attackers and implementing best practices such as employee training, regular system updates, and robust monitoring, organisations can significantly reduce their risk of falling victim to cyber crime.

Stay vigilant, invest in cyber security measures, and ensure your defences are up to the challenge this festive season. sophisticated cyber threats.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Defending Education

Defending Education: Top Cyber Security Challenges in Higher Education

Cyber Security for Education Institutions

Cyber security has become a critical issue for higher education (HE) institutions due to their unique structures. Academic institutions have open environments where many users access shared networks from various devices and locations.

This makes them prime targets for cyberattacks. Common threats include phishing attacks, ransomware, Distributed Denial of Service (DDoS) attacks, and data breaches. Plus, the rise of remote learning and cloud adoption has increased the potential attack surface for many educational institutions, making it harder to manage cyber security.


Understanding the Threat Landscape

Higher education institutions are attractive targets for threat actors due to their decentralised structures, large user bases, and the diversity of data they store.

Universities, for example, often have open networks to support collaboration and research, creating vulnerabilities and exploitable gaps in infrastructure. They typically hold valuable intellectual property, cutting-edge research, financial data, and personal student/staff information. Additionally, a blend of staff, students, and external collaborators using a range of different devices further complicates security oversight and can make endpoint security management a living nightmare.

Considering all of these factors, Higher Education Institutions appeal to a wide spectrum of motives for threat actors to target them; nation-states may target them for espionage and to obtain valuable research data, while ransomware groups view them as lucrative opportunities due to their reliance on constant system availability for academic and administrative purposes.

In the past year alone, 97% of UK higher education institutions reported cyber incidents, spanning across a wide variety of attack vectors and methods, according to a recent survey by the NCSC.


Key Security & Compliance Challenges Facing Higher Education

Decentralised Structures and User Diversity

Universities host a mix of staff, students, and external collaborators who access networks from various devices. This diversity increases the attack surface, making it harder to monitor and secure endpoints. Additionally, many departments and research teams have different security protocols or lack them altogether, creating inconsistent defences across the institution.

Appeal to Threat Actors: Espionage and Financial Crimes

Higher education institutions hold valuable intellectual property, particularly in research areas such as technology, health, and defence, making them appealing to nation-state actors seeking espionage. Ransomware groups and financially motivated cybercriminals also target these institutions due to the critical reliance on availability, making them more likely to pay to regain access to encrypted systems.

Cyber Security Awareness

With the variety of users and devices, human error is one of the largest vulnerabilities. Phishing attacks are common and can quickly compromise critical systems. Awareness training for students, faculty, and staff is often inconsistent or lacking.

Securing Research Data and Intellectual Property

Beyond financial crimes, universities are repositories of cutting-edge research and data. This makes them attractive targets for espionage, particularly for international competitors seeking technological advantages.


Best Practices and Recommendations for Higher Education Institutions

To effectively combat cyber threats, higher education institutions must adopt a proactive and tailored cyber security strategy. This begins with conducting a comprehensive risk assessment to measure their overall cyber security posture, but also to understand what makes their institution an attractive target specifically.

Universities and colleges should consider the assets they hold—whether it’s sensitive student data, valuable research project data, or intellectual property. Furthermore, institutions need to evaluate their relationships with external collaborators, including research partners, government agencies, and private corporations, as these partnerships may expose them to additional risks.

Geographic location can also influence the threat landscape, particularly if the institution is involved in research or collaborations that are of interest to state-sponsored actors. People of interest who teach among faculties or attend universities can attract both influence and risk. The NCSC has published guidance for HE institutions supporting VIPs and high-risk individuals.

With the right guidance and expertise, information security teams, compliance teams and other internal stake holders can identify where their biggest risks are within their estate, the most likely threat actors to target them, and thus the most likely methods and techniques they are to deploy, ultimately providing a “blueprint” for an optimal cyber security strategy and posture hardening.

With this understanding in place, universities can then implement best practices such as:

Adopting a Zero Trust Architecture

This approach assumes no user or device is trusted by default, even if they are already inside the network. This approach is especially crucial for higher education institutions, given their vast, open networks, with users accessing resources from diverse locations and devices.

Example in Higher Education: Universities can implement micro-segmentation within their networks to limit the movement of attackers if a breach occurs. For example, restricting student access to sensitive research databases or administrative systems through segmented network zones can prevent unauthorised access, even if an attacker has already breached one area.

Another common practice is continuous authentication, where the system regularly checks user credentials and behaviour, such as location, device type, or network usage, to identify any anomalies that could indicate a breach.

The University of California, Berkeley has adopted a Zero Trust approach by implementing secure, role-based access controls for its academic resources, minimising access privileges for non-administrative users. Their system continuously verifies user identity, reducing the risk of lateral movement by attackers. [source: The University of California, Berkeley]

Strengthening Access Controls

Implementing Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) ensures only authorised individuals have access to critical systems and data.

MFA requires users to present two or more forms of verification (something they know, something they have, and something they are). This is particularly effective in defending against phishing attacks, which are highly prevalent in higher education.

Example in Higher Education: Implementing MFA across university systems for both students and staff can prevent unauthorised access even if login credentials are stolen. For example, universities can require students to verify their identity using a mobile app or a hardware token in addition to their password.

The University of Oxford rolled out a university-wide MFA system, requiring all staff and students to authenticate using both their university credentials and an additional form of verification, such as a mobile phone app or security token. This has drastically reduced successful phishing attacks by ensuring that stolen passwords alone are not enough to gain access. [source: The University of Oxford]

Regular Software Updates and Endpoint Protection

Ensuring that all devices, including personal ones used for work (BYOD), have up-to-date antivirus and firewall protection is crucial. Regular software updates are vital to patch known vulnerabilities. Additionally, enabling remote wipe capabilities for lost or compromised devices ensures sensitive data can be erased quickly.

Phishing and Social Engineering Awareness Training

Employees are often the first line of defence against cyber threats. Regular training sessions on phishing, social engineering, and secure data handling can significantly reduce the risk of human error leading to a security breach.

Collaborating with External Cyber Experts

Partnering with cyber security experts, especially in the field of penetration testing, Managed Security Service Providers and Incident Response, or government agencies can provide higher education institutions with real-time threat intelligence, access to advanced security technologies, insights into vulnerabilities and misconfigurations across their estate and provide assurance that their assets and users will be safeguarded in the event of a cyber attack or data breach.

Managed Detection and Response (MDR)

Endpoint detection alone is no longer sufficient given today’s digital threat landscape. Organisations must now employ an “always-on” threat detection and monitoring capability. However, employing and retaining qualified cyber security analysts and engineers can be very expensive. Running a 24/7 SOC (Security Operations Centre) in-house with experienced analysts and security experts with state-of-the-art defensive technologies are typically reserved for multi-national conglomerates and global tier 1 banks.

MDR services provide continuous monitoring and analysis of an organisation’s entire estate, including endpoints, network traffic and activity logs. By outsourcing to experts, firms can ensure that threats are detected and mitigated in real-time, reducing the risk of a successful attack.

Incident Response and Recovery

Having a robust incident response plan is essential for mitigating the damage caused by cyber incidents. Higher education institutions should invest in both in-house and outsourced incident response teams to ensure a swift and effective reaction to breaches and conduct regular assessments of their cyber incident response plans (CIRP) or ‘tabletop exercises’ simulating various cyber incident scenarios to ensure that their response strategies are robust and understood by all risk owners.

Vulnerability Management

Regularly updating and patching software, coupled with continuous vulnerability assessments, is vital for maintaining a secure infrastructure. Cyber security as a Service (CSaaS) solutions, such as HackRisk can help organisations manage vulnerabilities effectively without overburdening internal teams.


Conclusion: Proactive Defence in Higher Education

To safeguard the wealth of data and intellectual property, higher education institutions must adopt a proactive, layered approach to cyber security. By addressing the unique challenges of decentralised networks and diverse users, universities can build a strong defence against increasingly sophisticated cyber threats.

Common Cyber Security Challenges in Education

Here are some key findings detailing the quantity of different types of cyber-attacks that further education colleges and higher education institutions have encountered over the past 12 months:

Phishing Attacks

Phishing attacks were extremely common across both sectors, with 100% of higher education institutions and 97% of further education colleges reporting incidents.

Impersonation Attacks

90% of higher education institutions and 78% of further education colleges experienced impersonation attacks, where attackers pretended to be from the organisation.

Viruses, Spyware, or Malware

Higher education institutions reported significantly higher incidents of viruses, spyware, or malware (77%) compared to 32% in further education colleges.

Access

Higher education faced more issues with unauthorised access to files or networks, with 27% of breaches caused by staff and 20% by outsiders. For further education colleges, 19% involved staff, but 0% by outsiders.

Other Breaches or Attacks

There was a considerable difference in miscellaneous breaches or attacks, with 47% of higher education institutions and 16% of further education colleges reporting incidents outside the standard categories.

[source: NCSC]

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Cyber Security Challenges Within The Public Sector

Cyber Security Challenges Within the Public Sector and How to Respond

How Threat Hunting and MDR Are Shaping Public Sector Resilience

The UK’s public sector – spanning the NHS, central and local government, emergency services, and education – is increasingly targeted by cyber criminals.

With digital transformation accelerating post-pandemic, the stakes have never been higher. According to recent government reports, ransomware attacks have cost public bodies over £1 million per incident, and more than 25% of breaches go undetected for months.


Key Challenges in the Public Sector

1. Skills Shortages

Public sector organisations face a critical shortage of cyber expertise. One in three cyber roles remains vacant or filled by costly contractors, and many departments lack senior digital leadership.

2. Financial Constraints

Budget pressures make it difficult to invest in proactive security measures. Yet prevention remains far more cost-effective than remediation.


The Solution: Sophos MDR

Sophos Managed Detection and Response (MDR) offers 24/7 threat hunting and incident response, bridging the skills gap and providing scalable protection. It combines AI-driven detection with human-led analysis to:

  • Proactively hunt and validate threats
  • Assess severity and business impact
  • Contain and neutralise attacks remotely
  • Provide root cause analysis and remediation guidance

Deployment options include:

  • Notify: Sophos alerts your team to threats
  • Collaborate: Joint response with your internal team
  • Authorise: Sophos handles containment and informs you of actions taken

This flexible model ensures public sector organisations retain control while benefiting from expert support.

Learn More

Protect the Public Sector: Understanding Security Frameworks & Log Management


Real-World Applications

Healthcare

An NHS Ambulance Trust adopted Sophos MDR to ensure uninterrupted access to patient data and services. Building an in-house 24/7 SOC was cost-prohibitive, making MDR a practical alternative.

Education

A leading independent school implemented Sophos MDR to protect student data and avoid ransomware-related downtime. Their proactive stance ensured continuity in teaching and learning.

Housing Associations

CyberLab has supported housing providers in deploying MDR to safeguard resident data and maintain operational integrity. These organisations now benefit from continuous monitoring and expert threat response.

Read Success Stories

Summary

The UK Government Cyber Security Strategy calls for a shift from reactive to proactive security across the public sector. Sophos MDR enables this transition by delivering round-the-clock protection, addressing talent shortages, and supporting digital resilience.

CyberLab is proud to support public sector clients across healthcare, education, housing, and government. As Sophos Public Sector Partner of the Year for ten consecutive years, and with a team of CREST and CHECK-certified testers, we’re here to help you strengthen your cyber defences.

Sophos Managed Detection and Response (MDR)

Where others stop at notification, Sophos MDR takes action.

Few organisations have the right tools, people, and processes in-house to manage their security program around-the-clock while proactively defending against new and emerging threats.

Unlike other MDR services which simply notify you of suspicious events, Sophos MDR provides an elite team of threat hunters and response experts to take targeted actions on your behalf to neutralise even the most sophisticated threats.

Learn More

The Human Hack Defending Against Social Engineering

The Human Hack: Defending Against Common Social Engineering Techniques

Hackers are Exploiting People, Not Just Systems.

The foundational pillars of any organisation’s performance and resilience are people, processes, and technology. These elements are emphasised in the ISO 27001 framework, which underscores the importance of a holistic approach to information security management.

Despite robust technological defences and well-defined processes, it is often the human element that remains the most vulnerable. Social engineering usually involves manipulating or deceiving individuals into divulging credentials or granting some form of unauthorised access to malicious actors.

This article explores the pervasive threat of social engineering, exploring its techniques, real-world impacts, and strategies to fortify your defences against these sophisticated attacks.


What is Social Engineering?

Social engineering is a manipulation technique that exploits human psychology to gain access to confidential information or systems. Unlike technical hacking, social engineering relies on human interaction and often involves tricking people into breaking normal security procedures with the goal of obtaining sensitive information or unauthorised access.

Social engineering tactics are diverse and continually evolving. Some of the most common techniques include:

  • Phishing: Deceptive emails or messages designed to trick recipients into providing sensitive information.
  • Baiting: Offering something enticing to lure victims into a trap.
  • Pretexting: Creating a fabricated scenario to steal victims’ personal information.
  • Tailgating: Gaining physical access to restricted areas by following someone with legitimate access.
  • Vishing: Using phone calls to trick victims into divulging information.

How Common is Social Engineering?

Social engineering is alarmingly common in cyber-attacks. According to findings from American-based Software and Cyber Security company Splunk, in 2023, 98% of all reported cyber-attacks involved some form of social-engineering, making it one of, if not the most prevalent methods used by cybercriminals and other threat actors. An average organisation can face over 700 social engineering attacks annually. [source: Splunk]

Phishing remains the most common social engineering technique, with millions of phishing emails sent daily around the globe. In the UK the 2024 Cyber Breaches Survey indicated that 84% of businesses and 83% charities have been targeted by phishing attacks this year already, with some cyber criminals impersonating other organisations in emails or online. [source: UK Government]

Real World Story – CyberLab Red Team

Tailgating into a Client’s Office

During a Red Team engagement, the team conducted thorough reconnaissance to understand staff reactions to access requests and building entry protocols. Exploiting this knowledge, a team member, posing as an employee on a phone call, approached a side entrance used primarily for Cycle to Work traffic. Waiting for an employee to open the door, the team member tailgated inside. When questioned by a security guard, he flashed a fake pass from his pocket. The presence of this card, combined with the confident demeanour was enough to convince the guard to allow the team member access.

Inside, the team member followed an employee into a lift that required keycard access. By closely shadowing the employee and engaging in light conversation, he gained access to the lift and descended to the basement. Here, most lifts required keycard activation, but one lift did not. Testing it, he found it led directly to the main lobby beyond the security barriers. Coordinating with a colleague, they both used this lift to bypass the barriers.

At the main lobby, they noticed another lift with the desired floor selected. Joining an employee in this lift, they engaged in friendly conversation, further establishing their legitimacy. On reaching the floor, they followed the employee to an office door requiring keycard access. Mentioning the company name, they tricked the employee into letting them in. Inside, they found a coffee machine and various unlocked meeting rooms. Booking a meeting room for an hour provided them with a secure space to operate.

This exercise demonstrated how effective social engineering techniques, such as tailgating, confident interaction, and exploiting human trust, can bypass robust security measures and gain unauthorised access to sensitive areas. The client was subsequently informed of the successful infiltration, highlighting vulnerabilities in their security protocols so that they could take remedial action to harden the physical security protocols and policies and also educate their staff to be more vigilant.

Learn About Red Teaming

Social Engineering Examples

Notably, recently reported threat actor behaviours have highlighted the significant role of social engineering in cyber-attacks. For example, Microsoft have recently reported how a threat actor group known as Storm-1811 are using Microsoft Teams as a vector to target users. The threat actors contact the targeted users via Teams impersonating IT or help desk personnel. This would then lead to the threat actors exploiting Quick Assist, followed by credential theft using EvilProxy, then executing batch scripts, and using SystemBC for persistence and command and control. [source: Microsoft]

In another example, Checkpoint Software Technologies have recently identified 1,200 new domains associated with Amazon, 85% of which were flagged as malicious or suspicious. Some examples of theses discovered domains include:

  • amazon-onboarding[.]com: a brand-new domain designed to steal carrier-related credentials
  • amazonmxc[.]shop: This domain masquerades as Amazon Mexico and even has a similar layout. However, it reveals user login credentials to cybercriminals when entering them in
  • amazonindo[.]com: Like the fake Amazon Mexico domain above, it also reveals user credentials to cybercriminals when entered

Amazon Prime day is very popular event where Amazon give away huge discounts and offers, attracting millions of users globally. This makes it a popular target for cyber criminals and combined with increasingly sophisticated phishing techniques and convincing malicious websites, there is a much higher potential for customers to be scammed. [source: Cyber News]

AI-Driven Social Engineering

Looking to the future, the integration of AI into social engineering is likely to result in even more sophisticated and automated attacks. As we have touched on in previous blog posts, we have already seen how AI and deepfake technology is being used offensively by malicious actors for social engineering purposes, whether to convey misinformation and create social unrest or to assist threat actors in obtaining unauthorised access or sensitive information.

One particular example involved cyber criminals using deepfake AI to extract millions of dollars from a multi-national company based in Hong-Kong. The cyber criminals achieved this by using deepfake generated images and audio of the company’s Chief Financial Officer, and other employees, to stage a conference call where they convinced and instructed another employee to transfer funds equivalent to almost £20 million. [source: Ars Technica]

As AI continues to evolve, we can expect to see the following developments:

  • Hyper-Personalisation: AI will enhance the ability to tailor attacks to individual targets, making phishing emails and other forms of communication indistinguishable from legitimate ones.
  • Real-Time Adaptation: AI-driven attacks will be able to adapt in real-time based on the target’s responses, increasing the likelihood of success.
  • Scalability: AI will enable attackers to conduct large-scale social engineering campaigns with minimal human intervention, increasing the reach and impact of these attacks.
  • Deepfakes: AI-generated audio and video deepfakes could be used to impersonate trusted individuals, further enhancing the credibility of social engineering attempts.
  • AI-Powered Fraud: According to a report by Onfido, deepfake/AI fraud attempts in the US surged 3000% in 2023 from the previous year. These fraud attempts can range from face-swapping or ‘morphing’ apps to bypass facial recognition and verification, AI generated voice replication to impersonate an intended victim or authority figure, to AI generated fabricated images or video of a damaged vehicle or property as evidence in support of fraudulent insurance claims. [source: TNW]


Protecting Against Social Engineering

To best defend against social engineering attacks, organisations and individuals must adopt a multi-faceted approach that addresses various aspects of cyber and physical security. Here are some key strategies to enhance your defences:

Robust Policies

Establishing and enforcing strict security policies and procedures is crucial. These policies should include:

  • Access Controls: Limiting access to sensitive information and systems based on the principle of least privilege.
  • Password Management: Enforcing strong password policies and regular password changes.
  • Data Classification: Categorising data based on its sensitivity and implementing appropriate handling procedures.

Multi-Factor Authentication (MFA)

Implementing Multi-Factor Authentication (MFA) adds an extra layer of security beyond just passwords. MFA can significantly reduce the risk of account compromise by requiring additional verification methods, such as:

  • One-Time Passwords (OTPs): OTPs sent to a user’s mobile device or email.
  • Biometric Verification: Using fingerprints, facial recognition, or voice authentication.
  • Hardware Tokens: Physical devices that generate a secure code required for login.

Training and Awareness

Regular training programs are essential to educate employees about the latest social engineering tactics and how to recognise them. Training should cover:

  • Phishing Simulations: Conducting regular simulated phishing attacks to test and improve employees’ ability to identify and respond to phishing attempts.
  • Incident Reporting: Implementing a policy and dedicated channel for reporting incidents, encouraging employees to report suspicious activities promptly can help mitigate the damage caused by a social engineering attack, or even prevent them from being successfully executed.
  • Role-Specific Training: Tailoring training to the specific roles and responsibilities of employees. For example, executives and finance staff may be targeted differently than IT personnel.

Regular Security Testing

Conducting regular phishing simulations and security audits helps identify and address vulnerabilities. These tests should include:

  • Red Team ExercisesSimulating real-world attack scenarios to test the effectiveness of your organisation’s people, processes and technology at identifying, detecting and responding to various threats.
  • Penetration TestingIdentifying and remediating vulnerabilities before they can be exploited by attackers.
  • Vulnerability AssessmentsContinuously scanning for and addressing potential security gaps in your systems.

Incident Response Planning

Having a well-defined incident response plan ensures that your organisation can quickly and effectively respond to social engineering attacks. Key components include:

  • Incident Response Team: Establishing a dedicated team to handle security incidents. Building and maintaining an in-house incident response team can be costly and resource intensive. Outsourcing to a dedicated team of incident response experts on retainer, such as Sophos, is a practical alternative to alleviate some of these cost and resource burdens associated with maintaining IR forensic expertise and capabilities in-house, and provides peace of mind that a competent team of experts is ready to respond to a security incident should one occur.
  • Communication Protocols: Outlining how to communicate internally and externally during a security incident. This should involve establishing clear guidelines for informing all relevant internal and external stakeholders, creating a crisis communications plan, and regular drills.
  • Post-Incident Reviews: Conducting a thorough analysis of the incident to identify lessons learned so that you can harden your organisation’s cyber security posture and mitigate future attacks.

Additional Recommended Resources:

By understanding the tactics used in social engineering and implementing these protective measures to counter them, organisations can significantly reduce their risk of falling victim to these deceptive attacks.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Securing Healthcare Organisations

Securing Healthcare Organisations with Modern Cyber Defence Strategies

Navigating Cyber Security Challenges

Healthcare organisations often face challenges in safeguarding sensitive patient data and critical infrastructure.

With 67% of healthcare organisations hit by ransomware last year, the threat level is high. In this blog, we explore the complexities of securing healthcare organisations amidst the evolving threat landscape and discuss strategies to mitigate risks effectively.


Understanding the Threat Landscape

Healthcare organisations are prime targets for cyber attacks due to the valuable information they possess, including medical records, financial data, and intellectual property. Threat actors, ranging from cyber criminals to nation-state actors, constantly probe for vulnerabilities to exploit.

Some of the most common threats to healthcare include:

  1. Phishing Attacks: Cyber criminals use deceptive emails or messages to trick employees into revealing sensitive information or installing malware.
  2. Ransomware: Malicious software encrypts critical data, rendering it inaccessible until a ransom is paid, disrupting healthcare operations and patient care.
  3. IoT Vulnerabilities: The abundance of Internet of Things (IoT) devices in healthcare introduces new attack vectors, posing risks to patient safety and data integrity.

Cyber Diagnosis: Navigating Cyber Security Challenges in Healthcare

In this exclusive webinar hosted by CyberLab, in collaboration with industry-leading partners Sophos, Logpoint, Forescout, and SecurEnvoy, we explore how to safeguard healthcare organisations against cyber threats.


“We have Microsoft E5 licences, are the included protections enough?”

Many healthcare organisations leverage Microsoft E5 licenses for cyber security capabilities. While these subscriptions offer robust security controls, they may not address all security requirements.

  1. Comprehensive Coverage: Assess whether E5 subscriptions adequately cover endpoints, servers, and other critical assets, including unmanaged IoT devices.
  2. Third-Party Integration: Evaluate the interoperability of Microsoft tools with third-party solutions to ensure comprehensive threat detection and response capabilities. For example, Sophos offer MDR for Microsoft Defender.
  3. Continuous Improvement: Cyber security is an ongoing process and organisations need to invest in regular assessments, updates, and training to stay ahead of emerging threats.


Balancing Budget Constraints and Cyber Security

Securing healthcare organisations requires striking a balance between budget constraints and cyber security needs. Key strategies include:

  1. Risk-Based Approach: Prioritise investments based on the organisation’s risk profile, focusing on critical assets and vulnerabilities.
  2. Baseline Security Practices: Implement foundational security measures, such as patch management, access controls, and employee training, to establish a strong security posture.
  3. Vendor Collaboration: Partner with trusted vendors and technology providers to leverage expertise, identify gaps, and implement cost-effective security solutions tailored to the organisation’s needs.


Next Steps

Securing healthcare organisations is a multifaceted challenge that demands a proactive and strategic approach. By understanding the evolving threat landscape, evaluating security controls, and balancing budget constraints with cyber security priorities, healthcare institutions can mitigate risks effectively and safeguard patient data, ensuring continuity of care.

CyberLab look after over 150 public and private healthcare providers, working together to develop solutions that secure their sensitive data, meet compliance requirements, and ensure online threats don’t compromise their operation.

Our range of security services and solutions have been developed to meet the requirements of the NHS Data Security and Protection Toolkit (DPST) and future-proofs against the NCSC’s Cyber Assessment Framework (CAF).

Want to know more about how to secure your healthcare organisation? CyberLab will be at the Healthcare Excellence Through Technology (HETT) Conference in London, so come and talk to us!

Find out more about our healthcare solutions or book a consultation to speak to one of our experts.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation