April 11, 2026
In an era where digital infrastructure underpins nearly everything—from national security to everyday commerce—asking whether your systems are truly secure is no longer rhetorical. Here are the latest developments that should raise eyebrows.
1. Nation state and geopolitically motivated threats
• A resurgence of Iran backed Pay2Key ransomware-as-a-service now offers criminals an 80% share of profits in attacks targeting the U.S. and Israel.
• Volt Typhoon, a Chinese APT group, is actively embedding itself in U.S. telecommunications infrastructure—posing risks to national security.
• The U.S. Government Accountability Office reports a steady rise in cyberattacks against critical infrastructure (energy, healthcare, transport), highlighting growing sophistication .
2. Sophisticated tactics and zero day exploitation
• New attack vectors like ClickFix social engineering and “attachment hijacking” in email threads are on the rise, enabling deeper penetration into corporate and government environments.
• CitrixBleed 2 (CVE 2025 5777), a critical NetScaler vulnerability, has been actively exploited since mid June 2025—permitting session hijacking and MFA bypass.
• ICS/OT systems from Siemens, Schneider Electric, and Phoenix Contact received emergency patches this month, signaling active industrial network threats.
3. Supply chain and third party risks
• Threats to critical infrastructure are increasingly tied to supply-chain compromises—whether it's trojanized medical software impacting Taiwan or nation state interference.
• GAO emphasizes that although intelligence-sharing among agencies has improved, critical infrastructure remains exposed due to rising numbers and severity of attacks.
4. The human vector: social engineering and insider risks
• Qantas recently suffered a massive data breach affecting up to 6 million customers, after attackers duped off shore call center staff via “vishing” and bypassed MFA—crediting “Scattered Spider.”
• Retail cyber crime ringleaders were arrested in connection with a £440 million attack on Marks & Spencer, Co op, and Harrods, underscoring both scale and coordination in criminal campaigns.
What This Means for Your Infrastructure
Take Action Now
1. Adopt Zero Trust: Limit implicit trust within your network—verify everything.
2. Accelerate Patching: Implement a sprint cycle for urgent CVEs.
3. Raise Human Awareness: Conduct social-engineering drills regularly.
4. Vet Your Vendors: Audit and monitor third-party integrations and supply-chain risks.
5. Embed Security-by-Design: Make security foundational in every development and deployment lifecycle.
If your defensive posture still leans on outdated models—and relies on the hope that your perimeter remains intact—you’re overdue for serious reassessment. Today’s threats are stealthy, human focused, and increasingly state sponsored. It’s time to ask not just how secure your infrastructure is, but how resilient it feels when breaches and disruptions are all but a given.
Let's get in touch and see how our assessments can help you strengthen your cybersecurity posture.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.