Four Campaigns, One Week, Zero Excuses: New Episode Out Now
Last week was one of the busiest in recent memory for cyber security. Four major attack campaigns landed within days of each other, each using completely different methods, each capable of compromising the kind of security controls most UK small businesses depend on.
And while those attacks were rolling out, the UK government quietly enacted the biggest change to data protection law since Brexit. With roughly 48 hours' notice.
In this week's episode, Mauven, Graham, and I break down all of it.
Campaign One: Russian military intelligence (APT28) weaponised a critical Microsoft Office vulnerability within 24 hours of the patch being published. The attack needs zero user interaction beyond opening a document. No macros. No warnings. It installs an Outlook backdoor that silently forwards every email you receive to Russian intelligence servers.
Campaign Two: Commodity criminals running a campaign called DEAD#VAX, using virtual hard disc files to bypass Windows security flags. The same techniques that nation-state actors use, sold as malware-as-a-service for about £50 a month.
Campaign Three: A Chinese-linked group compromised the download infrastructure for Notepad++, one of the most popular text editors in the world, for six months. Selective targeting. Nearly invisible.
Campaign Four: Three separate macOS infostealer campaigns running simultaneously, distributed through Google Ads, fake PDF tools, and WhatsApp.
On top of all that, the Data Use and Access Act came into force on February 5th. Cookie and marketing fines jumped from £500,000 to £17.5 million overnight. The ICO gained new enforcement powers. And every business handling personal data now has until June 19th to implement a formal complaints procedure.
We cover what happened, why it matters for UK small businesses, what you can do about it today, and how to protect a 20-person company for roughly £10,000 a year.
Fifteen minutes. No waffle. Practical actions you can take before close of business.
Listen now on your preferred podcast platform, or visit our episode page for full show notes, threat intelligence sources, and the complete immediate actions checklist.