Inside TRACE: Navigating a New Era of Cyber Threats
Share
The cyber threat landscape is evolving at an unprecedented pace. The latest insights from the National Cyber Security Centre (NCSC) and recent high-profile incidents underscore the urgent need for businesses to strengthen their resilience.
In the October 2025 edition of our Inside TRACE Cyber Webinar, Danny Howett, Technical Director – Digital Forensics and Incident Response at CyXcel, explores key findings from the NCSC Annual Review, examines emerging threat actor groups, assesses the role of AI in cybercrime, and reflects on the economic shockwaves caused by the Jaguar Land Rover attack.
Enter your details at the bottom of the page to watch the full webinar or read below for highlights from the session.
The State of Cybersecurity: A Nation Under Attack
The NCSC’s 2025 Annual Review paints a stark picture – UK businesses are facing record levels of cyberattacks.
- 1,727 incident reports were submitted to the NCSC last year.
- 429 incidents were formally managed, with nearly half deemed nationally significant.
- That’s 17 major cyberattacks every week, a 129% increase year-on-year.
The surge is driven by ransomware, supply chain compromises, and increasingly sophisticated nation-state actors. China remains the most capable adversary, while Russia, Iran, and North Korea continue to exploit geopolitical tensions to launch disruptive campaigns.
Three Threat Groups Join Forces
A new cybercriminal alliance made up of Scattered Spider, Lapsus$, and ShinyHunters, is redefining identity-based attacks.
- Scattered Spider: Known for SIM swapping and social engineering, now pivoting to ransomware.
- Lapsus$: Masters of extortion, targeting global giants like Microsoft and Samsung.
- ShinyHunters: Specialists in large-scale data breaches and dark web monetisation.
Their combined tactics, voice phishing, MFA fatigue, and credential theft, pose a serious risk to businesses worldwide.
AI: The Game-Changer for Cybercrime
Artificial Intelligence is no longer just a defensive tool; it’s powering autonomous cyber operations. Threat actors are leveraging AI across the cyber kill chain, from reconnaissance to ransom negotiation.
- Reconnaissance: Tools like Auto-GPT map attack surfaces in minutes.
- Weaponization: AI-driven malware adapts to evade detection.
- Delivery: Deepfake audio and video enable convincing social engineering.
- Exploitation and Persistence: Automated bypass of MFA and polymorphic malware.
- Command and Control: Dynamic rerouting to avoid detection.
- Actions on Objectives: AI sifts stolen data and even drafts ransom notes.
Black Hat AI tools such as WormGPT, FraudGPT and GhostGPT are lowering the barrier to entry for cybercrime, enabling even low-skilled threat actors to launch sophisticated attacks.
The Jaguar Land Rover Attack: A Supply Chain Crisis
The August 2025 attack on Jaguar Land Rover is a sobering reminder of supply chain fragility.
- £2 billion estimated economic impact.
- Five-week production halt, cutting UK car output by 25%. This is the worst since 1952.
- Ripple effects across 5,000 suppliers and 120,000 workers, with layoffs and insolvency warnings.
Government intervention, including a £1.5 billion loan guarantee, has stabilized recovery, but smaller suppliers remain vulnerable.
Building Resilience: What Organizations Must Do
To counter these escalating threats, organisations should prioritize:
- Identity and Access Management (IAM): Limit access and monitor anomalies.
- Adaptive Multi-Factor Authentication: Combat MFA fatigue with number matching.
- Threat Intelligence Monitoring: Detect compromised credentials early.
- Security Awareness Training: Go beyond phishing drills and test real-world scenarios.
- Zero Trust Architecture: Verify every access request, especially for cloud services.
Conclusion
Cybersecurity is no longer a technical issue; it’s a boardroom priority. The convergence of nation-state aggression, ransomware ecosystems, and AI-driven attacks demands urgent action. Resilience isn’t optional; it’s the foundation of business continuity and national security.
Photo by Conny Schneider on Unsplash.