Cybersecurity Executive Briefing

Trust Center

Start your security review
View & download sensitive information
Search items
ControlK

Welcome to Ntirety's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Trust Center Updates

Cybersecurity Executive Briefing

Copy link
General

Cybersecurity Executive Briefing for July 3, 2025

📝 Executive Summary

This week’s landscape is defined by escalating cyber threats linked to geopolitical tensions—especially involving Iran—alongside rising regulatory demands from the EU, US, UK, and India. Prominent events include a surge in hacktivist-driven DDoS attacks against US entities, new zero-trust and AI-based threat advisories, and significant directives impacting cloud security and infrastructure. The airline industry in particular has been a focus of attacks. The overarching message: implement proactive, scalable, and resilient cybersecurity frameworks—especially around identity controls, threat intelligence, zero trust, and compliance readiness.


🔍 Threat Landscape

  • Geopolitically-activated threats:
    Iran-linked cyber actors and hacktivists are intensifying cyber activity targeting US and allied infrastructure. Despite ceasefire conditions, the FBI, NSA, DHS, and FBI reiterate heightened vigilance as adversaries continue credential theft and attack operations. Source

  • DDoS wave:
    Between June 21–22, hacktivist groups like Mr. Hamza, Mysterious Team Bangladesh, and Keynous+ launched an 800% surge in DDoS attacks targeting U.S. sectors like manufacturing, finance, and government. Source

  • Cybercrime automation:
    AI-driven phishing, credential-stuffing, and MFA-push bombing techniques are proliferating—hackers now rapidly clone phishing pages via tools like Vercel’s “v0 AI”. Source

  • Ransomware & vulnerabilities:
    Active exploitation of zero-day and disclosed vulnerabilities—especially in Chromium, Apple, Citrix, Qualcomm—fueling ransomware campaigns. Source


🏛️ Regulatory & Compliance Updates

  • EU and UK regulatory momentum:

    • NIS2 technical guidance from ENISA and the EU’s Cybersecurity Blueprint (COM(2025) 66) were released in early June, setting new standards for incident response, cross-border coordination, and cloud sovereignty. Source
    • The EU’s Cyber Resilience Act (CRA) mandates vulnerability management and incident disclosures by digital product vendors—with enforcement deadlines stretching to December 2027. Source
    • The EU Data Act (access and portability) and AI Act approach applicability in August/September; non-compliance could disrupt cloud service contracts. Source
  • India’s RBI directive:
    Banks and financial institutions are required to adopt zero-trust architecture, AI-aware defenses, and strict vendor management to reduce systemic risk. Source

  • US Executive Order:
    On June 6, President Trump issued a successor to his cybersecurity EO, emphasizing modernization of federal programs, software transparency, and information sharing. Source

  • US-EU Financial Forum:
    Under DORA implementation, AI in financial services and critical infrastructure resilience were top of the agenda, hinting at deeper regulatory harmonization. Source


🚨 Notable Industry Incidents (Past 7 Days)

  • Iranian hacktivist surge:
    Post-June US actions, hacktivist groups launched DDoS campaigns against U.S. targets, signaling future escalation. Source

  • Persistent Iran-linked threats:
    FBI/NSA reports highlight ongoing attempts to compromise US critical systems, despite geopolitical signals.Source

  • AI-cloned phishing sites:
    Attackers are utilizing generative AI to create convincing phishing domains at speed. Source

  • RBI’s financial push:
    Indian banks are now compelled to strengthen cyber hygiene and adopt zero-trust and AI defensive models.Source

✈️ Airlines Cybersecurity Incidents

  • FBI alert: The FBI warns that the ransomware group Scattered Spider (aka UNC3944 or "Muddle Libra") is deliberately targeting the "airline ecosystem"—including vendors, support providers, and third-party IT teams—via sophisticated social engineering. Methods include vishing, helpdesk impersonation, and bypassing MFA through device registration tricks (CPO Magazine).

  • Threat intelligence from Unit 42 and Google Mandiant confirms the group’s adaptation to airline operations, stressing the need for stricter identity checks and MFA protections (The Hacker News).

  • Qantas (Australia) – On June 30, hackers allegedly accessed a third‑party call‑center system via social engineering, impacting ~6 million customer records: names, birth dates, emails, phone numbers, and frequent‑flyer IDs. No financial or passport data was taken, and frequent‑flyer accounts remain protected by MFA (TechCrunch). The airline has contained the breach, engaged cybersecurity specialists, and now recommends MFA apps over SMS and vigilance against phishing (The Sun).

  • Hawaiian Airlines (U.S.) – Confirmed a "cybersecurity event" on June 26 that affected internal systems. Flight operations were unaffected, though investigation and federal notifications are ongoing (Business Insider).

  • WestJet (Canada) – On June 13 experienced a cyber incident disrupting internal and customer digital services. The airline swiftly engaged forensic teams, restored systems, and continues to assess data exposure (Economic Times).

  • All three incidents align with FBI findings, although only Qantas has publicly acknowledged attribution to Scattered Spider so far (Economic Times).


🔑 Key Recommendations

Accelerate Zero-Trust Adoption

  • Audit identity access controls, MFA deployment, and microsegmentation in key systems.
  • Simulate hacktivist scenarios and bolster resilience of critical infrastructure.

Enhance Threat Intelligence & Visibility

  • Integrate geopolitical risk alerts into threat intel systems.
  • Expand telemetry on phishing site creation and anomalous account behavior.

Patch & Vulnerability Agility

  • Prioritize patching for known exploited vulnerabilities (Citrix, Chromium, Apple).
  • Participate in threat-led penetration testing and routine red-teaming.

Compliance and Regulatory Readiness

  • Align incident response and reporting processes with evolving EU/UK regulations and DORA.
  • Map supply-chain governance against RBI vendor lock-in measures.

Invest in AI Risk Controls

  • Deploy anti-phishing tools using AI detection.
  • Implement security review of generative AI usage in phishing simulations.

📌 Summary

Geopolitical escalation meets regulatory acceleration:
While adversaries deploy AI-augmented threats, governments worldwide are ramping up mandates on zero trust, incident reporting, and resilience. Executive decision-makers must act now—prioritize defense investments, compliance roadmapping, and resilience testing.

Š 2025 Ntirety Inc.

Compliance Report Updates

Compliance

Ntirery's new PCI DSS Attestation of Compliance (AOC) is now available to Ntirety Trust Center Subscribers.

ISMS SOA
PCI DSS AOC
SOC 1 Report
View more
Amazon Web Services (AWS)-company-logoAmazon Web Services (AWS)
Telarus-company-logoTelarus
AppDirect-company-logoAppDirect
AVANT-company-logoAVANT
Bridgepointe Technologies-company-logoBridgepointe Technologies
Intelisys-company-logoIntelisys
Microsoft Azure-company-logoMicrosoft Azure
Sandler Partners-company-logoSandler Partners
If you need help using this Trust Center, please contact us.
Contact support
Built onSafeBase by Drata Logo