Deep Dive high CNIFinance

AI in the Attack Chain: How Threat Actors Are Using Language Models Operationally

AI-assisted exploitation is no longer theoretical. From automated vulnerability research to AI-generated spear-phishing, the adoption of LLMs across the offensive lifecycle is accelerating. This analysis examines what is confirmed, what is emerging, and what it means for defenders.

Adversary Wire · · 18 min read Read more →
All analysis →
CNIFinance high

AI in the Attack Chain: How Threat Actors Are Using Language Models Operationally

AI-assisted exploitation is no longer theoretical. From automated vulnerability research to AI-generated spear-phishing, the adoption of LLMs across the offensive lifecycle is accelerating. This analysis examines what is confirmed, what is emerging, and what it means for defenders.

· 18 min read

OT / ICSCNI critical

Volt Typhoon: The Long Game in Western Critical Infrastructure

A deep analysis of Volt Typhoon's objectives, methods, and targets — and what the sustained Chinese pre-positioning campaign in Western CNI means for how operators, regulators, and governments need to respond.

· 18 min read

CommunicationsGovernment critical

Salt Typhoon: How China Compromised the West's Wiretap Infrastructure

The Salt Typhoon campaign against US and European telecommunications carriers was not a data breach in any conventional sense. It was a strategic intelligence operation targeting the systems governments use to conduct lawful surveillance.

· 16 min read

All commentary →
CNICommunications

The Attack Is Coming From Inside the Country: China's Compromised-Device Networks and Why Your Perimeter Controls Miss Them

A joint advisory from CISA, NCSC, and ten allied nations describes how China-linked threat actors have abandoned dedicated attack infrastructure in favour of networks of compromised home routers and IoT devices. The implication for defenders is worse than it sounds.

· 9 min read

Legal & ProfessionalFinance

The Data That Nation-States Actually Want Is Sitting in Your Document Management System

Law firms and professional services firms are among the most intelligence-rich targets in the UK economy. Understanding why clarifies the threat — and why perimeter security alone is the wrong response.

· 8 min read

Government

The Public Sector Cyber Gap: Why Government's Security Posture Trails the Threat

The structural factors that make the UK public sector a persistently soft target — fragmented IT estates, procurement cycles that optimise for cost over security, and a talent market that can't compete with private sector pay — are not going away. Here's what the gap looks like and what's actually being done about it.

· 9 min read