Cybersecurity Infrastructure Gaps, UK Cyber Surge, Qantas Data Breach
Quick Answer
_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Cybersecurity Infrastructure Gaps, UK Cyber Surge, Qantas Data Breach
Related: Free DMARC Checker ·How to Create an SPF Record ·SPF Record Format
From a product strategy perspective, DMARC reporting is evolving from a security tool to a business intelligence platform, says Brad Slavin, General Manager of DuoCircle. The data in aggregate reports tells you not just who’s spoofing you, but who’s sending legitimate email on your behalf - and whether they’re doing it correctly.
_According to the FBI’s 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report
Cybersecurity Infrastructure Gaps, UK Cyber Surge, Qantas Data Breach
<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
Play Episode
</button>
<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
Pause Episode
</button>
<audio preload="none" class="clip clip-32782">
<source src="https://media.mailhop.org/dmarcreport/images/2025/10/Cybersecurity-Infrastructure-Gaps-UK-Cyber-Surge-Qantas-Data-Breach.mp3">
</audio>
<button class="player-btn player-btn__volume" title="Mute/Unmute">
Mute/Unmute Episode
</button>
<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
Rewind 10 Seconds
</button>
<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
Fast Forward 30 seconds
</button>
<time class="ssp-timer">00:00</time>
/
<!-- We need actual duration here from the server -->
<time class="ssp-duration" datetime="PT0H2M22S">2:22</time>
<nav class="player-panels-nav">
<button class="subscribe-btn" id="subscribe-btn-32782" title="Subscribe">Subscribe</button>
<button class="share-btn" id="share-btn-32782" title="Share">Share</button>
</nav>
RSS Feed
<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-32782" title="RSS Feed URL" readonly />
<button class="copy-rss copy-rss-32782" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
Share
<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/cybersecurity-infrastructure-gaps-uk-cyber-surge-qantas-data-breach/&t=Cybersecurity Infrastructure Gaps, UK Cyber Surge, Qantas Data Breach" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
</a>
<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/cybersecurity-infrastructure-gaps-uk-cyber-surge-qantas-data-breach/&url=Cybersecurity Infrastructure Gaps, UK Cyber Surge, Qantas Data Breach" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
</a>
<a href="https://media.mailhop.org/dmarcreport/images/2025/10/Cybersecurity-Infrastructure-Gaps-UK-Cyber-Surge-Qantas-Data-Breach.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
</a>
Link
<input value="https://dmarcreport.com/blog/podcast/cybersecurity-infrastructure-gaps-uk-cyber-surge-qantas-data-breach/" class="input-link input-link-32782" title="Episode URL" readonly />
<button class="copy-link copy-link-32782" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
Embed
/*! This file is auto-generated */ ’ title=“Embed Code” class=“input-embed input-embed-32782” readonly/>
<button class="copy-embed copy-embed-32782" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
Hello people!
It feels like time is almost flying as we have entered the third week of October. Before we even realize it, 2025 will be over, and everyone out there will once again start preparing for the new year 2026. But what about cyber preps? 2025 has already been a not-so-good year, given that multiple cybersecurity mishaps have already occurred this year. Are we ready for what awaits us in 2026?
Only one thing can protect us from state-of-the-art cyberattacks in 2026, and that is cyber education. That’s why we always keep you updated with the major cyber incidents from around the world.
We are back again with week 3 cyber bulletin ,and this time our focus will be on the under-equipped critical infrastructures that easily fall prey to cyberattacks._ Next, we will talk about a massive 50% boost in cyber incidents in the UK. Lastly, we will discuss the recent Qantas data leak mishap - thanks to Salesforce! Let’s get started with the details!
Critical infrastructures are under-equipped when it comes to cybersecurity!
The infrastructure of any nation plays a critical role in its development. As more and more infrastructural setups across the **globe are getting digitized to cater to the demand of modern times, they are gradually becoming a favorite among threat actors. One, because targeting a critical infrastructure system can create massive damage to that nation, thereby creating panic and unrest among the people. Two, such cyberattacks often bring in a lot of money.
But why is it so easy to attack the infrastructure system across the globe? The reason is simple- a lack of fail-proof cybersecurity systems.
From water treatment facilities to electric grids, from transportation systems to pipelines, every infrastructural system is getting targeted by threat actors left, right, and center. The lack of adequate cybersecurity mechanisms is the major reason behind the vulnerability of the crucial infrastructures.
It is a very common practice to invest in cybersecurity when it comes to IT networks. But industrial controls and operations often get ignored, and that’s why it gets very easy for threat actors to target critical infrastructure systems of any country. From random cybercriminals to state-sponsored hackers, every threat actor closely monitors the operation **technology ecosystem in different nations to detect any kind of loopholes or weak points.
**A whopping 50% upsurge in cyber incidents in the UK The NCSC, or National Cyber Security Center, has stated that “highly significant” cyberattacks in the UK have witnessed a staggering 50% spike. From ministers to national security officials and cybersecurity experts, everyone is urging individuals and business enterprises to buckle up and prepare a fail-proof contingency plan in case they get targeted by cybercrooks.
The NCSC believes that excessive reliance on digitization and sophisticated ransomware attackers are responsible for this mind-numbing spike in cyber incidents in just one year. Experts recommend considering cyber-resilience as one of the serious topics to be included in boardroom meetings. Similarly, cyber risk management should be an integral part of the governance, believes Anne Keast Butler, the GCHQ director.
Experts and authorities feel that terrorist attacks can have severe implications on the UK’s economy as well as the livelihood of common people. The current situation demands close cooperation among the government, concerned authorities, a team of experts, business organizations, and commoners. NCSC also expects AI-initiated, sophisticated cyberattacks to pose serious threats in the near future. So, being proactive and taking adequate **precautionary measures are the only ways to combat the rise in threat incidents.
Millions of Qantas customers vulnerable to threat attack as their personal data has been leaked!
Qantas, an Australian-based airline company, experienced a data breach back in July when cybercriminals targeted one of its customer support centers. The breach occurred as cybercrooks managed to break into the networks of the third-party service provider– Salesforce.
The hackers managed to gain unauthorized access to highly sensitive data such as email addresses, dates of birth, names of customers, contact numbers, and so on. On Sunday, Qantas confirmed that the breach had compromised the data of over 5.7 million customers and that it had already been leaked on the dark web.
Alongside Qantas, the Salesforce breach has affected major companies like Google, Disney, Toyota, IKEA, McDonald’s, KLM Airlines, and Air France. The only **silver lining among the dark clouds is that no financial information, passport details, or credit card data have been compromised so far.
To combat phishing and email spoofing, organizations are implementing DMARC, DKIM, and SPF protocols.
Experts believe that the group Scattered Lapsus$ Hunters is behind the nerve-wracking cyberattack on Salesforce. Allegedly, the final deadline for ransom payment was 10th October. Now that the due date has passed, targeted companies fear that their sensitive data may be leaked online.
The hackers managed to break into Salesforce systems by using the commonly used identity impersonation technique.
Operations Lead
Operations Lead at DuoCircle. Runs project management, developer coordination, and technical support execution for DMARC Report.
LinkedIn Profile →Take control of your DMARC reports
Turn raw XML into actionable dashboards. Start free - no credit card required.