
Sign up to save your podcasts
Or


Episode Summary
A critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.
What You'll Learn
Critical Statistics Mentioned
Key Sources & References
Episode Sponsor
Equate Group - Comprehensive cybersecurity and IT services specialising in patch management, security awareness training, and incident response planning.
Visit www.equategroup.com
Your Next Steps
Source Verification Standards
All sources cited in this episode have been fact-checked and verified through multiple authoritative channels. ESET Research serves as the primary source for vulnerability discovery and exploitation details. Financial figures and exploit pricing are cross-referenced through cybersecurity intelligence firms. UK-specific data prioritises government sources and established UK technology security publications.
Disclaimer
This episode provides general guidance only. Always consult qualified cybersecurity professionals before making critical infrastructure changes. Content is based on independent research and industry best practices.
🎧 Subscribe for daily cybersecurity updates
👍 Like this episode if it helped you prepare
Production: Small Business Cyber Security Guy Production
Host: Lucy Harper
All rights reserved
By The Small Business Cyber Security Guy ProductionsEpisode Summary
A critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.
What You'll Learn
Critical Statistics Mentioned
Key Sources & References
Episode Sponsor
Equate Group - Comprehensive cybersecurity and IT services specialising in patch management, security awareness training, and incident response planning.
Visit www.equategroup.com
Your Next Steps
Source Verification Standards
All sources cited in this episode have been fact-checked and verified through multiple authoritative channels. ESET Research serves as the primary source for vulnerability discovery and exploitation details. Financial figures and exploit pricing are cross-referenced through cybersecurity intelligence firms. UK-specific data prioritises government sources and established UK technology security publications.
Disclaimer
This episode provides general guidance only. Always consult qualified cybersecurity professionals before making critical infrastructure changes. Content is based on independent research and industry best practices.
🎧 Subscribe for daily cybersecurity updates
👍 Like this episode if it helped you prepare
Production: Small Business Cyber Security Guy Production
Host: Lucy Harper
All rights reserved