Weekly Cybersecurity Digest [March, Week 3]
Posted on March 24, 2026
Dear Valued Clients,
Welcome to this week’s cybersecurity digest from Make Sense, your trusted partner in building measurable resilience across Europe’s rapidly evolving digital and financial ecosystems. March’s third week underscores the growing convergence of cybercrime industrialisation, geopolitical tensions and human-centric vulnerabilities.
From large-scale dark web takedowns to mobile malware and policy shifts on surveillance, the message is clear – cyber resilience now depends on trust, behaviour and coordinated enforcement across borders.
✅ Top Stories of the Week
i. Operation Alice Takes Down 370,000+ Dark Web Sites
A Europol-backed international operation dismantled over 373,000 dark web sites linked to a vast fraudulent network posing as illicit marketplaces. Run largely by a single operator, the scheme lured users into paying cryptocurrency for illegal content and cybercrime services that were never delivered. The crackdown involved multiple countries, with hundreds of suspects identified and investigations ongoing. [Read more via Infosecurity Magazine]
Reflect: How exposed is your organisation to fraud ecosystems operating on dark web platforms, particularly those targeting your brand or customers?
ii. Greece Issues Cyber Alert Amid Iran-Linked Threat Activity
Greek authorities urged companies across the shipping, banking and energy sectors to scan systems for compromise indicators following heightened geopolitical cyber risks. The advisory referenced suspected Iran-linked activity and followed recent attacks in Albania. While no major breach was confirmed domestically, officials flagged suspicious activity and warned of sophisticated intrusion techniques targeting critical infrastructure. [Read more via Reuters]
iii. New Android Malware Hiding in Streaming Apps to Spy on Users’ Personal Notes
Cybersecurity researchers uncovered a new Android malware, dubbed “Perseus”, concealed within fake streaming apps. The malware steals banking credentials, overlays fake login screens and scans note-taking apps to extract sensitive data, including passwords and crypto keys. Primarily targeting users in Turkey and Italy, it spreads via sideloaded apps, highlighting ongoing risks from unofficial app sources. [Read more via The Record]
✅ Industry Trends & Insights
Europe Pushes for Digital Sovereignty in Cybersecurity Infrastructure
European policymakers and industry leaders are intensifying calls for “digital sovereignty”, aiming to reduce reliance on foreign, particularly US, cloud and tech infrastructure. Discussions in Brussels highlighted risks tied to external control over data and platforms, with growing momentum behind open standards, localised cloud ecosystems and stricter regulatory alignment to strengthen long-term cyber resilience. [Read more via IT Pro]
Human Behaviour Emerges as Central Cybersecurity Risk Factor
Industry experts are shifting focus towards human-centric security as cyber threats increasingly exploit user behaviour. Research indicates human error contributes to a majority of breaches, with tactics like MFA fatigue and AI-driven social engineering rising sharply. Organisations are now prioritising phishing-resistant authentication and user-friendly security design to address this persistent vulnerability. [Read more via TechRadar]
Consider: Which behavioural vulnerabilities – fatigue, trust bias or process shortcuts – are most likely to be exploited within your organisation?
Chat Control: EU Parliament Rejects Mass Surveillance of Private Chats
The European Parliament backed limits on controversial “Chat Control” rules, rejecting indiscriminate mass scanning of private messages. Lawmakers supported extending interim measures only under strict conditions – targeted, proportionate and excluding encrypted services. While seen as a win for privacy advocates, negotiations on a permanent framework continue, leaving uncertainty around future surveillance powers in the EU. [Read more via TechRadar]
✅ Regulatory & Policy Updates
FCA Updates Cyber Incident and Third-Party Reporting Rules
The UK’s Financial Conduct Authority introduced updated rules to standardise cyber incident and third-party reporting across financial firms. The framework clarifies when incidents must be reported, strengthens oversight of critical suppliers, and improves consistency in disclosures. Firms have a 12-month transition period, with implementation set for March 2027, reflecting rising risks from third-party service disruptions. [Read more via Infosecurity Magazine]
EU Data Protection Bodies Back Stronger Cybersecurity Rules Under NIS2 Reforms
European data protection authorities have endorsed proposals to strengthen cybersecurity across the EU by updating the Cybersecurity Act and making targeted amendments to the NIS2 Directive. The joint opinion highlights the need to align security measures with data protection principles, ensuring organisations enhance resilience without undermining fundamental rights and freedoms across member states. [Read more via EDPB]
EU Sanctions Private Cyber Offensive Ecosystem Actors
The European Union imposed sanctions on companies and individuals linked to cyberattacks targeting member states and partners. Measures include asset freezes and travel bans, aimed at disrupting the broader cyber offensive ecosystem supporting malicious operations. The move reinforces the EU’s cyber diplomacy strategy, signalling stronger coordinated action against state-linked and commercial cyber threat actors. [Read more via diplomatie.gouv.fr]
Action prompt: How well does your organisation monitor and assess risks associated with sanctioned entities or regions within your digital supply chain?
✅ Cyber IQ Challenge + Proactive Security Hacks
Quick Quiz:
What is the primary risk highlighted by the “Perseus” Android malware?
A) Network infrastructure failure
B) Data exfiltration through mobile applications
C) Cloud misconfiguration
D) Hardware-level vulnerabilities
(Answer below)
Smart Security Moves of the Week
- Monitor dark web exposure: Track brand, credentials, and data mentions across underground marketplaces.
- Enhance mobile security posture: Restrict sideloading and enforce application vetting controls.
- Adopt human-centric security: Implement phishing-resistant MFA and behavioural awareness programmes.
- Strengthen geopolitical awareness: Integrate regional threat intelligence into risk management frameworks.
Answer: B) Data exfiltration through mobile applications
✅ Conclusion
From large-scale dark web disruptions and geopolitical cyber alerts to evolving mobile malware and human-centric vulnerabilities, this week highlights the shifting dynamics of Europe’s cyber threat landscape. The intersection of behavioural risk, regulatory change and coordinated enforcement underscores the need for adaptive and intelligence-led security strategies.
Final reflection: If your organisation were targeted through human error, mobile compromise or supply-chain exposure, how quickly could you detect and respond?
At Make Sense, we transform intelligence into measurable defence – strengthening awareness, enhancing detection capabilities and embedding resilience across every operational layer.
Stay secure,
The Make Sense SRL Team & CyberTania
