19 July 2024
Critical — Global
CrowdStrike / Microsoft Falcon Outage — Global
A faulty content update to CrowdStrike's Falcon sensor caused mass Windows blue-screen events worldwide — an estimated 8.5 million machines. Airlines grounded fleets, hospitals diverted patients, banks lost payment processing, broadcasters went dark and government services failed across the UK, Europe, the Gulf and beyond. Authentication and endpoint security tooling were among the first casualties — a stark reminder that the security software meant to protect you is itself a critical operational dependency, and that a single third party can become a global single point of failure.
Airlines
Banking & Payments
Healthcare
Authentication
Government
BCM Lesson: Third-party security software is a critical dependency. Single-vendor endpoint protection without staged rollout and rollback controls is a systemic vulnerability — not a security asset. This single incident is why third-party concentration risk now sits at the centre of DORA, the UK CTP regime and Gulf outsourcing rules.
20 October 2025
Critical — Global
AWS US-EAST-1 Outage — Banks, Crypto & Government Down
A failure in AWS's US-EAST-1 region cascaded worldwide. In the UK, Lloyds, Halifax and Bank of Scotland locked customers out of online banking, Barclays and HMRC reported disruption, and Coinbase suspended crypto trading while Robinhood users couldn't trade during market hours. Forrester noted it was the fourth major US-EAST-1 outage in five years — and that firms following AWS's own multi-availability-zone best practice still went down, because foundational control-plane services failed beneath them. Being "well architected" on a single provider was no protection.
UK Banks
Crypto Exchanges
HMRC
Payments
Concentration Risk
BCM Lesson: Multi-AZ within one provider is not resilience — when the control plane fails, every zone fails together. Important business services need tested failover across providers or regions, and firms must be able to demonstrate the DR workload genuinely runs independently. Under DORA and the UK regime, a cloud provider's outage is now the firm's regulatory responsibility, not an excuse.
2025
Major — Financial Services
Banking & Payment App Outages
Across the UK, Europe and the Gulf, major banks and payment providers suffered digital banking outages — in several cases with mobile apps unavailable for many hours while branches, ATMs and card rails stayed up. The pattern was consistent: cloud-hosted app layers failed while other channels survived, and opportunistic fraudsters exploited the confusion by impersonating official channels during the disruption. Regulators increasingly treat repeated outages as a conduct and operational-resilience failure, not a technical inconvenience.
Mobile Banking
Contact Centres
Cloud Platforms
Customer Trust
BCM Lesson: Cloud-hosted services require dedicated resilience architecture — not just cloud availability SLAs. Channel diversification (branch, ATM, web, app) is a regulatory expectation for financial services, and fraud monitoring must stay available precisely when an outage creates the conditions criminals exploit.
Gaming Sector
Critical — iGaming & Casino
Gaming Under Sustained Attack
Gaming and betting operators are now systematically targeted. The MGM and Caesars attacks took slot machines, digital room keys and payment systems offline — MGM reported roughly $100m in losses and around $8.4m a day in lost revenue during a ten-day disruption, both entered through social engineering of an IT vendor. In October 2025, Malta-based iGaming CRM provider Fast Track was breached, compromising casino clients through a single supplier, and BetMGM and Ladbrokes were among the operators knocked offline by the CrowdStrike update. Continent 8 reports a 400% rise in cyber incidents against gaming operators since early 2025 — a shift from opportunistic to systematic targeting.
Player-Facing Platforms
Payment Systems
Peak-Event Revenue
Third-Party CRM
Player Data
BCM Lesson: For iGaming operators, downtime during a peak event is direct, irreversible revenue loss — and players don't wait, they move to a competitor. AML, fraud and transaction-monitoring controls must stay available during an incident, and the EU's NIS2 now places personal, board-level accountability for cyber resilience on senior executives.
17 January 2025
Regulatory — EU & Malta
DORA Becomes Directly Applicable Across the EU
The Digital Operational Resilience Act became directly applicable across all EU member states, including Malta. For the first time, ICT risk management, resilience testing, ICT incident reporting and third-party provider oversight became legally mandated and harmonised for financial entities — banks, payment and e-money firms, investment firms, crypto-asset service providers and more. DORA also created direct EU oversight of critical ICT third-party providers. Firms now have to demonstrate digital operational resilience through evidence: a register of information on ICT arrangements, threat-led penetration testing for significant entities, and documented exit strategies for critical providers.
EU Financial Entities
Malta MFSA
CASPs
ICT Third Parties
TLPT
BCM Lesson: DORA raised the bar from "have a continuity plan" to "prove operational resilience with evidence." Firms operating in or into the EU and Malta need a register of ICT third-party arrangements, tested resilience, documented exit strategies for critical providers, and incident-reporting playbooks that meet harmonised EU timelines.
2025
Critical — UK Ransomware Wave
M&S, Co-op & Jaguar Land Rover
A wave of ransomware and social-engineering attacks — linked to the Scattered Spider / Lapsus$ / ShinyHunters collective — struck major UK organisations in 2025. Jaguar Land Rover halted UK production for around five weeks; the Cyber Monitoring Centre estimated the incident cost the UK economy roughly £1.9bn, the most financially damaging cyber event ever to hit the country, and the Bank of England linked it to slower GDP growth. M&S lost about £300m and six weeks of online sales; Co-op reported £206m in costs and empty shelves. In several cases the entry point was a third-party IT supplier, not the firm itself. The Bank of England's governor has named cyber-attacks among the biggest threats to UK financial stability.
Production Halted
Online Sales Down
Supply Chain
£1.9bn Economic Cost
Third-Party Entry
BCM Lesson: The FCA now names these incidents as severe-but-plausible scenarios firms must test against. Assume breach, and assume your suppliers can be breached too — in several of these attacks the victim's own defences were never the entry point. Offline, regularly exercised backups and a rehearsed recovery plan are the difference between days of disruption and weeks.
18 November 2025
Major — Global
Cloudflare Global Outage
A change to a database query inside Cloudflare's bot-management system produced a malformed configuration file that its network couldn't process — and a large slice of the internet went down with it. Estimates suggested roughly one in five webpages and a third of the world's 10,000 most popular sites were affected, including X, ChatGPT, Spotify, Coinbase and several crypto exchanges. It wasn't a cyberattack; it was an internal change. A second Cloudflare outage in February 2026 withdrew customer network routes for six hours. Concentration in the handful of providers the internet runs on means a single vendor's mistake becomes everyone's outage.
Global Web Traffic
Crypto Exchanges
SaaS Platforms
Connectivity
BCM Lesson: Your resilience depends on vendors most firms never map — DNS, CDN, bot management, edge providers. Single-provider dependency at the network edge is a single point of failure. Diverse routing, alternative providers and an understanding of where your traffic physically depends must be part of resilience architecture.
2024–2026 Ongoing
Ongoing — Escalating
DDoS Surge — A Standing Threat to Online Services
Distributed denial-of-service attacks against financial services, payment infrastructure and iGaming platforms have grown sharply in volume and duration across all major markets. Hacktivist and criminal groups use DDoS as a low-cost, high-visibility weapon, and player-facing or transaction-facing platforms are prime targets — an outage during a major sporting event or market-moving moment carries outsized financial and reputational cost. Average attack durations are now long enough to breach impact tolerances and trigger regulatory incident-reporting obligations under DORA, the FCA regime and Gulf frameworks alike.
Financial Services
iGaming Platforms
Payment Rails
Player-Facing Services
BCM Lesson: DDoS mitigation must be built into resilience architecture, not bolted on after an incident. Pre-contracted scrubbing, tested traffic rerouting, CDN resilience and customer-communication playbooks are standard requirements — and attack durations are now routinely long enough to require regulatory notification.