UPDATED: FDIC Board of Directors Meeting

The FDIC Board of Directors met on October 17, 2024. Materials and a recording of the meeting are available for review. No explicit Texas-specific information was provided.
Source

FDIC Board of Directors Meeting

The FDIC Board of Directors met on October 17, 2024. Materials and a recording of the meeting are available for review.
Source

CISA Statement on Iranian Cybersecurity Threats

CISA reports an increase in malicious cyber activity by Iranian regime actors and proxies targeting U.S. industries and government agencies; CISA will continue monitoring and sharing information.
Source

CISA’s ICT Supply Chain Risk Management Task Force Makes Key Acquisition Recommendation

The ICT Supply Chain Risk Management Task Force updated members on progress towards developing an initial recommendation for identifying and managing risks in global ICT supply chains. The task force includes CISA and government/industry members.
Source

CISA Partners with Secure Community Network to Hold Incident Response Exercise

- CISA and Secure Community Network conducted a tabletop exercise involving Jewish community leaders and law enforcement for incident response planning. - The exercise focused on scenarios of violence threats, based on current events.
Source

CISA’s ICT Supply Chain Risk Management Task Force Launches Work Streams

The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the ICT Supply Chain Risk Management Task Force convened to launch work streams. These efforts are aimed at managing supply chain risks in information and communications technology.
Source

DHS Announces ICT Supply Chain Risk Management Task Force Members

The DHS convened the first meeting of the ICT Supply Chain Risk Management Task Force; this task force aims to develop recommendations for managing risks in the global ICT supply chain. The initiative is a public-private partnership.
Source

DHS and Private Sector Partners Establish Information and Communications Technology Supply Chain Risk Management Task Force

The U.S. Department of Homeland Security has established the ICT Supply Chain Risk Management Task Force; this public-private partnership aims to identify and manage risks in the global ICT supply chain.
Source

DHS Holds Classified Briefing for Private Sector Election Companies

• DHS provided a classified briefing on the current cyber threat landscape for election infrastructure companies. • The meeting was held with members of the Sector Coordinating Council (SCC) for the Election Infrastructure Subsector.
Source

Marquis Sues SonicWall Over 2025 Firewall Data Breach

Marquis Software Solutions sued SonicWall over a 2025 data breach claiming the cloud backup flaw exposed firewall configuration files, enabling an August 2025 ransomware attack and triggering class action lawsuits. The incident involved sensitive credentials and multifactor authentication scratch codes.
Source

Conduent Says Hack Now Affects at Least 25 Million Patients

Conduent reported a breach affecting 25 million people; state officials in Wisconsin are investigating. The incident involves back-office support services.
Source

Phishing Platform Targeting Trucking and Logistics Disrupted

Russian and Armenian operators were identified behind the 'Diesel Vortex' group, which developed a phishing-as-a-service targeting logistics platforms. The operation facilitated multiple types of fraud and demonstrated deep industry knowledge.
Source

From Click to Compromise: Hardening Browser Risk

The article highlights the importance of hardening browser security to prevent cyber threats. It emphasizes the need for regular updates and strong password policies.
Source

PayPal Ties Small Data Breach and Fraud to App Coding Error

PayPal discovered a six-month data breach affecting about 100 business customers of its loan app, exposing personal information and leading to fraudulent charges. PayPal fully refunded the affected customers.
Source

Anthropic's AI Bug Hunter Jolts Cyber Stocks

Anthropic's AI tool Claude Code Security found 500+ undetected bugs in production code; cybersecurity stocks dropped sharply but analysts disagree on the long-term impact.
Source

Hospitals at Risk of BeyondTrust Ransomware Hacks

Critical flaw in BeyondTrust software could provide attackers access to hospital networks; Federal authorities and industry officials urge prompt action. Credit unions should ensure their systems are not vulnerable.
Source

Android Malware Taps Google Gemini at Runtime

• PromptSpy uses Google's Gemini AI model for automating persistence on infected devices. • This marks the second known case of AI-driven mobile malware.
Source

Cashing Out: ATM Jackpotting Attacks Surging Across US

- ATM jackpotting attacks have stolen $20 million last year in the U.S., with a surge in such incidents. - The FBI warns operators to implement physical and hardware-level defenses against these attacks.
Source

Red Flags for OT Abound in Dragos Review of 2025

• Ransomware attacks on operational technology systems are mischaracterized as IT incidents despite impacting operations. • The Dragos review highlights the silent epidemic of ransomware targeting OT, emphasizing the need for better visibility and recognition of these threats.
Source

Cogent Security Gets $42M to Boost AI Vulnerability Defense

Cogent Security raised $42 million for an AI-powered platform aimed at automating cyber defense; plans include tripling staff and enhancing model accuracy.
Source

Webinar | AI for Faster, Defensible Incident Response

The webinar discusses the use of AI for faster and more defensible incident response. Participants learn how AI can enhance security measures and improve compliance with regulatory requirements.
Source

Massiv Attack: Android Trojan Targets IPTV Users

• Android Trojan 'Massiv' masquerades as an IPTV app and can capture screens, overlay content, and steal credentials. • The malware may soon be offered for sale on criminal forums as a service.
Source

Hackers Increasingly Prefer Fast and Low-Complexity Attacks

Threat actors prefer low-complexity attacks over sophisticated ones; Credit union compliance officers should prioritize rapid response and well-trod techniques.
Source