Face-Swapping Tools Pose Elevated 'Know Your Customer' Risks

• Fraud and risk teams must enhance 'know your customer' checks due to rapidly improving deepfake technology. • Synthetic identities, convincing face-swaps, and defeated biometric checks pose significant risks.
Source

Fraud Tops Ransomware in WEF's 2026 Cybersecurity Outlook

Cyber-enabled fraud has become the top concern for CEOs in 2026, surpassing ransomware. AI is reshaping both cyber risks and defenses.
Source

Anthropic's Cowork Shipped With Known Vulnerability

AI agent can exploit known vulnerability to steal user files; security researchers demonstrated the flaw. Credit union compliance officers should monitor for similar vulnerabilities in third-party tools.
Source

ISP Sinkholes Kimwolf Servers Amid Eruption of Bot Traffic

Lumen has blocked over 550 command and control servers associated with the Kimwolf and Aisuru botnets since October; this highlights ongoing cyber threats that credit unions need to be vigilant about.
Source

ISMG Editors: Why Digital Skimming Is Still Thriving

Digital skimming remains a significant threat; AI's entry into personal health data raises new compliance and security concerns.
Source

Infoblox Buys Axur to Expand Cyberthreat Takedown Power

Infoblox acquires Axur to enhance AI-driven cyberthreat defense; Axur offers 99% takedown rate for phishing and rogue sites.
Source

Ransomware by the Numbers: Count of Victims and Groups Surge

• The number of ransomware victims and criminal groups has increased over the past 12 months. • Despite law enforcement efforts, competition among groups, and fewer victims paying, the trend remains concerning.
Source

DeadLock Ransomware Group Utilizes Polygon Smart Contracts

- DeadLock ransomware group uses blockchain smart contracts for storing proxy server addresses. - This technique indicates the group's experience and sophistication in cybercrime.
Source

Magecart Hits Continue: Stripe Spoofing, Supply Chain Risks

Researchers detail an active Magecart campaign targeting WooCommerce and Stripe payment forms. ConnectPOS exposes its code repository for years, posing a supply-chain risk for customers.
Source

One Simple Trick to Knock Out the Wi-Fi Network

• A flaw in Broadcom chipsets used in wireless routers allows attackers to disrupt the 5 GHz band regardless of security settings. • Credit unions should be aware of this cybersecurity risk.
Source

How GenAI Is Aiding a Rise in Identity-Based Threats

• Combining employee training with behavioral monitoring and AI guardrails is essential for mitigating identity risk in the face of AI-driven phishing threats. • The shift from brute-force attacks to AI-powered phishing poses tougher challenges for credit union defenders.
Source

ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches

• The article highlights the ongoing issue of lack of Multi-Factor Authentication (MFA) contributing to cloud data breaches. • It also touches on how researchers are exploring new methods for data protection in an AI-driven era.
Source

Illinois Notifies 700,000 of Misconfiguration Breach

• Over 700,000 Illinois residents notified of a data breach due to incorrect privacy settings on a mapping platform. • The breach exposed sensitive information related to Medicare, Medicaid, and rehabilitation services recipients.
Source

Breach Roundup: Firewalls Headed for Obsolescence

Moody's predicts firewalls will become obsolete; Sedgwick confirms a data breach; Romanian power firm and D-Link devices were targeted by cyber attacks.
Source

Breach Roundup: Firewalls Headed for Obsolesce

Moody's predicts firewalls will become obsolete; Sedgwick confirms a data breach; Romanian power firm and D-Link devices were targeted by cyberattacks.
Source

Cryptohack Roundup: Alleged Fraud Kingpin Deported to China

An alleged fraud kingpin was deported to China; Unleash Protocol suffered a $3.9M hack; TRM linked crypto thefts to the LastPass breach.
Source

Deception Tech Snares Shiny Hunter Attacker's IP Address

A honeypot set by a targeted threat intelligence firm caught one of the 'Scattered Lapsus$ Shiny Hunters' hackers, revealing his actual IP address. This incident highlights the effectiveness of deception technology in cybersecurity.
Source

Missing MFA Strikes Again: Hacker Hits Collaboration Tools

Dozens of organizations lost terabytes of data and credentials through a malware attack on cloud-based collaboration tools; initial access brokers are involved in selling stolen data.
Source

Conduent Hack Victim Count Soars by at Least 50%

The breach at Conduent affected nearly 14.8 million Texans; the victim count has increased after a new regulatory disclosure by the company.
Source

Covenant Health Notifying 480K Patients of 2025 Data Theft

Covenant Health notified 480K patients of a data theft incident in May 2025; hackers claimed to have stolen 852 GB of health information.
Source

Aflac Notifies 22.7 Million People of June Data Theft Attack

- 22.65 million people potentially affected by Aflac's data theft incident. - The breach could be the largest U.S. health data breach reported in 2025.
Source

RondoDox Botnet Exploiting Devices With React2Shell Flaw

• The RondoDox botnet campaign exploits the React2Shell vulnerability in open-source React framework across various devices. • This security breach could affect IoT devices at scale, posing a significant risk for Texas credit unions.
Source

Aflac Notifies 22.6 Million People of June Data Theft Attack

Aflac notified 22.65 million people of a June data theft incident compromising sensitive health and personal information, including Social Security numbers; the breach could rank as the largest U.S. health data breach in 2025.
Source