CISA’s ICT Supply Chain Risk Management Task Force Launches Work Streams

The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the ICT Supply Chain Risk Management Task Force convened to launch work streams. These efforts are aimed at managing supply chain risks in information and communications technology.
Source

Statement from CISA Director Krebs on Election Security

CISA Director Krebs released a statement on the agency’s election security work; no explicit mentions of Texas or Texas-specific entities.
Source

DHS Announces ICT Supply Chain Risk Management Task Force Members

The DHS convened the first meeting of the ICT Supply Chain Risk Management Task Force; this task force aims to develop recommendations for managing risks in the global ICT supply chain. The initiative is a public-private partnership.
Source

DHS and Private Sector Partners Establish Information and Communications Technology Supply Chain Risk Management Task Force

The U.S. Department of Homeland Security has established the ICT Supply Chain Risk Management Task Force; this public-private partnership aims to identify and manage risks in the global ICT supply chain.
Source

DHS Holds Classified Briefing for Private Sector Election Companies

• DHS provided a classified briefing on the current cyber threat landscape for election infrastructure companies. • The meeting was held with members of the Sector Coordinating Council (SCC) for the Election Infrastructure Subsector.
Source

Safeguarding and Securing Cyberspace

The article emphasizes the importance of cybersecurity measures for credit unions. It highlights the need for regular risk assessments and employee training on cyber threats.
Source

Marquis Sues SonicWall Over 2025 Firewall Data Breach

Marquis Software Solutions sued SonicWall over a 2025 data breach claiming the cloud backup flaw exposed firewall configuration files, enabling an August 2025 ransomware attack and triggering class action lawsuits. The incident involved sensitive credentials and multifactor authentication scratch codes.
Source

Conduent Says Hack Now Affects at Least 25 Million Patients

Conduent reported a breach affecting 25 million people; state officials in Wisconsin are investigating. The incident involves back-office support services.
Source

Phishing Platform Targeting Trucking and Logistics Disrupted

Russian and Armenian operators were identified behind the 'Diesel Vortex' group, which developed a phishing-as-a-service targeting logistics platforms. The operation facilitated multiple types of fraud and demonstrated deep industry knowledge.
Source

Privilege in a Hybrid World: Securing Every Identity

The article emphasizes the importance of securing identities in a hybrid work environment. It highlights the need for robust identity management systems and continuous monitoring to prevent unauthorized access.
Source

Moving From Anomalies to Connections in Fraud Defense

- Network intelligence focuses on relationships across banks rather than individual bank detection. - This approach aims to move from detecting anomalies alone to understanding the connections in fraud networks.
Source

From Click to Compromise: Hardening Browser Risk

The article highlights the importance of hardening browser security to prevent cyber threats. It emphasizes the need for regular updates and strong password policies.
Source

PayPal Ties Small Data Breach and Fraud to App Coding Error

PayPal discovered a six-month data breach affecting about 100 business customers of its loan app, exposing personal information and leading to fraudulent charges. PayPal fully refunded the affected customers.
Source

Anthropic's AI Bug Hunter Jolts Cyber Stocks

Anthropic's AI tool Claude Code Security found 500+ undetected bugs in production code; cybersecurity stocks dropped sharply but analysts disagree on the long-term impact.
Source

Hospitals at Risk of BeyondTrust Ransomware Hacks

Critical flaw in BeyondTrust software could provide attackers access to hospital networks; Federal authorities and industry officials urge prompt action. Credit unions should ensure their systems are not vulnerable.
Source

Android Malware Taps Google Gemini at Runtime

• PromptSpy uses Google's Gemini AI model for automating persistence on infected devices. • This marks the second known case of AI-driven mobile malware.
Source

Cashing Out: ATM Jackpotting Attacks Surging Across US

- ATM jackpotting attacks have stolen $20 million last year in the U.S., with a surge in such incidents. - The FBI warns operators to implement physical and hardware-level defenses against these attacks.
Source

Red Flags for OT Abound in Dragos Review of 2025

• Ransomware attacks on operational technology systems are mischaracterized as IT incidents despite impacting operations. • The Dragos review highlights the silent epidemic of ransomware targeting OT, emphasizing the need for better visibility and recognition of these threats.
Source

Cogent Security Gets $42M to Boost AI Vulnerability Defense

Cogent Security raised $42 million for an AI-powered platform aimed at automating cyber defense; plans include tripling staff and enhancing model accuracy.
Source

Certificate Automation: From Nice-to-Have to Mission-Critical

The article emphasizes the importance of certificate automation in credit union operations, highlighting its transition from a nice-to-have feature to a critical component for compliance and risk management. It stresses the need for robust automation tools to meet regulatory requirements efficiently.
Source

Cryptohack Roundup: Paxful's $4M Penalty

Paxful receives a $4M AML penalty; Coinbase introduces agentic AI wallets; $1M fraud indictment and other international incidents reported.
Source

Webinar | AI for Faster, Defensible Incident Response

The webinar discusses the use of AI for faster and more defensible incident response. Participants learn how AI can enhance security measures and improve compliance with regulatory requirements.
Source

Webinar | Explainable AI for SEC-Ready Security

The webinar discusses the use of Explainable AI for enhancing security measures and ensuring compliance with SEC requirements. Participants will learn how to integrate these technologies effectively.
Source