Massiv Attack: Android Trojan Targets IPTV Users

• Android Trojan 'Massiv' masquerades as an IPTV app and can capture screens, overlay content, and steal credentials. • The malware may soon be offered for sale on criminal forums as a service.
Source

Scaling Third-Party Risk Management with Confidence

The article emphasizes the importance of comprehensive third-party risk management and provides strategies for scaling such programs. It highlights the need for regular assessments, clear communication, and robust contract terms.
Source

Norton Healthcare to Pay $11M to Settle BlackCat Lawsuit

Norton Healthcare agreed to pay $11 million to settle a class action lawsuit related to a 2023 data theft attack by the Alphv/BlackCat ransomware gang. The attack affected nearly 2.5 million people.
Source

Hackers Increasingly Prefer Fast and Low-Complexity Attacks

Threat actors prefer low-complexity attacks over sophisticated ones; Credit union compliance officers should prioritize rapid response and well-trod techniques.
Source

Is Your GRC Program Really Reducing Risk?

- GRC theater creates false confidence and should be replaced with continuous GRC engineering. - Adversaries operate continuously, so GRC processes must also operate continuously.
Source

Kettering Health Notifying Patients of Interlock Breach

Kettering Health notified patients and affiliates of a potential data breach in May 2025; cybercriminal group Interlock claimed responsibility. The incident involved personal, health, and financial information.
Source

Feds Launch Portal to Report Substance Use Disorder Breaches

• New HHS breach reporting website and guidance materials launched for substance use disorder record confidentiality. • Aligns with HIPAA privacy rule enforcement mandates effective as of Monday.
Source

'Crazy' Hackers Strike Through Remote Monitoring Software

• RMM tools can be exploited by hackers using ransomware variants like VoidCrypt. • Cybersecurity firm Huntress highlights the risks associated with RMM tools, which are simultaneously open to remote connections and have privileged local access.
Source

Texas AG Investigating Conduent, BCBS Texas in Hack

- The Texas attorney general has launched an investigation into Conduent Business Services and BCBS Texas following a significant data breach affecting 15.5 million Texans. - This incident could potentially break U.S. data breach records.
Source

State Hackers Turn Google AI Into Attack Acceleration Tool

State-backed hackers weaponized Google's Gemini AI for cyberattacks; Google has disabled accounts and strengthened defenses. Cybersecurity measures should be reviewed and updated.
Source

2026 Predictions: AI Is Breaking Identity, Data Security

• Agentic AI is transforming security models faster than traditional defenses can keep up. • Organizations will shift from deterministic risk models to adaptive, autonomous systems by 2026.
Source

Bretton AI Gets $75M to Use AI for Financial Crime Compliance

Bretton AI has raised $75 million for scaling AI solutions in anti-money laundering and KYC compliance; the technology aims to reduce manual investigations and improve auditability.
Source

Bretton Raises $75M to Use AI for Financial Crime Compliance

Bretton AI has raised $75 million for automating AML compliance; targets large banks with reduced manual investigations and improved auditability.
Source

Cryptohack Roundup: 20 Years for $73 Million Scam

- SafeMoon CEO sentenced to eight years for fraud; - Sam Bankman-Fried seeks a new trial.
Source

Sophos Targets Compliance and Risk With Arco Cyber Purchase

Sophos acquired Arco to enhance cybersecurity assurance and compliance with a new CISO Advantage capability. The rollout will start in the U.K., integrating risk and regulatory mapping with threat intelligence operations.
Source

A New Data Theft Gang for the Health Sector to Lose Sleep Over

A new cybercriminal gang called Insomnia has targeted healthcare-related entities; 18 victims have been reported with more than half linked to the health sector.
Source

Should CISOs Plan for Government as an Adversary?

Governments should now be considered adversaries in threat modeling; CISOs need to reassess dependencies and trust boundaries due to state control over infrastructure.
Source

AI-Generated Malware Exploits React2Shell for Tiny Profit

AI-generated malware exploited React2Shell vulnerability; 91 hosts were targeted and funds mined in Monero. Attackers with no coding expertise could build functional exploits.
Source

Microsoft Beefs Up Runtime Security

Microsoft introduces two desktop security initiatives: enhanced runtime security for app access to sensitive resources and blocking legacy authentication protocols to promote multifactor authentication. These updates aim to improve overall system security.
Source

Billing Services Firm Notifying Medical Lab Patients of Hack

Ransomware gang Everest Group claims it has leaked data from medical diagnostic labs; patients of these labs may have sensitive information compromised.
Source