Idis Surveillance Management Software Vulnerable to Hacking

• Web-based client of Idis surveillance management software can be exploited through a one-click attack leading to code execution. • This vulnerability allows hackers to escalate privileges and execute arbitrary code on the host.
Source

Social Engineering Hackers Target Okta Single Sign On

- ShinyHunters campaign uses voice phishing to bypass multifactor authentication and steal corporate data. - At least 150 organizations, including some in the financial sector, are targeted by this active and ongoing campaign.
Source

CTO Talks: Modern PAM and Audit-Ready Access in 2026

The article discusses the importance of modern Privileged Access Management (PAM) and audit-ready access controls for credit unions in 2026. It emphasizes the need for robust security measures to protect sensitive information.
Source

Memcyco Gets $37M to Fight AI-Powered Impersonation Attacks

Memcyco raised $37 million for its AI-powered scam detection platform; plans to expand sales and develop new features.
Source

Telnet Flaw: 800,000 Servers at Risk Amid Active Attacks

A legacy client-server application protocol vulnerability allows unauthenticated users to gain root access; more than 800,000 servers could be targeted. Credit unions should assess their systems for open telnet ports.
Source

Rethinking Cybersecurity in a Platform World

- The article discusses how the reliance on point solutions for security is breaking down due to consolidation. - CISOs and CIOs need to rethink their security architecture to address new challenges.
Source

Identity Fraud: The New Crimewave Targeting Remote Work

• High-assurance identity proofing combining biometrics, liveness detection, and verified IDs is crucial to prevent impersonation in remote work environments. • The article highlights the growing threat of stolen and synthetic identities driven by deepfakes.
Source

Audio Accessory Flaw Converts Headphones Into Spy Tool

• A security flaw in 'WhisperPair' technology could allow hackers to covertly record conversations and track users. • This vulnerability may persist for years, posing a significant risk to credit union members.
Source

Voice Phishing Okta Customers: ShinyHunters Claims Credit

• Okta warns of a surge in voice-phishing attacks targeting single sign-on access. • These attacks bypass some types of multifactor authentication and allow attackers to manipulate what the target sees in their browser.
Source

Ransomware Hackers Leak Under Armour Customer Data

A Russia-linked ransomware group stole and leaked data from 72.7 million Under Armour customers after a failed extortion attempt; the incident highlights cybersecurity risks for large organizations.
Source

Breach Roundup: DOGE Uploaded Social Security Data to Cloud

DOGE uploaded sensitive data including Social Security numbers to an outside server; a phishing attack affected 750,000 Canadians.
Source

Cryptohack Roundup: South Korea Busts $102M Laundering Ring

- South Korea dismantled a $102 million money laundering ring. - Saga paused SagaEVM after a $7 million exploit, and Makina Finance lost $5 million.
Source

Zero-Day Flaw in Cisco Unified Communications Being Targeted

- A zero-day vulnerability in Cisco's Unified Communications and Webex products allows remote code execution and root-level access. - Cisco has released emergency patches, but no workarounds exist.
Source

Securing Banking Enterprises as Non-Human Identities Grow

Machine identities continue to grow as automation and AI initiatives expand. Lack of governance and visibility create new security vulnerabilities.
Source

EHR Vendor Veradigm to Pay $10.5M to Settle Hack Lawsuit

Veradigm agreed to pay $10.5 million to settle a hack lawsuit involving a breach affecting more than a dozen healthcare clients and 2.5 million patients; the incident was discovered in mid-2025 after it occurred in December 2024.
Source

Coder Builds Malware in Week With AI Help

Check Point identifies VoidLink as the first 'advanced' AI-generated malware framework; a single developer created it in less than a week. This challenges assumptions about development timelines for complex malware.
Source