Kettering Health Notifying Patients of Interlock Breach

Kettering Health notified patients and affiliates of a potential data breach in May 2025; cybercriminal group Interlock claimed responsibility. The incident involved personal, health, and financial information.
Source

Feds Launch Portal to Report Substance Use Disorder Breaches

• New HHS breach reporting website and guidance materials launched for substance use disorder record confidentiality. • Aligns with HIPAA privacy rule enforcement mandates effective as of Monday.
Source

'Crazy' Hackers Strike Through Remote Monitoring Software

• RMM tools can be exploited by hackers using ransomware variants like VoidCrypt. • Cybersecurity firm Huntress highlights the risks associated with RMM tools, which are simultaneously open to remote connections and have privileged local access.
Source

Texas AG Investigating Conduent, BCBS Texas in Hack

- The Texas attorney general has launched an investigation into Conduent Business Services and BCBS Texas following a significant data breach affecting 15.5 million Texans. - This incident could potentially break U.S. data breach records.
Source

State Hackers Turn Google AI Into Attack Acceleration Tool

State-backed hackers weaponized Google's Gemini AI for cyberattacks; Google has disabled accounts and strengthened defenses. Cybersecurity measures should be reviewed and updated.
Source

2026 Predictions: AI Is Breaking Identity, Data Security

• Agentic AI is transforming security models faster than traditional defenses can keep up. • Organizations will shift from deterministic risk models to adaptive, autonomous systems by 2026.
Source

Bretton AI Gets $75M to Use AI for Financial Crime Compliance

Bretton AI has raised $75 million for scaling AI solutions in anti-money laundering and KYC compliance; the technology aims to reduce manual investigations and improve auditability.
Source

Bretton Raises $75M to Use AI for Financial Crime Compliance

Bretton AI has raised $75 million for automating AML compliance; targets large banks with reduced manual investigations and improved auditability.
Source

Cryptohack Roundup: 20 Years for $73 Million Scam

- SafeMoon CEO sentenced to eight years for fraud; - Sam Bankman-Fried seeks a new trial.
Source

Sophos Targets Compliance and Risk With Arco Cyber Purchase

Sophos acquired Arco to enhance cybersecurity assurance and compliance with a new CISO Advantage capability. The rollout will start in the U.K., integrating risk and regulatory mapping with threat intelligence operations.
Source

A New Data Theft Gang for the Health Sector to Lose Sleep Over

A new cybercriminal gang called Insomnia has targeted healthcare-related entities; 18 victims have been reported with more than half linked to the health sector.
Source

Should CISOs Plan for Government as an Adversary?

Governments should now be considered adversaries in threat modeling; CISOs need to reassess dependencies and trust boundaries due to state control over infrastructure.
Source

AI-Generated Malware Exploits React2Shell for Tiny Profit

AI-generated malware exploited React2Shell vulnerability; 91 hosts were targeted and funds mined in Monero. Attackers with no coding expertise could build functional exploits.
Source

Microsoft Beefs Up Runtime Security

Microsoft introduces two desktop security initiatives: enhanced runtime security for app access to sensitive resources and blocking legacy authentication protocols to promote multifactor authentication. These updates aim to improve overall system security.
Source

Billing Services Firm Notifying Medical Lab Patients of Hack

Ransomware gang Everest Group claims it has leaked data from medical diagnostic labs; patients of these labs may have sensitive information compromised.
Source

Fake Out: 0APT Data-Leak Ransomware Group Branded a Scam

- 0APT ransomware group is considered a likely scam operation due to AI-generated victim lists and a 1 bitcoin joining fee for affiliates. - The malware used by the group is outdated.
Source

Writing Ransomware Using AI to Get Rich? Don’t Bet the Farm

Key points: Ransomware attackers using AI face limitations; known tactics remain prevalent and can be detected. Security expert Candid Wuest warns against relying on AI for cyber operations due to the ease of blocking these methods.
Source

Webinar | From Compliant to Cyber Ready: Closing the Gap

The webinar discusses strategies for moving from compliance to a state of readiness in cybersecurity. Key points include the importance of continuous monitoring and updating security measures, as well as the integration of cybersecurity into overall risk management practices.
Source

Webinar | Beyond Compliance: Building True Cyber Resilience

Key points: The webinar discusses strategies for enhancing cyber resilience beyond basic compliance. It emphasizes the importance of a comprehensive approach including incident response planning, employee training, and continuous monitoring.
Source

Sanctioned Bulletproof Host Tied to DNS Hijacking

A financially motivated threat actor hacked domain name system resolvers and connected them to a Russian bulletproof hosting service. The hosting service was sanctioned by the U.S. Department of Treasury for criminal links.
Source