Admin Rights Are a Vulnerability, Not an Enabler

The article discusses the benefits of an identity-first model over traditional admin rights, emphasizing reduced risk and improved business operations. It also promotes a webinar session by CyberArk on practical endpoint control techniques.
Source

How Banks Can Limit Losses From First-Party Fraud

• Financial institutions should implement risk-based controls to limit initial trust for new customers during online account opening. • Effective strategies include establishing customer behavior before full trust is granted.
Source

Why Good Cyber Defense Rarely Stops Attackers

• Cybercrime outcomes continue to worsen despite stronger controls and broader collaboration among security teams. • AI-based attacks are increasingly challenging cyber defenders, according to Brian Cute of the Global Cyber Alliance.
Source

Cryptohack Roundup: Step Finance, CrossCurve Exploits

US sanctions U.K.-registered exchanges over Iran ties; Step Finance and CrossCurve experience hacks; Coinbase data breach and ad ban in the UK.
Source

TRM Labs Raises $70M Series C for AI Crime-Fighting Push

TRM Labs has raised $70 million in Series C funding for AI-driven investigations and compliance tools; the company aims to combat cybercrime using advanced AI technologies.
Source

Questions Loom Ahead of Substance Abuse Privacy Rules Shift

Key points: Federal rules for the confidentiality of substance use disorder records under HIPAA are changing; critical questions remain unanswered regarding Part 2 programs; compliance deadline is approaching.
Source

Victims Are Rebuffing Ransomware Mass Data Theft Campaigns

Ransomware group Clop's initial 25% of victims paying ransoms dropped to zero by 2023; steal-and-leak campaigns are becoming less effective.
Source

Transparency in Decline as Data Breaches Hit New High

• 2025 saw a record 3,322 U.S. data breaches with only 30% of breach notices providing actionable details. • James Lee from ITRC warns that the lack of transparency in these notices increases risk for individuals and businesses.
Source

Capital Health to Pay $4.5M in LockBit Breach Settlement

- Capital Health agreed to pay $4.5 million in settlement for a 2023 ransomware attack affecting over 500,000 patients and employees. - The breach involved data theft by the LockBit group.
Source

Hanging Up on ShinyHunters: Experts Detail Vishing Defenses

Experts recommend deploying phishing-resistant multifactor authentication, monitoring for attacks, and using live video verification. These measures aim to safeguard against sophisticated voice phishing campaigns designed to trick employees and steal sensitive corporate data.
Source

Holiday Hits: Hackers Love to Strike When Defenders Are Away

• Attack intensity surged over the recent holiday period as hackers used automated bots. • Cybersecurity defenders are advised to remain vigilant despite reduced activity levels during holidays.
Source

AI, Deepfakes Are Top Risks for Financial Crime Specialists

The article highlights the increasing risk of financial crimes due to AI and deepfakes. It suggests that investigators need better data, architecture, and AI-based detection systems to combat these threats.
Source

Ambulance Billing Firm Pays $515K Fine to 2 States in Hack

- Comstar paid $515,000 to Massachusetts and Connecticut regulators for a 2022 hacking incident affecting nearly 350,000 residents. - The firm also paid $75,000 last year to settle HIPAA allegations related to the same breach.
Source

Cryptohack Roundup: Probe Into Missing Seized Bitcoin

South Korean prosecutors probed missing seized bitcoin; U.S. SEC dropped litigation against Gemini Earn; major hacks and a $37 million laundering prison sentence.
Source

Data Breaches in America Hit All-Time Record High in 2025

• 3,322 data breaches occurred in the U.S. in 2025, setting an all-time record high. • The number of notifications sent to affected consumers decreased sharply.
Source

Idis Surveillance Management Software Vulnerable to Hacking

• Web-based client of Idis surveillance management software can be exploited through a one-click attack leading to code execution. • This vulnerability allows hackers to escalate privileges and execute arbitrary code on the host.
Source

Social Engineering Hackers Target Okta Single Sign On

- ShinyHunters campaign uses voice phishing to bypass multifactor authentication and steal corporate data. - At least 150 organizations, including some in the financial sector, are targeted by this active and ongoing campaign.
Source

CTO Talks: Modern PAM and Audit-Ready Access in 2026

The article discusses the importance of modern Privileged Access Management (PAM) and audit-ready access controls for credit unions in 2026. It emphasizes the need for robust security measures to protect sensitive information.
Source

Memcyco Gets $37M to Fight AI-Powered Impersonation Attacks

Memcyco raised $37 million for its AI-powered scam detection platform; plans to expand sales and develop new features.
Source

Telnet Flaw: 800,000 Servers at Risk Amid Active Attacks

A legacy client-server application protocol vulnerability allows unauthenticated users to gain root access; more than 800,000 servers could be targeted. Credit unions should assess their systems for open telnet ports.
Source