CU InfoSecurity
Unknown date
Guidance|security
Experts recommend deploying phishing-resistant multifactor authentication, monitoring for attacks, and using live video verification. These measures aim to safeguard against sophisticated voice phishing campaigns designed to trick employees and steal sensitive corporate data.
CU InfoSecurity
Unknown date
Hidden
The National Association of State CIOs' 2026 agenda focuses on federal legislation and funding for AI policy, cybersecurity investment, and critical infrastructure. This aims to support state IT programs in managing multiple priorities.
CU InfoSecurity
Unknown date
Hidden
Britain plans to ban certain ransom payments as part of cybersecurity law reforms; details on scope and sanctions checks remain unclear.
CU InfoSecurity
Unknown date
Hidden
- Real-time vishing attacks are bypassing MFA and becoming a significant threat.
- The use of AI agents within enterprises can lead to conflicting decisions, highlighting the need for better governance, accountability, and control.
CU InfoSecurity
Unknown date
Hidden
Civil society organizations have called for a detailed antitrust investigation into Google's acquisition of Wiz. The deal could strengthen Google’s dominance in cloud security and undermine multi-cloud neutrality.
CU InfoSecurity
Unknown date
Hidden
Rohit Ghai, CEO of Barracuda, focuses on AI and simplicity for midmarket cybersecurity; emphasizes platform depth, human-led threat intelligence, and modular deployment.
CU InfoSecurity
Unknown date
Guidance
The article emphasizes the importance of implementing stronger identity and configuration controls to reduce cloud breach risks. It highlights best practices for enhancing security measures in cloud environments.
CU InfoSecurity
Unknown date
Security
The webinar focuses on cybersecurity strategies to prevent breaches and secure cloud environments. Participants will learn about the latest threats and best practices for protecting sensitive data.
CU InfoSecurity
Unknown date
Hidden
European experts recommend stepping up active defenses and modernizing IT infrastructure against cyberattacks. The Polish grid hack highlights the limitations of preventive measures alone.
CU InfoSecurity
Unknown date
Hidden
Artificial intelligence in healthcare requires robust governance and trust frameworks; errors or hallucinations can directly impact patient care. The article does not provide specific actions for credit unions.
CU InfoSecurity
Unknown date
Security
• Attack intensity surged over the recent holiday period as hackers used automated bots.
• Cybersecurity defenders are advised to remain vigilant despite reduced activity levels during holidays.
CU InfoSecurity
Unknown date
Hidden
Outtake will invest $40 million in its automated platform for digital risk protection and open-source threat intelligence. The company's agent-led model uses scalable AI workflows instead of manual labor.
CU InfoSecurity
Unknown date
Hidden
Researchers exposed an Android RAT abusing Hugging Face; a SmarterMail flaw was exploited by attackers.
CU InfoSecurity
Unknown date
The article highlights the increasing risk of financial crimes due to AI and deepfakes. It suggests that investigators need better data, architecture, and AI-based detection systems to combat these threats.
CU InfoSecurity
Unknown date
Enforcement
- Comstar paid $515,000 to Massachusetts and Connecticut regulators for a 2022 hacking incident affecting nearly 350,000 residents. - The firm also paid $75,000 last year to settle HIPAA allegations related to the same...
CU InfoSecurity
Unknown date
Security
South Korean prosecutors probed missing seized bitcoin; U.S. SEC dropped litigation against Gemini Earn; major hacks and a $37 million laundering prison sentence.
CU InfoSecurity
Unknown date
Security
• 3,322 data breaches occurred in the U.S. in 2025, setting an all-time record high.
• The number of notifications sent to affected consumers decreased sharply.
CU InfoSecurity
Unknown date
Hidden
CISA Acting Director uploaded sensitive documents to ChatGPT; internal alerts raised concerns about AI governance and leadership. The incident has sparked renewed discussions on the agency's handling of AI tools.
CU InfoSecurity
Unknown date
Hidden
The University of Arizona is centralizing its IT environment and unifying core platforms to support teaching, research, and operations. CIO Elliott Cheu discusses identity upgrades and unified support as part of the modernization efforts.
CU InfoSecurity
Unknown date
Hidden
Victim count in a 2025 hack against HCIactive reached nearly 3.1 million; the firm provides AI-powered services to healthcare practices.
CU InfoSecurity
Unknown date
Security
The webinar discusses AI and quantum attacks, providing strategies for credit unions to defend against next-generation threats. It aims to equip compliance officers with the knowledge needed to protect their institutions.
CU InfoSecurity
Unknown date
Hidden
Revisions to 42 CFR Part 2 for substance use disorder records now align better with HIPAA; compliance adjustments required. Adjustments are complex and challenging, according to attorney David Holtzman.
CU InfoSecurity
Unknown date
Security
• Web-based client of Idis surveillance management software can be exploited through a one-click attack leading to code execution. • This vulnerability allows hackers to escalate privileges and execute arbitrary code on the host.
CU InfoSecurity
Unknown date
Security
The webinar explains the risks associated with unsanctioned AI tools and how they can lead to data loss. It highlights the importance of identifying and managing these tools within an organization.
CU InfoSecurity
Unknown date
Security
- ShinyHunters campaign uses voice phishing to bypass multifactor authentication and steal corporate data.
- At least 150 organizations, including some in the financial sector, are targeted by this active and ongoing campaign.