Rethinking Cybersecurity in a Platform World

- The article discusses how the reliance on point solutions for security is breaking down due to consolidation. - CISOs and CIOs need to rethink their security architecture to address new challenges.
Source

Identity Fraud: The New Crimewave Targeting Remote Work

• High-assurance identity proofing combining biometrics, liveness detection, and verified IDs is crucial to prevent impersonation in remote work environments. • The article highlights the growing threat of stolen and synthetic identities driven by deepfakes.
Source

Audio Accessory Flaw Converts Headphones Into Spy Tool

• A security flaw in 'WhisperPair' technology could allow hackers to covertly record conversations and track users. • This vulnerability may persist for years, posing a significant risk to credit union members.
Source

Voice Phishing Okta Customers: ShinyHunters Claims Credit

• Okta warns of a surge in voice-phishing attacks targeting single sign-on access. • These attacks bypass some types of multifactor authentication and allow attackers to manipulate what the target sees in their browser.
Source

Ransomware Hackers Leak Under Armour Customer Data

A Russia-linked ransomware group stole and leaked data from 72.7 million Under Armour customers after a failed extortion attempt; the incident highlights cybersecurity risks for large organizations.
Source

Breach Roundup: DOGE Uploaded Social Security Data to Cloud

DOGE uploaded sensitive data including Social Security numbers to an outside server; a phishing attack affected 750,000 Canadians.
Source

Cryptohack Roundup: South Korea Busts $102M Laundering Ring

- South Korea dismantled a $102 million money laundering ring. - Saga paused SagaEVM after a $7 million exploit, and Makina Finance lost $5 million.
Source

Zero-Day Flaw in Cisco Unified Communications Being Targeted

- A zero-day vulnerability in Cisco's Unified Communications and Webex products allows remote code execution and root-level access. - Cisco has released emergency patches, but no workarounds exist.
Source

Securing Banking Enterprises as Non-Human Identities Grow

Machine identities continue to grow as automation and AI initiatives expand. Lack of governance and visibility create new security vulnerabilities.
Source

EHR Vendor Veradigm to Pay $10.5M to Settle Hack Lawsuit

Veradigm agreed to pay $10.5 million to settle a hack lawsuit involving a breach affecting more than a dozen healthcare clients and 2.5 million patients; the incident was discovered in mid-2025 after it occurred in December 2024.
Source

Coder Builds Malware in Week With AI Help

Check Point identifies VoidLink as the first 'advanced' AI-generated malware framework; a single developer created it in less than a week. This challenges assumptions about development timelines for complex malware.
Source

Minnesota Agency Notifies 304,000 of Vendor Breach

• Minnesota Department of Human Services notifies 304,000 people of a data breach involving inappropriate access by a healthcare provider worker. • State officials are monitoring the incident for potential fraud.
Source

Face-Swapping Tools Pose Elevated 'Know Your Customer' Risks

• Fraud and risk teams must enhance 'know your customer' checks due to rapidly improving deepfake technology. • Synthetic identities, convincing face-swaps, and defeated biometric checks pose significant risks.
Source

Fraud Tops Ransomware in WEF's 2026 Cybersecurity Outlook

Cyber-enabled fraud has become the top concern for CEOs in 2026, surpassing ransomware. AI is reshaping both cyber risks and defenses.
Source

Ransomware 'Most Wanted': Cops Seek Head of Black Basta

- Police raided two suspected members of the Black Basta ransomware group in Ukraine and issued an international arrest warrant for their Russian founder. - The group has targeted over 600 victims worldwide, with many millions in ransom payments.
Source

Anthropic's Cowork Shipped With Known Vulnerability

AI agent can exploit known vulnerability to steal user files; security researchers demonstrated the flaw. Credit union compliance officers should monitor for similar vulnerabilities in third-party tools.
Source

ISP Sinkholes Kimwolf Servers Amid Eruption of Bot Traffic

Lumen has blocked over 550 command and control servers associated with the Kimwolf and Aisuru botnets since October; this highlights ongoing cyber threats that credit unions need to be vigilant about.
Source