ISMG Editors: Why Digital Skimming Is Still Thriving

Digital skimming remains a significant threat; AI's entry into personal health data raises new compliance and security concerns.
Source

Infoblox Buys Axur to Expand Cyberthreat Takedown Power

Infoblox acquires Axur to enhance AI-driven cyberthreat defense; Axur offers 99% takedown rate for phishing and rogue sites.
Source

Ransomware by the Numbers: Count of Victims and Groups Surge

• The number of ransomware victims and criminal groups has increased over the past 12 months. • Despite law enforcement efforts, competition among groups, and fewer victims paying, the trend remains concerning.
Source

PharMerica Will Pay at Least $5.2M to Settle Hack Lawsuit

PharMerica will pay at least $5.27 million as part of a preliminary class action settlement for a 2023 data theft incident affecting 5.8 million individuals; the company agreed to enhance its security measures.
Source

DeadLock Ransomware Group Utilizes Polygon Smart Contracts

- DeadLock ransomware group uses blockchain smart contracts for storing proxy server addresses. - This technique indicates the group's experience and sophistication in cybercrime.
Source

Magecart Hits Continue: Stripe Spoofing, Supply Chain Risks

Researchers detail an active Magecart campaign targeting WooCommerce and Stripe payment forms. ConnectPOS exposes its code repository for years, posing a supply-chain risk for customers.
Source

One Simple Trick to Knock Out the Wi-Fi Network

• A flaw in Broadcom chipsets used in wireless routers allows attackers to disrupt the 5 GHz band regardless of security settings. • Credit unions should be aware of this cybersecurity risk.
Source

How GenAI Is Aiding a Rise in Identity-Based Threats

• Combining employee training with behavioral monitoring and AI guardrails is essential for mitigating identity risk in the face of AI-driven phishing threats. • The shift from brute-force attacks to AI-powered phishing poses tougher challenges for credit union defenders.
Source

Webinar | Improving Visibility and Response With a Unified Platform

The webinar discusses the benefits of using a unified platform for improving visibility and response in compliance operations. Attendees learn about integrating various systems to enhance data management and streamline regulatory reporting.
Source

ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches

• The article highlights the ongoing issue of lack of Multi-Factor Authentication (MFA) contributing to cloud data breaches. • It also touches on how researchers are exploring new methods for data protection in an AI-driven era.
Source

Illinois Notifies 700,000 of Misconfiguration Breach

• Over 700,000 Illinois residents notified of a data breach due to incorrect privacy settings on a mapping platform. • The breach exposed sensitive information related to Medicare, Medicaid, and rehabilitation services recipients.
Source

Breach Roundup: Firewalls Headed for Obsolescence

Moody's predicts firewalls will become obsolete; Sedgwick confirms a data breach; Romanian power firm and D-Link devices were targeted by cyber attacks.
Source

Breach Roundup: Firewalls Headed for Obsolesce

Moody's predicts firewalls will become obsolete; Sedgwick confirms a data breach; Romanian power firm and D-Link devices were targeted by cyberattacks.
Source

Cryptohack Roundup: Alleged Fraud Kingpin Deported to China

An alleged fraud kingpin was deported to China; Unleash Protocol suffered a $3.9M hack; TRM linked crypto thefts to the LastPass breach.
Source

Orthopedic Practice Pays $500K Settlement to NYS in Hack

• An orthopedic practice in upstate New York was hacked, affecting over 650,000 individuals' sensitive information. • The practice agreed to pay a $500,000 settlement and implement stronger security practices.
Source

Deception Tech Snares Shiny Hunter Attacker's IP Address

A honeypot set by a targeted threat intelligence firm caught one of the 'Scattered Lapsus$ Shiny Hunters' hackers, revealing his actual IP address. This incident highlights the effectiveness of deception technology in cybersecurity.
Source

Missing MFA Strikes Again: Hacker Hits Collaboration Tools

Dozens of organizations lost terabytes of data and credentials through a malware attack on cloud-based collaboration tools; initial access brokers are involved in selling stolen data.
Source

Conduent Hack Victim Count Soars by at Least 50%

The breach at Conduent affected nearly 14.8 million Texans; the victim count has increased after a new regulatory disclosure by the company.
Source

Covenant Health Notifying 480K Patients of 2025 Data Theft

Covenant Health notified 480K patients of a data theft incident in May 2025; hackers claimed to have stolen 852 GB of health information.
Source

Aflac Notifies 22.7 Million People of June Data Theft Attack

- 22.65 million people potentially affected by Aflac's data theft incident. - The breach could be the largest U.S. health data breach reported in 2025.
Source

RondoDox Botnet Exploiting Devices With React2Shell Flaw

• The RondoDox botnet campaign exploits the React2Shell vulnerability in open-source React framework across various devices. • This security breach could affect IoT devices at scale, posing a significant risk for Texas credit unions.
Source

Aflac Notifies 22.6 Million People of June Data Theft Attack

Aflac notified 22.65 million people of a June data theft incident compromising sensitive health and personal information, including Social Security numbers; the breach could rank as the largest U.S. health data breach in 2025.
Source