According to Security Week’s recent article, “Stolen Logins Are Fueling Everything from Ransomware to Nation-State Cyberattacks,” cybersecurity firm Ontinue’s 2H 2025 Threat Intelligence Report, showcases that “Attackers...more
The Federal Bureau of Investigation (FBI) recently released a FLASH warning highlighting malicious cyber activity conducted by threat actors operating on behalf of Iran’s Ministry of Intelligence and Security. According to...more
Cybersecurity firm Expel recently published its 2026 Threat Report, which analyzed over 1,000,000 alerts in its Security Operations Center throughout 2025. The results showed that threat actors continue to use compromised...more
As we reported last week, Stryker was attacked by Iranian-backed hackers in retaliation for Israeli and U.S. strikes against Iran. It was a significant cyberattack, known as a wiper attack. A wiper attack is designed not to...more
With the background of recent government warnings about increased cyber-attacks from Iranian-backed hackers, the Irish Examiner has reported that the Stryker site located in Cork, Ireland has been hit with a wiper attack by...more
3/12/2026
/ Business Disruption ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
International Relations ,
Iran ,
Ireland ,
Malware ,
National Security ,
Risk Management
Microsoft Threat Intelligence issued a report on March 6, 2026, entitled, “AI as tradecraft: How threat actors operationalize AI,” which outlines how threat actors, including those from North Korea, are “operationalizing AI...more
3/12/2026
/ Artificial Intelligence ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Identity Theft ,
Machine Learning ,
National Security ,
North Korea ,
Remote Working ,
Social Engineering ,
Threat Management
The Washington Post has published a report detailing a whistleblower complaint alleging that a former Department of Government Efficiency (DOGE) employee stole two complete databases from the U.S. Social Security...more
3/12/2026
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Security ,
Databases ,
Department of Government Efficiency (DOGE) ,
Elon Musk ,
Enforcement Actions ,
Government Agencies ,
Personal Information ,
Personally Identifiable Information ,
Sensitive Personal Information ,
Social Security Administration (SSA) ,
Trump Administration ,
Whistleblowers
The American Hospital Association (AHA) is advising hospitals and healthcare entities to “take precautionary measures in case Iran, its proxies or self-radicalized individuals attempt attacks in the U.S.” during the conflict...more
3/6/2026
/ American Hospital Association ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Government Agencies ,
Healthcare Facilities ,
Hospitals ,
Incident Response Plans ,
Information Security ,
National Security ,
Risk Management ,
Risk Mitigation
Cybersecurity firm Darktrace recently issued its Annual Threat Report, which offered some startling statistics and findings. The Threat Report provides a “comprehensive assessment of the global cyber threat landscape and the...more
ShinyHunters continues to wreak havoc against well-known brands; most recently, Wynn Resorts. Wynn Resorts has confirmed that “an unauthorized third party acquired certain employee data.” It is believed that the threat actor...more
Researchers at UpGuard have discovered a misconfigured cloud database online while conducting routine internet scanning that contains billions of records, including 2.7 billion Social Security numbers (SSNs) and 3 billion...more
Sophisticated vishing (voice phishing) attacks continue to target and victimize company call centers and help desks. Recently, a large ad tech company reported that customer information had been compromised as a result of a...more
2/27/2026
/ Call Centers ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Fraud ,
Identity Theft ,
Incident Response Plans ,
Multi-Factor Authentication ,
Phishing Scams ,
Risk Mitigation
A recent white paper issued by SocRadar, entitled “Operation DoppelBrand: Weaponizing Fortune 500 Brands for Credential Theft and Remote Access,” provides a stark outline of how a threat actor known as GS7 has been “targeting...more
2/20/2026
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Domain Name Registration ,
Financial Institutions ,
Malware ,
Payment Systems ,
Phishing Scams ,
Risk Management ,
Technology Sector ,
Websites
On February 5, 2026, a Massachusetts federal judge issued an order staying information-sharing between the IRS and ICE, as well as a preliminary injunction prohibiting Kristi Noem, Secretary of the Department of Homeland...more
2/16/2026
/ Data Privacy ,
Data Protection ,
Data-Sharing ,
Department of Homeland Security (DHS) ,
Enforcement Actions ,
Government Agencies ,
Immigration and Customs Enforcement (ICE) ,
Internal Revenue Code (IRC) ,
IRS ,
Memorandum of Understanding ,
Preliminary Injunctions ,
Trump Administration
Security researchers at Huntress Labs have identified a vulnerability in SolarWinds’s Web Help Desk that threat actors are exploiting to allow them to execute code remotely....more
Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more
It’s that time of the year when W2s and 1099s pile up in preparation for that dreaded tax return filing deadline. ...more
2/5/2026
/ Artificial Intelligence ,
Consumer Privacy Rights ,
Data Privacy ,
Data Protection ,
Federal Trade Commission (FTC) ,
Income Taxes ,
Internal Revenue Code (IRC) ,
IRS ,
Personal Data ,
Sensitive Personal Information ,
Tax Returns
We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more
2/2/2026
/ Authentication ,
Cloud Computing ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Information Security ,
Multi-Factor Authentication ,
Passwords ,
Phishing Scams ,
Risk Mitigation ,
SaaS ,
Social Engineering ,
Threat Management
Years ago, the Federal Trade Commission (FTC) designated the last week of January asIdentity Theft Awareness Week. For 2026, this week is devoted to education and awareness about identity theft, which is an ever-present...more
On January 13, 2026, eight United States Senators sent a letter to Alphabet, Meta, Reddit, Snap, TikTok, and X stating that they “are alarmed by reports of users exploiting generative AI tools to produce sexualized ‘bikini’...more
The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more
A recent report published by Cyera entitled “State of AI Data Security: How to Close the Readiness Gap as AI Outpaces Enterprise Safeguards,” based on a survey of 921 IT and cybersecurity professionals, finds that although...more
As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more
1/19/2026
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Email ,
Employee Training ,
FBI ,
Incident Response Plans ,
Information Security ,
Mobile Device Management ,
National Security ,
North Korea ,
Phishing Scams ,
QR Codes ,
Risk Management ,
State Sponsors of Cyberattacks
Gmail users are being urged to review and disable two key “Smart Features” settings following privacy concerns stemming from reports that these tools may allow Google to access email content to support AI‑driven services and...more
1/19/2026
/ Artificial Intelligence ,
Consent ,
Consumer Privacy Rights ,
Data Collection ,
Data Privacy ,
Data Protection ,
Email ,
Google ,
Opt-Outs ,
Personal Data ,
Privacy Settings ,
Transparency
Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more
1/2/2026
/ China ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Incident Response Plans ,
Malware ,
Supply Chain ,
Third-Party Risk ,
Vulnerability Assessments