On the latest episode of Nerd Out, Dave and Alec dig into the Bondi Beach attack and what lessons can be learned before looking at the NYE attack that was disrupted. Then the looked at some of the security predictions made earlier in the year to see if they hit the mark. They wrapped up with a prediction of their own for 2026. Then they turned to the other nerd news and talked about some of the latest trailers before talking about their favorite show of the year!
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• Cyware!
• New! The Gate 15 Interview EP 65: Yearend ISAC Extravaganza!
• 2025 CWE Top 25 Most Dangerous Software Weaknesses
• CISA Unveils Enhanced Cross-Sector Cybersecurity Performance Goals
Main Topics:
Bondi Beach Hanukkah Attack:
• NYT Live Updates: Sydney Gunmen Were Motivated by ISIS, Australia’s Leader Says
• Gunmen kill at least 15 people in attack on Hanukkah celebration on Sydney’s Bondi Beach
• Join FB-ISAO. If you’re involved with a place of worship or charity, please make sure they’re plugged in!
• Gate 15’s Hostile Events Attack Cycle white paper
• Germany foils suspected Islamist car ramming plot targeting Christmas market
• 'F*** the Jews': Gunman fires 20 bullets into Jewish family's hanukkah-decorated home in California
• Virginia mosque attacked, Muslim advocates call for hate crime charges
What we know about the Brown University shooting that killed 2 and injured 9
Cybersecurity Updates:
• ASD: Annual Cyber Threat Report 2024-2025
• 5 lessons we learned from our ransomware attack
• Dragos Industrial Ransomware Analysis: Q3 2025
• Alleged Coupang data leaker had only worked at company for two years, say police
• Users report chaos as Legal Aid Agency stumbles back online after cyberattack
• Canadian Centre for Cyber Security: Ransomware
Quick Hits:
• Opportunistic Pro-Russia Hacktivists Attack US and Global Critical Infrastructure
• CISA warns China has penetrated U.S. infrastructure, threatens 2027 turning point
• New Product! Active Shooter Response – Poster
In this episode of The Gate 15 Interview, Andy Jabbour speaks with leaders from the Information Sharing and Analysis Center (ISAC) community on the Cybersecurity Information Sharing Act, the government shutdown, the role and future of ISACs and what to look forward to in 2026. Experts include:
In the discussion the panel covers:
Selected links:
Congress extends CISA 2015, but path to long-term reauthorization remains murky
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• TribalHub Magazine, Winter 2025: A Publication For Technology Minded Professionals In Tribal Government Tribal Health, Tribal-Gaming And Non-Gaming Tribal Enterprises. Includes Tribal-ISAC happenings!
• React2Shell: Risky Bulletin: APTs go after the React2Shell vulnerability within hours & Critical Security Vulnerability in React Server Components
• We discussed our daily SUN and Weekly Ransomware & Data Breach Digest available via Gate 15’s GRIP: Join the GRIP! Gate 15’s Resilience and Intelligence Portal (GRIP) utilizes the robust capabilities available in Cyware’s Collaborate platform to provide the community with technology-enhanced, human-driven analysis products. Further, our team supports the implementation and use of Cyware Collaborate at the Enterprise level.
Main Topics:
FinCEN Issues Financial Trend Analysis on Ransomware. The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) is issuing a Financial Trend Analysis on ransomware incidents in Bank Secrecy Act (BSA) data between 2022 and 2024, which totaled more than $2.1 billion in ransomware payments… Previous FinCEN Financial Trend Analyses have focused on reported ransomware payments and incidents by the date the activity was filed with FinCEN. Today’s report shifts the focus to the incident date of each ransomware attack and offers greater visibility into the activities conducted by ransomware actors.
• Reported Ransomware Incidents and Payments Reach All-Time High in 2023
• FinCEN Data Shows Ransomware Payments Top $2.1B in Just Three Years
• Financial Services, Manufacturing, and Healthcare were the Most Impacted Industries
• The Onion Router (TOR) was the Most Common Communication Method Reported
• ALPHV/BlackCat was the Most Prevalent Ransomware Variant Between 2022 and 2024
• FinCEN analysis shows scope of ransomware problem
Five-page draft Trump administration cyber strategy targeted for January release; The six-pillar document covers a lot of ground in a short space, and could be followed by an executive order implementing it, according to sources familiar with the draft. America 250: Presidential Message on the Anniversary of the Monroe Doctrine
• Here’s what the new National Security Strategy says about threats to critical infrastructure
• New US National Security Strategy reveals Trump administration’s latest stance on Taiwan
FBI PSA: Criminals Using Altered Proof-of-Life Media to Extort Victims in Virtual Kidnapping for Ransom Scams. The Federal Bureau of Investigation (FBI) warns the public about criminals altering photos found on social media or other publicly available sites to use as fake proof of life photos in virtual kidnapping for ransom scams. The criminal actors pose as kidnappers and provide seemingly real photos or videos of victims along with demands for ransom payments… Criminal actors typically will contact their victims through text message claiming they have kidnapped their loved one and demand a ransom be paid for their release. Oftentimes, the criminal actor will express significant claims of violence towards the loved one if the ransom is not paid immediately. The criminal actor will then send what appears to be a genuine photo or video of the victim’s loved one, which upon close inspection often reveals inaccuracies when compared to confirmed photos of the loved one. Examples of these inaccuracies include missing tattoos or scars and inaccurate body proportions. Criminal actors will sometimes purposefully send these photos using timed message features to limit the amount of time victims have to analyze the images.
Quick Hits:
• US leader of global neo-Nazi terrorist group signals retribution for arrests
• ASD: Information stealers are on the rise, are you at risk?
• UK NCSC: Prompt injection is not SQL injection (it may be worse)
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• WaterISAC – EPA: National Security Information Sharing Bulletin – Q4 2025 & Access the PDF
• Canadian Centre for Cyber Security: The cyber threat to Canada’s water systems: Assessment and mitigation
• Canadian Centre for Cyber Security: Don't take the bait: Recognize and avoid phishing attacks - ITSAP.00.101
• How cannabis businesses can go digital while thwarting hackers
Main Topics:
• Semperis Warns That Holiday & Weekend Gaps Leave Critical Infrastructure Open to Ransomware Attacks
• FBI San Diego Warns Shoppers to Be Aware of Scams During the 2025 Holiday Season
• FBI PSA: Account Takeover Fraud via Impersonation of Financial Institution Support
• Take9: Cyber threats are everywhere. And getting sneakier. What can you do to protect yourself, your community and our nation? Take a 9-second pause and think before you click, download, share. A short pause goes a long way.
• JCAT First Responder's Toolbox: Tech Sector Outreach: Identifying Violent Extremist Indicators and Reporting Mechanisms for Online Service Providers
Quick Hits:
• OnSolve CodeRED cyberattack disrupts emergency alert systems nationwide
• CISA: Mobile Communications Best Practice Guidance
• CISA: Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications
On this week's Security Sprint, Dave and Andy get ready for hte holidays with a full menu of topics that include:
Warm Open:
· Happy23rd birthday to DHS!
· WaterISAC’s Quarterly Water SectorIncident Summary, April to June 2025 – Executive Summary
· GridEx VIII – Surge in ParticipationReflects Importance of Exercising Emergency Preparedness
· Cloudflare outage on November 18, 2025
Main Topics:
Insider Threats: Former contractor admits to hackingemployer in retaliation for termination
· CrowdStrike catches insider feeding information to hackers
Blended Threats, you say? AWS: New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare & Amazon details Iranian “cyber-enabled kinetic targeting” operations
Quick Hits:
· House AI terrorism bill spotlights extremist use of generative AI for propaganda and training
· Obscura Ransomware: A Case Study in Ransomware Data Loss
· Overconfidence is the new zero-day as teams stumble through cyber simulations
· The SANS 2025 State of ICS Security Report: Progress, Pressure, and the Path to Resilience
· CISA Releases New Guides to Safeguard Critical Infrastructure from Unmanned Aircraft SystemsThreats
· Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• Happy Birthday to CISA! The Cybersecurity and Infrastructure Security Agency turned seven on Sunday.
• Government funding bill temporarily revives cybersecurity information-sharing law
• The Gate 15 Interview EP 64: Cody Barrow, CEO, EclecticlQ. “Nothing in cyber happens without a reason.”
• Faith-Based (U.S.): FB-ISAO Newsletter, v7, Issue 10
Main Topics:
Cybersecurity!
• OWASP Top Ten. Welcome to the 8th installment of the OWASP Top Ten!
• ASD: Annual Cyber Threat Report 2024-2025
• Checkout.com: Protecting Our Merchants: Standing Up to Extortion: “We will not be extorted by criminals. We will not pay this ransom.”
Holidays & Hostile Events!
• Europol: 10 years on: remembering the victims of the 13 November terrorist attack in Paris
• DOJ: New Jersey Man Charged with Cyberstalking in Connection with Violent Network ‘764’
• Indiana Republican called out by Trump on redistricting is swatted
• Marjorie Taylor Greene Says She Received Pipe Bomb Threat: What We Know
• Terror plot arrests reveal ‘more dangerous’ online pathway to ISIS radicalization in America
• Suspects charged in alleged Michigan Halloween terror plot eyed attack on Chicago Pride Parade: Docs
• Racists are now openly targeting Indian Americans
• Is left-wing terrorism returning?
Quick Hits:
• Blended Threats! Risky Biz News - German TV station hacked: A cyberattack has disrupted the broadcast of German radio station Radio Nordseewelle. Hardware components were damaged in the attack and had to be replaced. The broadcaster said it had to rebuild large parts of its IT network. The hack took place days after a similar incident crippled the transmission of Dutch radio and TV station RTV Noord. [Tarnkappe]
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Cody Barrrow, CEO, EclecticlQ. Cody is a cybersecurity industry leader with over 20 years of public and private sector experience in the US and EU, holding leadership positions within the Pentagon, National Security Agency/US Cyber Command, Fortune 25, and commercial vendors as well as a number of other positions with the US Government and across the cybersecurity community. Since 2019, he has been with EclecticIQ, the Amsterdam-based European leader in cybersecurity technologies servicing central governments and large enterprises, where he took over as Chief Executive Officer in 2024. Cody has a Bachelor of Science in Political Science from the University of Maryland. Learn more about Cody on LinkedIn.In the discussion Cody and Andy cover:
Selected links:
In the latest episode of Nerd Out, Dave and Alec are joined by Joe Levy who talks about his role and the day to day of managing a venue. Then the group talks about outdoor venue security and other preparedness activities incorporating drone threat and building lasting partnerships. The gang then talked about winter weather preparedness before wrapping up their security talk with a look back to the recent elections and a look ahead to 2026.
Finally, they continued their holiday kick-off with a run through their favorite holiday food and drinks.
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
Main Topics:
Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time.
Threat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here.
2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.
Quick Hits:
• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm
• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica
• ‘Tremendous unprecedented devastation’ in Jamaica from Hurricane Melissa, UN coordinator says
• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north
• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says
On the latest episode of Nerd Out, Dave and Alec welcome back Hunter Headapohl to deep dive into Cybersecurity Awareness Month and cyber threats.
References from the discussion include:
After the security nerd discussions, the trio turned to other nerd news with a little Halloween theme.
On this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open
• H2OSecCon 2026 Call for Presentations
• Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC.
• CISA’s international, industry and academic partnerships slashed. The cuts “create a dangerous void,” said Errol Weiss, chief security officer for the Health Information Sharing and Analysis Center. “The health sector is one of the most targeted and vulnerable, and this is exactly the wrong time to be pulling back federal support.
• Kristi Noem pledged to boost the nation’s cybersecurity. She gutted it instead
• Trump Administration Cuts Cyberdefense Even as Threats Grow
• U.S. Cyberspace Solarium Commission Annual Assessment: America’s Cyber Resiliency in 2025: Lessons from the Fifth CSC 2.0 Annual Assessment & US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes
Main Topics:
Ransomware recovery perils: 40% of paying victims still lose their data. Paying the ransom is no guarantee of a smooth or even successful recovery of data. But that isn’t even the only issue security leaders will face under fire. Preparation is key.
• UK Government: Supply chain resilience against ransomware
• JLR hack is costliest cyber attack in UK history, say analysts
Melissa becomes third Category 5 hurricane of the extraordinary 2025 season
• NHC issuing advisories for the Atlantic on Hurricane Melissa
• Key messages regarding Hurricane Melissa (en Español: Mensajes Claves)
• Melissa leaps from tropical storm to Category 4 hurricane in 18 hours
• Category 5 Hurricane Melissa’s eye is nearing Jamaica and conditions are worsening
Quick Hits:
• Palo Alto Networks: Why Threat Actors Succeed
• LA Metro digital signs taken over by hackers
• Chatbots Are Pushing Sanctioned Russian Propaganda
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• The White House fired 176 CISA employees on Friday, with more layoffs fearedLayoffs, reassignments further deplete CISA
• Top cyber lawmaker wants answers on CISA workforce reductions
• Tech industry unites behind bipartisan effort to urgently reauthorize US cyber threat information sharing law
• What They Are Saying: Technology Stakeholders Urge Passage Of Peters & Rounds Bipartisan Bill To Restore Critical Cybersecurity Protections (CISA 2015)
Main Topics:
F5, AWS, Third Party Risk & Resilience:
• AWS: Operational issue - Multiple services (N. Virginia).
• AWS: Operational issue - Multiple services (N. Virginia). [RESOLVED] Increased Error Rates and Latencies
• What the Huge AWS Outage Reveals About the Internet
• AWS outage exposes Achilles heel: central control plane
• F5: K000154696: F5 Security Incident
• F5, Inc. Form 8K
• ED 26-01: Mitigate Vulnerabilities in F5 Devices
Ransomware & Data Breaches:
• IT-ISAC: Quarterly IT Sector Ransomware Analysis Q3 2025, July -September. PDF.
• BlackFog’s 2025 Q3 Ransomware Report
Arctic Wolf 2025 Human Risk Report Reveals Escalating Breaches, Overconfidence in Phishing Defenses, and Risky AI Behavior. Key findings from the 2025 Human Risk Behavior Snapshot include:
Quick Hits:
• AG Platkin Sets Standards for Active-Shooter Readiness
• Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
• NCSC Warns Data Centres Face Rising Cybersecurity Threats
• Microsoft Dominates Phishing Impersonations in Q3 2025
• UK NCSC - UK experiencing four 'nationally significant' cyber attacks every week
• UK NPSA: Protecting our Democratic Institutions: Countering Espionage and Foreign Interference
• DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
In this week's Security Sprint, Dave and Andy covered the following topics:
Main Topics:
Russia, China and North Korea are using ChatGPT to influence you — here’s how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI’s popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”
• The Case for AI Loss of Control Response Planning and an Outline to Get Started
• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?
The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.
• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week
• Cyber attack contingency plans should be put on paper, firms told
• Policyholder Plot Twist: Cyber Insurer Sues Policyholder’s Cyber Pros
• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF
• Paying off cyber criminals no guarantee stolen data won’t be published – study
Severe Weather: Hurricane Season continues
18 Oct: No Kings nationwide protests
Quick Hits:
• Peace in Israel and Gaza?
• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections
• Yet another shutdown and its impact on cybersecurity professionals
• Experts: Shutdown Strains Healthcare Cyber Defenses
• Is the government shutdown impacting info sharing for healthcare cyber threats?
• ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more!
• Poland says cyberattacks on critical infrastructure rising, blames Russia
• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS
• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense
• Belgian PM reported to be among targets of ‘jihad-inspired’ drone plot
• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
In this special (and now maybe annual!) episode of The Gate 15 Interview, live from the floor of TribalNet 2025, Andy speaks with TribalHub’s Senior Marketing & Communications Manager, Michelle Bouschor, as they catch up and talk incident response, why non-IT leaders need to be part of the conversation, and what’s trending across the conference. Plus, Michelle throws out a fun popup question: what would Andy do if he weren’t working in tech? Listen on Spotiy, Apple or the TribalHub page at podbean!Relevant to their conversation: Tribal-ISAC Unveils Cybersecurity Report. The Tribal Information Sharing and Analysis Center (Tribal-ISAC) released its first-ever report, The Pulse – The State of Cybersecurity Within Tribal Nations, during the Annual TribalNet Conference and Tradeshow in early September. The report was produced by the Tribal-ISAC with assistance from TribalHub, and features cybersecurity insights, trends and more gathered from three key sources: Tribal-ISAC’s 2025 “Tribal Cybersecurity” Survey, TribalHub’s “How Prepared is Your Tribe for AI?” Survey, and Gate 15’s CHIEF and NATIVE Reports.
Additional selected links:
On this week's episode of the Security Sprint, Andy is joined by the Cybersecurity Evangelist herself, Jennifer Walker as well as Sadie Anne Jones! Together they covered the following topics:
Warm Open:
• Tribal-ISAC Unveils Cybersecurity Report & Tribal-ISAC cybersecurity report delivers data, insights into risks
• (TLP:CLEAR) WaterISAC Physical Security Advisory Committee: Insider Threat Management – Fact Sheet.
• Colin Wood on Bluesky: “October isn't only cyber awareness month. It's also National Popcorn Poppin' Month, National Adopt a Shelter Dog Month and Eczema Awareness Month. There's something for everyone, really” It's also National Pizza Month!
Main Topics:
CISA: Cybersecurity Awareness Month - Building a Cyber Strong America. October is Cybersecurity Awareness Month! This year’s theme is Building a Cyber Strong America, highlighting the need to strengthen the country's infrastructure against cyber threats, ensuring resilience and security.
• Cybersecurity Awareness Month Toolkit
• DHS and CISA Announce Cybersecurity Awareness Month 2025
• Article: DHS, CISA kick off Cybersecurity Awareness Month 2025 to protect critical services, boost national resilience
Cybersecurity Information Sharing Act of 2015 (CISA 2015):
• CISA 2015 sunsets: Cyber Threat sharing without a net?
• CISA Liability Protections Terminate - What Legal & InfoSec Need to Know Before Sharing Cyber Threat Information
• Cyber Threat Information Sharing at Risk: What Companies Should Consider if the Cybersecurity Information Sharing Act of 2015 Is Not Renewed
• Cyber defenders on edge amid shutdown furloughs, expired authorities
• Information sharing under CISA 2015 in limbo after government shuts down
Quick Hits:
• Judge temporarily blocks use of National Guard in Portland
• USNORTHCOM statement regarding protection of federal property and personnel in the Portland Area
• Trump says US is in ‘armed conflict’ with drug cartels after ordering strikes in the Caribbean
• Venezuela says it detected 5 US ‘combat planes’ flying 75km from its coast, calls it a ‘provocation’
• Clop extortion emails claim theft of Oracle E-Business Suite data
• Active exploitation of vulnerability affecting Oracle E-Business Suite
• Oracle Security Alert Advisory - CVE-2025-61882
• CISA and UK NCSC Release Joint Guidance for Securing OT Systems
• Shutdown guts U.S. cybersecurity agency at perilous time
• CISA to furlough 65% of staff if government shuts down this week
• UK NPSA - Manchester Incident
• Security boost for Irish Jews after Manchester synagogue attack
• Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• TribalNet 2025: Cybersecurity Is Central to IT Modernization for Tribes
• Cyberattacks remain big threat for tribes: survey
• CISA to furlough 65% of staff if government shuts down this week
• Cyber shutdown showdown
Main Topics:
Domestic Hostile Events:
• Deadly attack on Michigan church leaves investigators searching for motive
• Michigan church shooter was Marine veteran who White House official says "hated people of the Mormon faith"
• Update from FBI Detroit on Shooting and Fire at a Michigan Church
• Michigan church shooting suspect went on anti-LDS tirade, political candidate said
• Armed man busted after plowing car through police barricade outside Michigan church day after deadly shooting, blaze
• Iraq War veteran Thomas Sanford ID’d as gunman who attacked Grand Blanc LDS church, killing 4 and setting it ablaze
• What we know about Michigan church shooter Thomas Sanford. Authorities have provided no motive for the attack.
• Who is Michigan church attacker Thomas Jacob Sanford: Iraq war vet 'suffered from PTSD' and wore 'Make Liberals Cry Again' shirt
• A List of Notable Shooting Attacks on Houses of Worship in the US in the Past 20 Years
• Marine veteran in custody after 3 killed, at least 8 injured in shooting at a waterfront bar in North Carolina, officials say & Southport mass shooting: Suspect identified in gunfire from boat that killed 3, injured 8, officials say
• Eagle Pass casino shooting: 2 killed, 5 hurt; suspect in custody, authorities say & Two dead, six hurt in shooting at Texas tribal casino; suspect in custody
Ransomware
• 'You'll never need to work again': Criminals offer reporter money to hack BBC
• Co-op says cyber-attack cost it £206m in lost sales
Quick Hits:
• CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
• Threat Insights: Active Exploitation of Cisco ASA Zero Days
• CISA - SonicWall Releases Advisory for Customers after Security Incident
• Widespread Supply Chain Compromise Impacting npm Ecosystem
• Russia dares NATO to shoot
• New Kremlin-Linked Influence Campaign Targeting Moldovan Elections Draws 17 Million Views on X and Infects AI Models
• Bot Networks Are Helping Drag Consumer Brands Into the Culture Wars
• Outrage Cycle: Cracker Barrel and its CEO Targeted Amidst Logo Controversy
• CISA Releases Advisory on Lessons Learned from an Incident Response Engagement
• Helping OT Organizations to Establish Defensible Architecture and More Resilient Operations
• Designating Antifa as a Domestic Terrorist Organization
• Fact Sheet: President Donald J. Trump Designates Antifa as a Domestic Terrorist Organization
• Ranking Member Thompson Statement on Trump Incorrectly Designating ‘Antifa’ as a Domestic Terrorism Organization
• DHS Issues Statement on Targeted Attack on Dallas ICE Facility3 people shot at Dallas ICE field office: ICE official
• Trump Says He Is Ordering Troops to Portland, Escalating Domestic Use of Military
• Trump Says He’s Sending Troops To ‘War Ravaged’ America City — Authorizes ‘Full Force’
• Pentagon calls up 200 National Guard troops after Trump Portland announcement
• Oregon leaders object to Trump’s deployment of 200 National Guard troops in the state
• Feds march into downtown Chicago; top border agent says people are arrested based on ‘how they look’
• ICE tactics inflame tensions in New York, Chicago and other cities
• Shane Tamura, gunman in shooting at NFL headquarters, had CTE: Medical examiner
On the latest episode of Nerd Out, Dave and Alec talked about the following topics:
Some of the articles reference in the pod included:
In this week's Security Sprint, Dave and Andy covered the following topics:
Warm Open:
• TribalNet: Casino-systems suppliers protecting operations from cyberattacks
• TribalNet: AI main focus of tribal technology conference
• TribalNet 2025: Cybersecurity Is Central to IT Modernization for Tribes
• The Gate 15 Interview EP 62: Justine Bone, Executive Director, Crypto ISAC
Main Topics:
U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area. The U.S. Secret Service dismantled a network of electronic devices located throughout the New York tristate area that were used to conduct multiple telecommunications-related threats directed towards senior U.S. government officials, which represented an imminent threat to the agency’s protective operations. This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites. In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises. While forensic examination of these devices is ongoing, early analysis indicates cellular communications between nation-state threat actors and individuals that are known to federal law enforcement.
Ransomware!
• EU cyber agency says airport software held to ransom by criminals
• A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
• Rising cyberattacks on K-12 schools prompt concern as Uvalde CISD grapples with ransomware
Cyber threat information law hurtles toward expiration, with poor prospects for renewal
• Rand Paul's last-minute demands push key cybersecurity law to the brink
• Peters Urges Senate to Quickly Extend Critical Cybersecurity Protections That Expire on October 1st
• Health-ISAC CSO: A Looming Deadline: The Cybersecurity Information Sharing Act of 2015
• RER and Coalition Urges TRIA Reauthorization
• Commentary: Shrinking cyber budgets and rising threats: Why public-private partnerships are now mission-critical
US threats and violence
• MN man threatened people via email as retaliation for Charlie Kirk's death: Charges
• NH Man Arrested for Allegedly Plotting to Kill Republican Governor Kelly Ayotte With Pipe Bombs
• NCTC Supports U.S. Law Enforcement, First Responders by Sharing Intel Product Aimed at Deterring Attacks by Al-Qa’ida
• ISIS calls for slaughter of Christians and Jews in UK attacks – 'shoot, stab, and ram'
Quick Hits:
• FBI PSA: Threat Actors Spoofing the FBI IC3 Website for Possible Malicious Activity
• NHC issuing advisories for the Atlantic on Hurricane Gabrielle
• UK NPSA: Vehicle Security Barriers at Event Venues
• TikTok: Statement from ByteDance
o Deal to Keep TikTok in U.S. Is Near. These Are the Details.
o Trump expected to approve TikTok deal via executive order later this week, WSJ reports
• OpenAI admits AI hallucinations are mathematically inevitable, not just engineering flaws
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Justine Bone, Executive Director, Crypto ISAC. She has worked at the intersection of technology, governance, and investment for over twenty years from her start in the intelligence community with the New Zealand GCSB and the U.S. NSA, and has since spanned CEO roles, multinational board appointments, and global advisory positions. Today she serves as Executive Director of the Crypto ISAC, leading global collaboration at the nexus of digital assets, cybersecurity, and governance, and working with public and private stakeholders to build trust and resilience in international markets. She has also held leadership roles at Dow Jones, Bloomberg, and MedSec, and worked with public–private collaborations alongside the FDA, DHS, and DOD. Learn more about Justine on LinkedIn.In the discussion Justine and Andy cover:
“there’s a lot that’s the same, but there’s a lot that’s different”
Selected links: