The following posts are useful for general awareness of current cyber threats, vulnerabilities, guidance, and other cyber-related news or updates. These resources have been curated by the WaterISAC analyst team as items of broad relevance and benefit that do not need supplemental analysis at this time.
Critical Infrastructure Resilience
- EPA system for water, air and toxics data is vulnerable to threats | Fedscoop
- Trump’s 2026 budget proposes $163 billion cut to non-defense spending, slashes CISA and FEMA funding | Industrial Cyber
- Lawmakers grill Noem over CISA funding cuts, demand Trump cyber plan | The Record
- FBI awaits signal that Salt Typhoon is fully excised from telecom firms, official says | Nextgov
- FARM-TO-TABLE RANSOMWARE REALITIES | Food and Ag-ISAC
IT Vulnerability Security Updates
- Here Comes Mirai: IoT Devices RSVP to Active Exploitation | Akamai
- Second Ransomware Group Caught Exploiting Windows Flaw as Zero-Day | Security Week
- Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization | The Hacker News
IT Malware, Threats & Risks
- 'Venom Spider' Targets Hiring Managers in Phishing Scheme | Dark Reading
- LTE Networks Owning the Network, Owning the Risk | Industrial Cyber
- As Vishing Gains Momentum, It’s Time to Fight Back | Fortra
- ClickFix Scam: How to Protect Your Business Against This Evolving Threat | Hackread
- New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR | Security Affairs
- Using Blob URLs to Bypass SEGs and Evade Analysis | Cofense
Ransomware
- DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists | SentinelOne
- DragonForce Ransomware: Redefining Hybrid Extortion in 2025 | Check Point
- Big Game Ransomware: the myths experts tell board members | DoublePulsar
- Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal | Trend Micro
- Mamona ransomware lowers the bar with offline encryption | SC Media
- Ransomware Attacks April 2025: Qilin Emerges from Chaos | Cyble
- The organizational structure of ransomware threat actor groups is evolving before our eyes | Coveware
Cyber Resilience, General Awareness, & AI
- Passkeys for Normal People | Troy Hunt
- A whopping 94% of leaked passwords are not unique - will you people ever learn? | ZDNet
- Personal data of top executives easily found online | Help Net Security
- Stronger Cloud Security in Five: Securing Your Cloud Identities | Tenable
- Strengthening Cybersecurity Incident Response Part 2: From Detection to Recovery | Fortra
- Impact of AI on cyber threat from now to 2027 | UK National Cyber Security Centre
- AI Agents Are Here. So Are the Threats. | Unit 42
- Microsoft unveils new AI agents that can modify Windows settings | Bleeping Computer
- 1 in 3 workers keep AI use a secret | Help Net Security