DEFENSESTORM

Cybersecurity RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cybersecurity resources highlight our recent research and success stories.

Cyber security risk management solutions from DefenseStorm.
The “Bank Investigator” Scam That Drained $1.7M

Fraud Squad

The “Bank Investigator” Scam That Drained $1.7M

When 89-year-old Victoria (Canada) resident picked up the phone, the caller ID displayed: Canadian Imperial Bank of Commerce (CIBC) Fraud Department. What followed was a months-long deception that ended with nearly $1.7 million in cash, bank drafts, and gold gone.

Holiday Cybersecurity Tips: Staying Safe from Thanksgiving through Christmas

Insights

Holiday Cybersecurity Tips: Staying Safe from Thanksgiving through Christmas

As you prepare for the holidays, it’s important to remember that cybercriminals are preparing too! Now is the perfect time to strengthen your cybersecurity! Here are some important tips to keep your data and devices safe while you enjoy the holidays!

CANVAS CREDIT UNION

Case Studies

CANVAS CREDIT UNION

Canvas Credit Union, based in Lone Tree, Colorado, serves over 300,000 members and holds more than $4 billion in assets. The institution faced the challenge of demonstrating continuous and comprehensive cybersecurity oversight. It needed a system capable of aggregating and analyzing log and firewall data around the clock to ensure account safety and compliance confidence.

CNB TEXAS

Case Studies

CNB TEXAS

Citizens National Bank of Texas, headquartered in Waxahachie, manages more than $1.9 billion in assets with a staff of 159 employees. The bank struggled with limited internal cybersecurity expertise, which left it vulnerable to threats. It needed improved detection, monitoring, and reporting capabilities to reduce risks and enhance visibility across its digital environment.

AXOS BANK

Case Studies

AXOS BANK

Axos Bank, headquartered in San Diego, California, employs approximately 1,375 people and manages over $23 billion in assets. The bank faced challenges with a previous cybersecurity provider that lacked attention to detail and operated inefficient global processes that were not customized for the bank’s specific needs. This lack of tailored service led to inefficiencies and vulnerabilities across its digital infrastructure.

DEXSTA FEDERAL CREDIT UNION

Case Studies

DEXSTA FEDERAL CREDIT UNION

DEXSTA Federal Credit Union, based in Wilmington, Delaware, holds over $400 million in assets, has 68 employees, and serves more than 35,000 members. Following network and architectural innovations that created new vulnerabilities, DEXSTA engaged PureIT to evaluate cybersecurity solutions. The goal was to ensure that the bank’s systems remained protected during its modernization efforts.

COMMUNITY WEST CREDIT UNION

Case Studies

COMMUNITY WEST CREDIT UNION

Community West Credit Union, located in Kentwood, Michigan, operates with approximately $250 million in assets, 65 employees, and around 19,000 members. In early 2021, Community West CU was preparing for an examination that would elevate them to the next peer group. Faced with the challenges of having only two personnel managing their security, numerous disjointed systems, and impending reporting obligations, they recognized the need for a more efficient cybersecurity solution.

The 3 Questions Every Bank Board Asks Their CISO and How MDR Built for Banking Answers Them

Insights

The 3 Questions Every Bank Board Asks Their CISO and How MDR Built for Banking Answers Them

Boards demand clarity on security, proof, and risk. Learn how banking-specific MDR delivers the metrics, evidence, and insight CISOs need to lead with confidence.

The Power of the Tabletop: Turning Awareness into Readiness in Financial Services

Insights

The Power of the Tabletop: Turning Awareness into Readiness in Financial Services

Discover how tabletop exercises turn your financial institution’s incident response plan into real-world readiness, ensuring your team is prepared to protect trust, minimize chaos, and respond confidently when every second counts.

The Human Side of Cybersecurity: Why Strengthening the Human Fire Wall Still Matters.

Insights

The Human Side of Cybersecurity: Why Strengthening the Human Fire Wall Still Matters.

Year after year, the data tells the same story: people remain the prime target in cyberattacks. Now, with attackers using AI to clone voices and craft convincing scams, the human element has become both our greatest risk and greatest opportunity. That’s why we’re revisiting the article, “The Human Firewall: Strengthening the Weakest Link in Cybersecurity,”  because the strongest defense in 2025 is still built on the collaboration of technology, culture, and leadership to strengthen the human firewall.

GREAT LAKES CREDIT UNION

Case Studies

GREAT LAKES CREDIT UNION

Great Lakes Credit Union (GLCU), located in Bannockburn, Illinois, manages $1.4 billion in assets, serves 111,090 members, and employs approximately 231 people. The credit union faced challenges with disjointed security and risk systems, limited capacity within a small security team, and manual, labor-intensive processes. These issues made it difficult to correlate data for actionable insights and expand cyber event monitoring, leading to inefficiencies in operations and delayed responses to potential threats.

READINESS2025 Highlight Video

Webinars & Videos

READINESS2025 Highlight Video

READINESS2025, our annual user conference, took place in New Orleans at the historic Hotel Monteleone, September 16–18. We brought together our clients and partners for hands-on training and educational sessions, then kept the energy going with fun, social events after hours. This year’s highlight was a lively second line parade leading to dinner, where we celebrated our community with a client award ceremony—take a look at the video! This is what DefenseStorm’s Community of Trust is all about: learning, connection, and unforgettable experiences.

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software Vulnerability

Threat Alerts

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software Vulnerability

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. Cisco has released software updates that address this vulnerability.

The MDR Illusion: Why Generic Cybersecurity Leaves Banks Exposed

Insights

The MDR Illusion: Why Generic Cybersecurity Leaves Banks Exposed

Generic cybersecurity solutions may look strong on paper, but for banks and credit unions they leave dangerous gaps. This blog exposes the illusion of “all-in-one” MDR services and explains why financial institutions face unique threats that generic models can’t handle.

MostereRAT: Banking Malware Turned Remote Access Trojan

Threat Alerts

MostereRAT: Banking Malware Turned Remote Access Trojan

MostereRAT is a recently identified banking malware that has evolved into a sophisticated remote access trojan (RAT), currently targeting Microsoft Windows users in Japan. It currently remains unclear whether they intend to expand their campaign globally. These attacks typically begin with a phishing campaign designed to establish stealthy, long-term control over victims’ systems.

Palo Alto & Salesforce Third-Party Drift App Incident

Threat Alerts

Palo Alto & Salesforce Third-Party Drift App Incident

DefenseStorm is aware of recent reports regarding a breach involving Palo Alto and certain types of data. Please see the most recent update below, taken directly from Palo Alto’s blog page about the incident.

Vulnerability [Urgent] Apple Zero-Day Security Release

Threat Alerts

Vulnerability [Urgent] Apple Zero-Day Security Release

Apple has released emergency updates to patch another zero-day vulnerability that was exploited in an “extremely sophisticated attack.” This flaw affects various devices, including the latest iPhone, iPad, and Mac models.

 

Cisco Firewall RADIUS Remote Code Execution Vulnerability

Threat Alerts

Cisco Firewall RADIUS Remote Code Execution Vulnerability

Cisco has disclosed a critical vulnerability in the RADIUS authentication subsystem of its Secure Firewall Management Center (FMC) software. An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary shell commands at a high privilege level.

Reported Cyber Incidents Involving Gen 7 SonicWall Firewalls

Threat Alerts

Reported Cyber Incidents Involving Gen 7 SonicWall Firewalls

There has been a notable increase in both internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls where SSLVPN is enabled. This includes threat activity highlighted by several third-party cybersecurity research teams.

Cisco Customer Guidance for ISE and ISE-PIC vulnerabilities

Threat Alerts

Cisco Customer Guidance for ISE and ISE-PIC vulnerabilities

Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user. Cisco has released software updates that address these vulnerabilities. Read the recommendations compiled from Cisco’s security advisory page.

SharePoint Vulnerability CVE-2025-53770.

Threat Alerts

SharePoint Vulnerability CVE-2025-53770.

Microsoft is aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update. Read the guidance from Microsoft regarding SharePoint vulnerability CVE-2025-53770.

Remote Access Tools 2025: Security and Productivity

Insights

Remote Access Tools 2025: Security and Productivity

As businesses continue to embrace remote work and digital collaboration in 2025, Remote Access Tools (RATs) have become essential for maintaining productivity and supporting distributed teams. Yet, these powerful platforms also present a growing security challenge, as cybercriminals increasingly exploit vulnerabilities, misconfigurations, and user trust to infiltrate networks.

Next-Gen Threats: How Cybercriminals Are Exploiting AI

Threat Alerts

Next-Gen Threats: How Cybercriminals Are Exploiting AI

Generative AI is rapidly reshaping the cybercrime landscape, enabling threat actors to launch faster, more convincing, and highly scalable attacks. As defenders explore AI for productivity and automation, cybercriminals are exploiting the same tools to streamline fraud, malware development, phishing, and vulnerability exploitation.

Lumma Stealer Using Legitimate Windows Tools Tactics

Insights

Lumma Stealer Using Legitimate Windows Tools Tactics

Lumma Stealer—a powerful information-stealing malware that has wreaked havoc across the globe—made headlines in 2025. The Malware-as-a-Service (MaaS) platform, also known as LummaC2, allows cybercriminals to rent and deploy malware designed to steal sensitive information from infected devices. First surfacing in 2022, it has rapidly evolved into one of the most notorious info stealers on the dark web.

FS-ISAC Cyber Fraud Framework and DefenseStorm Support

Insights

FS-ISAC Cyber Fraud Framework and DefenseStorm Support

Financial institutions are facing an alarming rise in sophisticated cyber fraud, often overlooked due to siloed operations among departments. To address this, FS-ISAC has published “Leveling Up: A Cyber Fraud Prevention Framework for Financial Services,” which offers a structured approach to improve coordination, enhance investigations, and prevent losses. Here’s a brief overview of its contents and how DefenseStorm can help implement this vision.

Astaroth Phishing Tool Bypasses Two-Factor Authentication

Threat Alerts

Astaroth Phishing Tool Bypasses Two-Factor Authentication

A new phishing tool called Astaroth threatens the security of online accounts globally. This malicious tool bypasses two-factor authentication (2FA), which is meant to be a vital layer of protection for private accounts, enabling hackers to steal sensitive information such as usernames, passwords, credit card details, bank information, and more.

Space Coast Credit Union

Case Studies

Space Coast Credit Union

With over $8.8 billion in assets, Space Coast Credit Union (SCCU), serves approximately 677,000 members across 67 branches. Prior to their partnership with DefenseStorm, SCCU’s cyber risk management program relied on multiple network monitoring tools, not entirely integrated, which posed challenges in threat detection and reduced the efficiency of their data gathering processes.

CISA Releases Malware Report On RESURGE Malware

Threat Alerts

CISA Releases Malware Report On RESURGE Malware

On Friday March 28, 2025 CISA released a report with analysis of a new malware variant CISA has identified and named as RESURGE. RESURGE is a persistent malware that shares similar characteristics to the malware SPAWNCHIMERA. Please review the information that is taken directly from CISA and compiled by DefenseStorm Director of Cyber Threat Intelligence to learn more about RESURGE, its capabilities, and attack vectors.

Reliant Credit Union

Case Studies

Reliant Credit Union

Reliant Credit Union, with assets amounting to nearly $700M and a membership of 46,615, serves its community through ten offices and a committed team of 171 employees. As cybersecurity threats became more sophisticated, the credit union faced challenges in managing and mitigating risks effectively. Reliant recognized this urgent need and embarked on a transformative journey to enhance its ability to monitor, manage, and report on cyber events.

Business Email Compromise Threats on the Rise

Threat Alerts

Business Email Compromise Threats on the Rise

Business Email Compromise (BEC) is a sophisticated email scam where cybercriminals trick victims into transferring funds or sharing sensitive data. Learn more about common BEC attack types, how they work, and essential strategies for protection.

1 2 3 6