logo

September Cyber Roundup: AI Threats + Actions for your Sector

April 18, 2026 Newsletter

image

September Cyber Roundup: AI Threats + Actions for your Sector

September 2025, Vol. I, Issue VII: AI is reshaping both sides of cybersecurity. August brought fresh OT advisories, deepfake-driven fraud, and regulatory shifts. We’ve curated what matters for your sector and what to do next

Electric Utilities & Critical Infrastructure (OT/ICS): Signals from August

INL’s TAIGR Launch
Idaho National Lab stood up Testing for AI Grid Resilience (TAIGR) to trial where AI genuinely helps grid ops (e.g., forecasting, fault detection) and where it hurts (hallucinations, adversarial prompts, poisoned training data). The goal is disciplined pilot-to-production paths with guardrails, not “AI everywhere” by default.
Read more.

InfoSight Insight INL’s TAIGR Launch

Patch pressure
CISA pushed batches of ICS advisories across common OT vendors (Johnson Controls, Schneider Electric, Siemens, Rockwell, and more). Several issues are remotely exploitable or low-complexity—meaning they’re realistic footholds for actors pairing commodity exploits with AI-driven recon.
Read more.

InfoSight Insights CISA Patch Pressure

What you should do now
- Triage the August advisories against asset inventory; pay attention to Johnson Controls FX80/FX90 (CVSS v4 8.4) and Rockwell FLEX 5000 I/O (remote/low complexity). Read more.

- If you’re piloting AI in SCADA/DER forecasting, align data pipelines to CISA’s AI Data Security guidance (provenance, anti-poisoning, and integrity checks). Read more.

- Start network micro segmentation work now (CISA’s new Part 1 is a planning playbook that actually helps you sequence the work). Read more.

State & Local Government: What happened — and why it matters

St. Paul, MN — confirmed ransomware + data leak
The city’s July 25 cyber incident was confirmed as ransomware on Aug 10. St. Paul required in-person password resets for ~3,500 employees to safely restore access—an unusual but prudent move when identity systems may be compromised. Days later, attackers posted about 43 GB of city data after officials refused to pay, with impacts touching public-facing services (e.g., library internet access). Reporting attributes the attack to the Interlock group. This is the full lifecycle: disruption → coercion via leak site → recovery under zero-trust assumptions.
Read more.

Mower County, MN — ransomware with HIPAA scope
Following a June 18 ransomware detection, the county issued a HIPAA web notice on Aug 15 confirming unauthorized access to protected health information tied to Health & Human Services. The county says individual notifications and creditmonitoring are planned. It’s a clear example of how a county IT event can become a regulated healthdata incident once PHI is involved.
Read more.

State & Local Cybersecurity Grant Program (SLCGP) — What to know now
CISA’s SLCGP funds SLTT (state, local, tribal, territorial) cybersecurity. FY25 funding is $91.75M, administered by CISA (program) and FEMA (grants). States/territories apply; 80% must pass through to local governments and 25% to rural areas within that pass-through, generally within 45 days of funds release. Cost share: 40% for single-entity projects, 30% for multi-entity projects (waived only for certain insular territories this year).  Cybersecurity Plans must be confirmed or revised by Jan 30, 2026. Subrecipients (except .edu institutions)
must migrate to .gov domains. Funds can support plan implementation, admin (capped at 5%), and projects aligned to program objectives; ransom payments, construction/renovation, and similar items are not allowed. Read more.

Why it matters
If you’re SLTT leadership, this is near-term budget to advance zero-trust controls, identity hardening, IR, and .gov migration without waiting on the next appropriations cycle. If you’re a vendor/partner, align offerings to eligible uses and help customers meet pass-through and cost-share constraints.
Do now
- States/territories: confirm Cybersecurity Plan status and prep pass-through mechanics (funds or in-kind) with rural allocation tracking.
- Locals/tribes: engage your SAA and Cybersecurity Planning Committee early; queue projects that map cleanly to the plan and can meet 40%/30% match.
- Everyone: plan the .gov domain migration path and capture cost-share documentation up front.

What State & Local Government leaders should do now
- Assume identity compromise after ransomware: require staged credential resets (admin → service → user), and enforce out-of-band verification for privileged actions—St. Paul’s in-person reset posture is a relevant model.
- Plan for “data-leak pressure.” If you refuse to pay, prepare comms, legal, and victim-support workflows (e.g., credit monitoring) before the leak post goes live. Use Mower County’s HIPAA notice structure as a template if PHI is involved.

FINANCE: Risk & Regulation: AI Threats Reshaping Finance

Deepfake fraud moved from “rare” to “routine controls”
The Wall Street Journal reports a surge in AI generated voice/video impersonations of executives used to authorize large, urgent transfers—mirroring a widely covered eight-figure UK case. Reported losses already exceed $200M in early 2025, and techniques now blend deepfaked Zoom calls with spoofed domains and compromised vendor threads.  U.S. banks are being urged to harden verification steps because traditional “recognize the voice”
controls no longer hold.
Read more

Regulatory anchor is shifting: FFIEC CAT retires Aug 31, 2025
FFIEC confirmed it will remove the Cybersecurity Assessment Tool on Aug 31, 2025 and not update it for newer resources.  Supervisors direct firms to align with NIST CSF 2.0 and CISA Cybersecurity Performance Goals (CPGs) instead—expect examiner conversations and board reporting to reference these frameworks going forward.
Read more.

Workday: vendor CRM data accessed via social engineering
Workday says attackers tricked people by phone/text; info pulled from a third-party CRM (names, emails, phone numbers). No evidence of access to customer tenants. 
Why it matters: Classic vendor-path exposure that can seed targeted phishing. 
Do now: retrain on voice/SMS phishing, lock down CRM access, review third-party authorization.
Read more

What to do now
- Bake deepfake-aware payment controls into treasury ops (mandatory callback on vendor banking changes; tiered holds; executive deepfake drills). Use FinCEN typologies to drive training.
- Re-baseline programs against NIST CSF 2.0/CRI ahead of the CAT sunset and brief Audit/Risk.

Enterprises are rapidly adopting AI and cloud technologies while neglecting to adequately strengthen their core defenses
According to a recent survey of 1,000 senior IT and business leaders, only 62% are implementing or planning zero trust, 45% have deployed or intend to deploy MDR, and just 42% use or plan to use digital identity/IAM—even though identity-related breaches are the leading cause of cloud incidents. Additionally, 85% acknowledge that their strategies are “too reactive.” While 78% plan to increase spending on GenAI, only 45% are “very satisfied” with the return on investment. Most respondents also feel unprepared for post-quantum threats; 71% say their defenses are inadequate, and only 14% believe their infrastructure can support post-quantum cryptography, despite U.S. recommendations to begin early migration planning. Read more 

Why it matters: Even if tenants are not compromised, having accurate names, emails, and phone numbers from a vendor CRM provides attackers with believable reasons to target your executives, finance/AP, HR, sales, and procurement teams. This can lead to business email compromise (BEC), invoice and bank-change fraud, vendor-portal takeovers, and customer impersonation, resulting in actual financial losses, contract risks, and damage to your supply chain’s reputation. 
Do now:  
Identity: Implement single sign-on (SSO) with phishing-resistant multi-factor authentication (MFA); eliminate legacy authentication; apply least-privilege and time-limited vendor access.  
CRM data: Limit exports and API access; set alerts for unusual data retrieval; rotate keys regularly; activate data loss prevention (DLP).  
Payments: Use out-of-band callbacks to verified numbers and require two-person approvals for bank or purchase order changes and high-value wire transfers.  
Email/brand: Employ SPF, DKIM, and DMARC to reject spoofed emails; monitor for look-alike domains; enable alerts for executive impersonation attempts.  
Humans: Conduct vishing and smishing training exercises; establish scripted phone and SMS verification processes for finance, help desk, and vendor management.  
Vendors: Mandate MFA and maintain audit logs; disable inactive accounts; include 24–48 hour incident notification clauses in contracts.  
Incident response: Maintain a playbook and prewritten communications for social engineering incidents originating from vendors.

 

HEALTHCARE: Signals and Next Moves

AI cuts both ways in hospitals
Health systems are adopting AI to triage alerts and detect anomalies faster; at the same time,threat groups use GenAI to write phishing lures, customize malware, and produce  deepfakes, increasing identity-assurance and HIPAA-process risk. Read more. 

 

HHS OCR settles ransomware case with a Business Associate
HHS' Office for Civil Rights announced a HIPAA Security Rule settlement with BST & Co. CPAs, LLP, an accounting firm acting as a Business Associate to a covered entity.  OCR said BST failed to conduct an "accurate and thorough" risk analysis and will pay $175,000 and complete a two-year corrective action plan (policies, training, and a documented risk management program). Read more
 
 
How InfoSight can help this month
  1. AI Security & GRC Assessment: We inventory AI use cases, map data flows to CISA's AI Data Security practices, and deliver a prioritized remediation plan (poisoning/drift checks, provenance, access controls).
  2. Utilities OT/AI Readiness Sprint: Cross-walk the Aug ICS advisories to your PLCs/HMIs, then align AI pilots with micro segmentation plans so experiments don't widen blast-radius.
  3. Deepfake-Resilient Payments (SLG/Finance): Tabletop simulating executive-impersonation + vendor bank-change; implement callback and staged release policies aligned to FinCEN patterns.
  4. Healthcare BA due-diligence tune-up: Tighten BA contract evidence, incident comms, and patient notification workflows in light of current enforcement posture and August incidents.
     
InfoSight Insights is your trusted source for critical infrastructure security news.
For more details and continuous updates, please subscribe to receive this monthly newsletter directly to your inbox.

Stay ahead of evolving threats with expert insights

Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.

One follow-up from a security expert—no spam, ever.