This DAP highlights Exclusive: ‘A more vulnerable nation’: FEMA memos lay out risks of plan to cut $1B in disaster and security grants and AI-powered impersonation scams are up 148%. The DAP also has More Faith-Based Stories and Select All-Hazard Stories. These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.

Faith-Based Daily Awareness Post 17 July 2025
- Mackenzie Gryder
- cybersecurity, faith, General, Headlines, News, preparedness, Resilience, resiliency, Resources, security, threat assessment
Faith-Based Security Headlines
These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.
House Of Worship Homicides
The Violence Prevention Project maintains multiple databases tracking hostile events including one dedicated to homicides at U.S. houses of worship (HOWs). Their research places such incidents in the broader context of mass public violence, the database is broken into sections like victims, the list of HOWs, the yearly trends, and more. The Violence Project’s work emphasizes comprehensive data collection including life histories, motives, and incident context to understand these tragedies and create prevention efforts.
Since they began tracking incidents in 2001 there have been 417 incidents across the U.S. with 533 victims killed, and an additional 193 injured.
Analyst Comments: The dataset underscores that while attacks on religious spaces represent a small percentage of mass shootings, they carry high community impact. These incidents often follow patterns seen in other mass violence events, including warning signs and personal or grievance-based motives. This highlights the need for faith-based organizations consider building practical, layered safety plans, like training staff to recognize concerning behaviors, having emergency procedures, and maintaining strong ties with local law enforcement.
Cyber officials warn Canadians of malicious campaign to impersonate high-profile public figures
Cybersecurity agencies in Canada are warning that cybercriminals are using AI-generated voice calls, texts, urgent financial request, malicious links and phishing links to impersonate government officials and executives in Canada, stealing money and personal information. This campaign uses urgent, personalized messages to pressure victims. Authorities advise verifying requests through known contacts, avoiding suspicious links, and reporting suspected fraud to law enforcement immediately.
Analyst Comments: This alert highlights how threat actors are evolving by using AI voice cloning and deepfake tactics to increase the believability of scams targeting Canadian executives and officials. Previously this year the FBI released a statement noting similar scams impersonating U.S. officials, confirming that these operations are linked and part of a broader global campaign. Organizations may want to think about briefing executives and updating staff awareness training to include AI-enabled scams.
How Threat Actors Use AI to Hide Malicious Sites
Threat actors are increasingly leveraging AI-power-tools from large language models to cloaking-as-a-service platforms to enhance the stealth, speed, and sophistication of cyberattacks. SlashNext notes attackers employ AI-powered cloaking services to hide malicious sites and bypass detection tools while using LLM-generated phishing content to evade filters. ReliaQuest highlights how AI accelerates deepfake and voice/video impersonation attacks, making social engineering campaigns more scalable and convincing. Together, these trends show AI is not creating new attack types but is dramatically amplifying the speed, scale, and effectiveness of existing cyber threats.
Analyst Comments: The use of AI to cloak malicious sites and generate highly tailored phishing lures is a reality for threat actors. SlashNext’s and ReliaQuest’s findings align with attackers blending AI-powered automation to bypass defenses. AI’s capacity to generate realistic phishing emails, deepfake voices, and cloaked infrastructure significantly reduces the friction for criminals while forcing defenders to move beyond traditional detection methods. Organizations may want to prepare for a threat actors that may use AI and be aware of scams that include AI.
More Faith-Based Stories
‘Taken advantage of’: Real estate agent ripped off friends, church, and federal government
MD: Church fire under investigation
OH: Investigation continues in local antisemitic vandalism cases
‘We will not bow in fear’: California pastor defiant after ICE arrest at her church
4 highlights from the White House Summit of Faith and Business Leaders
At Least 21 Christians Arrested In Iran Under Heightened Persecution
China’s cyber sector amplifies Beijing’s hacking of U.S. targets
Five Iranians nabbed at US northern border as terror fears grip small towns
Tens of thousands in US set to join ‘Good Trouble’ protests honoring John Lewis
Map of US ransomware attacks (updated daily)
Security-Minded Communications – Guidance for Remote and Rural Locations
Powerful earthquake rattles Alaska, prompted rare tsunami warning
Trump administration sued by 20 states over FEMA funding cuts
More Security-focused Content
The FB-ISAO’s sponsor Gate 15 publishes a daily newsletter called the SUN. Curated from their open source intelligence collection process, the SUN informs leaders and analysts with the critical news of the day and provides a holistic look at the current global, all-hazards threat environment. Ahead of the daily news cycle, the SUN allows current situational awareness into the topics that will impact your organization. To sign-up for the SUN, send an email to gate15@gate15.global.
AIantisemitismarsonattacksbriefingChristianChurch of Jesus Christ of Latter-day SaintsCISACommunities of Faithcybercyberattackscybersecuritydatadata breachesfaithfaith-basedFaith-Based ISAOFaith-Based OrganizationFB-ISAOFBOIslamophobiaJewjewishLDSmalwareMormonmuggingMuslimNerd OutphishingpodcastpreparednesspreventionransomwareresilienceresourcessafetyscamsSecretive Chinesesocial mediaterrorismtheftthreatvandalismviolenceweatherworship
Related Posts

This DAP highlights North Korean IT Worker Threats to U.S. Businesses, The Com: Theft, Extortion, and Violence are a Rising Threat to Youth Online, and We found 5 places in the US that could flood like Texas. Here's what they have in common. The DAP also has More Faith-Based Stories and Select All-Hazard Stories. These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.

This DAP highlights Task Force Chairman McCaul Delivers Opening Statement In Hearing To Examine Historical Attacks At Mass-Gathering Events, With Less Federal Support, States Look to Lead in Cyber, Digital Firebreaks: Network Segmentation for Containment, and Weekly Security Sprint EP 119. Cyber fundamentals -third party management, passwords, and patching plus P2D2! The DAP also has More Faith-Based Stories and Select All-Hazard Stories. These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.