Faith-Based Daily Awareness Post 15 April 2026

Faith-Based Security Headlines

These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.

 

Suspicious device at St. Patrick’s Day parade was planted by fire officials, cops say

 

A Brookdale Community College fire safety official, Christopher J. Otis, has been charged after authorities say he planted a suspicious device near the staging area of a St. Patrick’s Day parade in Keansburg, New Jersey, and then reported it to police. The device, discovered shortly before the parade on March 28, prompted officials to cancel the event for safety reasons. Investigators allege Otis gave conflicting accounts about how he found the device, leading to charges including possession of a destructive device, creating a false public alarm, and providing false information to law enforcement. His attorney disputes the severity of the threat, claiming the device was similar in power to a small firework and not capable of causing significant harm. Otis, a Navy veteran with no additional suspicious materials found in searches, is currently being held in Monmouth County jail and has been suspended from his position pending a detention hearing.

 

Analyst Comments: This incident highlights the persistent risk of explosive or suspicious devices at large public events like parades, where crowded, open environments create attractive targets and require rapid, coordinated response. Even when a device ultimately poses no physical danger, the disruption, panic, and resource strain can be significant. It also underscores how a lack of coordination between  security stakeholders for a major event, such as a parade, can complicate response efforts and decision-making.

 

Federal Bureau of Investigation Internal Crime Repot 2025

 

The FBI’s Internet Crime Complaint Center (IC3) 2025 report highlights ransomware as a continued and escalating threat to U.S. critical infrastructure, with over 2,100 incidents reported across key sectors such as healthcare, energy, financial services, and agriculture. Healthcare and public health systems were the most frequently targeted, underscoring the potential for ransomware to disrupt essential services and expose sensitive data. Across all sectors, IC3 received more than 3,600 ransomware complaints resulting in over $32 million in reported losses, though the FBI emphasizes that the true impact is significantly higher when factoring in downtime, recovery, and unreported incidents. The report also identifies leading ransomware-as-a-service groups Akira, Qilin, and Lynx which commonly use double extortion tactics and exploit compromised credentials to infiltrate networks, disable defenses, and encrypt data.

 

Analyst Comments: This year’s IC3 findings reinforce several consistent cybersecurity trends: ransomware remains one of the most disruptive and financially damaging threats; attackers are increasingly organized through ransomware-as-a-service models; and initial access is frequently gained through credential compromise rather than sophisticated exploits.

 

For faith-based organizations, these trends are particularly relevant. Many operate with limited cybersecurity resources, rely on volunteer or decentralized IT management, and maintain sensitive personal and financial data, making them attractive targets. Additionally, disruption to operations such as services, community programs, or charitable activities can have outsized community impact. Organizations should prioritize basic but effective controls, including multi-factor authentication, regular backups, user awareness training, and incident response planning to improve resilience against these persistent threats.

 

Offensive AI: What Red Teams and Attackers are Doing Now

 

The Gate 15 “Offensive AI” piece explains how artificial intelligence is increasingly being leveraged by adversaries to enhance the speed, scale, and effectiveness of attacks across the threat landscape. It highlights that AI lowers barriers to entry for malicious actors by automating tasks like reconnaissance, vulnerability discovery, and exploitation, while also enabling more sophisticated social engineering through highly personalized phishing and deepfake content. The article emphasizes that offensive AI is not limited to cybercriminals but is also being adopted by nation-state actors and other threat groups, making attacks more adaptive and harder to detect. As a result, organizations must recognize that AI-driven threats are evolving quickly and require a shift in defensive strategies prioritizing resilience, improved detection, strong identity controls, and cross-functional preparedness to keep pace with increasingly intelligent and automated adversaries.

 

Weekly Security Sprint EP 153. Traveling Man, FBI Report, Hurricane Predictions, and More

 

The Gate 15 Security Sprint is a weekly rundown of the week’s notable all-hazards security news, risks and threats and some of the key focus areas for organizations to consider behind the headlines. Gate 15 team members discuss physical security, cybersecurity, natural hazards, health threats and other issues across our environment.

 

In this week’s Weekly Security Sprint Dave and Andy covered the following topics:

  • Gate 15: Leveraging AI for Proactive Physical Threat Detection and Emergency Response
  • Cloud Security Alliance: The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program
  • gov.au: Frontier models and their impact on cyber security
  • Canadian Centre for Cyber Security: Frontier artificial intelligence –
  • Anthropic: Glasswing
  • I. Is on Its Way to Upending Cybersecurity
  • S. Department of the Treasury: Treasury Launches Cybersecurity Information Sharing Initiative for the Digital Asset Industry
  • Strengthening American Leadership in Digital Financial Technology Digital Assets Report EO14178
  • Treasury debuts effort to share cyber threat intel with crypto firms
  • Crypto Firms Can Now Access Treasury’s Cybersecurity Info to Bolster Defense Against Attacks

 

Information on other Gate 15 podcasts can be found at Podcasts (gate15.global).

More Security-Focused Content

The FB-ISAO’s sponsor Gate 15 publishes a daily newsletter called the SUN. Curated from their open source intelligence collection process, the SUN informs leaders and analysts with the critical news of the day and provides a holistic look at the current global, all-hazards threat environment. Ahead of the daily news cycle, the SUN allows current situational awareness into the topics that will impact your organization.