- Comparitech Stack Report
- Posts
- Interlock Claims Responsibility for Winona County Breach
Interlock Claims Responsibility for Winona County Breach
⚡ Weekend Threat Brief
Interlock Claims Responsibility for Winona County Breach
The ransomware group Interlock has claimed responsibility for the April cyberattack on Winona County, Minnesota. The county first disclosed the incident on April 9 after taking systems offline to contain the attack. Residents were warned to expect service delays while recovery efforts began.
Interlock says it stole more than two million files and has posted sample documents on its leak site to support its claim. Winona County has confirmed that data taken during the attack was later released online, though officials have not verified the group’s full claims. The county has also declined to disclose what information was exposed, whether a ransom was demanded, or if any payment was made.
This was the county’s second ransomware incident in 2026. A separate attack in January led to a state of emergency. County officials say the April attack was carried out by a different threat actor. They also noted that security upgrades already underway helped detect and contain the second breach more quickly.
Takeaway:
Repeat ransomware attacks often expose lingering weaknesses or incomplete recovery efforts
Data theft now remains a major risk even when systems are restored quickly
Security improvements made after an initial attack can greatly improve detection and response during future incidents
🎯 Tactical Playbook
Why Lawmakers Are Scrutinizing Chinese AI in Critical Infrastructure
U.S. lawmakers are examining the cybersecurity risks tied to Chinese-built AI models deployed in critical infrastructure. The concern is not only data privacy. It is also about supply chain trust, model integrity, and the possibility of hidden vulnerabilities in systems that support power grids, manufacturing plants, and transportation networks.
As AI becomes part of operational technology, the attack surface grows. Organizations must treat AI models as software supply chain assets, subject to the same security reviews, testing, and governance controls as any other critical component.
Key Takeaway:
AI models should undergo security reviews before deployment in critical environments
Provenance, training data, and update mechanisms matter as much as model performance
Critical infrastructure operators should require strong vendor transparency and independent validation
🛡️ Research Watch
NSA and Global Partners Issue New Guidance on Agentic AI Security
The National Security Agency, together with international cybersecurity partners, has released new guidance on securing agentic AI systems. These systems can make decisions and take actions with limited human input, which raises both opportunity and risk.
The guidance focuses on secure design, access controls, oversight, and clear operational boundaries. As organizations begin using autonomous AI for security, operations, and analysis, governance must keep pace. Autonomy without guardrails is simply risk at machine speed.
🧩 Tool Tip of the Week
Get More From PRTG With Dependency Mapping
In Paessler PRTG Network Monitor, use device dependencies to reduce alert noise during outages. When a core router or switch fails, dozens of downstream devices can trigger separate alerts. Dependency mapping tells PRTG which systems rely on others.
When the parent device goes down, PRTG suppresses child alerts automatically. That gives your team one actionable incident instead of a flood of false alarms. It is one of the easiest ways to improve signal-to-noise ratio in a busy monitoring environment.
🗣️ Community Signal
The reality of today’s cybersecurity landscape is a cycle of noise and reactive patches. Organizations are currently struggling with "vulnerability fatigue," a state where security teams are overwhelmed by thousands of alerts, most of which are never addressed due to manual constraints and a global shortage of experts. - Dragan Pleskonjic, Founder & CEO @ Glog.AI
🗳️ Your Take - The Results

|
Until Monday’s edition - Let’s keep that zero-day count at zero!
*Terms & Conditions apply. Not available if with Metro in the last 180 days. If using >35GB/mo. May notice reduced speeds.