RSS feed source: Federal Emergency Management Agency

CHARLESTON, W.Va. – Because of weather, the FEMA-West Virginia Disaster Recovery Center in McDowell County is closing at 3:30 p.m. Tuesday, May 20, 2025.

Center information: 

McDowell County Disaster Recovery Center

Bradshaw Town Hall

10002 Marshall Hwy

Bradshaw, WV 24817

Normal hours of operation:

Monday to Friday: 9 a.m. to 6 p.m.

Closing Tuesday, May 20, 2025 at 3:30 p.m.

Survivors do not have to visit a disaster center to communicate with FEMA. They can call 800-621-3362 (FEMA). The toll-free telephone line operates from 7 a.m. to 11 p.m., seven days a week. If you use a relay service, such as video relay service (VRS), captioned telephone service or others, give FEMA the number for that service. They can also go online to DisasterAssistance.gov or download the FEMA app on their smartphone.

If you have received a letter from FEMA about your application status, contact FEMA to learn more about next steps.  Staff can help you submit additional information or supporting documentation for FEMA to continue to process your application and answer any questions you may have.

For more information on West Virginia’s disaster recovery, visit emd.wv.gov, West Virginia Emergency Management Division Facebook page, www.fema.gov/disaster/4861 and www.facebook.com/FEMA.

###

FEMA’s mission is helping people before, during and after disasters.

Follow FEMA online, on X @FEMA or @FEMAEspanol, on FEMA’s Facebook page or Espanol page and at FEMA’s YouTube account. 

For preparedness information follow the Ready Campaign on X at @Ready.gov, on Instagram @Ready.gov or on the Ready Facebook page.

Click this link to continue reading the article on the source website.

RSS feed source: Federal Emergency Management Agency

Full Proposal Deadline(s) (due by 5 p.m. submitting organization’s local time):

August 25, 2025

Track 1

September 25, 2025

Track 2 (Submission of a Concept Outline by August 25th is required. See full text for additional information)

IMPORTANT INFORMATION AND REVISION NOTES

A Concept Outline (CO) is required for Track 2 only. PIs interested in responding to Track 2 of this solicitation must submit a Concept Outline to [email protected] by August 25, 2025 prior to submission of a proposal to aid in determining the appropriateness of the scope and work for consideration under this opportunity.

Any proposal submitted in response to this solicitation should be submitted in accordance with the NSF Proposal & Award Policies & Procedures Guide (PAPPG) that is in effect for the relevant due date to which the proposal is being submitted. The NSF PAPPG is regularly

Click this link to continue reading the article on the source website.

RSS feed source: Federal Emergency Management Agency

Summary

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors. According to FBI information and trusted third-party reporting, this activity has been observed as recently as May 2025. The IOCs included in this advisory were associated with LummaC2 malware infections from November 2023 through May 2025.

The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of LummaC2 malware.

Download the PDF version of this report:

AA25-141B Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations (PDF, 1.28 MB )

For a downloadable copy of IOCs, see:

AA25-141B STIX XML (XML, 146.54 KB ) AA25-141B STIX JSON (JSON, 300.90 KB ) Technical Details

Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for threat actor activity mapped to MITRE ATT&CK

Click this link to continue reading the article on the source website.