Home Blog Page 23

Hackers Turn Personal, Targeting Google’s Defenders

0

On September 2, a hacker group calling itself the Scattered LapSus Hunters threatened Google with a data leak unless two of its top security experts, namely Austin Larsen and Charles Carmakal, were fired.

The demand, made through the messaging app Telegram, is unusual. Hackers typically threaten companies, not individuals. By naming names, the group has shifted the battle from a corporate fight to a personal one.

Google has not confirmed whether its systems were breached, but the threat alone points to a troubling change in how cybercrime is carried out.

Mr. Larsen and Mr. Carmakal are well-known inside Google’s security ranks. Both work in the Threat Analysis Group, a team that investigates major hacking operations.

Mr. Carmakal, once the chief technology officer at the cybersecurity firm Mandiant before Google bought it, has helped companies respond to some of the most significant data breaches of the last decade.

On the other hand, Mr. Larsen is recognized for his work tracking groups like Scattered Spider, a collective blamed for attacks on airlines, video game makers, and technology firms.

For the hackers, targeting these two men is about more than removing obstacles. It is about making the fight personal, and in doing so, undermining the confidence of the very people responsible for exposing their methods.

The coalition behind the threat appears to be a mix of three groups: Scattered Spider, Lapsu$, and ShinyHunters. Each has a history of bold attacks.

Scattered Spider is known for tricking employees into giving up login details, sometimes by hijacking phone numbers through a technique called SIM swapping. Lapsu$, which gained attention in 2022, broke into companies including Microsoft, Nvidia, and Okta, and often bragged about its successes online. ShinyHunters was behind a 2023 breach of the cloud company Snowflake, which exposed data from hundreds of corporate clients.

In early August, members of these groups began posting under the joint name Scattered LapSus Hunters. On Telegram, they shared stolen information, issued taunts, and made demands.

The channel was later banned, but not before showing how hackers now combine technical skills with intimidation tactics meant to pressure companies into compliance.

The personal targeting of Larsen and Carmakal illustrates how the fight has shifted. Cyberattacks are no longer only about stealing information or disrupting services.

They are now about weakening the people who protect against them, raising the risk of harassment, reputational damage, and personal stress for those on the front lines.

Experts say this new phase of cybercrime means companies must do more than secure their networks. They must also protect their staff.

That could mean limiting how much personal information about employees is publicly available, using stronger authentication for logins, monitoring for leaked data, and offering legal and emotional support when threats arise.

For Google, the demand tests its willingness to stand by its security team. For the wider industry, it marks a turning point. Hackers are no longer only attacking companies. They are naming individuals, bringing a corporate struggle into the personal lives of the people sworn to defend it.

A Decade-Old Bug Still Haunts America’s Smallest Agencies

0

When the FBI issued a public warning in August about Russian hackers abusing a long-known flaw in Cisco devices, the message wasn’t aimed at Wall Street or big tech. It was meant for the kinds of organizations most people rarely notice—local utilities and regional authorities that keep everyday services running and often operate with thin budgets and aging gear. On the same day, Cisco’s threat-intelligence team published technical details that underscored the risk.

The campaign is attributed to a Russian state-sponsored group that security researchers call Static Tundra, which they link to the F.S.B.’s Center 16 unit and to the broader cluster known as Energetic/Berserk Bear. According to US officials and Cisco researchers, the group has spent more than a decade compromising network devices as a beachhead for long-term espionage.

At the center is CVE-2018-0171, a vulnerability in Cisco’s Smart Install feature. Left unpatched, it exposes devices listening on TCP port 4786 and can allow attackers to crash equipment, seize control, or plant code that persists across reboots. Many victims, investigators say, are running end-of-life hardware that never received updates.

The FBI says the actors have recently collected configuration files from thousands of US networking devices tied to critical infrastructure, in some cases modifying settings to enable unauthorized access and reconnaissance. Cisco reports similar activity worldwide, with particular focus on Ukraine and allied countries since the war began.

While the current wave is aimed at data collection and access, the tradecraft echoes earlier router compromises. Investigators have tied the group to historic use of “SYNful Knock,” a stealthy firmware implant first documented in 2015 that gives attackers durable control over Cisco routers.

US agencies and Cisco urge organizations to take basic but often under-resourced steps: apply patches or disable Smart Install, implement phishing-resistant multifactor authentication, segment networks so a single failure doesn’t cascade, and audit internet-facing devices for unexpected changes. For small public agencies with limited staff, those measures can be difficult to sustain—yet they remain the strongest defense.

Vendor Weak Link: Allianz Life Breach Puts Third-Party Security Under the Microscope

0

In mid-July 2025, hackers gained unauthorized access to a cloud-based customer-management system used by Allianz Life Insurance Company of North America. The company disclosed the breach later that month.

The incident ranks as a significant breach at a major US life insurer in recent years, affecting a broad cross-section of the company’s policyholders, financial advisers, and employees.

Company officials said the attackers infiltrated the third-party platform on July 16 and retrieved a large set of personal records. The files contained routine identifiers—names, home and email addresses, phone numbers, and dates of birth—and, in some cases, more sensitive details such as Social Security numbers and tax identification numbers. Security experts note that once such identifiers are exposed, they can be exploited indefinitely for identity theft and fraud.

After identifying the intrusion, Allianz Life reported the breach to the Federal Bureau of Investigation. The company says there is no evidence that its internal corporate systems, including policy administration platforms and network infrastructure, were accessed. Early findings indicate the exposure was confined to a third-party system, though the scale of the incident has drawn scrutiny from regulators and consumer advocates.

By early August, Allianz Life had begun notifying affected individuals and offering 24 months of credit monitoring and identity-protection services at no cost. Consumer advocates caution that the risks can extend well beyond any monitoring period, because Social Security numbers and similar identifiers cannot be replaced or revoked.

Independent researchers, including the breach-reporting service Have I Been Pwned, as reported by SecurityWeek, have verified the scale of the leak and revealed that 72% of exposed email addresses had already appeared in prior breaches. This overlap enables criminals to combine older data with newly exposed details, building fuller profiles of victims that make phishing more persuasive and fraudulent account openings harder to detect.

The Allianz Life case also underscores the growing risk posed by outside vendors in financial services. According to Verizon’s 2025 Data Breach Investigations Report, about 30% of breaches involved third parties. That pattern points to a structural weakness: firms can invest heavily in their own defenses yet remain exposed through partners and contractors on which they rely.

Thus, the attack has renewed calls for stronger oversight of supply-chain partners and wider adoption of Zero Trust security models, which assume that no user or system should be trusted by default. Analysts say these approaches can be costly but remain among the most effective ways to limit the impact of intrusions of this kind.

Allianz Life has filed breach notices with several state attorneys general, including Maine and Washington, and reviews are underway. The case is likely to give added momentum to state privacy measures and to renew calls for a single, nationwide data-security standard.

For Allianz Life, the breach represents not only a technical incident but also a reputational test. Trust sits at the center of life insurance and retirement planning, and a public loss of confidence can carry lasting consequences.

With IronCircle’s Move, Maryland Pushes to Build the Nation’s Cyber Talent Hub

0

On an August morning in Columbia’s Merriweather District, Governor Wes Moore joined IronCircle executives to cut the ribbon on the company’s new global headquarters. The move from Florida to Howard County is expected to bring more than 200 jobs, and for Maryland officials, it represents another step in shaping the state into a hub for cybersecurity.

The decision to relocate was partly driven by geography because Columbia sits within a short drive of Fort Meade, home to the National Security Agency and U.S. Cyber Command. That proximity, combined with a dense network of contractors and technology firms, has made central Maryland one of the busiest cyber corridors in the country.

With such a concentration of federal agencies and private firms, Maryland has seen a surge in demand for skilled workers. State figures show that more than 24% of information technology job postings in Maryland now require cybersecurity skills.

However, even with starting salaries exceeding $100,000, employers continue to struggle with hiring. Across the United States, workforce trackers estimate that more than half a million cyber jobs were listed over the past year, leaving gaps that affect not just corporations but also schools, hospitals, and even local governments.

IronCircle has built its business model around this shortage through its training platform. It utilizes artificial intelligence to simulate cyberattacks and adjusts the difficulty level based on the learner’s skills. IronCircle claims to bridge the gap between classroom instruction and the speed of real-world threats. From its new Maryland base, the firm plans to expand its workforce and increase opportunities for contractors, instructors, and institutions that already utilize its platform.

For Moore, the relocation aligns with a broader strategy. His administration has directed millions of dollars to community colleges to expand cyber courses, including funding for new training labs. It has also steered money to programs such as Cyber Maryland, which aims to connect schools, businesses, and government agencies in developing the workforce.

State leaders argue that investments like these are already paying off. Maryland has nearly 19,000 information technology businesses, generating about $80 billion in annual output and employing more than 124,000 people. Howard County alone is home to almost 300 cybersecurity firms, a cluster that provides students and professionals with a direct path from training to employment.

James C. Foster, IronCircle’s chief executive, has warned that the gap remains even as training programs multiply and salaries climb. Forster argued that the shortage of cyber talent is “growing by the year,” and with advances in technology continually raising the bar, new demands continue to emerge that even schools and companies struggle to meet.

Artificial Intelligence, for example, illustrates that tension. Although the tool is being used to train workers and strengthen defenses, it is also available to attackers. Britain’s National Cyber Security Centre has cautioned that AI is lowering the barrier for would-be criminals and is likely to drive a rise in ransomware within the next two years.

That dynamic has made workforce development both an economic and a security concern for the state of Maryland. A vacancy can leave a small business, a hospital, or a school system more vulnerable. Filling that role not only brings a paycheck but also adds to the state’s resilience at a time when nearly every part of the economy depends on secure networks.

IronCircle’s new headquarters is one piece of that puzzle. Its presence in Columbia reflects the state’s bet that building the workforce will bring jobs and also strengthen its role in defending against the next wave of digital threats.

Cybersecurity Turns Proactive as Companies Attack Themselves Before Hackers Do

0

Security leaders are rethinking the way they defend their networks. What used to be a system that was built solely on the defensive has evolved into a more proactive approach, with companies choosing to attack themselves first to expose weaknesses.

This “new idea” of securing networks was recently highlighted in a TechRadar Pro analysis that detailed a significant shift in how organizations think about cybersecurity. For decades, cybersecurity networks were built on a defensive approach: create walls, patch systems, and respond when intruders broke through.

Today, as attacks become faster and more sophisticated, many security teams are turning to controlled intrusions through staging their own red team exercises, automating penetration tests, and simulating exploits to determine weaknesses before criminals do.

And this approach is being driven by a new reality—AI.

Cyberattacks have not only grown in number in recent years but also in sophistication, with artificial intelligence powering everything from malware that adapts in real time to phishing emails that look indistinguishable from genuine communication.

While exact figures vary, the damage is rising. For example, average ransomware payments passed the million-dollar mark, more than twice the level of the previous quarter, according to ITPro. Investigators say the surge is less about one-off cases and more about a shift in tactics.

Criminal groups are leaning on AI tools to automate tasks that once slowed them down—writing convincing phishing messages, tailoring malware on the fly, and scaling campaigns that previously required large crews.

The speed and scale made possible by artificial intelligence are what alarm researchers most. They point out that the very tools helping criminals accelerate their operations could just as easily be placed in the hands of defenders. And that tension has led many in the field to call AI a double-edged sword. The same algorithms that allow attackers to scan entire networks for misconfigurations or generate new exploits in minutes can also be used by security teams to probe their own systems with equal intensity.

Academic studies have shown that AI can accelerate the discovery of weaknesses, but most experts caution against overstating precision metrics. What is clear, however, is that AI has collapsed timelines on both sides of the battle.

One instance is that the Cybersecurity and Infrastructure Security Agency has repeatedly encouraged critical infrastructure operators to adopt proactive security practices. In recent advisories, the agency pointed to red team assessments and the testing of AI models under stress as examples of methods that can strengthen resilience.

The Department of Homeland Security even went further in 2024 by publishing AI safety and security guidelines that urged operators to move beyond static defenses and treat cyber readiness as a continuous process.

For many security officers, the shift is not about abandoning traditional safeguards but about changing the timeline. Firewalls, detection systems, and antivirus software remain essential, but they are no longer seen as enough on their own.

The priority is to discover vulnerabilities during a drill, not in the middle of a crisis. The strategy, however, is not without complications. Misconfigured test environments can cause outages, and some organizations worry about blurring the line between a controlled simulation and a real-world breach.

Despite the risks, momentum is building. Analysts and industry experts believe that offensive testing, powered in part by AI, will move steadily into the mainstream. Within a few years, many expect it to be a standard part of security programs across both business and government.

What is emerging is a new kind of playbook. Security teams are no longer content to defend passively. Instead, they are trying to think like their adversaries, act first, and build systems that can withstand the next wave of attacks before it arrives.

New Mexico Colleges Take a $102 Million Blow as Federal Research Stalls, With Tribal Schools Bracing for Deeper Cuts

State officials in New Mexico say public colleges face about $102 million in losses from canceled federal research grants, stop-work orders, and delayed projects. The state Higher Education Department says the disruption is already affecting public colleges, special schools, and the University of New Mexico Health Sciences Center, with the heaviest losses at research-reliant campuses.

The New Mexico Institute of Mining and Technology faces the largest gap at $32 million, followed by New Mexico State University at $19 million and New Mexico Highlands University at $18 million. Stephanie Rodriguez, New Mexico’s higher education secretary, said her agency is tracking the impact on campuses and sharing the information with the governor’s office and the Department of Finance and Administration to inform decisions in the 2026 session.

The budget strain comes as the department conducts its annual capital outlay assessments through visiting campuses to review infrastructure needs ahead of funding decisions. This year, higher education institutions requested nearly $500 million for construction and repairs. Still, the department estimates only about $300 million will be available, which means many projects will be delayed even without the federal funding disruption.

Tribal colleges and universities in New Mexico and across the country are facing an even more acute threat. The administration’s fiscal year 2026 budget proposal would reduce operations funding for Bureau of Indian Education post-secondary programs from about $183.3 million to $22.1 million, an 88% cut that would take effect on October 1, 2025, if Congress enacts it. Those programs include career and technical schools, community colleges, and four-year institutions that serve Native students.

According to the American Indian Higher Education Consortium, tribal colleges depend on federal funding for about three-quarters of their operating budgets. Leaders have warned that if the proposal is enacted, some campuses could close, eliminating jobs and displacing students. At the Institute of American Indian Arts in Santa Fe, where roughly 80% of students are Native and 92 federally recognized tribes are represented, administrators have been working with New Mexico’s congressional delegation to preserve funding.

The funding debate comes against a backdrop of longstanding underinvestment in tribal higher education. A 2024 investigation by ProPublica and The Hechinger Report found that Congress underfunds the nation’s 37 tribal colleges by about $250 million each year compared with what federal law authorizes. The 1978 Tribally Controlled Colleges and Universities Assistance Act sets base funding at $8,000 per Native student, adjusted for inflation, but appropriations have rarely met that level. Advocates argue the shortfall undermines commitments tied to the federal trust responsibility to Native nations.

State and federal officials have not yet said how they will address the looming gaps. In Washington, a House panel advanced an Interior–Environment spending bill that provides overall funding for the Bureau of Indian Education but does not spell out post-secondary program levels. In Santa Fe, HED is feeding impact data to state budget officials as they prepare recommendations for the 2026 session, while college leaders say the outcome in Congress could determine whether some campuses can continue operating.

Cyberattack on Federal Courts Exposes Vulnerabilities in Judiciary’s Aging Systems

0

A major cyber intrusion has compromised critical systems used by the US federal courts, disrupting operations in multiple districts and raising fears of potential exposure of sensitive case records. The breach, which was publicly confirmed by the Administrative Office of the US Courts (AO) on Aug. 7, affected the judiciary’s two primary digital platforms: the Case Management/Electronic Case Files (CM/ECF) system and PACER—two essential portals responsible for providing public access to court filings.

According to officials familiar with the matter, the attack was detected in early July and is now under investigation by the Department of Justice, the Department of Homeland Security, and other federal partners. While the AO did not describe the incident as a complete shutdown, several courts have taken portions of their filing systems offline as a precaution. Some sensitive filings are being handled outside of the electronic system entirely.

The AO called the incident a “serious compromise” of judicial infrastructure, one that prompted immediate steps to limit access and strengthen security protocols. The move follows years of warnings from the Government Accountability Office and judiciary officials that the courts’ digital systems (which were built decades ago) are increasingly vulnerable to sophisticated cyber threats.

Federal agencies have not yet confirmed who was responsible. A recent update, however, revealed that investigators are examining whether the breach is linked to Russian-affiliated hacking groups due to similarities with previous espionage campaigns. But officials stress that attribution remains preliminary, and it could take months before they know the full scope of the attack or whether any sealed or classified materials were taken.

What is clear, however, is that any leak of confidential case records could have far-reaching consequences. This might include exposure of sealed filings that could jeopardize active law enforcement operations, reveal the identities of confidential informants, or be used to intimidate witnesses.

In Washington, the incident has triggered calls for accountability and reform. Members of Congress, already briefed on the breach in late July, have requested classified follow-ups and are pressing for public hearings. Lawmakers from both parties say the episode underscores the judiciary’s chronic underinvestment in cybersecurity.

CISA, the Cybersecurity and Infrastructure Security Agency within DHS, is sharing threat information and technical guidance with the judiciary as the investigation unfolds. Forensic teams are combing through compromised networks to determine how the attackers gained access and whether they altered or removed records.

However, restoring secure, nationwide digital access will not be quick. Officials say the process will unfold in phases, beginning with hardening existing systems and expanding protections for high-risk cases.

For the judiciary, which has long operated with far less cybersecurity attention than executive branch agencies, the breach marks a sobering shift. The courts, once considered a lower-priority target for foreign adversaries, are now firmly in the crosshairs.

And for a democracy built on the rule of law, the warning is plain: safeguarding the integrity of judicial records is no less critical than protecting the ballot box.

New Mexico Overhauls Graduation Rules for the Class of 2029

For the first time in more than a decade, New Mexico is changing what it takes to graduate from high school. In an overhaul that state leaders believe will make “learning more relevant to students’ lives,” a new personalized requirement has come to light.

Starting with the Class of 2029, Algebra II, long a flashpoint in education debates, will no longer be required for everyone. Although districts are still required to offer the course, students can now choose other math classes that better match their career plans or personal interests.

The standard requirement of 24 credits, which includes 4 years of English and Math to earn a diploma, remains the same.

This change was signed into law in 2024 under House Bill 171. The law gives each district and charter school the power to set two elective credits of their own, tailored to local needs. Supporters say it marks a shift away from a one-size-fits-all checklist toward a more flexible system.

“It’s really connecting students to like why they go to school, and really finding what their own passions and interests are, and not making every student’s career path in high school look the same,” said Gabriella Durán Blakey, superintendent of Albuquerque Public Schools.

One thing that the public needs to know about this overhaul is that the state’s core requirements remain largely intact: three years of science and four years of social science. The social studies sequence must now include U.S. history and geography (with New Mexico history woven in), world history and geography, and a government and economics course that incorporates personal financial literacy.

Albuquerque, the state’s largest district, will go further. Starting in 2025–26, it will require a half-credit in Personal Financial Literacy and add 1.5 extra elective credits.

Amanda DeBell, a deputy secretary at the Public Education Department, said that flexibility will allow districts to shape courses around their communities. “For example, we see districts offering more agricultural-type electives… or we see additional language courses being added as a requirement,” she said.

New Mexico’s graduation rules had not been updated since 2009. In earlier reform attempts, Algebra II was the sticking point — viewed by some as essential preparation for college math, and by others as an unnecessary hurdle for students headed into other fields.

The decision to drop it as a blanket requirement follows a national trend. For example, Oregon now uses a “2+1” model, where the third math credit can be filled with classes like data science or quantitative reasoning. Florida requires Algebra 1 and Geometry, but allows other rigorous math courses in place of Algebra II.

Financial literacy mandates are also spreading. According to the nonprofit Next Gen Personal Finance, 27 states now require a stand-alone course in personal finance for graduation. Advocates say these classes teach vital skills for adulthood, while critics warn that quality depends on how well they are taught.

Districts have little time to act. This fall’s first-year students will be the first to graduate under the new rules, and schools must decide within weeks which locally designed electives they will offer.

University of New Mexico Moves to Tighten Campus Security After Dorm Shooting

The University of New Mexico has pledged a sweeping overhaul of its campus safety policies after the fatal shooting of a 14-year-old boy in a residence hall last month. Speaking to students, staff, and the media during an August 1 briefing, university leaders detailed both immediate and long-term changes aimed at closing security gaps and restoring trust in the institution’s ability to keep its community safe.

The briefing came in the wake of the July 25 shooting at the Casas del Rio dormitories, which left Michael LaMotte dead and another youth wounded. Police say the suspects were not enrolled at UNM.

This fact has fueled questions over how outsiders gained access to student housing and whether the university’s current security measures are sufficient for an urban campus of its size. The shooting has shaken the campus and surrounding neighborhoods, sparking difficult conversations about how an open, public university can protect its students without shutting itself off from the community it serves.

President Garnett S. Stokes opened the session by acknowledging the grief felt across campus and offering condolences to LaMotte’s family. She said the safety of the campus comes before everything else and asked students, faculty, and staff to help strengthen it.

“This is not the work of administrators alone,” Stokes said. “It’s a collective effort to protect one another.” Her call for collaboration set the tone for a briefing that alternated between policy commitments and appeals for community engagement.

Executive Vice President Teresa Constantinidis said the university has begun a top-to-bottom review of its safety policies and day-to-day security practices. The goal, she explained, is a “thoughtful analysis” — not only to address the weaknesses revealed by the shooting but also to create safeguards strong enough to stop future incidents before they happen. Constantindis also confirmed that these safety policies are already in motion, with officials looking at everything from who can get into residence halls to how fast emergency alerts go out.

In its press release, the university provided updates on several projects tied to that review as already underway. These efforts include new fencing installed around student housing, more buildings converted to key-card access, and additional lighting going up in areas where dim conditions have long made people uneasy at night.

She said that work on the review has already begun, with officials looking closely at everything from how people get into campus buildings to how quickly emergency messages reach students and staff. University updates describe several of these projects as already moving forward: new fencing is going up around residence halls, more buildings are being switched to key-card entry, and extra lighting is being added in spots where poor visibility has long made people uneasy.

Other outdated emergency systems, such as Blue Light phones, are being replaced with brighter, more reliable units, and upgrades to the Lobo Alert system to improve the speed and reach of emergency notifications.

These steps build on more than $20 million invested in safety enhancements over the past five years, including lighting, cameras, and access controls. This figure, officials say, underscores the scale of the university’s commitment to security.

President Stokes is also putting more emphasis on training, from how to respond in an active-shooter situation to understanding and preventing sexual harassment. Those sessions are being reviewed and updated so they reflect current risks and reach everyone on campus.

Picking up on that theme, Police Chief Joseph Silva stressed the need for vigilance as he reminded the audience of UNM’s zero-tolerance policy on firearms. He also urged students and staff to speak up about anything that feels unsafe. “If you see something, say something,” he said, noting that the department is working on practical ways to help people recognize and report potential threats sooner.

As part of a push to make the campus perimeter more secure, UNM recently bought the former Motel 6 on Avenida César Chávez. The property, which sits near the South Campus entrance, will be redeveloped into a safer and more welcoming gateway for students and visitors.

UNM officials note that LoboAlerts are not limited to enrolled students, faculty, and staff. Parents, community members, and others without a UNM account can receive alerts by following LoboAlerts on Twitter or Facebook, or by registering through the UNM Community text platform. The system is designed to share critical updates with anyone who signs up, including people outside the immediate campus.

The shooting at Casas del Rio exposed some clear gaps in how the campus is secured, from how easily outsiders were able to get inside a dorm to how long it took for word of the danger to spread. In the days since, university leaders have pointed to those failures as the driving force behind their safety plans. Some changes, like brighter lighting and stepped-up patrols, are already visible on campus, while larger projects will take more time to finish.

For President Stokes, the challenge now is turning plans into lasting change. “We can’t undo what happened,” she said. “But we can honor Michael’s memory by making sure our campus is safer for everyone who calls it home.” Whether that goal becomes reality will depend on more than fences, lights, and alerts — it will rest on how fully students, faculty, and neighbors join the effort to watch out for one another.

University of New Mexico Launches Groundbreaking Bilingual Program for Early Childhood Communication Needs

The University of New Mexico’s Department of Speech and Hearing Sciences has launched Project MESA—a first-of-its-kind program in the state aimed at training bilingual, culturally responsive speech-language pathologists to serve young children with special needs.

Funded through a five-year federal grant, Project MESA—short for Multilingual, culturally responsive, Early childhood Social communication Approaches—prepares graduate students to work with children from birth to age six, particularly those with speech delays, autism, or other communication challenges.

The program will emphasize bilingualism, cultural humility, and community engagement, with a focus on serving families who speak Spanish or Indigenous languages such as Diné.

“We’re not just building skills—we’re building trust,” said Associate Professor Cindy Gevarter, Project MESA’s director. “When families see themselves reflected in their providers, real progress happens,” she added.

The need for certified and bilingual SLPs is pressing. According to the American Speech-Language-Hearing Association, fewer than 9 percent of speech-language pathologists nationwide are proficient in Spanish or Indigenous languages. And in New Mexico, where multilingualism is woven into daily life, the shortage leaves many families without adequate support.

Project MESA addresses this gap directly. Its first cohort includes four bilingual Spanish-speaking scholars who are now working in the community. The program also runs a summer clinic where students apply their training under the guidance of veteran clinician Mary Hartley, who has spent more than 35 years working with children in the state.

“We’re serving more families because we’re training more bilingual clinicians,” Hartley said. “The summer clinic is a highlight—it’s where students put everything into practice, and families receive services they might not otherwise access.”

Students accepted into the two-year program receive tuition assistance, mentorship, and community-based learning opportunities. They will tackle curricula such as the Bilingual Concentration track focused on culturally responsive care, bilingual assessment, and specialized intervention strategies.

Furthermore, sixty-five percent of the grant funds go directly toward student support, covering both tuition and living expenses.

“This isn’t just about becoming a therapist,” said Grant Manager Jessica Nico. “It’s about embedding cultural humility and responsiveness into every aspect of training.”

In addition to traditional speech therapy methods, Project MESA integrates Naturalistic Developmental Behavioral Interventions (NDBIs) and Augmentative and Alternative Communication (AAC) tools to better connect with children in comfortable, meaningful ways.

By the end of the grant’s five-year span, the program will have trained 12 specialists equipped to serve in under-resourced communities across the Southwest, potentially transforming access to early communication support in the region.