Attacks, Threats, and Vulnerabilities
Russia's FSB reports 'unprecedented' hacking campaign aimed at government agencies (Reuters) Foreign hackers compromised Russian federal agencies in a digital espionage campaign that Russian officials described as unprecedented in scope and sophistication.
Chinese hackers are attacking Uyghurs by posing as UN Human Rights Council (MIT Technology Review) Chinese-speaking hackers are targeting Uyghur Muslims with fake United Nations reports and phony support organizations, according to a new report.
Minority report: Fake human rights documents and websites used in cyberattacks targeting Uyghurs, a Turkic ethnic minority in China (Check Point Software) Highlights Check Point Research (CPR), in collaboration with Kaspersky's Global Research & Analysis Team (GReAT), have been tracking an ongoing attack
Colonial Pipeline Missed Requested Security Review Before Hack (Wall Street Journal) Colonial Pipeline last year didn’t undergo a requested federal security review of its facilities and was in the process of scheduling a separate audit of its computer networks when hackers hit on May 7.
Why the Colonial Pipeline ransomware attack is a sign of things to come (Fast Company) From work-from-home culture to cryptocurrency’s mainstreaming, many trends are bolstering the work of ransomware criminals. And there are no easy fixes.
Cyber Innovation Center explains ransomware hack (KTBS) After a group of hackers attacked a critical pipeline that supplies fuel to much of the east coast and parts of the south, KTBS 3 reached out
'World's Leading Bank Robbers': North Korea's Hacker Army (SecurityWeek) Nuclear-armed North Korea is advancing on the front lines of cyberwarfare, analysts say, stealing billions of dollars and presenting a clearer and more present danger than its banned weapons programmes.
Belgium government discovers old 2019 hack during Hafnium investigation (The Record by Recorded Future) Belgian officials said that hackers breached the network of its interior ministry in a security incident that took place in April 2019.
Belgium Interior Ministry Targeted in Cyber Attack (SecurityWeek) The Belgian interior ministry has found itself the target of "sophisticated" cyber espionage campaign that is believed to have been launched in 2019.
Belgium uproots cyber-espionage campaign with suspected ties to China (CyberScoop) A Belgian government ministry said this week that it was the victim of a cyber-espionage campaign that began two years ago, one that has apparent links to Beijing.
New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks (Dark Reading) The Agrius group's focus appears to be Israel and the Middle East.
Hackers release patient data stolen from New Zealand health systems (TheHill) Hackers sent patient data stolen during an attack on New Zealand’s Waikato District health system to local media outlets on Wednesday, with the outlets declining to publish the sensitive information.&
Cyber security firm says 'even chance' it could break Waikato DHB ransomware (Stuff) Nelson based Emsisoft has helped Ireland deal with attack for free and is hoping to talk to DHB in case it can assist.
HSE still 'very compromised' following cyber attack (RTE.ie) The Health Service Executive remains very compromised following the cyber attack on its IT systems, but some progress is being made, according to Chief Operations Officer Anne O'Connor.
HSE cyberattack's impact may not be apparent for ‘days or weeks’ (BreakingNews.ie) Dr Paolo Palmieri, a cyber security lecturer at University College Cork, told breakingnews.ie that it may be days or weeks before individuals are targeted
If you use this healthcare provider, your medical records might’ve been stolen in a data breach (BGR) One of the bits of news that has been especially frustrating to watch in recent weeks is the spate of ransomware attacks and data breaches pulled off by utterly despicable hackers who’ve deci…
Trinity Health System Reports Data Breach Exposing Confidential Information (WTRF) (WTRF)- Trinity Health System reported a data breach that exposed confidential information during a network breach. The data breach was not done by Trinity Health System but by by a third party ven…
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web (Vice) The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
The Transition to 5G: Security Implications of Campus Networks (Trend Micro) The 4G/5G campus network demonstrates the growing role of telecom technologies in different industries. Organizations and IT/OT experts need to keep up with these changes and consider their security implications.
As Chips Shrink, Rowhammer Attacks Get Harder to Stop (Wired) A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed.
Nearly 50,000 IPs Compromised in Kubernetes Clusters (GovInfoSecurity) Researchers at Trend Micro say that about 50,000 IPs have been compromised across multiple Kubernetes clusters in a wormlike attack by the cloud-focused
Canada Post reveals supplier data breach involving shipping information of 950,000 parcel recipients (The Daily Swig) Names and postal addresses leak blamed on malware attack
Various Japanese government entities had data stolen in cyber attack: Report (ZDNet) Japanese government data stored in Fujitsu software has reportedly been accessed and stolen by hackers.
Fujitsu suspends ProjectWEB platform after Japanese government hacks (The Record by Recorded Future) Japanese tech giant Fujitsu has temporarily taken down its ProjectWEB enterprise software-as-a-service (SaaS) platform after hackers gained access to its systems and stole files belonging to multiple Japanese government entities.
Frustration over Scripps cyberattack, hospital confirms it 'involved ransomware' (KGTV) It's been 24 days since Scripps Health was first hit with a debilitating malware attack, but patients continue to reach out with concerns over care.
NHS plans to share data, "leaks will inevitably happen" (Healthcare Global) As England's NHS plans to share medical records with third parties, CybelAngel's security analyst David Sygula tells us about the risks this poses
Implications of Domino’s data breach and how you can safeguard your data (The News Minute) Two months after customer data of Domino’s Pizza was breached and days after the hackers made the data publicly searchable, parent company Jubilant FoodWorks informed customers that it experienced an “information security incident” on March 24. Similar to the statement issued by the company earlier, the communication to customers says that no financial information was compromised.
Explained: What is the Air India data breach that has hit its customers? (The Indian Express) Air India data breach: The airline said the cyber-attack that compromised the data of millions of passengers from across the world involved personal data registered between August 26, 2011 and February 20, 2021.
Oklahoma City dental practice announces data breach (KFOR.com Oklahoma City) An Oklahoma City dental practice says a hard drive that contained patient information has been stolen.
Security Patches, Mitigations, and Software Updates
Google Patches 32 Vulnerabilities With Release of Chrome 91 (SecurityWeek) Chrome 91 patches half a dozen high-severity use-after-free vulnerabilities.
Rising Cyberattacks in West Highlight Vulnerabilities (SecurityWeek) A series of high-profile cyberattacks on targets in the West have highlighted the vulnerability of companies and institutions, making the issue a higher public priority but with no easy solution.
How SolarWinds Changed Cybersecurity Leadership's Priorities (InformationWeek) A new survey shows how IT security leaders have changed their focus after the SolarWinds attack and a year of the pandemic.
Check Point Research: Asia Pacific experiencing a 168% year on year increase in cyberattacks in May 2021 (Check Point Software) Check Point Research (CPR) has revealed a staggering 168% year on year increase in the number of cyberattacks in Asia Pacific (APAC) when compared to May
Cyber Insurance Losses Spark Rate Increases (Fitch Ratings) U.S. property/casualty insurers active in providing cyber insurance coverage are taking significant pricing and underwriting actions in 2021 in response to a spike in cyber claims with immediate improvement unlikely this year, according to Fitch Ratings in a new report.
Cybersecurity monitoring and threat prevention startup Uptycs raises $50M (VentureBeat) Cloud security analytics and threat prevention platform Uptycs today announced it has raised a $50 million round.
Accenture snaps up Industrie&Co (CRN Australia) To boost cloud practice.
The U.S. Is Back in the 5G Game (Wall Street Journal) The U.S. campaign against Huawei has opened the cellular-equipment market to a host of new players that previously didn’t seem to have much of a chance.
Quantum computing investments on the rise (Help Net Security) Investments in quantum computing are expected to increase in the next 24 months, according to the survey results from IDC.
Mission-critical: Northern Virginia sets out to solve the cybersecurity workforce shortage (Security Magazine) What the COVID-19 crisis is ultimately doing to the cybersecurity industry is shining a spotlight on the cybersecurity talent shortage.
Palantir Makes Batman a Reality. Buy PLTR Stock to Own the Real World Wayne Enterprises. (InvestorPlace) Palantir is making the 'wonderful toys' Batman uses to fight crime a reality. Buy PLTR stock to own the closest thing to Wayne Enterprises.
Community Standards Enforcement | Transparency Center (Facebook) Report on how we’re doing at enforcing our policies.
IDology Wins Series of Leadership, Industry and Customer Service Excellence Awards (PR Newswire) IDology, a GBG Company, announced today it has been recognized with multiple industry awards for outstanding customer service and innovative...
CompTIA ISAO Announces Members of its MSP Champions Council (CompTIA) Cybersecurity experts from leading organizations across the information technology (IT) industry and its community of managed services providers (MSPs) have been selected to serve on the inaugural MSP Champions Council of the CompTIA Information Sharing and Analysis Organization (ISAO). The announcement was made today by CompTIA, the nonprofit association for the IT industry and workforce.
Trustwave Adds Top Talent to Senior Leadership Team to Support Its Rapid Growth in MDR (BusinessWire) Trustwave today announced the appointment of two new members to its senior leadership team.
Jaco joins MemCrypt to tackle ransomware threat (Daily Business) Tech entrepreneur Pete Jaco has been appointed chief executive of a university spin-out tackling the multi-billion pound ransomware market.
Forcepoint appoints transformational sales leaders to accelerate global growth of data-first SASE security (Zawya) Former Forescout and F5 Networks sales leaders Myles Bray as Senior Vice-President of EMEA Sales and Peter Brant as Senior Vice President of North America Sales
Products, Services, and Solutions
Imperva® Introduces Data Privacy Solution to Help Manage Sensitive Data (GlobeNewswire) Imperva Sonar Platform enhanced with Data Privacy solution monitors, protects and reports on personal data across all data assets
Adaptiva Helps Enterprises Achieve Maximum Health, Compliance and Performance With Endpoint Health Advancements (BusinessWire) Latest Endpoint Health features and health checks empower enterprises to quickly identify and resolve issues with ease, without impacting the network.
Zix Expands Global Partner Program in the United Kingdom and Germany (BusinessWire) Zix Corporation (Zix), (Nasdaq: ZIXI), a leading provider of cloud email security, productivity, and compliance solutions, today announced the expansi
Egnyte Expands its Multicloud Content Governance Ecosystem (PRWeb) Egnyte, the unified content security, compliance, and collaboration solution for multicloud businesses, today announced new integrations with Google ...
All Covered reduces security incidents by 70 percent with Bitdefender (Channel Futures) In this case study, you will see how All Covered, a leading MSP 501, leveraged Bitdefender to reduces seurity incidents by 70% in their MSP practice.
Blue Hexagon offers Agentless Cloud-Native AI Security at Runtime for Google Cloud (Yahoo Finance) Blue Hexagon Inc. offers one of the only agentless deep learning powered threat defenses that combines with Google Cloud’s Packet Mirroring.
CrowdStrike Accelerates Security Transformation With New Store Partner Integrations from Rapid7, Google Cloud, ExtraHop and Siemplify (Yahoo Finance) CrowdStrike Accelerates Security Transformation With New Store Partner Integrations from Rapid7, Google Cloud, ExtraHop and Siemplify
Nextgen signs deal with Secureworks (CRN Australia) To distribute security products across APAC.
SailPoint Technologies : Introducing SailPoint SaaS Management – Taking Security Beyond Just the Apps You're Aware Of (MarketScreener) You can't secure what you can't see. You can't control what you don't understand.
This reality alongside the rapid pace of change our customers are facing on a daily basis is... | May 27, 2021
NINJIO Releases Enterprise Simulated Phishing Solution as Cyberattacks Continue to Gain Momentum. | NINJIO (NINJIO) As phishing becomes one of the most prevalent attack vectors in the cybersecurity landscape, NINJIO, a cybersecurity awareness training company currently serving some of the largest organizations in the world, has launched the first ever simulated Phishing as a Service (PHAAS) platform to help companies thwart these attacks.
1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution (Help Net Security) 1Kosmos announced the availability of its Passwordless Identity Package that provides enterprises with a scalable passwordless solution.
Technologies, Techniques, and Standards
Seeking HoNIST Opinions – NIST Invites Comments on Major Revision to Cyber Supply Chain Risk Management Practices for Systems and Organizations (SP 800-161) and Provides Further Software Supply Chain Guidance (The National Law Review) The National Institute of Standards and Technology (&ldquo;NIST&rdquo;) is seeking comments on its draft NIST SP 800-161 Rev. 1, &ldquo;Cyber Supply Chain Risk Management Practices for Systems and Org
Operations in Ukraine, other countries help Army develop cyber teams (C4ISRNET) The service plans to try a series of ideas it gleaned from operations in Ukraine and Armenia to build its new tactical cyber and electronic warfare units.
Pentagon Pushes Testing For Electronic Warfare Vulnerabilities (Breaking Defense) Despite a 2018 mandate for “electronic protection” against jamming, there’s little data available showing how vulnerable systems are, said EW director David Tremper.
Everyone Wants to Build a Cyber Range: Should You? (Security Intelligence) During the past six months, IBM X-Force has been seeing an unprecedented increase in requests to build cyber ranges. What’s driving this increased demand?
Design and Innovation
WSJ News Exclusive | Google Strikes Deal With Hospital Chain to Develop Healthcare Algorithms (Wall Street Journal) Google and national hospital chain HCA will work to develop algorithms to help improve operating efficiency, monitor patients and guide doctors’ decisions.
North Farmington High School student wins National Cyber Scholarship (The Oakland Press) North Farmington High School junior Jacob Marchionda was named a winner in the National Cyber Scholarship Competition, hosted by CyberStart America.
UTSA School of Data Science receives $1 million from Frost Bank to support emerging research (UTSA) Frost Bank has committed $1 million to the UTSA School of Data Science (SDS). The gift establishes the Frost Excellence Fund endowment, which will support research-enhancing activities such as graduate research fellowships, undergraduate research activities and other research programs within the school.
Legislation, Policy, and Regulation
Russia Raises Heat on Twitter, Google and Facebook in Online Crackdown (New York Times) Its campaign is part of a global wave of actions by governments that are testing how far they can go to control online speech.
The EU’s Response to SolarWinds (Council on Foreign Relations) While EU’s issuance of the declaration of solidarity in response to the SolarWinds cyber campaign is a sign of progress, it fails to provide clarification on what, if any, further actions can be expected from Brussels.
Top military official warns US peace with China and Russia 'fraying' (Fox News) The U.S.’s highest-ranking military officer warned against “fraying” relations with China and Russia Wednesday, advising urgent action to improve global ties and prevent another “great power war.”
Russia is still the biggest player in disinformation, Facebook says (Washington Post) Report explores how issue has evolved in recent years
Security researchers suggest naming state-harbored hackers 'privateers' (CyberScoop) The ransomware-induced disruption of Colonial Pipeline, which supplies 45% of fuel consumed on the East Coast, has already forced big changes to U.S. government policies on pipeline security and brought heightened scrutiny of organizations’ decisions to pay hackers ransoms.
Biden's first cyber EO deadline is here. What will change? (FCW) The Department of Homeland Security was asked to transmit policy recommendations on data retention and event logging to the Office of Management and Budget by May 26 as part of President Joe Biden's cybersecurity executive order.
The Cybersecurity 202: DHS directive out today is ‘step one’ in securing pipelines against hacking (Washington Post) Stringent new cybersecurity requirements for pipeline companies being released today by the Department of Homeland Security are just the “first step” in a “multi-pronged” effort to prevent a repeat of the devastating Colonial Pipeline ransomware attack, officials say.
DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators (Department of Homeland Security) The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect against, and respond to threats to critical companies in the pipeline sector.
Biden budget to seek boost to the military's cyber force (POLITICO) If approved by Congress, the move would mark the first expansion of the Cyber Mission Force since its structure was set in 2012.
Mayorkas Says Budget Proposal Will Bolster Cyber Capabilities Of DHS Components - Defense Daily (Defense Daily) In addition to the Cybersecurity and Infrastructure Security Agency (CISA), the forthcoming fiscal year 2022 budget request will boost the cybersecurity ca
DHS Secretary Mayorkas Answers Questions on CISA, Cyber Talent for Senate Subcommittee (Meritalk) In a Senate Appropriations Committee review of the Department of Homeland Security’s (DHS) fiscal year (FY) 2022 budget request today, DHS Secretary Alejandro Mayorkas emphasized the importance of building resilience among the nation’s cybersecurity and the cyber workforce.
PSC Urges Congress to Include Cyber, IT Funding in Infrastructure Package (MeriTalk) The Professional Services Council (PSC), which represents government contractors, urged Congress in a May 21 letter to include funding for cybersecurity and IT modernization in an upcoming infrastructure funding package that aligns with President Biden’s American Jobs Plan.
NSA places greater focus on unclassified work in new physical, virtual hubs (FedScoop) One of the nation’s most secretive intelligence agencies is making a strategic effort to do more work in the open. The National Security Agency has developed new physical and virtual workspaces to support collaboration around its unclassified work. The agency, which historically focuses most of its work on highly classified mission sets, had been strategically […]
CISA’s Nitin Natarajan: Tighter Cryptocurrency Regulations Won’t Deter Ransomware Attackers - Executive Gov (Executive Gov) Nitin Natarajan, deputy director of the Cybersecurity and Infrastructure Security Agency (CISA), sai
UK: Global tax deal must ensure that big techs pay their fair share (Computing) UK finance officials have been cautious accepting US proposals on a global corporate tax rate, insisting that tech firms should pay their share locally
Bulgaria’s president fires head of national security agency (The Sofia Globe) Acting on the recommendation of the caretaker government that he appointed, Bulgarian President Roumen Radev fired Dimitar Georgiev as the head of the State Agency for National Security (SANS), acc…
Biden Taps Obama Counterterror Chief To Lead DOJ Division (Law360) President Joe Biden on Wednesday nominated longtime intelligence community insider and Uber Technologies Inc. chief trust and security officer Matt Olsen to lead the U.S. Department of Justice's National Security Division.
Litigation, Investigation, and Law Enforcement
Indonesian government blocks hacking forum after data leak (The Record by Recorded Future) The Indonesian government has blocked access inside its borders to Raid Forums, a well-known cybercrime hub, in an attempt to limit the spread of a sensitive data leak.
French authorities seize their third dark web marketplace (The Record by Recorded Future) French authorities have dismantled their third dark web marketplace over the last four years after they seized control of "Le Monde Parallèle" (The Parallel World) last week.
DHS oversight body finds data handling concerns across department agencies (FedScoop) The DHS' Office of Inspector General has identified 'persistent' data collection and management issues.
Security concerns raised as alleged BPJS data breach investigation moves slowly (The Jakarta Post) An account with the username Kotz claimed on online hacking forum radforums.com on May 12 to have the personal data of 279 million Indonesians, alive and deceased.
US Data Breach Notification Laws: How to Manufacture a Confident Response (ARC Advisory Group) Data breaches affect all types of organizations – large and small, popular and little known. Are there any Data Breach Notification Laws?
Citizen crime-tracking app, funded by Peter Thiel, scraps plans for on-demand police force (CBS News) The company tested out giving users the ability to summon their own personal police force. This week it pulled the plug.
One year after Amazon, Microsoft and IBM ended facial recognition sales to police, smaller players fill void (ZDNet) Dozens of smaller facial recognition companies have taken over for Amazon, IBM and Microsoft in providing police departments with tools.
Law Society Warns Of Disputes Over Cyber Insurance (Law360) A trade body for solicitors in England and Wales has warned that new regulations governing cyber insurance for law firms could lead to disputes between insurers over liability for claims.
U.S. steps up pursuit of far-right activists in 2016 voter suppression probe (Reuters) The indictment of a far-right internet activist on charges of interfering with the 2016 U.S. election reflects a strategic shift by the Department of Justice and sets the stage for new cases against more prominent right-wing actors, according to people familiar with the matter.
He Fought Trump’s 2020 Lies. He Also Backs New Scrutiny of Ballots. (New York Times) Brad Raffensperger, the Republican secretary of state in Georgia, told The Times that a new, disinformation-driven attempt to inspect 2020 ballots wouldn’t unearth wrongdoing, and would help restore voter confidence.
UK Immigration Records Law Violates GDPR, Court Rules (Law360) An exemption within U.K. data rules that allows the government to blanket refuse people access to their personal records in immigration cases is unlawful because it doesn't include specific safeguards, a U.K. appeals court ruled Wednesday.