Attacks, Threats, and Vulnerabilities
Positions of Two NATO Ships Were Falsified Near Russian Black Sea Naval Base (USNI News) The tracking data of two NATO warships was faked off the coast of a Russian controlled naval base in the Black Sea while the actual ships were moored 180 miles away, USNI News has learned. The U.K. Royal Navy’s HMS Defender, a Type-45 Daring-class destroyer, and the Royal Netherlands Navy’s HNLMS Evertsen, a De Zeven …
N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack (GovInfoSecurity) The Korea Atomic Energy Research Institute, a South Korean organization, acknowledges confirms it was recently hacked, apparently by a North Korean group that
DirtyMoe malware has infected more than 100,000 Windows systems (The Record by Recorded Future) A Windows malware botnet believed to be operated out of China has exploded this year, growing from 10,000 infected systems in 2020 to more than 100,000 in the first half of 2021, cyber-security firm Avast reported last week.
Water Sector Security Report Released Just as Another Water Plant Hack Comes to Light (SecurityWeek) Water Sector Coordinating Council releases a new cybersecurity report just as another water plant hack comes to light.
Cybercriminals Use Malicious Google Ads to Lure Computer Users (eSentire) Threat actors used Malicious Google Ads to capture the millions of users abandoning WhatsApp for Signal and Telegram in early 2021
LV Ransomware (Secureworks) Learn how Secureworks CTU researchers investigated reports that the LV ransomware had the same code structure as REvil.
LEXSS: Bypassing Lexical Parsing Security Controls (Bishop Fox) Technical details of achieving cross-site scripting (XSS) attacks by using HTML parsing logic where lexical parsers are used to nullify dangerous content.
Data leak marketplace pressures victims by emailing competitors (BleepingComputer) The Marketo data theft marketplace is applying maximum pressure on victims by emailing their competitors and offering sample packs of the stolen data.
Highly targeted exploit attacks against multiple companies discovered (Hindu Businessline) Attackers leveraged zero-day vulnerabilities in Microsoft Windows and Chrome, say Kaspersky experts
The Static Expressway: Leveraging Legit Sites to Get to the Inbox (Avanan) Attackers are using a legitimate service called HostGator to bypass static filters and reach the inbox.
Scammers are impersonating the DarkSide ransomware gang (Help Net Security) Someone out there is impersonating the infamous DarkSide ransomware gang and trying to trick companies to part with 100 Bitcoins.
New Buer Malware Loader Spread Through DHL Scam Email (Security Intelligence) Digital attackers are using fake DHL shipping emails to trick recipients into opening a malicious document. See how the new DHL scam email campaign works.
CyRC Vulnerability Advisory: Zephyr vulnerability (Software Integrity Blog) Eight vulnerabilities were discovered in Zephyr’s Bluetooth LE Stack using Defensics Bluetooth LE fuzzing solution.
Amazon Prime Day - Beware of Phishing Deluge, Experts Warn (Infosecurity Magazine) Shoppers urged not to click on links in unsolicited emails and texts
Ohio Medicaid providers’ data may have been exposed from data breach (Dayton Daily News) Data manager Maximus had a cybersecurity incident mid-May.
Data breach discovered at shuttered OSU program helping veterans deal with PTSD (NBC4 WCMH-TV) NBC4 Investigates is learning more about what happened inside a state-funded pilot program that was meant to help veterans manage psychological issues before it abruptly pa…
Vermont Hospital Still Calculating Cost of Ransomware Attack (SecurityWeek) Officials at Vermont’s largest hospital are still trying to determine the full financial impact of the cyberattack last October that knocked out computers affecting three hospitals in Vermont and three in New York.
VW delays in contacting 3.3 million customers over data breach (Digital Journal) Three months after the event, Volkswagen and its Audi subsidiary are notifying 3.3 million people in the U.S and Canada about a data breach.
Embryology Data Breach Follows Fertility Clinic Ransomware Hit (Threatpost) Approximately 38,000 of RBA's customers had their embryology data stolen by a ransomware gang.
A deep dive into Akamai's outage last week, as seen through Cisco's ThousandEyes (iTWire) GUEST OPINION: Mike Hicks, the Principal Solutions Analyst at Cisco ThousandEyes, has cast his eyes over Akamai's Prolexic outage last week to analyse what happened, which as Akamai noted, wasn't due to a cyber attack but an inadvertently exceeded routing table value. How did this happen, wh...
Maria Danzilo Faces Cyber Attack (iLovetheUpperWestSide.com) Maria Danzilo, a candidate for City Council’s District 6, announced through a Monday tweet that her website has apparently been the victim of a recent cyber attack. In her letter, shared on Twitter the day before Election Day, Danzilo wrote that “Because we have the momentum, we are a threat. I am saddened to report that our campaign has been the target of sophisticated and visious cyber attacks intended to derail us and stop our momentum.” The letter continues to state that “On June 2nd, our website was attacked with excessive login attempts by ‘bots,’ causing a 2 hour shutdown.
Security Patches, Mitigations, and Software Updates
Vulnerability Summary for the Week of June 14, 2021 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
Trends
New Report Explores State of Evolving Email Threats, With Hybrid Work Being a Catalyst For Increasingly Personalized and Authentic BEC Attacks (GreatHorn) The new report from GreatHorn found that almost 1 out of 3 organizations (30%) say that a majority of links received via email lead to malicious sites.
Crypto Threats Surge by 500%, and It's All About the Money (Akamai) Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream -- with tech entrepreneurs and prominent financial institutions leading the charge.
Appsec Stats Flash | WhiteHat Security (WhiteHat Security) The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape.
BlueVoyant Report Reveals Cyber Security Weaknesses Within Defense Industrial Base Supply Chain (BlueVoyant) The Defense Industry Supply Chain & Security 2021 report includes evidence of the exploitable cyber weaknesses of small-to-medium businesses (SMBs) within the Defense Industrial Base (DIB).
Cyber Attacks Against SMB Defense Contractors (Report) | BlueVoyant (BlueVoyant) More than half of 300 SMB defense contractors showed critical vulnerabilities to cyber attacks. Download BlueVoyant's full report now.
The Cybersecurity 202: Defense contractors are yet another sector highly vulnerable to hacking, study finds (Washington Post) Defense contractors are highly vulnerable to ransomware and similar cyberattacks that have been roiling other critical industry sectors, a report out today finds.
Glaring Gap in Open Source Security: Veracode Finds 80 percent of Libraries Used in Software Are Never Updated (Veracode) Despite inherent risks of open source code, good software security posture still lacking
69 percent of fixes are minor and won’t break functionality of even the most complex software applications
New Corinium Research Report Reveals Data Privacy Compliance Top Priority for Companies, Yet Nearly Half Not Concerned About Regulatory Fines (BusinessWire) Market research firm Corinium today released a new report, The Intersection of Data Privacy and Cybersecurity, which examines how data privacy, govern
The most common attack surface trends by company location, size, and industry (Security Brief) A new report identifies the most common attack surface trends by geography and company size and highlights industries most vulnerable.
Deep Instinct Unveils First Annual Voice of SecOps Report | Deep Instinct (Deep Instinct) Deep Instinct, the first company to apply end-to-end deep learning based on the only purpose-built deep learning framework for cybersecurity, today launched its Voice of SecOps Report. This marks the first annual report to highlight current and emerging threats, the impact these have on the day-to-day lives of SecOps professionals, and how automation will play a significant role moving forward. In Deep Instinct’s new survey of 600 IT and cybersecurity professionals, more than half of the survey respondents noted ransomware or zero-day attacks as the biggest threats to their organization.
NAVEX Global Survey Finds Growing Alliance Between Cybersecurity and Integrated Risk Management Programs (BusinessWire) NAVEX Global®, the leader in integrated risk and compliance management solutions, today released key findings from its survey of IT security professio
Cybercriminals Increasingly Target Manufacturing, IP (Security Boulevard) Recent attacks targeting intellectual property (IP) and critical infrastructure are raising the security stakes for manufacturing organizations, as the industry records one of the highest attack rates of any sector since the onset of COVID-19.
93% of Security Leaders Do Not Report to the CEO, According to New Research From LogRhythm (LogRhythm) LogRhythm, the company powering today’s security operations centers (SOCs), announced the release of its report, “Security and the C-Suite: Making Security Priorities Business Priorities.” The research found that, while most organizations have experienced a cyberattack in the last two years (60%) and spend approximately $38 million on security activities, only 7% of security leaders are reporting to the CEO.
Marketplace
Cybersecurity M&A Roundup for June 14-20, 2021 (SecurityWeek) Several cybersecurity-related acquisitions were announced between June 14 and 20, 2021.
Firmament Completes Investment in Cybersecurity Services & Software Provider CyberPoint (PR Newswire) The Firmament Group ("Firmament"), a leading provider of tailored capital solutions to small- and medium-sized enterprises (SMEs), announced...
Transmit Security Raises $543 Million in Series A Funding to Rid the World of Passwords (BusinessWire) Transmit Security Raises $543 Million in Series A Funding to Rid the World of Passwords
Daniel Loeb-backed SentinelOne eyes over $7 billion valuation in U.S. IPO (Reuters) Cybersecurity firm SentinelOne Inc, backed by billionaire investor Daniel Loeb's hedge fund Third Point, is aiming for a valuation of over $7 billion in its U.S. initial public offering (IPO), according to a regulatory filing on Monday.
SentinelOne announces IPO (Help Net Security) SentinelOne has filed a registration statement on Form S-1 to offer 32,000,000 shares of its Class A common stock to the public.
Is Upcoming IPO SentinelOne Worth Your Attention? (The Motley Fool) It's another S-1 show, this time focused on a cybersecurity top player.
DataRails Extends Series A Funding Round with Additional $25M for a Total of $43.5M (PR Newswire) DataRails, a leading FP&A solution for SMEs, today announced that it has raised $25M in a Series A extension, doubling the company's valuation....
Ping Identity Announces the Acquisition of SecuredTouch to Accelerate Identity Fraud Capabilities (BusinessWire) Ping Identity Holding Corp. (NYSE: PING) (“Ping Identity”), the Intelligent Identity solution for the enterprise, today announced that it has acquired
PE-backed GovExec buys two contracting intelligence companies (PE Hub) GovExec, which is backed by Growth Catalyst Partners, has acquired two contracting intelligence firms: Military Periscope and Government Contracting Institute.
CACI Wins $82M Army Contract to Support Electronic Warfare Mission (Nasdaq) CACI International Inc. CACI recently won an $82-million, four-year contract by the U.S. Army’s C5ISR Center Electronic Warfare Air/Ground Survivability Division (EWAGS). Under the contract, CACI will continue to support the Army in cyber and ground electronic warfare missions.
Splunk stock pops on Silver Lake's $1B investment, share buyback (NASDAQ:SPLK) (SeekingAlpha) Splunk (SPLK) announces that Silver Lake will make a $1B investment via convertible senior notes, which Splunk will use to fund growth initiatives and manage its capital...
Cequence Security Sees Record Growth as API Security Risks Explode (Cequence) Leader in API security secures 4 new patents, adds notable new investors, expands global reach and more Sunnyvale, Calif., June 22, 2021 — Cequence Security, a leading API security vendor, today announced strong corporate momentum with significant growth in revenue, customers and brands protected over the last 12 months, further validating its groundbreaking, open and […]
Ubiquiti: An Under-the-Radar Technology Disruptor (The Motley Fool) This company is going after a gigantic market and is returning lots of cash to shareholders.
Verizon announces acquisition of precise positioning company, Senion (Verizon) Today, Verizon announced the acquisition of Senion, a global leader in location-responsive solutions. The developer of an indoor positioning platform, Senion’s advanced machine-learning sensor fusion technology delivers sub-meter accuracy for precise positioning and navigation of indoor spaces.
Arctic Wolf Expands Presence to EMEA to Meet Spiking Market Demand for Its Security Operations Solutions (Arctic Wolf) Company launches new sales and technical operations, establishes leadership team in Europe to bring ease and simplicity to cybersecurity
Virsec Appoints Marnie Wilking as Board Advisor (Virsec) Virsec growth accelerates, appointing Marnie Wilking, a proven thought leader in cybersecurity, as an Advisor and Board Participant.
Managed Intelligence Provider Nisos Adds Cyber and National Security Veteran Paul Kurtz to Its Board of Directors (BusinessWire) Nisos announced today that noted security and intelligence expert Paul Kurtz has joined the company’s Board of Directors.
Mimecast Names David Raissipour as Chief Technology & Product Officer (GlobeNewswire) Appointment will accelerate innovation and market leadership, driving new enterprise business
Ivanti Reinforces Commitment to Customer Security with Appointment of Daniel Spicer as New Vice President of Security (BusinessWire) Ivanti, the automation platform that discovers, manages, secures, and services IT assets from cloud to edge, today announced the appointment of Daniel
Products, Services, and Solutions
Securitas delivers managed security services to Lynk & Co (News Powered by Cision) Securitas, the world’s leading intelligent protective services partner, will provide security
ActZero Launches Maturity Model with High-Impact Ransomware Controls to Help Businesses Accelerate Security Hardening (PR Newswire) ActZero, an AI-driven cybersecurity startup whose mission is to democratize cybersecurity for small and mid-size businesses, today announced...
NetFolder for Secure file Uploads by odix is now available on the Microsoft Azure Marketplace (PRWeb) odix, the Israel based cyber security leader in file-based malware prevention solutions has officially launched NetFolder, an advanced file sanitization
GitLab 14 Delivers Modern DevOps in One Platform (GitLab) Provides Increased Development Velocity, Built-in Application Security for Risk Mitigation, and Visibility into DevOps Success
Telos Corporation Authorized as CMMC-AB Registered Provider Organization™ (RPO) (Telos Corporation) Ashburn, Va. – June 22, 2021 – Telos® Corporation (NASDAQ: TLS), a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations, today announced that it has been approved as a Registered Provider Organization (RPO) by the Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB). As a CMMC-AB RPO, Telos offers... Read more
Global Leader in Sports Gear and Equipment, Decathlon, Teams with Datadobi to Carry Cloud Data Migration Across the Finish Line (BusinessWire) Datadobi today announced Decathlon has deployed its DobiMigrate software to help enable the move of Decathlon's IT operations into the cloud.
Shared Assessments Launches Third Party Risk Fundamentals Training (BusinessWire) Shared Assessments Launches Third Party Risk Fundamentals Training; Gives Entry-Level Professionals the Core Concepts/ Practices for Proficiency
DH2i Launches DxEnterprise (DxE) Smart Availability Software for Containers (DH2i) We are excited to announce the release of DxEnterprise (DxE) for AGs in Containers alongside our new DH2i Store and Developer Edition Program.
WD-40 Eases Network Friction with Slick SD-WAN Overhaul (BusinessWire) WD-40 Enables Network Migration with Aryaka Managed Networking and Security.
Quarkslab Announces the Certification of Its Product Quarks AppShield (BusinessWire) Quarkslab is the first company worldwide to have certified its white-box cryptography solution under this highly demanding evaluation process.
The Cato MDR Service Becomes First with Immediate Time to Value (Cato Networks) Cato taps its global SASE platform, machine learning algorithms, and massive data warehouse to eliminate the 30- to 90-day startup window typical of MDR services. Automated 70-point checklist now instantly assesses enterprise security readiness.
Dynatrace helps the State of Minnesota deliver uninterrupted access (Dynatrace news) Read about how Dynatrace has helped the State of Minnesota deliver uninterrupted access to digital services.
Retrospect Announces Integration with Microsoft Azure Blob Storage (Retrospect) Microsoft Azure Cloud Platform is a leading choice for businesses moving to the cloud.
Plutora Introduces Enhanced Data-Centric Platform to Guide Strategic Decision Making and Achieve Successful Software Development (BusinessWire) Plutora has transitioned to an expanded data-centric platform, added additional metrics, and deepened its integrations with Agile planning tools.
Technologies, Techniques, and Standards
New tools for tech companies to prioritise safety (eSafety) Tech companies wanting to bolster online safety can now access free interactive assessment tools developed by Australia’s eSafety Commissioner.
Deploying Secure Unified Communications/Voice and Video over IP Systems (National Security Agency Cybersecurity Technical Report) Unified Communications (UC) and Voice and Video over IP (VVoIP) call-processing systems provide rich collaboration tools and offer flexible ways to communicate by combining voice, video conferencing, and instant messaging in the modern workplace. Today these systems are integrated into an enterprise’s existing Internet Protocol (IP) infrastructure, use commodity software, and are likely to use open-source and standard protocols.
Testing for Differential Privacy Bugs (NIST) We are excited to introduce our third guest author in this blog
SolarWinds hackers could have been waylaid by simple countermeasure -US officials (Reuters) Following a decade-old security recommendation could have helped stymie the Russian hackers who ran amok across federal government networks last year, the Department of Homeland Security's digital defense arm said in a letter sent earlier this month.
Monitoring cyberspace activity in space (Federal News Network) When you think of space, you don’t think of it as the frontline of cyber war, but that’s not the case. Many important aspects of U.S. critical infrastructure are controlled from space…
What it means to have a baseline level of security in 2021 (CyberScoop) Chris Ritter, Principal Systems Engineer & Application Architect for Dell Technologies joins other influential security leaders to discuss cybersecurity trends and strategies as both public and private sector organizations meet today’s most pressing security challenges.
SailPoint Technologies : The Untold Risk of Automatic Remediation of Cloud Access (MarketScreener) It's inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned.
How cyber security can improve your marine operations (Riviera) An organisation that is cyber resilient is resilient overall, it stands to reason, and that’s why cyber security is great value. It really can pay for itself – especially in the marine industry.
Helping charities tackle cybersecurity (TechRadar) Helping charities tackle common cyber threats
Design and Innovation
Are NFTs Always Bad? (Foreign Policy) The digital assets known as “nonfungible tokens” could help artists make money from their work.
Research and Development
DHS S&T hosts whole-of-government R&D showcase (Intelligence Community News) The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is convening U.S. government research organizations for the Virtual Whole-of-Government R&D Showcase, a unique four-part virtual content series that kicks off June 21 and will run through August.
Academia
CYBER.ORG Announces Creation of National Cybersecurity Education Week to Increase Equitable Access to K-12 Cybersecurity Education (BusinessWire) CYBER.ORG today announced the creation of National Cybersecurity Education Week, a series of events to celebrate and advance the state of K-12 cyberse
Legislation, Policy, and Regulation
EU to launch rapid response cybersecurity team (POLITICO) Barrage of cyberattacks pushes EU to pool powers to fight hackers.
New Australian bill would force companies to disclose ransomware payments (The Record by Recorded Future) Australian lawmakers have filed on Monday a new bill that would mandate that local companies inform the Australian Cyber Security Centre (ACSC) of their intention to pay a ransomware gang.
Unhealthy content on cyberspace threatens Vietnamese users (VietNamNet) Many Internet users in Vietnam, especially young people, students and children are negatively affected by unhealthy information and images that are freely distributed in cyberspace.
CISA still in the dark about agency network defense plans (FCW) In the wake of the SolarWinds campaign, the agency in charge of federal agency cyber defense acknowledges some gaps in both its data collection and network monitoring capabilities.
A State Department for the Digital Age (War on the Rocks) Carl Sagan was right. The renowned American scientist once warned that “we have arranged a society based on science and technology, in which nobody
“Cyber disruption,” ransomware, and critical infrastructure: A new US understanding of “attack”? (Lawfire) Does the U.S. now consider a ransomware “cyber disruption” of “critical infrastructure” to be an “attack” within the meaning of international law? If so, it would seem to be an important inflectio…
What Biden and Putin didn't discuss (TheHill) The extent of Russia’s disinformation offensive hasn’t garnered nearly enough critical attention in the United States.
Biden-Putin Summit Proves Essentially Fruitless (The Heritage Foundation) President Joe Biden met with Russian President Vladimir Putin in Geneva on June 16 to discuss a number of issues, including human rights, Ukraine, and cyberattacks.
Biden’s executive order on cybersecurity should include behavior transparency (TechCrunch) The cyber executive order, alongside sanctions on Russia, are strong indications the Biden administration intends to take a far more proactive approach to cybersecurity. But it's not quite enough.
Mandatory Cyber Reporting Within 24 Hours: Sen. Warner Bill (Breaking Defense) Sen. Warner's draft legislation, long expected, marks one of the first attempts to create a federal law mandating cyber incident reporting by some entities. Notably, the bill provides reporting entities with a degree of privacy and legal protection.
US Companies Won’t Pay to Prepare for Cyber Attacks. Congress Must Step In (Defense One) A combination of funding and regulation is needed to boost the defenses and resilience of the corporations that America depends on.
Who, Sir? Me, Sir? Appointing GDPR Representatives in the UK and the EU (JD Supra) This article explores the topic of appointed representatives under Article 27 of the GDPR. What are they? When do you need one? How is regulatory...
Chris Inglis Assumes Nation's First Top Cyber Post (Government CIO) The Air Force and NSA veteran is charged with implementation of Biden's recent cyber executive order.
Litigation, Investigation, and Law Enforcement
China to shut down over 90% of its Bitcoin mining capacity after local bans (Global Times) Many Bitcoin mines in Southwest China’s Sichuan Province – one of China’s largest cryptocurrency mining bases – were closed as of Sunday, according to after local authorities ordered a halt to mining in the region on Friday amid an intensified nationwide crackdown against cryptocurrency mining.
Bitcoin Price Extends Drop After China Intensifies Crypto Crackdown (Wall Street Journal) The price of bitcoin and other cryptocurrencies slid after China’s central bank ordered the country’s largest banks and payment processors to take a more active role in curbing cryptocurrency trading and related activities.
Graphics cards get more affordable in China in wake of bitcoin crackdown (South China Morning Post) Graphics cards from companies including Nvidia and Asus saw prices fall by as much as two-thirds on e-commerce platforms after Sichuan started enforcing China’s sweeping cryptocurrency mining crackdown.
U.S. SEC probing SolarWinds clients over cyber breach disclosures -sources (Reuters) The U.S. Securities and Exchange Commission (SEC) has opened a probe into last year's SolarWinds (SWI.N) cyber breach, focusing on whether some companies failed to disclose that they had been affected by the unprecedented hack, two persons familiar with the investigation said on Monday.
Chinese firms, including Huawei, barred from using national security loophole in new US bill (ETTelecom.com) According to a press release issued Monday, the bill would also "prevent further integration and sales" of "Chinese state-backed or directed firms," s..
FCC Prevails in Huawei ‘National Security Threat’ Designation Case (Law Street Media) In a ruling ruling last Friday, the Fifth Circuit Court of Appeals denied a petition brought by Huawei Technologies Company and its American subsidiary,
Google Faces EU Antitrust Probe of Alleged Ad-Tech Abuses (Wall Street Journal) The European Union opened a formal antitrust investigation into allegations that Google abuses its leading role in the advertising-technology sector, the most wide-ranging case yet to look at that pillar of the tech giant’s business.
Report of Investigation: Mr. Brett J. Goldstein, Defense Digital Service Director (Inspector General, US Department of Defense) From March 22, 2020, through June 18, 2020, the DoD Hotline received thirty complaints against Mr. Brett J. Goldstein, Director, Defense Digital Service (DDS). Most of the complainants were anonymous and generally alleged that Mr. Goldstein fostered a negative work environment by failing to treat his subordinates with dignity and respect. On June 19, 2020, the DoD Office of Inspector General (OIG) initiated an investigation into the allegations. During the course of our investigation, we also examined an emergent allegation that Mr. Goldstein used and condoned the use of an unauthorized electronic messaging and voice-calling application to discuss official DoD information.
Fifth of Google Play Apps Violate Child Protection Law (Infosecurity Magazine) One in five apps designed for children contravened the Children's Online Privacy Protection Act (COPPA)
1 in 5 children’s Google Play Apps breach Children’s Online Privacy Protection Act rules (Comparitech) According to data collected by our researchers, 1 in 5 children’s apps available on Google Play don’t adhere to COPPA rules. COPPA, imposed by the Federal Trade Commission (FTC), enforces a number of requirements on operators of websites or online services that are aimed at under 13s. It also applies to operators of other websites […]
Proofpoint Investors Sue Over $12.3B Merger Proposal (Law360) Cybersecurity company Proofpoint Inc. was hit Friday with a proposed investor class action in New York federal court alleging the company failed to disclose to shareholders key details about a $12.3 billion take-private merger.
Scott Cole & Associates Announces Filing of Scripps Health Data Breach Class Action (BusinessWire) Scott Cole & Associates announces data breach lawsuit filing against Scripps Health.