Cyber Attacks, Threats, and Vulnerabilities
LazyScripter targets job seekers. (The CyberWire) Malwarebytes tracks a new threat actor they're calling “LazyScripter.” The group is targeting airlines and job seekers with malware-laden phishing documents.
LazyScripter: From Empire to double RAT (Malwarebytes Labs) Malwarebytes’ Threat Intelligence analysts are continually researching and monitoring active malware campaigns and actor groups as the prevalence and sophistication of targeted attacks rapidly evolves. In this paper, we introduce a new APT group we have named LazyScripter, presenting in-depth analysis of the tactics, techniques, procedures, and infrastructure employed by this actor group. Although the...
Amnesty International: Hackers attacking Vietnam dissidents (News4Jax) Amnesty International says it has found that a hacking group known as Ocean Lotus has been staging more spyware attacks on Vietnamese human rights activists in the latest blow to freedom of speech in the communist-ruled country.
Vietnamese activists targeted by notorious hacking group (Amnesty International) Amnesty Tech investigation reveals hacking group Ocean Lotus is behind spyware attacks against Vietnamese human rights activists
Exploitation of Accellion File Transfer Appliance (CISA) This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[1] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[5][6] These authorities are aware of cyber actors exploiting vulnerabilities in Accellion File Transfer Appliance (FTA).[
Clop ransomware gang leaks online what looks like stolen Bombardier blueprints of GlobalEye radar snoop jet (Register) And what may be CAD drawing of a military radar antenna
()
Bombardier Statement on Cybersecurity Breach (Bombardier) Bombardier Statement on Cybersecurity Breach
MINEBRIDGE Remote-access Trojan (RAT) 2021 (Zscaler) Threat actors distributing the MINEBRIDGE RAT in-the-wild have returned in 2021 with new and updated tactics, techniques, and procedures (TTPs).
SolarWinds hackers targeted NASA, Federal Aviation Administration networks (TechCrunch) Russian hackers were blamed for the attacks on at least nine federal agencies.
More SolarWinds Hack Victims Yet to Be Publicly Identified, Tech Executives Say (Wall Street Journal) The executives told a Senate panel the attack revealed systemic vulnerabilities in the software supply chain that all U.S. businesses and government institutions rely on.
SolarWinds, Microsoft, FireEye, CrowdStrike defend actions in major hack - U.S. Senate hearing (Reuters) Top executives at Texas-based software company SolarWinds Corp, Microsoft Corp and cybersecurity firms FireEye Inc and CrowdStrike Holdings Inc defended their conduct in breaches blamed on Russian hackers and sought to shift responsibility elsewhere in testimony to a U.S...
CrowdStrike CEO blames Microsoft's 'antiquated' architecture for SolarWinds breach (SeekingAlpha) CrowdStrike (CRWD) CEO George Kurtz says Microsoft's (MSFT) "antiquated"and complicated architecture was to blame for the SolarWinds (SWI) security breach
Russia assigned more than 1,000 expert engineers to execute SolarWinds hack, says Microsoft exec (MarketWatch) A cyberespionage campaign waged by Russian foreign intelligence on U.S. companies and government institutions was of a scale and sophistication never before...
IBM CEO Says He Feels ‘Sorry’ For SolarWinds, Cybersecurity ‘Biggest Issue’ For Tech Industry (CRN) IBM CEO Arvind Krishna said he feels “sorry” for SolarWinds, which has been hit hard by what is considered one of the most damaging cyberattacks in the history of computing.
The Anatomy of the SolarWinds Attack Chain (Cyberark) Imagine there’s an attacker lurking inside your network right now. Do you have the ability to find out and respond before they can cause harm? Now imagine your adversary has privileged access to...
Clubhouse chats streamed to third‑party website (WeLiveSecurity) Clubhouse has experienced a data incident as an unidentified user found a way to stream audio from its chat rooms to a third-party website.
Clubhouse suffers data breach (Security Magazine) Audio-based social app Clubhouse has allegedly suffered a data breach, as a third-party developer designed an open-source app that allowed Android smartphone users to access the invite-only, iPhone-only service. The app, which launched in March 2020, has quickly gained popularity, raising $100 million in funding in January.
()
Hackers Tied to Russia's GRU Targeted the US Grid for Years (Wired) A Sandworm-adjacent group has successfully breached US critical infrastructure a handful of times, according to new findings from the security firm Dragos.
Why America would not survive a real first strike cyberattack today (TheHill) The nation needs to bolster defenses for our critical servers.
Behind the News: Cyber Attack on Florida Water Treatment Facility (Radiflow) On February 5, 2021, a hacker carried out an attack on an Oldsmar, Florida water treatment facility, whereby the level of sodium hydroxide was modified from 100 to 11,100 parts per million. At this time the identity of the attacker is still unknown, despite the investigative efforts of US law enforcement.
()
FireEye links 0-day attacks on FTA servers & extortion campaign to FIN11 group (ZDNet) FireEye: Hackers breached companies running FTA servers, stole private files, and are now publishing data on the Clop ransomware leak site.
Turkey Dog Continues to Target Turkish Speakers with RAT Trojans via COVID Lures (RiskIQ) Shortly after the COVID-19 pandemic began, there was a spike in threat infrastructure using the crisis to bait, deceive, and social engineer victims. Reports of threat campaigns attempting to fool Turkish-speaking users into downloading Android apps containing the Cerberus and Anubis banking trojans surfaced. Today, new RiskIQ data shows these attacks have not stopped, shedding light on the full extent of these campaigns.
Turkey Dog: Cerberus and Anubis Banking Trojans Target Turkish Speakers (RiskIQ) Since at least April 2020, campaigns distributing the malicious android applications Cerberus and Anubis have been targeting Turkish speakers with lures exploiting the COVID-19 pandemic.
Quickbooks File Data Theft is on the Rise (ThreatLocker) Quickbooks file data theft has been on the rise over the last few months. We have observed attackers using email in various ways to deliver malware and exploit the accounting software.
Rockwell Automation FactoryTalk Services Platform (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Rockwell Automation
Equipment: FactoryTalk Services
Vulnerability: Use of Password Hash with Insufficient Computational Effort
2.
Advantech BB-ESWGP506-2SFP-T (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Advantech
Equipment: BB-ESWGP506-2SFP-T
Vulnerability: Use of Hard-coded Credentials
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information and execute arbitrary code.
Advantech Spectre RT Industrial Routers (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Advantech
Equipment: Spectre RT Industrial Routers
Vulnerabilities: Improper Neutralization of Input During Web Page Generation, Cleartext Transmission of Sensitive Information, Improper Restriction of Excessive Authentication Attempts, Use of a Broken or Risky Cryptographic Algorithm, Use of Platform-Dependent Third-party Components
()
CybelAngel Reveals How Cybercriminals Target Healthcare Sector (BusinessWire) CybelAngel published in-depth original research revealing how cybercriminals plan healthcare-related fraud, ransomware and other attacks.
Illinois hospital reverts to paper records, diverts imaging services after cyberattack (Becker"s Hospital Review) St. Margaret’s Health–Spring Valley (Ill.) has shut down its computer network in response to a cyberattack Feb. 21, Shaw Local News Tribune reports.
Huawei chief criticises academic’s ‘false attack’ over 5G security risks (The Irish Times) Chinese telecoms firm tells senior Irish officials academic freedom is a ‘two-way street’
Unethical Stalkerware Apps Offer Parents Tools to Spy on their Children (PR Newswire) Avast (LSE:AVST), a global leader in digital security and privacy products, and member of the Coalition Against Stalkerware, carried out an...
Officials confirm cyber attack on Clearfield County computer system (WTAJ) Officials from Clearfield County reported Tuesday that a recent cyber event may have impacted the security of personal information for certain individuals asso…
Security Patches, Mitigations, and Software Updates
IBM issues patches for Java Runtime, Planning Analytics Workspace, Kenexa LMS (ZDNet) The worst bugs could lead to malicious code execution and application crashes.
Mozilla beefs up anti-cross-site tracking in Firefox, as Chrome still lags on privacy (TechCrunch) Mozilla has further beefed up anti-tracking measures in its Firefox browser. In a blog post yesterday it announced that Firefox 86 has an extra layer of anti-cookie tracking built into the enhanced tracking protection (ETP) strict mode — which it’s calling ‘Total Cookie Protection…
Keybase secure messaging fixes photo-leaking bug – patch now! (Naked Security) It’s a bit like Snapchat all over again – but this bug was quickly fixed.
Android’s latest update will let you schedule texts, secure your passwords and more (TechCrunch) Google today announced the next set of features coming to Android, including a new password checkup tool, a way to schedule your texts, along with other improvements to products like its screen reader TalkBack, Maps, Assistant and Android Auto. This spring 2021 release is latest in a series of smal…
Cyber Trends
IBM X-Force Threat Intelligence Index (IBM X-Force) Get the IBM X-Force Threat Intelligence Index for the most up-to-date reporting on the evolving cybersecurity landscape
2020 ICS Cybersecurity Year in Review (Dragos) Our year in review is an annual report on vulnerabilities, threat activity, incident response, and threat hunting from our team of experts.
Cloud and Threat Report (Netskope) How much malware is cloud delivered? Learn the latest about cloud-enabled threats, data movement risks, and what apps need to be watched now.
3 Security Flaws in Smart Devices & IoT That Need Fixing (Dark Reading) The scope and danger of unsecured, Internet-connected hardware will only continue to deepen.
Ransomware threats to watch for in 2021 include crimeware-as-a-service (TechRepublic) BlackBerry researchers see more double-extortion ransomware attacks, attackers demanding ransom from healthcare patients, and rising bitcoin prices driving the growth of ransomware.
Everything You Need to Know About Evolving Threat of Ransomware (The Hacker News) Ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down.
New NetMotion Survey Reveals Only 12% of Enterprises Worldwide Have Fully Embraced SASE (NetMotion Software) NetMotion announces the findings of its inaugural Secure Access Service Edge (SASE) global survey, revealing that pandemic-driven remote work has not led to wholesale SASE and SDP adoption.
U.S. municipalities are the perfect target for cybercriminals in 2021 (Help Net Security) Lax remote work security protocols enable cybercriminals to increasingly target municipalities using ransomware and other malicious actions.
Telework Exposes U.S. Government Employees to Increasing Credential-theft Mobile Attacks (PR Newswire) Lookout Inc., the leader in mobile security, today released its Government Threat Report, which examines the most prominent mobile threats...
78% Lack Confidence in Their Company’s Cybersecurity Posture, Prompting 91% to Increase 2021 Budgets (BusinessWire) Nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT secur
Marketplace
Smart Home SaaS Startup Plume Raises $270M Series E, Reaching $1.35B Valuation (Crunchbase News) The Series E round, which was led by Insight Partners, brings the company’s valuation to $1.35 billion.
PerimeterX Raises $57M For Geographic, Vertical Growth (CRN) Application security vendor PerimeterX has raised $57 million to expand its reach beyond the retail e-commerce vertical and strengthen its presence in Europe and Asia-Pacific.
Atos completes the acquisition of leading cybersecurity services company Motiv (Yahoo) Atos today announced that it has completed the acquisition of Motiv ICT Security, the largest independent Managed Security Services (MSS) provider in the Netherlands.
Covid Driving M&A Focus Towards Cloud IT & Outsourcing (Hampleton Partners) The latest IT & Business Services M&A market report from Hampleton Partners reveals how Covid-19 has accelerated demand for cloud computing and related IT infrastructure deals.
Google trying to put Microsoft on the spot at SolarWinds hearing (POLITICO) Microsoft has faced intense scrutiny in the two months since the revelation of the SolarWinds campaign over the role of its products in spreading the hackers’ net.
Zscaler, CrowdStrike: Cybersecurity Stocks To Watch After The SolarWinds Attack (Forbes) Our indicative theme of Cybersecurity Stocks has returned over 150% since the end of 2019, compared to gains of about 21% on the S&P 500 over the same period. The theme is up by about 5% year-to-date. Cybersecurity companies typically provide software, hardware, and services that help protect...
Onapsis Joins Microsoft Intelligent Security Association (Onapsis) The Onapsis Platform extends Microsoft Azure Sentinel’s capabilities providing Security Operations Center with visibility into SAP, Oracle and Salesforce mission-critical applications
Cybereason partners with Dubai’s Oxygen to expand services in MENA markets (TahawulTech) Cybereason, the leader in future-ready attack protection, announced a partnership with Oxygen DMCC, the Dubai-based leader in AI-powered cybersecurity and …
Cybereason Accelerates North American Expansion with Strategic Hires (Cybereason) “Abigail, Stephan and Ahmed each bring unique skill sets that will have a profound impact as we continue to meet the need for future-ready security by enhancing partnerships with organizations that are in the battle with defenders everyday..." ~Eric Apple, SVP Sales at Cybereason.
Hewlett-Packard Veteran, John Johasky, Joins MetricStream as Chief Sales Officer (PR Newswire) MetricStream, the market leader in governance, risk, and compliance (GRC), and integrated risk management products and solutions, today...
Steven Oh Joins ManTech as Mission, Enterprise IT VP (GovCon Wire) Steven Oh, former technology director of the intelligence and homeland division within General Dynamics...
Mike McConnell, Patrick Gorman, and Peter Carroll join advisory board of 1Kosmos (Consulting) Following a $15 million Series A funding from ForgePoint Capital, cybersecurity startup 1Kosmos has assembled an advisory board composed of a dozen cybersecurity leaders – including seasoned consulta
Kaspersky Appoints Christopher Hurst GM of UK and Ireland (Infosecurity Magazine) Industry veteran to help drive continued enterprise and channel growth
San Jose's new cybersecurity unicorn Lacework names Dave Hatfield as CEO (Silicon Valley Business Journal) Lacework Inc., fresh from raising a $525 million unicorn funding last month, named Dave Hatfield as CEO on Tuesday.
Products, Services, and Solutions
Sequitur Labs Expands EmSPARK™ Security Suite Deployment Options with Introduction of Base and Advanced Packages (BusinessWire) Sequitur Labs Expands EmSPARK™ Security Suite Deployment Options with Introduction of Base and Advanced Packages
Press Release: CYDEPLOY (TCecure) TCecure CEO Tina Williams-Koroma has launched a new product venture, CyDeploy, with the aim of helping businesses better secure their data.
Hillstone Networks X8180 secures networks with more performance and energy efficiency (Help Net Security) Hillstone Networks X8180 delivers performance, security services and overall efficiency in a 3U form factor.
Imperva unifies its security capabilities with AI-infused Sonar platform (SiliconANGLE) Imperva Inc. today introduced an expansive cybersecurity platform, dubbed Sonar, that it says can block a wide variety of threats ranging from data exfiltration attempts to online bots targeting corporate websites.
Trustwave holds out a helping hand to security starters (MicroscopeUK) Security players referral programme will help those without security skills to still provide support for their customers.
Edge Delta Releases Intelligent Observability Pipelines for DevOps, Security, and SRE teams (PR Newswire) Edge Delta, the leading automated observability platform for Kubernetes, containers, and microservices in the cloud, today announced new...
Avast Announces Partnership with PMovil (PR Newswire) Avast (LSE:AVST), a global leader in digital security and privacy products, has today announced a strategic partnership with PMovil, an...
Comodo offers SOC as a platform (iTWire) Security provider Comodo has launched a security operations centre (SOC)-as-a-platform that allows managed service providers (MSPs) to offer their clients 24/7 monitoring, management and full remediation with the hard work being done by Comodo's cybersecurity experts.
Datadobi Partners with Effect ICT Solutions, Delivers High-Performance Storage and Migration Strategy for MVRDV, Leading International Architect (BusinessWire) Datadobi and Effect ICT Solutions have today announced the completion of a data migration for MVRDV.
Introducing ThreatConnect 6.1 - One Operational Support Platform for Threat Intelligence & Security Operations (BusinessWire) Introducing ThreatConnect 6.1
How companies handed cybersecurity to employees... and how MyCena is changing that (LinkedIn) Take a moment and imagine… Imagine a company letting their employees make their own keys to access the company building, elevators, floors, doors, data rooms..
Milton Security Launches Risk-Free Threat Hunting Proof of Value (PR Newswire) Milton Security, a leading provider of Threat Hunting as a Service, XDR & MDR (MxDR) SOC Services, announced today that it has launched a free,...
Digital Guardian Deepens Relationship with AWS (Digital Guardian) Amazon Macie integration, Amazon WorkSpaces support, achievement of AWS Advanced Technology Partner status, and availability in AWS Marketplace point to growing momentum
Technologies, Techniques, and Standards
VPNs pose challenges for agencies sustaining remote work (FedScoop) Virtual private networks (VPNs) are presenting some agencies with added challenges as they increase remote work during the COVID-19 pandemic. Some agencies had to make emergency acquisitions for more VPN licenses and are now looking to segment their data because the technology provides more internet exposure than advocates of models like zero-trust security are comfortable with. …
If you buy a 5G phone this year, you might be disappointed (The Verge) US networks aren’t very good yet, but they will improve in the long term.
Research and Development
NTT Co-authored Papers at FC21 Reveal Risks and Boost Efficiencies (NTT Research) Topics Include Selfish Mining Attacks, Differential Privacy and Block Confirmation in the Sleepy Model
Academia
BlueVoyant Report Reveals Ransomware is the Number One Cyber Threat facing Higher Education (PR Newswire) BlueVoyant, a cybersecurity services company, today announced the findings from its Cybersecurity in Higher Education report. Using open source...
Ransomware: Sharp rise in attacks against universities as learning goes online (ZDNet) Higher education is struggling with ransomware attacks, with gangs seeing an easy target in institutions busy making the switch to remote operations.
Bad education: Universities struggle to defend against surging cyber-attacks during coronavirus pandemic (The Daily Swig) Number of ransomware attacks against the sector doubled between 2019 and 2020
When the crime scene is a computer: How Virginia Tech’s IT Security Office uses forensics to solve cyber incidents (VT News) Virginia Tech's IT Security Office (ITSO) protects the university's data systems and infrastructure against cyberattacks. Here's a closer look at how the ITSO's security analysts use computer forensics to investigate cybersecurity incidents — and things you can do to avoid getting hacked.
Legislation, Policy, and Regulation
U.S.-based cybersecurity company explains N. Korean elites have unlimited Internet access (Arirang) North Korea's political and military elites reportedly have unlimited access to the Internet, and shop from Amazon and Alibaba.
Pakistan needs Joint Inter-Services Cyber Command to counter hybrid war (Daily Times) Chairman of Senate Foreign Affairs Committee, Senator Mushahid Hussain Sayed, has said India has a clear Pakistan policy, in which disinformation and destabilization are key components, while Pakistan needs clarity in its India policy to respond effectively. He made these remarks at a Conference on ‘Disinformation as a Tool of Strategic Warfare’ organised by the […]
Facebook promises to 'restore news' for Australians in wake of government agreement (ABC) Facebook will walk back its block on Australian users sharing news on its site after the government agreed to make amendments to the proposed media bargaining laws that would force major tech giants to pay news outlets for their content.
Facebook’s Petty Unfriending of Australia (Wired) There are real flaws in the country’s proposed law to make platforms pay for news, but the social media giant’s protest doesn’t address them.
With Biden in Office, Global Policymakers Are Making a Renewed Push for Cyber Norms | The Record by Recorded Future (The Record by Recorded Future) On Tuesday, diplomats from Australia, France, and Estonia emphasized the need for a renewed focus on norms in cyberspace
Biden administration preparing to sanction Russia for SolarWinds hacks and the poisoning of an opposition leader (Washington Post) The Biden administration is preparing sanctions and other measures to punish Moscow for actions that go beyond the sprawling SolarWinds cyber espionage campaign to include a range of malign cyber activity and the near-fatal poisoning of a Russian opposition leader, said U.S. officials familiar with the matter.
U.S. 'Can’t Be Timid' Fighting Back Against Cyberattacks, Sen. Warner Says (Cheddar) Sen. Mark Warner (D-Va.) discussed the need for stronger cybersecurity measures for the U.S. prior to the Senate Intelligence Committee hearing on the SolarWinds data breaches in 2020.
After Russian Cyberattack, Looking for Answers and Debating Retaliation (New York Times) Key senators and corporate executives warned at a hearing on Tuesday that the “scope and scale” of the hacking of government agencies and companies, the most sophisticated in history, were still unclear.
The Cybersecurity 202: Congress looks towards new data breach laws as Russian hack scope remains unknow (Washington Post) Companies responding to a massive Russian hack urged Congress to update laws dictating how the private sector shares information about cybersecurity breaches with the government.
Tech Executives Call for Improved Public-Private Coordination After SolarWinds Hack (Wall Street Journal) The response to the attack on Austin, Texas-based software provider SolarWinds Corp. and other organizations was at times hindered by a lack of communication between businesses and federal departments, the executives said Tuesday at a hearing before the Senate Select Committee on Intelligence.
A digital strategy to defend the nation (Microsoft On the Issues) Editor’s note: On Feb. 23, Microsoft President Brad Smith testified before the Senate Armed Services Committee on emerging technologies and their impact on national security. Later, he also testified at the Senate Select Committee on Intelligence on the SolarWinds hack. Read Brad Smith’s written testimony from the Senate Armed Services Committee hearing here and watch the...
After SolarWinds, US needs to toughen cyber defenses, says Microsoft president (C4ISRNET) Microsoft Corp. President Brad Smith asked the Senate Armed Services Committee to picture the danger from a cyberattack on the water supply or other national infrastructures.
SolarWinds CEO Recommends Liability Protections for Sharing Information about Incidents (Nextgov.com) The new CEO had a couple of other asks for Congress too.
Here are the 5 most important takeaways from the US Senate's grilling of SolarWinds, Microsoft, CrowdStrike, and FireEye over what could be the biggest cyberattack in history (Business Insider) Amazon was a no-show, while Microsoft's president, Brad Smith, expressed a strong belief that Russia was behind the sweeping SolarWinds attacks.
CEOs, Senators discuss mandating cyber-attack disclosures (ZDNet) At a hearing regarding the SolarWinds breach, Senators stress the importance of information sharing -- and call out AWS for refusing to attend the hearing
Biden to order sweeping review of U.S. supply chain weak spots (Washington Post) The White House aims to avoid shortages of critical goods such as computer chips and surgical masks
CCPA On The East Coast? Meet CDPA, Virginia’s Consumer Data Protection Act (AdExchanger) Last week, Virginia’s house of representatives and senate passed the Consumer Data Protection Act (CDPA) with sweeping majorities.
Former Google CEO stresses ‘urgency’ in countering China on tech (South China Morning Post) The US is ‘one or two years ahead of China, not five or 10’ and ‘the Chinese are well ahead in areas like face recognition,’ said former Google CEO Eric Schmidt.
Lawmakers to roll out legislation reorganizing State cyber office (TheHill) A group of bipartisan lawmakers led by House Foreign Affairs Committee ranking member Michael McCaul (R-Texas) will reintroduce legislation Tuesday intended to increase the ability of the State Department to address international cybersecurity coo
Army switches up cyber leadership (C4ISRNET) Two top Army officers are swapping roles between Army Cyber Command and the cyber and electronic warfare schoolhouse.
Best, brightest federal cyber workers competing in ‘save the world’ scenario (Federal News Network) Five teams and 20 individuals will compete on Feb. 25 to be named the best in federal cybersecurity.
Cyber Workforce Vital to Protecting National Security (U.S. Department of Defense) During Engineers Week, the Defense Department is highlighting its efforts to develop a diverse and well-educated future engineering workforce and to increase understanding of and interest in engineering and technology.
Virginia’s New Privacy Law Takes Aim at Larger Business Entities (Lexology) Virginia’s new consumer privacy bill, expected to be signed into law as soon as April 2021, will elevate the Commonwealth’s approach to data privacy…
Litigation, Investigation, and Law Enforcement
Exclusive: French antitrust investigators say Google breached its orders on talks with news publishers - sources (Reuters) French antitrust investigators have accused Alphabet Inc's Google of failing to comply with the state competition authority's orders on how to conduct negotiations with news publishers over copyright, two sources who read the investigators' report said.
California can finally enforce its landmark net neutrality law, judge rules (The Verge) Net neutrality is back
Pandemic has exposed fractures in cyber fraud strategy (ComputerWeekly) RUSI report urges a bolder and more coordinated response to cyber-enabled fraud as the pandemic lays bear the scale of the problem