Attacks, Threats, and Vulnerabilities
Belgian public-sector network suffers cyberattack, affecting parliament (Computing) The attack disrupted a planned meeting of Belgian's Foreign Affairs, which had been due to discuss the human rights situation in Xinjiang
XSS in the wild: JavaScript-stuffed orders used to compromise Japanese e-commerce sites (The Daily Swig) Website vulnerabilities abused in new hacking campaign
Three new malware families found in global finance phishing campaign (ZDNet) Doubledrag, Doubledrop, and Doubleback are the work of “experienced” threat actors.
Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques (Symantec) Two-factor or multi-factor authentication is used to secure organizations and accounts from attackers, making it a problem for malicious actors. Recent attacks show how they are attempting to bypass or avoid it completely.
The UNC2529 Triple Double: A Trifecta Phishing Campaign (FireEye) We observed a widespread, global phishing campaign from UNC2529 targeting numerous organizations across an array of industries.
Qualys Flags Gaping Security Holes in Exim Mail Server (SecurityWeek) Security researchers at Qualys have discovered multiple gaping security holes in Exim, a widely deployed mail server that has been targeted in the past by advanced nation state-based threat actors.
High-Severity Dell Driver Vulnerabilities Impact Hundreds of Millions of Devices (SecurityWeek) Dell patches high-severity vulnerabilities affecting a driver that is present on hundreds of millions of devices.
How Attackers Use Compromised Accounts to Create and Distribute Malicious OAuth Apps (Proofpoint) Open authorization or “OAuth” apps add business features and user-interface enhancements to major cloud platforms such as Microsoft 365 and Google Workspace. Unfortunately, they’re also a new threat vector as bad actors are increasingly using malicious OAuth 2.0 applications (or cloud malware) to siphon data and access sensitive information. In 2020, Proofpoint detected more than 180 different malicious applications, attacking over 55% of customers with a success rate of 22%.
21Nails vulnerabilities impact 60% of the internet's email servers (The Record by Recorded Future) The maintainers of the Exim email server software have released updates today to patch a collection of 21 vulnerabilities that can allow threat actors to take over servers using both local and remote attack vectors.
'Phishing' Sites Buying Workplace Login Details Linked to Well-Funded Startup (Vice) Argyle says it provides access to employment and payroll history. Buying login details may fall afoul of U.S. hacking laws.
Report: Iran likely behind cyber attacks on Israeli supply chain companies (Cleveland Jewish News) Despite issuing ransom demands, the hackers reportedly used code that corrupted stolen information, leading experts to doubt a profit motive.The post Report: Iran likely behind cyber attacks on Israeli supply
72 Hours Left: Hackers Extend PN Ransom Deadline, But Party Insists It Isn't Negotiating (Lovin Malta) A group of hackers that operate on the dark web have extended the deadline for Malta’s Opposition party to pay them a ransom until this Friday, threatening to release a trove of sensitive information if they aren’t paid thousands. However, the Nationalist Party has remained steadfast in its position of not negotiating with hackers. It … Continued
They Told Their Therapists Everything. Hackers Leaked It All (Wired) A mental health startup built its business on easy-to-use technology. Patients joined in droves. Then came a catastrophic data breach.
‘You have 240 hours to co-operate’: Cyber attackers demand ransom from NSW Labor (Brisbane Times) Security sources speaking on the condition of anonymity but who are familiar with the attack said Russian ransomware Avaddon was behind the breach.
Fertility apps with hundreds of millions of users collect and share excessive information (EurekAlert!) The majority of top-rated fertility apps collect and even share intimate data without the users' knowledge or permission, a collaborative study by Newcastle University and Umea University has found.
Researchers are now calling for a tightening of the categorisation of these apps by platforms to protect women from intimate and deeply personal information being exploited and sold.
Outdated Windows Users Flout Computing Safety (TechNewsWorld Headlines) A recent study by Kaspersky revealed that nearly one quarter of PCs still run Microsoft Windows 7, which stopped receiving mainstream support in January 2020.
Using an end-of-life operating system that no longer receives security updates is akin to driving a car with a brake light on, suggested Oliver Tavakoli, CTO at Vectra AI.
Alabama school system fends off cyber attack (al) The system's technology team detected a threat on April 29th.
Spanish delivery startup Glovo hit by cyber attack (Reuters) A hacker broke into the systems of Spanish rapid-delivery startup Glovo last week, it said on Tuesday, without specifying what information might have been accessed.
Security Patches, Mitigations, and Software Updates
Dell patches 12-year-old driver vulnerability impacting millions of PCs (The Record by Recorded Future) Hundreds of millions of Dell desktops, laptops, notebooks, and tablets will need to update their Dell DBUtil driver to fix a 12-year-old vulnerability that exposes systems to attacks.
Apple products hit by fourfecta of zero-day exploits – patch now! (Naked Security) Don’t delay. Get these updates today.
Advantech WISE-PaaS RMM (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.1
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Advantech
Equipment: WISE-PaaS/RMM
Vulnerability: Use of Hard-coded Credentials
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information.
Delta Electronics CNCSoft ScreenEditor (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Delta Electronics
Equipment: CNCSoft ScreenEditor
Vulnerability: Out-of-bounds Write
2. RISK EVALUATION
Successful exploitation of this vulnerability could crash the device, and an out-of-bounds write may allow remote code execution.
Trends
Netskope Research Finds Poor Collaboration Between Security and Networking Teams Holding Back Digital Transformation Projects (Netskope) Research reveals that – despite shared goals – ‘combative’ and ‘dysfunctional’ relationships are jeopardizing projects estimated to cost $6.8tn globally between 2020 and 2023 50% of global CIOs state that a lack of collaboration between specialist teams stops their organization from realizing the benefits of Digital Transformation 43% of security professionals and 45% of networking […]
PC Matic Survey Finds Majority of Americans Lack Confidence in U.S. Federal Government's Cybersecurity Preparedness (PR Newswire) Today, American cybersecurity firm, PC Matic, released the findings of a public opinion survey which sought to understand public opinion of...
Industry Report highlights the scale of the ransomware challenge (Pro Lion) Double Whammy of increased frequency of cyber breaches, coupled with difficulties of recovering from these attacks during a pandemic laid bare
The Hiscox Cyber Readiness Report 2021
(Hiscox) Read our Cyber Readiness Report for the latest cyber security insights. Discover how business are responding to cyber risks and the impact of Covid-19.
Rise of the Cyborg: Arkose Labs Fraud Report Finds Human-Bot Hybrid Attacks Increase in Q1 (Yahoo) Arkose Labs, provider of online fraud and abuse prevention technology, today released new data on the latest fraud trends, revealing an increase in human-bot hybrid attacks. The Q2 Arkose Labs Fraud and Abuse Report, released today, indicated an uptick in fraud originating from North America, with the U.S. and Russia vying for the top spot in terms of origination of attacks.
The cyber industry's struggle for speed and superiority (SC Media) Spending and investment in cybersecurity have never been higher, and yet the industry is struggling to adapt to the speed of modern attacks and prevent software from becoming a single point of failure.
Healthcare hackers demanded an average ransom of $4.6M last year, says BakerHostetler (Healthcare IT News) The report found that healthcare was one of the industries most affected by tracked ransomware incidents in 2020, second only to education.
Americans On Cybersecurity (PC Matic) 2020 saw an increase in ransomware attacks across the country. In a statement releasedby the National Cyber Investigative Joint Task Force, a division of the FBI, they found a total Bitcoin payout of $144.35 million for ransomware between 2013 and 2019. The 2020 increase in ransomware saw a payout of $20 billion, a significant jump from the FBI findings in the previous 6 years. Americans were aware of ransomware before 2020, but they were paying attention once it exploded.
80% of Indian firms struggle to educate employees on cybersecurity: Sophos (mint) The study revealed that despite the increase in cyberattacks, cybersecurity budgets have remained stagnant and executive teams continue to underestimate the level of damage the attacks can do to organizations
Marketplace
Cybersecurity compliance startup Vanta raises $50M (VentureBeat) Vanta, which offers products aimed at automating cybersecurity compliance, has raised $50 million in venture funding.
Sectigo Acquires SiteLock (Sectigo® Official) Sectigo® today announced the acquisition of SiteLock, a leading provider of website security protection and monitoring.
Acuant Announces the Acquisition of Hello Soda to Strengthen Its Trusted Identity Platform and Global Position in Digital Identity (GlobeNewswire) The acquisition follows the company’s best quarter in history with record revenue
JupiterOne's Fast Growth Bolstered by $30 Million Series-B Funding (PR Newswire) JupiterOne, a provider of cyber asset management and governance solutions, today announced a $30-million Series-B funding round led by Sapphire...
Persona lands $50M for identity verification after seeing 10x YoY revenue growth (TechCrunch) The identity verification space has been heating up for a while and the COVID-19 pandemic has only accelerated demand with more people transacting online. Persona, a startup focused on creating a personalized identity verification experience “for any use case,” aims to differentiate itself in an in…
OneTrust to Acquire Shared Assessments (OneTrust) OneTrust entered into a definitive agreement to acquire Shared Assessments, the global third-party risk membership organization.
Zentry Security Poised to Dominate Zero Trust Remote Access for SMEs with Strong Funding Support, Expanded Product Capabilities and Key Leadership Team Appointments (GlobeNewswire) Zentry Security, an emerging cybersecurity company offering Zero Trust remote access solutions for small and medium-sized enterprises (SMEs), today announced new cloud capabilities for its Zentry Trusted Access product and the appointment of seasoned security technology executives to the leadership team.
The Briefing: Acronis Raises $250M+, WorkBoard Snags $75M, And More (Crunchbase News) Crunchbase News' top picks of the news to stay current in the VC and startup world.
SASE Vendors: Overview - Definition (SDxCentral) The SASE market has grown significantly since the term’s introduction in 2019. Check out this article for an overview of SASE vendors.
Facebook and Trump are at a turning point in their long, tortured relationship (Washington Post) Facebook’s Oversight Board is expected to announce a decision Wednesday on whether to reinstate the former president’s account
Donald Trump’s ‘social media platform’ has launched and it’s just a blog (The Verge) Does the like button work yet?
Facebook Allows Drug Ads to Target Teens, Activists Say (Wired) The social network has rules about what can be shown to minors. The Tech Transparency Project found that they aren’t being enforced.
Patricia Nagle Appointed as New President of TeamViewer Americas (PR Newswire) TeamViewer, a leading global provider of remote connectivity and workplace digitalization solutions, is very pleased to announce that...
Bishop Fox Appoints IT Operations Veteran as Associate Vice President of Consulting Managed Services (GlobeNewswire) Tony Needler to Drive Excellence and Expand the Company’s Leading Strategic Programs
ZeroNorth Appoints Dan Beauregard as Vice President of Strategic Alliances (ZeroNorth) DevSecOps Industry Expert to Lead Company’s Strategic Technology and Channel Partnership Programs Boston, May 5, 2021 –– ZeroNorth, the only company to unite security, DevOps and the business for the good of software, today announced that Dan Beauregard was named Vice President of Strategic Alliances. Beauregard joined ZeroNorth in October 2020 to lead DevSecOps technical …
Products, Services, and Solutions
Black Kite - New Automated Tool Calculates Supply Chain Ransomware Susceptibility (Black Kite) Black Kite, a leading cybersecurity ratings provider, today released the first automated ransomware service that assesses the likelihood of a ransomware attack on organizations and their vendors, suppliers, and business partners. The Ransomware Susceptibility Index (RSI) enables companies to gauge the ransomware attack risk of any vendor within minutes.
Itential Extends Cloud-Native Network Automation Platform, Launches Sa (PRWeb) Itential©, the leader in network and cloud automation software, today announced at ONUG Spring 2021 the general availability of its cloud-native network automation so
TeamViewer Partners with Cyberprotection Leader Malwarebytes (PR Newswire) TeamViewer, a leading global provider of secure remote connectivity solutions and workplace digitalization technology, today announced a...
XM Cyber Partners with Italy-based Value-Added Distributor ICOS (PR Newswire) XM Cyber, the multi-award-winning leader in cyberattack path management, today announced that it has signed an agreement with Italy-based...
XM Cyber Announces Integration with Palo Alto Network's Cortex XSOAR (PR Newswire) XM Cyber, the multi-award-winning leader in Attack-Centric Exposure Prioritization, today announced integration with Palo Alto Network's Cortex...
Cyber Precog Packs Data Center Power in a Flyaway Kit (Booz Allen Hamilton) Learn how Booz Allen’s Cyber Precog delivers next-generation cyber incident response.
Cequence Security Strengthens Runtime API Protections in API Sentinel (Cequence) New features drive “shield right” protections while supporting “shift left” initiatives Sunnyvale, Calif., May 05, 2021 — Cequence Security, a leading API security vendor, announced today the release of API Sentinel 2.0, adding powerful features that will help organizations strengthen their runtime API protections by “shielding the right” – a necessary step that is often […]
KnowBe4 Launches Artificial Intelligence-Driven Phishing Feature (PR Newswire) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced a new feature –...
Harena Data introduces Safe Play, a protected mobile platform for kids to game (GYO Score) Franklin, IN - May 4, 2021 - Harena Data, the world's largest esports community aggregator, has today unveiled Safe Play, a new mobile offering that offers a safe, secure environment for children to play video games. Harena's proprietary platform is the
Privitar Launches Modern Data Provisioning Platform to Provide Self-Service Access to Trusted Data (Privitar) New Privitar Data Provisioning Platform expands industry-leading data privacy capabilities, adds a new data exchange, compliance accelerators and dynamic masking to enable modern data provisioning and safe data sharing LONDON and BOSTON – May 4, 2021 – As organizations worldwide increasingly seek to enable frictionless access to data for maximum business insights, data privacy […]
Trend Micro Unveils New OT Endpoint Security Solution Made by TXOne (SecurityWeek) Trend Micro announces a new endpoint security solution developed by TXOne Networks for operational technology (OT) environments.
Calamu’s cybersecurity platform is built around basic concept — data breaches are unavoidable … so, protect your info before it’s stolen (ROI-NJ) Paul Lewis, who has been in cybersecurity his entire career, considers it a sad state of affairs that, somewhere along the way, businesses embraced a new best practice … They dutifully pay their ransom to criminals. Although it has been said in countless articles warning about the threat of hackers holding data hostage with encryption […]
Semperis Enhances the Industry’s Most Comprehensive Active Directory Protection Platform with Continuous Security Validation (BusinessWire) Semperis enhances its Active Directory protection platform with continuous security validation.
Mandiant Managed Defense now supports Microsoft Defender for Endpoint (Help Net Security) FireEye announced that Mandiant Managed Defense, a managed detection and response service, now supports Microsoft Defender for Endpoint.
Keenetic Limited integrates DPI software from Rohde & Schwarz into Wi-Fi routers to boost wireless network performance (UNITED NEWS NETWORK GmbH) A technical collaboration between Rohde & Schwarz and Keenetic will improve QoE, QoS and strengthen network security for wireless home and business applications
Fortinet releases 5G optimised solutions for networking and security (Security Brief) Tthe FortiGate 7121F delivers the security necessary for 5G networks and enterprise Zero Trust Access, while FortiExtender 511F-5G provides wireless WAN connectivity for SD-WAN and SASE solutions.
Taking Control During Incident Response with FortiSOAR 7.0 (Fortinet Blog) Daily SOC challenges-including the volume of alerts, extensive manual processes, and staffing shortages-make it difficult for SOC teams to keep up with the evolving threat landscape. Learn how Fort…
IBM Gets SASE With Zscaler, Adds Zero-Trust Security Blueprints (SDxCentral) IBM Security today rolled out several zero trust security updates including a secure access service edge (SASE) partnership with Zscaler.
Forward Networks And Itential Team Up To Deliver Seamless Closed-Loop Automation For Physical, Virtual, And Cloud Networks (PR Newswire) Forward Networks, the industry leader in network assurance and intent-based verification, and Itential, the leader in network and cloud...
Vaccine passport app 'may not be ready' when foreign travel resumes (Computing) A Downing Street spokesperson said the app may not be ready by the 17th May
Wolf & Company, P.C. Staff Obtains Highly Regarded OSCP Certification (PR Newswire) Alex Martirosyan, a member of Wolf & Company P.C.'s Penetration Testing Group, obtained the coveted Offensive Security Certified Professional...
Cyber-Security Firm GLESEC Announces the Launch of New Orchestrated Data Leakage Detection and Protection Service (PR Newswire) International Cyber-Security Firm GLESEC announces the launching of its Orchestrated Data Leakage Detection and Protection Service to address a...
NetSTAR Announces Availability of inSITE Threat Intelligence 2.0 (PR Newswire) NetSTAR, the global leader in OEM integrated solutions for internet categorization and threat intelligence, announced today the global...
IBM Helps Customers Adopt a Zero Trust Approach to Security (IBM News Room) IBM Security introduced a new Software as a Service (SaaS) version of IBM Cloud Pak for Security, designed to simplify how organizations deploy a zero trust architecture across the enterprise.
QuoLab Technologies Joins Forces with the Cyber Alliance to Defend Our Healthcare (BusinessWire) QuoLab Technologies today announced a partnership with the Cyber Alliance to Defend our Healthcare.
Technologies, Techniques, and Standards
MITRE ATT&CK for Containers: Why It Matters (Trend Micro) The complexity of containers demands something to make sense of it all. Builders, operations teams and security teams need a single language to understand the risk associated with containers.
Influencing Future of Cloud Security with MITRE ATT&CK® for Containers (Container Journal) Trend Micro contributes to new framework, helping businesses build and deploy secure container environments
Integrated SIM Functionality: Drivers, Approaches to Standardisation and Use Cases (Trusted Connectivity Alliance) SIM technology provides the foundation for the most widely distributed secure application delivery platform in the world. SIM / USIM applications enable access to mobile networks and have traditionally been incorporated within mobile devices via Tamper Resistant Element (TRE)1 hardware, in standalone Secure Element (SE) form factors such as the removable or embedded SIM.
Report: Unified Endpoint Security for the Hybrid Workplace (BlackBerry) A recent survey of IT professionals shows a shift to a more distributed workforce, exposing organizations to new cyber-risks. Read the full analysis.
Incident Detection and Response Basics Greatly Matter (Cyber Security Hub) Cyber security professionals know there are two types of organizations: those that have been breached and those that will be breached. The question isn't whether organizations will be attacked. The question is when a cyber security incident occurs, will they be able to appropriately respond?
It's Time to Ditch Celebrity Cybersecurity (Dark Reading) High-profile attacks and solutions are shiny objects that can distract from the defenses that afford the greatest protection.
Courts Should Use Encryption Technology to Stay Safe (Bloomberg Law) IT network breaches of U.S. federal and state courts demonstrate the vulnerability of legacy IT systems used by the judiciary, say Guillermo Christensen, managing partner of Ice Miller LLP, and Chris Howell, co-founder of security tech company Wickr Inc. They say integrating end-to-end encryption in a “zero trust” environment is the only realistic solution.
How To Deal With Employees As The New Security Perimeter (CTOvision.com) Read Robert Fly, Co-founder and CEO, Elevate Security explain how organizations should deal with employees as a new cybersecurity risk perimeter on Forbes : Let’s look back in time about a year when security executives woke up and realized it was about to get (even more) real. You likely fell in one of two categories:
Design and Innovation
Algorithms improve how we protect our data (EurekAlert!) Daegu Gyeongbuk Institute of Science and Technology (DGIST) scientists in Korea have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach they used was described in the journal IEEE Transactions on Information Forensics and Security and could reduce the computational complexity needed to validate encryption security.
Planning Our Passwordless Future (Dark Reading) All the talk that passwords could one day go away seemed too good to be true, yet the scales are finally started to tip to a passwordless reality. (Part one of a two-part series.)
Research and Development
NSA, Army Launch ‘Qubit Collaboratory’ to Advance Quantum Information Science (Nextgov.com) A new broad agency announcement will be open until early 2026.
Legislation, Policy, and Regulation
Australia Draws A Line on China (Foreign Policy) Canberra’s had enough of trade embargoes and Chinese grievances—and is ready to draw a line.
India doesn't name Huawei among participants in 5G trials (Reuters) India will allow mobile carriers to carry out 5G trials with equipment makers including Ericsson, Nokia and Samsung's network unit, the government said on Tuesday, but did not name China's Huawei among the participants.
‘It’s an act of war’: Trump’s acting Pentagon chief urges Biden to tackle directed-energy attacks (POLITICO) “If this plays out and somebody is attacking Americans [even] with a nonlethal weapon … we owe it to our folks that are out there,” said Christopher Miller.
Biden Says 'Hope and Expectation' for Putin Meeting in June (The Moscow Times) A summit has not been confirmed but a Putin advisor has said planning is underway.
No ‘Boogeyman’: Why the Bin Laden Raid Might be the Last Unifying Moment for US Foreign Policy (Defense One) The changing threat facing the country and a growing political divide means there’s no common enemy around which Americans can unite.
Why the United States Needs an Independent Cyber Force (War on the Rocks) Cyber is now the oxygen upon which the U.S. military depends for almost literally every element of its vast warfighting capabilities. No military service
Rosenworcel Wants to “Revitalize” CSRIC (Radio World) The acting chairwoman of the Federal Communications Commission plans to “refocus and revitalize” the group that advises the FCC on improving the security, reliability and interoperability of U.S. communications systems. And she wants it to focus on 5G.
Cyber Command shifts counterterrorism task force to focus on higher-priority threats (C4ISRNET) U.S. Cyber Command is shifting Joint Task Force-Ares' focus from counterterrorism to nation-state actors, particularly in the Indo-Pacific region.
Maj. Gen. DeAnna Burt: Space Force Needs More Cyber Expertise (Executive Gov) Maj. Gen. DeAnna Burt, deputy commander of Space Operations Command, said the U.S. Space Force wants
The Cybersecurity 202: Lawmakers want greater resources, authorities for CISA to protect critical infrastructure (Washington Post) Leading voices in Congress say the nation's top cybersecurity agency needs better resources to handle growing threats to critical services like water and power.
The Urgent Need to Strengthen the Cyber Readiness of Small and Medium-Sized Businesses (Cyber Readiness Institute) We remain mired in a nightmarish game of Whack-A-Mole with our cyber adversaries. But now the digital landscape is larger, and we have no idea where the next cyber attack will pop up. What we know with certainty is that it will. The discovery of major adversary actions, through the SolarWinds and Microsoft Exchange compromises, comes as we emerge from a pandemic year of remote business operations that saw a dramatic rise in ransomware attacks against hospitals, schools, and other critical infrastructure. We are at a inflection point...
Litigation, Investigation, and Law Enforcement
Dubious Covid-19 Shots, Fake Vaccination Certificates Proliferate on Dark Web (Wall Street Journal) Dubious coronavirus shots and Covid-19 vaccination certificates are springing up on dark web marketplaces.
Maryland U.S. Attorney’s Office Seizes Domain Name Falsely Purporting to Provide COVID-19 Vaccines (U.S. Food and Drug Administration) FDA OCI, freevaccinecovax.org, purported website, biotechnology company, vaccine, COVID-19, virus, coronavirus, collect, personal information, fraud, phishing attacks, malware, seizure, domain name, Russia, Pfizer, WHO, UNHCR,
OSG did not tell privacy watchdog about recent data breach (INQUIRER.ne) The Office of the Solicitor General (OSG) did not notify the country’s data privacy watchdog about the data breach that was flagged to it twice last March, a violation that is
Second Circuit Clarifies Standing Inquiry in Data Breach Actions (Lexology) On April 26, 2021, the Second Circuit Court of Appeals in McMorris v. Carlos Lopez & Associates, LLC[1] affirmed the dismissal of a putative class…
PA Legislators Call For Investigation Into Massive Data Breach (Norristown, PA Patch) House Republicans say that concerns about a data breach, impacting 72,000 Pennsylvanians, were dismissed by the state months ago.
Apple's App Tracking Shift Seizes On 'Spirit' Of Privacy Laws (Law360) Apple's recent move to require apps to obtain permission before tracking users is poised to reshape the advertising industry and fuel emerging antitrust concerns, while raising the bar set by U.S. privacy laws on how much control consumers should have over their personal information.
Katie Hill Owes Radio Host $30K In Revenge Porn Suit Fees (Law360) A California judge has ordered former U.S. Rep. Katie Hill to pay radio personality Joseph Messina almost $30,000 in attorney fees incurred during her revenge porn lawsuit against him and various media outlets, even though she dropped her claim against Messina early in the case.
Judge Blasts Barr As 'Disingenuous' In Mueller Report Filings (Law360) A D.C. federal judge said former Attorney General William Barr's U.S. Department of Justice was "disingenuous" with the court about the contents of a memo it sent related to a report on 2016 election interference, finding Monday that the agency should not be allowed to keep the memo from the public.
Florida Teen charged as adult in rigged homecoming election (Washington Post) A Florida teen accused of rigging a homecoming queen election with her mother is being charged as an adult, prosecutors said.