Dateline Moscow, Kyiv, and Washington: Cyber phases of Russia's hybrid war.
Ukraine at D+99: 100 days of sanguinary war. (The CyberWire) Observers offer their assessments of Russia's war against Ukraine after a hundred days of invasion. Russia shows signs of concern over the information war, and Western governments and corporations grow more open about their work for Ukraine and against Russia in cyberspace.
Russia's invasion of Ukraine enters 100th day (Reuters) Russia's invasion of Ukraine entered its 100th day on Friday with no end in sight to the fighting that has killed thousands, uprooted millions and reduced cities to rubble.
EXPLAINER: At 100 days, Russia-Ukraine war by the numbers (AP NEWS) One hundred days into Russia's invasion of Ukraine, the war has brought the world a near-daily drumbeat of gut wrenching scenes: Civilian corpses in the streets of Bucha; a blown-up theater in Mariupol; the chaos at a Kramatorsk train station in the wake of a Russian missile strike.
Russia-Ukraine war: what we know on day 100 of the invasion (the Guardian) Russian forces now occupy about 20% of Ukraine’s territory as Zelenskiy notes ‘some success’ in battles at Sievierodonetsk
"Beyond disappointment": How Putin will view first 100 days of Ukraine war (Newsweek) Experts told Newsweek that Russian President Vladimir Putin is likely to view the first 100 days of his invasion against Ukraine with enormous disappointment.
Putin is 100 days into Ukraine war and cracks in his support are showing (Newsweek) High-profile resignations and a report that Russian elites are displeased with the Russian president point to waning support for Putin's war.
Street battles in Severodonetsk; Zelensky says Russia holds 20% of Ukraine (Washington Post) Ukraine is suffering significant setbacks in parts of the east, amid grueling street-by-street battles in the key city of Severodonetsk, with the British Defense Ministry saying that most of the city is in Russian hands. After nearly 100 days of fighting, Russian forces control 20 percent of Ukraine, Ukrainian President Volodymyr Zelensky said in a speech to the Luxembourg parliament.
Devastation and defiance in Ukraine: 100 days of a war that is reshaping Europe (the Guardian) How the Russian invasion has unfolded, from the desperate fight for Mariupol to economic turmoil around the world
Ukraine marks 100 days of war as battle for Severodonetsk rages (Washington Post) Ukraine marked 100 days of war Friday with its troops in brutal combat for the key eastern city of Severodonetsk, which is now mostly controlled by Russian forces.
Russia-Ukraine war at 100 days: Compassion fatigue is here (Al Jazeera) While Putin no doubt welcomes the metastasising onset of compassion fatigue, Zelenskyy has to fear it.
Russia warns West of weapons repercussions, pounds Ukraine (Military Times) Western arms have been critical to Ukraine’s success in stymieing Russia’s much larger and better-equipped military during a war now in its 99th day.
Neither Ukraine nor Russia can win now (The Telegraph) The paradox is that a settlement is desperately needed, but there can be no lasting peace with Putin
Russia-Ukraine latest news: Kyiv may switch off Europe's largest nuclear powerplant (The Telegraph) Ukraine would consider switching off its Zaporizhzhia nuclear power plant that lies in Russian-occupied territory if Kyiv loses control of operations at the site, an aide to the prime minister has said, Interfax news agency reports.
In Chernobyl’s delicate nuclear labs, Russians looted safety systems (Washington Post) Six hundred ninety-eight computers. 344 vehicles. 1,500 radiation dosimeters. Irreplaceable software. Almost every piece of firefighting equipment.
Ukraine Wants Longer-Range Ammunition for Donbas Gunfight (Foreign Policy) “We’re still not giving them what they want,” one U.S. source told Foreign Policy.
Volodymyr Zelensky on War, Technology, and the Future of Ukraine (Wired) In a one-on-one interview with WIRED, the embattled president expresses clarity amidst the chaos.
How Putin's "nuclear football" really works (Newsweek) A nuclear launch hub called a "nuclear football" accompanies American presidents everywhere. Russian leaders have their own such system, called the Cheget.
Ukraine reports 15,000 suspected war crimes (BBC News) Its top prosecutor accuses Russian military officials and politicians of committing war crimes.
US Pushing Regional Monitoring Body to Extend Russian War-Crimes Inquest (Defense One) The OSCE already did one fact-finding mission in March; U.S. diplomats are whipping up support for another.
Why Ukraine and Russia Both Look to the Nuremberg Trials (Time) Ukraine looks to Nuremberg to demand a full investigation into Russian war crimes, while Russia invokes Nuremberg to justify their invasion
Russia summons heads of U.S. media outlets, warns of 'stringent measures' (Reuters) Russia's Foreign Ministry said it was summoning the heads of U.S. media outlets in Moscow to a meeting next Monday to notify them of tough measures in response to U.S. restrictions against Russian media.
US confirms military hackers have conducted cyber operations in support of Ukraine (CNN) Cyber Command, the US military's hacking unit, has conducted offensive cyber operations in support of Ukraine as it defends itself against Russia's invasion, the head of the command has confirmed.
Advancing security across Central and Eastern Europe (Google) We are expanding our cybersecurity partnerships and investment in Central and Eastern Europe.
US Justice Department Braces for More Russian Cyberattacks (VOA) Three months into Russia’s war with Ukraine, US officials are bracing for the possibility of Russian cyberattacks in retaliation for sanctions
Russia, backed by ransomware gangs, actively targeting US, FBI director says (Cybersecurity Dive) The FBI is laser focused on preventing a destructive attack, FBI Director Christopher Wray said. The agency previously, helped to disrupt a 2021 Iran-backed attack on Boston Children’s Hospital.
US Army Delays Doctrine Release to Incorporate Lessons from Ukraine (Defense One) A service team is in Europe talking to Ukrainian troops and U.S. trainers, gathering information to refine its multi-domain operations playbook.
Five questions about U.S. help for Ukraine (Washington Post) President Biden has made it official: Ukraine will be getting a new $700 million wave of military aid, including the High Mobility Artillery Rocket System (HIMARS) that will expand its ability to strike Russian positions more accurately and from much farther away.
Readout of President Biden and Vice President Harris’s Meeting with NATO Secretary General Jens Stoltenberg (The White House) President Joseph R. Biden, Jr. and Vice President Kamala Harris met today with Secretary General Jens Stoltenberg of the North Atlantic Treaty
How Sweden and Finland could reshape NATO’s northern security (Defense News) The accession of Finland and Sweden, historically neutral nations, is expected to transform Europe’s security landscape for years to come. Their armed forces and geography would seriously complicate any further aggression Russia might want to try in the region, defense officials and national security experts say.
Ukraine renews diplomatic push for speedy EU membership (the Guardian) Effort to win over doubters in Berlin, Paris and other capitals and start accession process
How Is Russia's Invasion of Ukraine Likely to Alter the Post-World War II International Order? (Carnegie Corporation of New York) The dramatic global events unleashed by Russia’s invasion of Ukraine and other fast moving global trends require deep expertise to be understood and explained. A group of experts offer their perspectives on some critical global challenges
Will Teaching Aggressors a Lesson Deter Future Wars? (Foreign Policy) Calls to inflict a decisive defeat on Russia are misguided and won’t necessarily prevent Putin or others from using force.
The Reconstruction of Ukraine Should Start Today. The First Step Is Ukraine’s Safety (Wilson Center) There are many discussions on the reconstruction of Ukraine underway and even a few specific plans, such as the one proposed by the European Commission.
The Reconstruction of Ukraine: Three Experts Offer Priorities for the Future (Wilson Center) Postwar rebuilding will be a monumental task for Ukraine. Politicians and economists from Ukraine and around the world have already started discussing the cost of Putin’s war and what rebuilding might look like. Prime Minister Denys Shmyhal and the Ukrainian cabinet are working on the “U-24” reconstruction plan.
The EU Finally Approves a Ban on Russian Oil (World Politics Review) European Union leaders agreed this week to a partial ban on Russian oil imports, overcoming a veto by Hungarian Prime Minister Viktor Orban. But the agreement commits only to banning seaborne imports to the EU by the end of 2022, leaving Russian oil imported by pipeline untouched.
U.S. Technology, a Longtime Tool for Russia, Becomes a Vulnerability (New York Times) Global restrictions on sending advanced technology to Russia are hampering the country’s military capacity, U.S. officials say, though Russia has stockpiled American equipment for years.
Forty Percent of the World Food Program’s Wheat Supplies Come from Ukraine (Wilson Center) According to Ukraine’s ministry for agriculture, due to the Russian war on that country, approximately 22 million tons of grain are stranded in Ukraine waiting export. The broad implications are clear. As the UN Food and Agriculture Organization notes, Ukraine supplies up 16% of the world’s corn exports and more than 40% of the world’s sunflower oil. A recent BBC report noted that Egypt and Bangladesh each get about one-quarter of their wheat from Ukraine. Moldova, already suffering from Russian occupation and the war’s fallout, gets over 90% of its wheat from Ukraine.
Palantir’s Karp is first western CEO to visit Zelenskyy amid invasion (Defense News) “We are actively working not only on the digital blockade of the Russian Federation, but also to attract top international companies to Ukraine,” a Ukrainian minister said. “This is one of our priorities today.”
Attacks, Threats, and Vulnerabilities
Kaspersky says Chinese APT demonstrating “seemingly impossible network behaviors” (The Stack) A modular malware platform called WinDealer being used by a Chinese APT dubbed LuoYu is demonstrating “seemingly impossible network behaviors” via infrastructure that is “nothing short of extraordinary” according to a striking new report by security researchers at Kaspersky Lab — who believe the threat group has the unusual and highly sophisticated ability to conduct hugely powerful “man-on-the-side” (MOTS) attacks like those of the NSA and GCHQ’s “Quantum Insert” project, which were revealed in Edward Snowden’s 2013 leaks.
Exiled Iran Group Claims Tehran Hacking Attack (SecurityWeek) An exiled Iranian opposition group claimed a hacking attack which it said temporarily took control of dozens of websites run by Tehran's municipality and thousands of the capital's surveillance cameras.
Exposing POLONIUM activity and infrastructure targeting Israeli organizations (Microsoft Security) Microsoft successfully detected and disabled attack activity abusing OneDrive by a previously undocumented Lebanon-based activity group Microsoft Threat Intelligence Center (MSTIC) tracks as POLONIUM. The associated indicators and tactics were used by the OneDrive team to improve detection of attack activity and disable offending actor accounts. To further address this abuse, Microsoft has suspended more than 20 malicious OneDrive applications created by POLONIUM actors, notified affected organizations, and deployed a series of security intelligence updates that will quarantine tools developed by POLONIUM operators. Our goal with this blog is to help deter future activity by exposing and sharing the POLONIUM tactics with the community at large.
Microsoft steps in to disable OneDrive attacks from Lebanese group targeting Israeli orgs (The Record by Recorded Future) Microsoft said it detected and disabled attacks targeting OneDrive from a Lebanon-based group the company named Polonium.
Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies (The Hacker News) Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies
Microsoft blocked Polonium attacks against Israeli organizations (Security Affairs) Microsoft blocked an attack activity aimed at Israeli organizations attributed to a previously unknown Lebanon-based hacking group tracked as POLONIUM. Microsoft announced to have blocked a series of attacks targeting Israeli organizations that have been conducted by a previously unknown Lebanon-based hacking group tracked as POLONIUM. POLONIUM has targeted or compromised more than 20 Israeli […]
Foxconn confirms ransomware attack disrupted production in Mexico (BleepingComputer) Foxconn electronics manufacturer has confirmed that one of its Mexico-based production plants has been impacted by a ransomware attack in late May.
Foxconn: Mexico factory operations 'gradually returning to normal' after ransomware attack (The Record by Recorded Future) Billion-dollar tech manufacturer Foxconn said its factory in Mexico is slowly returning to normal after a ransomware attack crippled the facility in May.
Conti Targets Critical Firmware (Eclypsium) In late February of this year, an unknown individual began leaking internal information and communications from the notorious Conti ransomware organization. These leaks appear to confirm the long-suspected connections between Conti and the Russian FSB, and provide key insight into the development of new threats and techniques.
Conti ransomware group targeted Intel firmware tools (TechTarget) A pair of Intel firmware management platforms were targeted by the notorious Conti ransomware group to create new attack techniques, according to Eclypsium researchers.
Leaks Show Conti Ransomware Group Working on Firmware Exploits (SecurityWeek) The Conti leaks show that the ransomware group has been working on firmware hacks targeting the Intel Management Engine (ME).
Cybercriminals look to exploit Intel ME vulnerabilities for highly persistent implants (CSO Online) Leaked Conti information show the ransomware gang likely completed a proof of concept to exploit Intel ME and rewrite its firmware.
Ransomware gang now hacks corporate websites to show ransom notes (BleepingComputer) A ransomware gang is taking extortion to a new level by publicly hacking corporate websites to publicly display ransom notes.
Ransomware groups rebrand to dodge sanctions (The Hill) Ransomware groups that have been sanctioned by the U.S. government are switching their tactics to evade sanctions and continue to receive ransom payments, according to a report released Thursday by…
Russia-Linked Ransomware Groups Are Changing Tactics to Dodge Crackdowns (Wall Street Journal) Gangs are splitting into smaller cells and using different malware to obscure their identities and evade sanctions, researchers say.
To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions (Mandiant) UNC2165 changes its tactics to avoid sanctions.
Evil Corp hackers evolve ransomware, dodge US sanctions (TechCrunch) OFAC sanctioned Evil Corp in December 2019, citing the group's extensive development of Dridex malware, which the gang used to steal more than $100M.
Russian Hacking Gang Evil Corp Shifts Its Extortion Strategy After Sanctions (Data Center Knowledge) The security firm Mandiant believes that the Evil Corp gang is now using a well-known ransomware tool named Lockbit, which is used by numerous cybercrime groups.
Karakurt alert latest indicator that feds are worried about spin-off ransomware groups (SC Magazine) Two ransomware experts told SC Media that while the group’s brand isn’t well-known, they are believed to be a spin-off or partner of the more well-known and prolific Conti group.
CISA Updates Advisory on Threat Actors Chaining Unpatched VMware Vulnerabilities (CISA) CISA has updated Cybersecurity Advisory AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control, originally released May 18, 2022. The advisory has been updated to include additional indicators of compromise and detection signatures, as well as tactics, techniques, and procedures reported by trusted third parties.
Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control (CISA) The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory (CSA) to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination. These vulnerabilities affect certain versions of VMware Workspace ONE Access, VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.
Web Scraping Bots Continue to Threaten the Travel and Hospitality Industry (PerimeterX) Web scraping increased 240% YoY in 2021. This is a type of booking engine abuse that travel and hospitality companies can’t ignore.
Vulnerability within the UNISOC baseband opens mobile phones communications to remote hacker attacks (Check Point Research) Research by: Slava Makkaveev Introduction Do you remember push-button telephones? Many of them were based on chips from Spreadtrum Communications Inc., a Chinese chip manufacturer founded in 2001. In 2011, over half of all phones in China were powered by Spreadtrum chips. In 2018, Spreadtrum rebranded itself as UNISOC. Today, the manufacturer produces budget chipsets that... Click to Read More
Researchers find critical vulnerability in widely-used smartphone chips (The Record by Recorded Future) A vulnerability affecting one of the world’s largest chipmakers – UNISOC – has been discovered by researchers.
Millions of Budget Smartphones With UNISOC Chips Vulnerable to Remote DoS Attacks (SecurityWeek) Millions of budget smartphones that use UNISOC chipsets can have their communications remotely disrupted by hackers due to a critical vulnerability.
Stripe Website Impersonated in Credential Phishing Attack (Abnormal) In this sophisticated credential phishing attack, the threat actor created a duplicate version of Stripe’s entire website.
Watch out for phishing emails that inject spyware trio (Register) You wait for one infection and then three come along at once
[Scam Alert] Baby Formula Shortage — A List of Fake Online Shops (Trend Micro News) Unfortunately, but unsurprisingly, scammers have been exploiting people’s need to feed their babies with various malicious activities with fake texts that lead to scam baby formula online shops.
Microsoft Azure has had a string of ‘nightmare’ vulnerabilities (Protocol) The discovery of a series of critical flaws in Azure services reveals a new form of cloud security risk.
Mobile Banking Heists On The Rise Worldwide: New Research from Zimperium Illuminates Growing Risk of Trojan Horse Malware (Business Wire) Zimperium published a new report on the global risks financial institutions & consumers face due to Trojan horse malware targeting mobile applications
Mobile Banking Heists: The Global Economic Threat (Zimperium) In this report, Zimperium examines how mobile banking trojans have grown in popularity, analyzes the 10 major banking trojan families, and reviews the top targeted financial apps. Download Now.
Banking trojans follow the money to mobile (SC Magazine) U.S. financial institutions are the most frequently targeted by banking trojan attacks with 121 mobile financial applications representing more than 286 million downloads having been attacked by bad actors last year, according to Zimperium’s zLabs.
Homograph Phishing Attacks - When User Awareness Is Not Enough (Bitdefender) We recently tested all Microsoft Office 365 applications and found they were vulnerable to IDN homograph attacks. See our recommendations on protecting yourself.
Atlassian: Unpatched critical Confluence flaw under attack (Register) One suggested option: Turn the thing off until it can be fixed
CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog (CISA) CISA has added one new vulnerability—CVE-2022-26134—to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
Chicago Public Schools reports data breach five months after incident (Washington Examiner) A massive data breach exposed some personal data of more than a half-million students and staff members at Chicago Public Schools, but the attacked vendor didn’t report the problem to the school district for months.
Cybersecurity expert gives insight into timing of attack on Unified Government data centers (KSHB) The KSHB 41 I-Team is digging deeper into the timing behind a local cybersecurity attack. It's been almost two months since that attack hit the Unified Government of Wyandotte County and Kansas City, Kansas on Easter weekend.
Security Patches, Mitigations, and Software Updates
CISA Releases Security Advisory on Illumina Local Run Manager (CISA) CISA has released an Industrial Controls Systems Advisory (ICSA) detailing multiple vulnerabilities in Illumina Local Run Manager. Successful exploitation of these vulnerabilities may allow an unauthenticated malicious actor to take control of the affected product remotely and take any action at the operating system level. These vulnerabilities could impact settings, configurations, software, or data on the affected product and interact through the affected product with the connected network.
Carrier LenelS2 HID Mercury access panels (CISA) 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Carrier LenelS2 Equipment: HID Mercury access panels sold by LenelS2 Vulnerabilities: Protection Mechanism Failure, Forced Browsing, Classic Buffer Overflow, Path Traversal, OS Command Injection 2.
Illumina Local Run Manager (CISA) 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Illumina Equipment: Local Run Manager (LRM) Vulnerabilities: Path Traversal, Unrestricted Upload of File with Dangerous Type, Improper Access Control, Cleartext Transmission of Sensitive Information 2.
Atlassian Releases Security Updates for Confluence Server and Data Center, CVE-2022-26134 (CISA) Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) affecting Confluence Server and Data Center products. An unauthenticated remote attacker could exploit this vulnerability to execute code remotely. Atlassian reports that there is known exploitation of this vulnerability.
Cato Patches Zero-day Flaw in Microsoft Office (Cato Networks) Cybersecurity researchers are lighting up Twitter with a zero-day flaw in Microsoft Office enabling attackers to execute arbitrary code on targeted Windows systems.
Trends
Thousands of deaths from control system cyber incidents and most did not involve IP network issues (Control Global) The term “cybernetics” is defined as the science of communications and automatic control systems in both machines and living things. Today, the term cybernetics has been transformed to the term “cyber” which effectively doesn’t always address the physical nature of devices that control physics.
IBM Study: Canadian CEOs rank Sustainability and Cyber Risk as 2022's greatest challenges (PR Newswire) IBM Think Canada Conference: climate, cybersecurity and skills key focus for business 56% of Canadian CEOs say sustainability is a significant challenge, a...
Marketplace
JupiterOne Achieves Valuation of Over $1B with $70M Series C Funding to Fuel Innovation in Cybersecurity and Democratize Access for All (PR Newswire) JupiterOne, the industry's leading cyber asset attack surface management (CAASM) platform provider, today announced a $70 million Series C...
Laminar Doubles Funding in Less Than Six Months to $67 Million, Leading the Way in Cloud Data Security (Business Wire) Laminar, a public cloud data security provider, announced today that they have raised an additional $30 million, nearly doubling its funding to $67 mi
lowRISC Acquires NewAE Technology, Adding Advanced Security Analysis Tools to the OpenTitan Platform · lowRISC: Collaborative open silicon engineering (lowRISC) lowRISC C.I.C., the open source organization dedicated to bringing secure collaborative innovation to silicon development, today announced the acquisition of NewAE Technology, Inc., a privately-held designer and manufacturer of broadly accessible silicon security analysis tools.
Chainguard raises $50M Series A for supply chain security (TechCrunch) Software supply chain startup Chainguard today announced that it has raised a $50 million Series A led by Sequoia.
Ten Eleven Ventures Raises Third Generation Fund Bringing Total AUM to Over $1Bn (PR Newswire) Ten Eleven Ventures, the original cybersecurity-focused, global, stage-agnostic investment firm, today announced it has raised $600 million for...
Parsons Closes Xator Acquisition (GovCon Wire) Looking for the latest GovCon News? Check out our story: Parsons Closes Xator Acquisition. Click to read more!
VMware Says Broadcom Acquisition Won’t Be Like Symantec, CA (CRN) VMware employees concerned Broadcom acquisition will be like Symantec and CA Technologies. President Sumit Dhawan says not to worry.
Michael Dell: Broadcom ‘Unsolicited’ VMware Offer Was Not Expected (CRN) Michael Dell says Broadcom’s $61 billion acquisition offer for VMware was unexpected, but is excited about combining semiconductor, edge computing, cloud and software technology ahead.
Global Industrial Cybersecurity Spend to Grow to More Than US$36 Billion in 2027 (Longview News-Journal) To address the rise of cyber and digital security challenges, ABI Research's new whitepaper presents critical and actionable cybersecurity trends and forecasts
ExpressVPN rejects CERT-In directives, removes its India servers (The Economic Times) "ExpressVPN refuses to participate in the Indian governments attempts to limit internet freedom," the company said.
Northrop Grumman Systems gets a competitive $249M defense contract (NYSE:NOC) (SeekingAlpha) Northrop Grumman Systems (NOC) and Owl Cyber Defense Solutions are being awarded competitive multiple-award, ID/IQ firm-fixed price and cost-reimbursement contracts with a...
Meta reorganization aims to decentralize Facebook's AI efforts (Axios) Meta VP Jerome Pesenti will leave the company this month.
Sandberg’s Advertising Empire Leaves a Complicated Legacy (Bloomberg) The Facebook executive built the company into a global giant through personal ads, but developed blind spots on data, misinformation and more.
Sheryl Sandberg Is Leaving Facebook at a Perilous Moment (Bloomberg) The social media giant’s scaler-in-chief is departing just as the company confronts some of its biggest challenges.
Javier Olivan, who's replacing Sheryl Sandberg at Meta, built his career on international expansion (CNBC) Javier Olivan, Meta's next chief operating officer, might not be a household name, but inside the company he's known for taking Facebook global.
Michael Welts Joins Aviatrix as Chief Marketing Officer (PR Newswire) Aviatrix, the pioneer of secure cloud networking, today announced that Michael Welts has joined the executive leadership team as Chief...
Obsidian Security Strengthens Engineering Team To Drive SaaS Security Innovation (AiThority) Obsidian Security, announced four new senior hires on its engineering team Zhiping Liu as Senior Principal Engineering Lead, Shuyang Wang.
Cherry Bekaert Expands Federal Government Capabilities with New Leader Appointment (PR Newswire) Cherry Bekaert LLP ("the Firm") is pleased to welcome Ward Melhuish as Federal Government Sector Advisory Leader and Managing Director in the...
Cyware Grows Sales Channel Leadership in North America by Bringing Aboard Industry Veterans Matt Courchesne and Shashi Nair (Business Wire) Cyware announced the appointment of Matt Courchesne as Head of Channel, North America, and Shashi Nair, Partner Account Manager for North America.
Products, Services, and Solutions
New infosec products of the week: June 3, 2022 (Help Net Security) The featured infosec products this week are from: ESET, Kingston Digital, SecureAuth, SecurityMetrics, Semperis, and Traceable AI.
Secure Code Warrior and Okta Collaborate to Create New Solution to Secure Developer Workflows (Business Wire) Secure Code Warrior, the global, developer-driven security leader, today announced an exciting addition to the Okta Integration Network. Okta, the lea
Contrast Security Makes Enterprise-Class Code Security Testing Tools Available to All Developers for Free (Contrast Security) CodeSec by Contrast Security makes code security for developers simple and efficient with quick scan times, market-leading accuracy, actionable results and seamless integration
Gurucul launches industry’s first cloud-native SOC Platform pushing the boundaries of next-gen SIEM and XDR (Security Info Watch) Automating Threat Detection, Investigation and Response (TDIR) with the industry’s most advanced analytics, comprehensive threat content, and flexible enterprise risk engine for hybrid and multi-cloud environments
Fortanix Launches the Industry’s First Web 3.0-era Solutions Based on Confidential Computing to Secure Sensitive Digital Assets (Fortanix) New suite integrated within Fortanix Data Security Manager adopts a 360-degree platform approach and FIPS 140-2 Level 3 certification to deliver unprecedented digital security for decentralized finance
Lacework Adds Agentless Scanning to Rapidly Uncover Vulnerability Risks in Cloud-Native Workloads (PR Newswire) Lacework®, the data-driven cloud security company, today announced new agentless scanning for workloads that provides organizations with...
Infosec Institute Accelerates Role-Guided Cybersecurity Training for the Entire Workforce at RSA 2022 (Yahoo) Infosec Institute, a leading cybersecurity education company and part of Cengage Group, announced a hands-on supply-chain cybersecurity workshop and role-guided training solutions they will showcase at the RSA Conference, June 7-9, 2022, in San Francisco, CA. Infosec will highlight a range of solutions including proprietary, role-guided training roadmaps, gamified security awareness programs and a chance to experience their industry-leading training firsthand with an incident response security w
VMware Advances Its Anywhere Workspace Platform To Enable Intelligent, Proactive Security for All Employee Devices (Business Wire) VMware Inc. (NYSE: VMW), a leading innovator in enterprise software, today unveiled innovations to its anywhere workspace platform, VMware Workspace O
IBM Spin-Off Kyndryl Teams With Cisco For ‘Co-Creation’ Of Managed Network, Edge Services (CRN) Global solution provider and IBM managed infrastructure services spin-off Kyndryl is partnering with Cisco Systems in a new relationship aimed at jointly creating networking and edge managed services solutions for enterprise customers.
ioXt Approves Bishop Fox for Base Profile Lab Testing (Business Wire) ioXt, the global standard for IoT security, today announced that Bishop Fox, the leading authority in offensive security and an ioXt Authorized Lab, i
LogicHub Launches Free MDR Jump Start for AWS Cloud Applications (LogicHub) LogicHub's free MDR Jump Start for AWS program enables companies to outsource security operations needed to manage critical applications in the AWS cloud.
DobiMigrate is the Unstructured Data Management Software of Choice for Dell PowerStore File Migrations (Datadobi) Datadobi’s StorageMAP is designed to build a virtual layer of organization over unstructured data environments of chaos. Learn how StorageMAP puts companies in control of their unstructured data’s cost, carbon footprint, risk & value.
Technologies, Techniques, and Standards
State of the Modern SOC: Automating Response - Deepwatch (Deepwatch) The State of the Modern SOC Report Stronger Detection and Automation Pave the Way for Real-Time Response Organizations both large and small face a cyber threat landscape that is complex and growing. Throughout the first half of 2022, sophisticated adversaries, an expanding attack surface, unavailability of skilled talent and even geopolitical turmoil require organizations to… Continue reading LP-State of the Modern SOC
Why are many businesses still not using a password manager? (Help Net Security) In this video for Help Net Security, Hemant Kumar, CEO at Enpass, discusses why many businesses are still not using a password manager.
Fleet Cyber Command creates Operation Cyber Dragon to mitigate vulnerabilities in Navy networks (FedScoop) The Navy has kicked off a repeatable operation aimed at mitigating vulnerabilities on its networks. Operation Cyber Dragon, which began in March, is focused on identifying and mitigating the attack surface and vulnerabilities of commercial cloud-hosted and externally facing assets over time, Sandy Radesky, Fleet Cyber Command/10th Fleet deputy chief information officer, told FedScoop in […]
Academia
It's exam time in Syria — and that means internet shutdowns (The Record by Recorded Future) As Syrian high school students sit to take national exams, their government is taking an extreme proctoring measure: shutting down national internet access.
Legislation, Policy, and Regulation
Europe's hope to scan devices for unlawful files criticized (Register) Antivirus-but-for-pictures would trample rights, not even work as expected, say academics
The Fight Against Robocall Spam and Scams Heats Up in India (Wired) A new proposal by India's telecom regulator aims to make accurate caller ID mandatory, but critics say it may be fundamentally flawed.
Govt's cybersecurity rules risk creating 'environment of fear': Tech firms (Business Standard) Indian cybersecurity rules due to come into force later this month will create an "environment of fear rather than trust", a body representing top tech companies has warned the government
Solarium successor wants the White House to lead on cyber workforce strategy (FCW) One recommendation: establish cyber excepted service authorities, like the Department of Homeland Security's newly launched cyber hiring initiative, government-wide.
Here's a plan for wooing more cyber pros to work for the government (Washington Post) Higher pay and less stringent degree requirements could attract more federal cyber workers
Kirsten Gillibrand pushes 'Cyber Academy' to fight China, Russia cyber war (Newsweek) "One of the biggest challenges we have in the future is protecting the nation from a cyberattack and being able to win a cyberwar," Gillibrand told Newsweek.
Microsoft, Tenable Team up to Support Government Cyber Efforts (Nextgov.com) The partnership has roots in President Joe Biden’s executive order on cybersecurity last year.
Microsoft collaborates with Tenable to support federal cybersecurity efforts (Microsoft) On May 12, 2021, the White House issued Presidential Executive Order (EO) 14028 to establish cybersecurity as a national priority.1 As part of this effort, the White House has called for greater public and private sector collaboration to address the evolving threats facing federal agencies.
Get to Know FBI Cyber: Ryan Frampton | Federal Bureau of Investigation (Federal Bureau of Investigation) Ryan Frampton is a computer scientist with the FBI’s Tampa office.
Litigation, Investigation, and Law Enforcement
Dutch security service uses Pegasus software: Volkskrant (DutchNews.nl) The Dutch security service AIVD is using controversial hacking software developed by Israeli company NSO Group, the Volkskrant reported on Thursday, quoting four confidential sources. The paper said the claims are the first tangible link between the Netherlands and NSO Group, a commercial company which produces the Pegasus phone hacking software. The software was used in the investigation into gangland boss Ridouan Taghi, the sources said. Pegasus is used by governments worldwide to monitor opposition leaders, activists and journalists, according...
Dutch Used Pegasus Spyware on Most-Wanted Criminal: Report (SecurityWeek) Dutch secret services have reportedly used the controversial Israeli spyware known as Pegasus to hack targets including the country's most-wanted criminal, Ridouan Taghi.
Dutch intelligence service allegedly uses Pegasus hacking software (Euractiv) The General Intelligence and Security Service have allegedly been using hacking software from the Israeli supplier NSO Group, Dutch broadcaster Volkstkrant reported Thursday after interviewing anonymous sources.
State AGs Vow To Share Info With FCC To Combat Robocalls (Law360) Attorneys general from New York, California, Illinois and more than three dozen other states and territories pledged on Thursday to work collaboratively with the Federal Communications Commission to investigate and clamp down on robocalls.