Ukraine at D+118: Phishing for intelligence. (The CyberWire) As Russia's brutal reduction of Ukrainian cities continues, cyber operations resurface in the form of phishing expeditions against Ukrainian targets.
Russia-Ukraine war: List of key events, day 119 (Al Jazeera) As the Russia-Ukraine war enters its 119th day, we take a look at the main developments.
Ukraine war: Fires ablaze in Mykolaiv after Russia launches seven missile strikes (The Telegraph) Russian missile strikes have killed at least one person and damaged a school in the southern Ukrainian city of Mykolaiv.
Why Russia Keeps Turning to Mass Firepower (Foreign Policy) Russian artillery is an old tradition with brutal uses.
How Kaliningrad, Russian land ringed by NATO, is tangled in Ukraine war (Washington Post) The Russian exclave of Kaliningrad, hundreds of miles west of the rest of the country, is the latest flash point between Moscow and the rest of Europe as the fallout from Russian President Vladimir Putin’s war reverberates beyond Ukraine.
A first look inside occupied Mariupol, a city rebuilding itself yet surrounded by death (The Telegraph) Rare access shows bodies filling makeshift morgues as markets spring up and school terms begin again in obliterated city
Linchpin of Ukrainian Defiance, a Southern City Endures Russian Barrage (New York Times) Without its Black Sea coast, a landlocked Ukraine would struggle. Mykolaiv is determined that won’t happen.
Ukraine must not settle for 's----y peace', Boris Johnson to tell G7 (The Telegraph) Prime Minister will push Western leaders to strengthen their support for Ukraine amid concerns allies are experiencing 'war fatigue'
U.S. attorney general visits Kyiv as heavy fighting continues in Luhansk (Washington Post) U.S. Attorney General Merrick Garland met with Ukraine’s top prosecutor Tuesday during an unannounced trip to Kyiv. Garland, announcing the launch of a U.S. “war crimes accountability team,” pledged to “pursue every avenue of accountability for those who commit war crimes and other atrocities in Ukraine.”
Opinion This isn’t just Ukraine’s war. It’s our war, too. Act accordingly. (Washington Post) U.S. military assistance to Ukraine has been good — but not good enough. In part, that’s because of a conceptual error we keep making. We keep thinking it’s their war. We should understand that this is our war — and act accordingly.
Howitzers arrive in Ukraine, first in pledged weapons package from Germany (Reuters) German self-propelled howitzers have arrived in Ukraine in the first delivery of heavy weapons promised by Berlin, Ukraine's defence minister said on Tuesday.
Putin threatens to deploy new nuclear missile by year end – and it could hit Britain within three minutes (The Telegraph) Tensions escalate as Russian leader warns that he will launch intercontinental ballistic weapon, nicknamed ‘Satan II’
What the Fall of Empires Tells Us About the Ukraine War (Foreign Policy) Russia’s war can only be understood as a bloody post-imperial conflict.
U.S. works to scale up intelligence networks in Central Asia (Washington Post) With no basing options in the region, the Pentagon is exploring a new approach to counterterrorism by cultivating human intelligence while tiptoeing around Russia
Russian Electronic Warfare Drone Shot Down in Ukraine: Report (The Defense Post) Russia’s experimental electronic warfare drone has reportedly been shot down in Ukraine amid its ongoing invasion of the country.
Ukrainian cybersecurity officials disclose two new hacking campaigns (CyberScoop) Both efforts relied on malicious documents, officials said.
Ukraine Warns of New Malware Campaign Tied to Russian Hackers (Bloomberg Law) Ukrainian cybersecurity officials said Tuesday that a prominent Russian-backed hacking group is behind a new wave of malware attacks being spread via innocuous-looking emails.
Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware (BleepingComputer) The Ukrainian Computer Emergency Response Team (CERT) is warning that Russian hacking groups are exploiting the Follina code execution vulnerability in new phishing campaigns to install the CredoMap malware and Cobalt Strike beacons.
Opinion How Russia’s vaunted cyber capabilities were frustrated in Ukraine (Washington Post) A quiet partnership of the world’s biggest technology companies, U.S. and NATO intelligence agencies, and Ukraine’s own nimble army of hackers has pulled off one of the surprises of the war with Russia, largely foiling the Kremlin’s brazen internet hacking operations.
Space-based assets aren’t immune to cyberattacks (CSO Online) Russia's attack on Viasat satellites exposed how vulnerable space-based assets are and the potential for spillover damage.
Intel Reveals Putin Plan to Weasel His Way Into American Hearts (The Daily Beast) A May intelligence briefing from a Department of Homeland Security intel shop obtained by The Daily Beast offers clues about the dirty tricks Putin is using against Americans.
Corruption At Gazprom Facilitated GUR Hackers' Attack On The Urengoy Gas Pipeline (Inside Cyber Warfare) Alarms that would have warned about increased pressure were never connected
Did Russian hackers blow up a Texas LNG pipeline on June 8? (Washington Examiner) According to two sources, around the time of Russia's late February invasion of Ukraine, a cyber unit of Russia's GRU military intelligence service again conducted targeting-reconnaissance operations against a major U.S. liquefied natural gas exporter, Freeport LNG.
Was the Freeport Liquified Natural Gas (LNG) explosion that forced Europe to keep buying Russian natural gas a control system cyberattack? (Control Global) Freeport said its preliminary determination of the June 8, 2022 explosion was that one of the facility's LNG transfer lines was over pressurized and ruptured, which caused a "rapid flashing of LNG and the release and ignition of the natural gas vapor cloud."
Former NSA chief warns of Russian cyberattacks against US financial sector (The Hill) Retired Gen. Keith Alexander, the former National Security Agency chief and head of U.S. Cyber Command, warned Tuesday that Russian President Vladimir Putin is likely to unleash cyberattacks agains…
Russia blocks The Telegraph’s website for war coverage (The Telegraph) The Telegraph is the first British newspaper to be banned in the country
Violence, rhetoric, hate speech, drive atrocity crimes in Ukraine and beyond, Security Council hears (UN News) The UN Special Adviser on the Prevention of Genocide briefed the Security Council on Tuesday, reinforcing concerns already voiced by other senior UN officials in the chamber, over “the heightened risks” of sexual violence, and trafficking, which are “significantly impacting women and children”, following the Russian invasion of 24 February.
Vladimir Putin critic shares grim prison punishments inflicted on inmates (Mirror) Alexei Navalny - Vladimir Putin's strongest political opponent - was jailed by the Kremlin at the start of 2021 upon returning to Russia after being poisoned with the novichok nerve agent while visiting Siberia in 2020
Moscow councillor on trial for ‘fake news’ holds ‘I am against war’ sign in dock (The Telegraph) Alexei Gorinov could be sent to prison for ten years if convicted
Echoes of Spain's NATO membership in Swedish, Finnish bids (Breaking Defense) "The coming of Sweden and Finland will not look like the Eastern expansion, but more akin to the Spanish development, whereby older national traditions are re-defined and new defense approaches shaped," writes Robbin Laird.
Japan has always been refugee-averse. Then Ukraine happened. (Washington Post) Since Russia’s invasion of Ukraine, refugee-averse Japan has accepted more than 1,300 people fleeing the conflict and provided social services to help them assimilate — a rare and surprising move that could mark a turning point for the country’s long-standing restrictions on those fleeing violence and persecution.
Cancel Russia's UN Contracts (Defense One) Congress should insist that U.S. dollars not fund United Nations procurement from Russian companies.
Russia is now China's biggest oil supplier, overtaking Saudi Arabia as Western demand for its crude has dropped (Business Insider) Imports of Russian oil to China have risen 55% over the past year, according to data from the Chinese General Administration of Customs.
Attacks, Threats, and Vulnerabilities
OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT (Forescout) Forescout’s Vedere Labs has disclosed OT:ICEFALL, a set of 56 vulnerabilities affecting devices from 10 manufacturers caused by insecure-by-design practices in OT. Many of these products have been certified with OT security standards.
From Basecamp to Icefall: Secure by Design OT Makes Little Headway (SecurityWeek) Forescout has identified a set of 56 vulnerabilities affecting devices from 10 major operational technology (OT) vendors that are collectively calling OT:ICEFALL.
Dozens of vulnerabilities threaten major OT device makers (Cybersecurity Dive) Researchers from Forescout’s Vedere Labs found 56 vulnerabilities across big names like Honeywell and Motorola raising design-level security concerns.
New Toddycat APT Targets MS Exchange Servers in Europe and Asia (Infosecurity Magazine) APT actor would utilize two formerly unknown tools Kaspersky called
Microsoft Exchange servers hacked by new ToddyCat APT gang (BleepingComputer) An advanced persistent threat (APT) group dubbed ToddyCat has been targeting Microsoft Exchange servers throughout Asia and Europe for more than a year, since at least December 2020.
'Everything' in app popular with US troops is 'seen in China,' new report says (Task & Purpose) Data “was accessed far more frequently and recently than previously reported,” according to BuzzFeed.
Nigeria’s electronic payments boom leaves some at risk for fraud (The Record by Recorded Future) As fintech booms internationally, local consumer protection and cybersecurity policies haven’t always kept up.
‘The Lazarus Heist’ Is the Gripping Story of North Korean Cybercrime (Foreign Policy) Worryingly, Washington’s concern does not rise to the level of the danger.
Trend Micro Cloud App Security Threat Report 2021 (Trend Micro) In this report, we highlight the notable email threats of 2021, including over 33.6 million high-risk email threats (representing a 101% increase from 2020’s numbers) that we’ve detected using the Trend Micro Cloud App Security platform.
How Threat Actors Hijack Attention: The 2022 Social Engineering Report (Proofpoint) Social engineering is a component of nearly every threat actor’s toolbox who uses email as an initial access vector. From financially motivated cybercrime, to business email compromise (BEC) fraud, to advanced persistent threat (APT) actors, Proofpoint has observed countless tactics, techniques, and procedures relying on humans’ fundamental propensity to open and respond to emails.
Details of Twice-Patched Windows RDP Vulnerability Disclosed (SecurityWeek) CyberArk shares details on a Windows Remote Desktop Services vulnerability that Microsoft had to patch twice.
Cloudflare cites "own error" for outage causing major global internet disruptions (CRN Australia) Says issue hit 19 of its data centres.
Major internet outage knocks hundreds of websites out of action (Metro) Discord, Shopify, Peloton and JustEat are some of the sites affected, returning an error message to users.
Cloudflare outage on June 21, 2022 (Cloudflare) Today, June 21, 2022, Cloudflare suffered an outage that affected traffic in 19 of our data centers. Unfortunately, these 19 locations handle a significant proportion of our global traffic. This outage was caused by a change that was part of a long-running project to increase resilience in our busiest locations.
These cyberthreat actors present the most risk to insurance (PropertyCasualty360) CyberCube reveals the motivations of the digital ne’er-do-wells most likely to strike Western businesses.
The Anatomy of a Supply Chain Cyberattack (Law.com) This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
Twitter Accounts Hyped Company Seeking Covid Vaccine Trials (Bloomberg) Network of bot-like accounts promoted Ocugen, researchers say. Suspicious activity coincided with request to test vaccine.
Hackers stole Social Security numbers in Flagstar data breach affecting 1.5 million customers (TechCrunch) It's the bank's second breach of customer Social Security numbers in two years.
Delivery firm Yodel disrupted by cyber attack (IT PRO) The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
Security Patches, Mitigations, and Software Updates
AutomationDirect Patches Vulnerabilities in PLC, HMI Products (SecurityWeek) AutomationDirect has patched several high-severity vulnerabilities in its PLC and HMI products.
CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) Cybersecurity and Infrastructure Security Agency sent this bulletin at 06/21/2022 01:54 PM EDT
Mitsubishi Electric MELSEC Q and L Series (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC Q and L Series Vulnerability: Improper Resource Locking 2. RISK EVALUATION Successful exploitation of this vulnerability could result in a denial-of-service condition for Ethernet communication. A system restart would be required to restore functionality.
JTEKT TOYOPUC (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.7 ATTENTION: Exploitable remotely Vendor: JTEKT Equipment: TOYOPUC Products Vulnerability: Missing Authentication for Critical Function CISA is aware of a public report, known as “OT:ICEFALL” that details vulnerabilities found in multiple operational technology (OT) vendors.
Phoenix Contact Classic Line Controllers (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Phoenix Contact Equipment: ILC, AXC, RFC, PC WORX, FC Vulnerability: Insufficient Verification of Data Authenticity 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to upload logic with arbitrary code.
Phoenix Contact ProConOS and MULTIPROG (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Phoenix Contact Equipment: ProConOS/ProConOS eCLR and MULTIPROG Vulnerability: Insufficient Verification of Data Authenticity CISA is aware of a public report, known as “OT:ICEFALL” that details vulnerabilities found in multiple operational technology (OT) vendors.
Phoenix Contact Classic Line Industrial Controllers (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Phoenix Contact
Equipment: ILC 131 ETH, ILC 131 ETH/XC, ILC 151 ETH, ILC 151 ETH/XC, ILC 171 ETH 2TX, ILC 191 ETH 2TX, ILC 191 ME/AN, and AXC 1050
Vulnerability: Missing Authentication for Critical Function
CISA is aware of a public report, known as “OT:ICEFALL” that details vulnerabilities found in multiple operational technology (OT) vendors. CISA is issuing this advisory to provide notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
Siemens WinCC OA (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC WinCC OA Vulnerability: Use of Client-side Authentication CISA is aware of a public report, known as “OT:ICEFALL” that details vulnerabilities found in multiple operational technology (OT) vendors.
Cybersecurity researchers face real-life threats (CSO Online) Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.
Report: Consumers Besieged by–and Falling Prey to–Crypto Scams (GlobeNewswire News Room) Sift’s Q2 2022 Digital Trust & Safety Index reveals consumer loyalty is at risk as they experience an increase in crypto scams and other abusive content...
Ransomware is stressing CISOs to breaking point (Information Age) Securing remote work is driving a burnout surge.
2022 Trends in Securing Digital Identities (Identity Defined Security Alliance) Managing identities accessing enterprise resources has become significantly more complicated over the last several years.
New Research Report Highlights Significant Shift to Managed Detection and Response (MDR) Services (Logic Hub) Survey finds businesses addressing alert fatigue, staff shortages, and increasingly complex stacks by moving rapidly to MDR.
60% of Enterprise have Little Confidence in Managing Attack Surface Risk Due to Hybrid Workplace, Multi-cloud, and Digital Business Growth (Oomnitza) Oomnitza reveals its 2022 Attack Surface Management Maturity Report Oomnitza, the leading provider of Enterprise Technology Management (ETM) solutions, revealed a new survey, “The 2022 Attack Surface Management Maturity Report” conducted by Cybersecurity Insiders, which found that most enterprises (60%) have low confidence in their ability to manage attack surface risk. The majority of respondents […]
New Trend in Business Email Compromise Emerges as Vendor Impersonation Overtakes CEO Fraud (Business Wire) Abnormal Security releases new threat report showcasing a rising trend in financial supply chain compromise, a subset of business email compromise.
Research Shows Supply Chain Compromise on the Rise (Abnormal) Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors.
Cowbell Cyber Releases Q2 Cyber Round-Up Report (Cowbell Cyber) Cowbell Cyber, the leading provider of cyber insurance for small and medium-sized enterprises (SMEs), today announced the results of its Q2 cyber insurance risk report, the Cowbell Cyber Round-Up. The report, the second of its kind from Cowbell, offers insight into and rationale behind cyber insurance for SMEs.
Cyber Funding, Plentiful for Years, Faces a Reckoning (Wall Street Journal) Venture capital money has poured into cybersecurity companies in recent years. Now fears of a recession and disruption in the wider technology market are beginning to curb investments.
Cyberint Scores $40 Million Late-Stage Investment (SecurityWeek) Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm.
French Encryption Firm Cosmian Raises $4.4 Million (SecurityWeek) French deep tech firm Cosmian has raised €4.2 million in a venture funding round that brings the total raised by the company to €5.6 million
ISRAEL : Change of control at NSO's rival in strategic market Quadream (Intelligence Online) Guy Geva and Nimrod Reznik, who co-founded Israeli cyber intelligence company Quadream with Ilan Dabelstein, have sold their shares, just as competitor NSO finds itself in serious difficulty.
Huawei reaffirms R&D focus despite sanctions (Capacity Media) Huawei’s UK presence remains strong, despite government-imposed restrictions wrangling its consumer segment. Head of R&D Henk Koopmans talks to Saf Malik about innovation, partnerships and 5G and 6G use cases
G2 Recognizes Egnyte as a Category Leader in Multiple Summer 2022 Reports (Egnyte) Egnyte, a leader in cloud content security and governance, today announced it has been named a leader and No. 1 ranked vendor by peer-to-peer software review platform G2 in multiple Summer 2022 reports, including a new Sensitive Data Discovery report. The company has also retained leadership positions in the Data Governance, Data Security, Data-Centric Security, Encryption Key Management, and Cloud Content Collaboration categories.
Birmingham metro sees cybersecurity job growth, exceeds national trends (Alabama Inno) Job openings for more than 10,500 cybersecurity positions were advertised by Alabama employers during the 12-month period that ended in April, and 1,788 of them were in the Birmingham-Hoover metro area.
NetSPI Expands Global Footprint with Strategic Leadership Appointments in EMEA (PR Newswire) NetSPI, the leader in enterprise penetration testing and attack surface management, today announced the expansion of its global footprint in...
SilverSky Names Mike Viruso as Vice President of Sales (PR Newswire) SilverSky, a cybersecurity innovator offering powerful managed detection and response (MDR) services, today announced the further expansion of...
Cybersecurity Industry Veteran John Addeo Joins Netsurion as Chief Revenue Officer (GlobeNewswire News Room) Former Rapid7 channel director leverages expertise guiding enterprise IT leaders in Managed XDR space to support Netsurion’s growth...
G DATA Personalie: Matthias Koll ist neuer Business Owner der Cyber Defense Academy (unn | UNITED NEWS NETWORK GmbH) Erfahrener IT-Security-Experte verantwortet ab sofort den Geschäftsbereich E-Learning
David Appel named VP of National Security at AWS (Security Magazine) David Appel, former VP of Raytheon Intelligence & Space, has been named Vice President, National Security at Amazon Web Services (AWS).
Products, Services, and Solutions
Juni signs for combined ID verification and Know Your Business services from iDenfy (Finextra) The Lithuanian identity verification and compliance company iDenfy, joined forces with Juni, the financial management platform made for ecommerce.
GitGuardian invests in the developer experience for large-scale enterprise deployments (GlobeNewswire News Room) GitGuardian, the enterprise-ready secrets detection and remediation platform, is announcing a series of new...
Menlo Security launches Security Assessment Toolkit to identify Highly Evasive Adaptive Threats (HEAT) (Menlo Security) New self-service tools provide immediate insight into current exposure, vulnerabilities, gaps in security posture and potential impact of HEAT Attacks.
Announcing Identity Pools, next-gen IdP (Cloudentity) Identity Pools is a new capability that disrupts existing on-prem and SaaS IdP by providing a lightweight identity platform.
Norton and National PTA Launch New and Improved 'The Smart Talk' Tool to Help Families Stay Cyber Safe (PR Newswire) Norton, a consumer Cyber Safety brand of NortonLifeLock (NASDAQ: NLOK), and National PTA, the oldest and largest child advocacy association in...
Retrospect, a StorCentric Company, Announces Retrospect Cloud for Simple Offsite Data Protection (Retrospect) Retrospect Cloud Storage Provides Seamless Cloud Backup Experience for Ransomware Protection and Detection in A Single Subscription with Retrospect Backup 19 and Retrospect Virtual 2022
Hillstone Networks Raises the Bar on Remote Security and Network Access Control with ZTNA Solution (Business Wire) Hillstone Networks, a leading provider of infrastructure protection solutions, today introduced its ZTNA solution, the company’s latest offering that
Splunk unveils new capabilities in latest version (SC Magazine) Splunk recently announced the 9.0 iteration of its Splunk Enterprise offering as well as new capabilities in its Splunk Cloud Platform that are designed to streamline users collection, management and gathering of data, according to CRN.
Cyberint delivers focus to cybersecurity teams (VentureBeat) Cyberint claims that dark web data harvesting and analysis of an org’s attack surface will deliver timely and focused cybersecurity data.
New Darktrace early warning system detects unusual behavior in email (SiliconANGLE) New Darktrace early warning system detects unusual behavior in email - SiliconANGLE
Cato SASE Cloud Becomes First SASE Platform with Network-based Ransomware Protection (PR Newswire) Cato Networks, provider of the world's first SASE platform, introduced today network-based ransomware protection for the Cato SASE Cloud. Using...
Carahsoft Announces Okta and LexisNexis Risk Solutions Alliance to Fight Cyber Fraud (GlobeNewswire News Room) Modern Identity Proofing and Strong Authentication Blocks Identity Theft, Account Takeovers, and Fraudulent Payments...
Acronis Cyber Protect Home Office: More than just a backup solution (TechRepublic) The number of cybersecurity protection tools on the market is staggering, which makes it challenging to decide which to use. Acronis has one tool that stands out in the pack. Read on to see if this tool is right for you.
John B. Sanfilippo & Son gets ahead of persistent email attacks with Cyren Inbox Security (Yahoo) Cyren LtdContinuous Improvement of Cybersecurity Leads to Reduced Risk of Email Threats
Microsoft teams up with Cyberproof on new security services (Technology) Microsoft and Cyberproof will be joining forces to help develop Managed Extended Detection and Response (MXDR) capabilities
Microsoft wants to improve IoT security with Edge Secured-core devices (ZDNet) Microsoft adds devices from Intel, Lenovo and Asus to its list of internet-connected devices certified as secure.
New Stellar Cyber Security Sensors Disrupt Economics for Defending Distributed Environments (Business Wire) Stellar Cyber, the innovator of Open XDR, once again disrupts cybersecurity economics with a new lineup of cost-effective, functionality-rich security
Unit 221B Report Validates Deep Instinct’s >99% Zero-Day and <0.1% False Positive Threat Prevention Accuracy (Business Wire) Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity, today announced validation of its threat prevention capabilities
Tanium Partners with ScreenMeet to Power One-Click Remote-Desktop Sessions from Any Endpoint (Tanium) Tanium and ScreenMeet announce strategic partnership to deliver one-click ScreenMeet sessions from the Tanium platform.
Cavelo Announces Platform Capabilities to Mitigate Attack Surface Vuln (PRWeb) Attack surface management technology provider Cavelo Inc. today announced the release of digital asset discovery, tracking, data access, vulnerability and
DoControl Launches 'Accelerate Channel Program' to Extend Sales Footprint of SaaS Data Access Control Solution (PR Newswire) DoControl, the automated Software as a Service (SaaS) security company, today announced the launch of its Accelerate Channel Program for global...
Cado Security Unveils Cross Cloud Support to Streamline Cloud Investigations (Business Wire) Cado Security, provider of the cloud investigation platform, today announced cross cloud support, enabling security teams to swiftly investigate incid
ThreatX Unveils API Protection Quick Start Program (Business Wire) ThreatX today announced the launch of its API Protection Quick Start Program
Keeper Security Launches One-Time Password Sharing with Zero-Knowledge Encryption (PR Newswire) Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software, today announced the launch of One-Time Share, a...
Technologies, Techniques, and Standards
CISA releases guidance on cloud security management (SC Media) The Cybersecurity and Infrastructure Security Agency has published a draft of the Trusted Internet Connections (TIC) 3.0 Cloud Use Case, which provides guidelines for applying modern network security procedures on various cloud computing settings, Federal News Network reports.
Network Infrastructure Security Guide (National Security Agency) Guidance for securing networks continues to evolve as adversaries exploit new vulnerabilities, new security features are implemented, and new methods of securing devices are identified. Improper configurations, incorrect handling of configurations, and weak encryption keys can expose vulnerabilities in the entire network.
NSA Issues Updated Network Infrastructure Security Guide (Hstoday) This report provides guidance to mitigate common vulnerabilities and weaknesses on existing networks.
Future of Cloud Strategy Survey Report (Deloitte United States) Explore the Deloitte Future of Cloud Survey Report to understand how cloud investments relate to strategy and innovation goals, and the innovation gap that exists.
Why Hackers Are Winning the Ransomware Game (CPO Magazine) The threat landscape is in a constant state of flux. While malicious activity is incessant and we know it will continually occur, the methods and the rates of which threat actors target victims continues to morph and ransomware has begun to take center stage.
Five benefits of industrial cybersecurity implementation (Security Magazine) Security leaders in the industrial space identified five benefits to cybersecurity implementation, according to a report from Kaspersky.
How a new risk culture can ensure more IT security (Funkschau) The last two years have made it clear how important it is to prepare company processes for a crisis in order to keep the effects as small as possible. It's not just about what's at risk. But also which legal requirements should be observed.
Wisconsin National Guard: Part of cyber defense exercise (Wisconsin Politics) Always Ready, Always There includes cyberspace. Members of Wisconsin’s Cyber Response Team — the state’s volunteer resource
So You Want To Defend Your Cloud… Agentless or Agent-based, Which Approach Is Better? (CSO Online) Agentless or agent-based? That is the question when it comes to securing the modern IT infrastructure. Cloud environments, and their security needs, are dynamic and complex. A flexible approach to defending your cloud is key.
Design and Innovation
Telos Corporation Wins Touchless Mobile Fingerprint Awards (Telos Corporation) Telos® Corporation (NASDAQ: TLS), a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations, today announced that its ONYX® technology won first place in the overall competition of the Mobile Fingerprint Information Technology (mFIT) Challenge hosted by the National Institute of Standards...
Microsoft Plans to Eliminate Face Analysis Tools in Push for ‘Responsible A.I.’ (New York Times) The technology giant will stop offering automated tools that predict a person’s gender, age and emotional state and will restrict the use of its facial recognition tool.
SolarWinds Unveils New Software Development Process (Business Wire) SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure IT management software, unveils its new Next-Generation Build System, a tran
That agent who sounds like they’re from Paris, Texas? Try Paris, France (TechCrunch) Our daily lives are more linked into a globalized grid than ever before. Products are sourced and shipped from afar; traveling to a place 3,000 miles away can be easier than getting across a big city in traffic; and information disseminates to anyone and everyone at the tap of a finger. A startup c…
Legislation, Policy, and Regulation
The world’s biggest surveillance company you’ve never heard of (MIT Technology Review) Hikvision could be sanctioned for aiding the Chinese government’s human rights violations in Xinjiang. Here’s everything you need to know.
Pegasus makers face EU grilling. Here’s what to ask them (POLITICO) Uncovering NSO Group’s workings is key for lawmakers trying to gain control of the spyware market.
Biden signs a pair of cybersecurity bills into law (The Record by Recorded Future) President Joe Biden on Tuesday signed into law two pieces of legislation that will enhance cyber coordination to state and local governments and strengthen the federal cyber workforce, the White House announced.
Press Release: Bill Signed: S. 1097, S. 2520, and S. 3823 (The White House) On Tuesday, June 21, 2022, the President signed into law:S. 1097, the "Federal Rotational Cyber Workforce Program Act of 2021," which establishes a
Senate Panel Okays Cyber-Loaded FY2023 NDAA (MeriTalk) The Senate Armed Services Committee on June 16 completed its markup of the fiscal year 2023 National Defense Authorization Act (NDAA) and voted 23-3 to send the spending bill to the full Senate for consideration.
Defense bill is a major cyber legislation opportunity for Rep. Langevin (Washington Post) Langevin is reaching for cyber measures even as he heads out the door
How ‘Cybersecurity First’ Strategies Can Help Make DISA’s ‘Wish List’ Come True (MeriTalk) A recent keynote address from Lt. Gen. Robert Skinner, director of the Defense Information Systems Agency (DISA), stands out as a perfect example of this digital transformation-inspired dynamic. Skinner spoke at AFCEA International’s TechNet Cyber event and presented a “wish list” of advancements that would help DISA significantly improve operations and solve its problems. “Every great innovation started when somebody said, ‘Wouldn’t it be cool if…’” Skinner told his audience of private sector IT firms.
Bill Would Ban Brokers From Selling Health, Location Data (GovInfoSecurity) Worries among Democratic lawmakers that the U.S. Supreme Court will overturn a key abortion ruling have led Sen. Elizabeth Warren, D-Mass., to introduce legislation
Federal Backstop for Cyber Insurance Should Be Studied, GAO Says (Bloomberg Law) The Biden administration should assess whether private insurers need a federal assistance to help cover losses from cyberattacks on electricity grids, banks, pipelines and other critical infrastructure, a government watchdog said.
Health systems want government help fighting off the hackers (POLITICO) Hospitals look to Washington to provide more security for what they consider critical national infrastructure.
CISA Plans to Hire Chief People Officer to Boost Cyber Workforce (Nextgov.com) Agency advisors are set to vote on a host of draft recommendations which include reviewing the security clearance process for inefficiency.
Former Mandiant exec tapped to run CTIIC, ODNI's cyber threat intelligence center (CyberScoop) Laura Galante comes to the role after several years of running her own cybersecurity firm. The Ukrainian government was one of her clients.
Hawaii Cyber Airmen Awarded For Aiding Community’s Critical Networks (Air National Guard) Three Airmen were presented with Achievement Medals on May 14, at Fort DeRussy for providing major enhancements to Hawaii National Guard’s cyber-response capabilities.
Litigation, Investigation, and Law Enforcement
Phishing gang behind several million euros worth of losses busted in Belgium and the Netherlands (Europol) The action day on 21 June 2022 led to: 9 arrests in the Netherlands 24 house searches in the Netherlands Seizures including firearms, ammunition, jewellery, electronic devices, cash and cryptocurrency The criminal group contacted victims by email, text message and through mobile messaging applications. These messages were sent by the members of the gang and contained a phishing link leading...
9 arrested in Netherlands after Europol raids on phishing gang (The Record by Recorded Future) Nine people were arrested during raids across the Netherlands as Belgian and Dutch police partnered with Europol to shut down an alleged criminal gang involved in phishing.
Подполковника УФСБ по Самарской области арестовали за кражу криптовалюты у хакера (TASS) Он будет находиться под стражей до 1 августа
Meta Agrees to Alter Ad Technology in Settlement With U.S. (New York Times) The Justice Department had accused Meta’s housing advertising system of discriminating against Facebook users based on their race, gender, religion and other characteristics.
Pornhub Parent Company’s CEO and COO Resign (Variety) MindGeek, the internet company best known for operating Pornhub, said that CEO Feras Antoon and COO David Tassillo have resigned. In a statement to Variety, a company representative said, “An…
EU High Court Sharply Curtails Use Of Airline Passenger Data (Law360) The European Court of Justice on Tuesday rolled back member states' ability to gather the personal information of passengers on all flights to, from and within the European Union, ruling that the practice must be limited to what's "strictly necessary" to combat terrorism and serious crime.
BNSF Loses Appeal Bid in Biometric Privacy Ruling (Law360) An Illinois federal judge refused Tuesday to certify an interlocutory appeal of his ruling denying BNSF Railway Co. summary judgment in a putative class action alleging it violated Illinois' biometric privacy law, saying the railroad mischaracterized his ruling and waited too long to move for appellate review.
Fox Corp. Must Face Dominion Defamation Suit In Delaware (Law360) Fox Corp. must face claims that Fox News Network published defamatory statements about Dominion Voting Systems Inc. during its coverage of the 2020 presidential election, a Delaware judge ruled Tuesday.