Dateline Geneva: Both sides stick to their positions with respect to Ukraine, as risk of cyberwar grows.
Crisis over Ukraine: sanctions and solidarity; deterrence and clarity. (The CyberWire) Neither side gives much ground in Geneva, but a heightened tempo of cyber operations is widely expected in the near term.
Biden ‘fully prepared’ to hold summit with Putin over Ukraine tensions (the Guardian) US to formally respond to Russian demands on Nato after ‘frank and substantive’ held talks in Geneva
Top US, Russian envoys discuss Ukraine at ‘critical moment’ (Military Times) U.S. Secretary of State Antony Blinken and Russian Foreign Minister Sergey Lavrov lowered expectations ahead of the meeting in Geneva.
Satellite images show more Russian troops, equipment near Ukraine (Military Times) Russian military activity has been increasing in recent weeks, with the Kremlin announcing plans to send troops to Belarus for war games.
Russia announces deployment of over 140 warships, some to Black Sea, after Biden warning (Newsweek) The Russian Defense Ministry said the Russian Navy will have a series of exercises in all zones of responsibility from January to February, according to TASS.
Russian parliament to discuss recognising rebel-held east Ukraine as independent (Reuters) Russia's parliament will hold consultations next week on an idea to appeal to President Vladimir Putin to recognise two pro-Russian breakaway regions in eastern Ukraine as independent states, the chamber's speaker said on Friday.
Biden clarifies any Russian movement into Ukraine 'is an invasion' (TheHill) President Biden on Thursday sought to clear up his remarks from a day earlier when he appeared to distinguish between a Russian invasion of Ukraine and a "minor incursion."
Ukrainian officials, GOP go after Biden's remarks on 'minor incursion' into Ukraine (Breaking Defense) "We want to remind the great powers that there are no minor incursions," tweeted Ukrainian President Volodymyr Zelensky.
Zelensky says 'there are no minor incursions' after Biden's comments on Ukraine, Russia (TheHill) Ukrainian President Volodymyr Zelensky on Thursday said “there are no minor incursions,” an apparent response to President Biden’s comment the day before suggesting that Russia would face smaller consequences if it
'Minor incursion' by Russia could complicate West's response (AP NEWS) Short of an all-out invasion, Russian President Vladimir Putin could take less dramatic action in Ukraine that would vastly complicate a U.S. and allied response. He might carry out what President Joe Biden called a “minor incursion” — perhaps a cyberattack — leaving the U.S.
U.S., Germany Say Any Russian Aggression Against Ukraine Would Trigger Response (Bloomberg) Crisis is at ‘decisive juncture,’ Blinken says in Berlin. Four-way meeting in Berlin highlights efforts to deter Russia.
Biden Strengthens Words on Ukraine After Flustering European Partners (New York Times) After the president laid bare divisions over Russian meddling in Ukraine, his administration scrambled to get on the same page with European allies.
Ukraine Hacks Signal Broad Risks of Cyberwar Even as Limited Scope Confounds Experts (Wall Street Journal) Last week’s cyberattacks might presage a larger operation, but so far, the hacks appear limited and amount to a fraction of the damage Western officials believe Moscow is capable of inflicting on Kyiv.
Canada agency says Russian-backed actors targeting infrastructure (Reuters) Network operators of critical Canadian infrastructure should boost their defenses against Russian state-sponsored threats, Canada's signals intelligence agency said on Thursday.
Canada’s cyberspy agency warns of Russian cyberattacks on critical infrastructure (The Globe and Mail) Warning issued as Western countries prepare economic sanctions in the growing expectation that Russia will invade Ukraine
Threat of Russian-backed cyber attacks growing amid Ukraine tensions, Canadian cybersecurity agency warns (National Post) There is no doubt that cyberattacks against Canada have increased recently, and Russia is a key actor behind it, one cybersecurity insider said
CSE warns Canadian critical infrastructure of Russian-backed cyber threat activity (CTVNews) The Canadian Centre for Cyber Security issued a bulletin warning operators of critical infrastructure in Canada to be aware and take steps to mitigate Russian-backed cyber threat activity.
Cybersecurity pros warn Ukraine crisis could spur Russian cyberattacks around the world (The Washington Times) The cybersecurity firm Mandiant is warning that Russia’s conflict over Ukraine may yield attacks in cyberspace that cause harm around the world.
Anticipating Cyber Threats as the Ukraine Crisis Escalates (Mandiant) The crisis in Ukraine has already proven to be a catalyst for additional aggressive cyber activity that will likely increase as the situation deteriorates. At Mandiant, we have been anticipating this activity, and we are concerned that, unlike the recent defacements and destructive attacks, future activity will not be restricted to Ukrainian targets or the public sector.
Ukraine asks Australia for more 'technical assistance' to combat increasing Russian cyber attacks (ABC News) Ukraine seeks support from allies as fears grow that Russian President Vladimir Putin is on the brink of launching a fresh military invasion.
Analysis: In Ukraine crisis, Germany faces tough decisions over gas pipeline (Reuters) Germany could find itself in a no-win situation if Russia invades Ukraine, pitting Berlin's main gas supplier against its most important security allies.
Cybersecurity pros warn Ukraine crisis could spur Russian cyberattacks around the world (The Washington Times) The cybersecurity firm Mandiant is warning that Russia’s conflict over Ukraine may yield attacks in cyberspace that cause harm around the world.
‘Don’t Freaking Test Us’: U.S. Sanctions Alleged Intelligence Operatives Undermining Ukraine (Foreign Policy) It’s part of an effort to shed light on Russia’s orchestrated campaign to destabilize Kyiv—and even take over Ukraine.
Former Ukrainian official sanctioned for assisting Russian cyberattacks (The Record by Recorded Future) The Treasury Department on Thursday imposed sanctions on four current and former Ukrainian government officials for engaging in "Russian government-directed influence activities" in Ukraine, including gathering information about the country’s critical infrastructure.
Treasury Sanctions Russian-Backed Actors Responsible for Destabilization Activities in Ukraine (U.S. Department of the Treasury) Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned four individuals engaged in Russian government-directed influence activities to destabilize Ukraine. This is the latest action we have taken to target purveyors of Russian disinformation, including designations in April 2021.
Opinion: Putin has carefully calculated the odds. Right now, they’re in his favor. (Washington Post) What does Vladimir Putin want? It’s a question Washington finds hard to answer because we Americans rarely put ourselves in other people’s shoes. Two important essays, by Dmitri Trenin in Foreign Affairs and Eugene Chausovsky in Foreign Policy, provide some clues. Both suggest that the Russian president has stayed in power since 1999 not by being a reckless gambler but rather by being careful, even rational.
Putin Loves to Roll the Dice. Ukraine Is His Biggest Gamble Yet. (Wall Street Journal) The former spy chief’s tolerance for risk is tested as he threatens a ground war unseen in Europe since the 1940s.
Will Russia make a military move against Ukraine? Follow these clues. (Atlantic Council) Our military fellows from the US Army, Navy, Air Force, and Marine Corps give a sense of the movements from Russia that they're tracking most closely.
The Day After Russia Attacks (Foreign Affairs) What war in Ukraine would look like—and how America should respond.
NATO should shut the door, but not because Russia said so (Defense News) Keeping the option of NATO enlargement on the table is a faulty policy on an ordinary day. In the case of Ukraine, it’s a disservice.
Attacks, Threats, and Vulnerabilities
Pirates Spammed an Infamous Soviet Short-wave Radio Station with Memes (Vice) The UVB-76 numbers station took a break from being a suspected communications tool of Russian intelligence to blast 'Gangnam Style'
Prolific Chinese APT Caught Using 'MoonBounce' UEFI Firmware Implant (SecurityWeek) Kaspersky warns that a well-known Chinese APT actor is using an UEFI implant to maintain stealthy persistence across reboots, disk formatting or disk replacements.
Unique new UEFI firmware attack dubbed “MoonBounce” spotted in the wild (The Stack) Security researchers at Kaspersky have identified a new UEFI rootkit in the wild that exhibits some unique behaviours — including its modification of existing legitimate UEFI firmware rather than adding drivers to it.
MoonBounce: the dark side of UEFI firmware (SecureList) At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.
Kaspersky uncovers third known firmware bootkit (Kaspersky) Moonbounce bootkit shows significantly enhanced elusiveness and persistence
McAfee Agent bug lets hackers run code with Windows SYSTEM privileges (BleepingComputer) McAfee has patched a security vulnerability discovered in the company's McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges.
Open redirects: real-world abuse and recommendations (Fastly) Open URL redirection is a class of web app security problems that make it easier for attackers to direct users to malicious resources. Here are some examples of how they do it and what you can do to prevent it.
Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk (Morphisec) The fear of the Log4j security flaw has once again returned as threat actors have started to exploit vulnerable VMWare Horizon Servers. Read the blog.
Resurrected jQuery UI Library Haunts Websites, Enterprise Products (SecurityWeek) Drupal developers inform users about several XSS vulnerabilities discovered in a third-party library that was recently resurrected after previously believed to have reached end of life.
Software Supply Chain Attacks Tripled in 2021: Study (SecurityWeek) The success of open-source software supply chain attacks in 2021 makes it almost certain that it will remain an important part of threat activity moving forward.
Security scanners across Europe tied to China govt, military (Yahoo) At some of the world’s most sensitive spots, authorities have installed security screening devices made by a single Chinese company with deep ties to China’s military and the highest levels of the ruling Communist Party. All depend on equipment manufactured by Nuctech, which has quickly become the world’s leading company, by revenue, for cargo and vehicle scanners. Nuctech has been frozen out of the U.S. for years due to national security concerns, but it has made deep inroads across Europe, installing its devices in 26 of 27 EU member states, according to public procurement, government and corporate records reviewed by The Associated Press.
Crypto.com Confirms Exchange Lost Nearly $34M to Hackers (Decrypt) Crypto exchange Crypto.com has lost roughly $34 million in a recent security incident, according to a post-mortem released on Thursday.
2FA Bypassed in $34.6M Crypto.com Heist (Threatpost) In a display of 2FA's fallibility, unauthorized transactions approved without users' authentication bled 483 accounts of funds.
Conti ransomware gang started leaking files stolen from Bank Indonesia (Security Affairs) The central bank of the Republic of Indonesia, Bank Indonesia, confirmed the ransomware attack that hit it in December. Bank Indonesia confirmed that it was the victim of a ransomware attack that took place last month. The Conti ransomware gang claimed the attack and leaked some allegedly stolen files as proof of the security breach. A […]
A Trip to the Dark Site — Leak Sites Analyzed (The Hacker News) Any business that has digital assets of value can be a victim. Both small size and perception of 'irrelevance' of data doesn't offer cyber protection.
Update: 'This Was a Targeted Attack,' Says Red Cross (Gov Info Security) Data on more than 515,000 "highly vulnerable people" has been compromised as the result of a supply chain cyberattack, the International Committee of the
Sophisticated cyber-attack targets Red Cross Red Crescent data on 500,000 people (International Committee of the Red Cross) The attack compromised personal data and confidential information on more than 515,000 highly vulnerable people, including those separated from their families due to conflict, migration and disaster, missing persons and their families, and people in detention.
Cyber attack shuts down Red Cross family reunions (The Stack) An attack on a Red Cross partner this week has compromised confidential information on more than half-a-million vulnerable people, including those separated from their families due to conflict, migration and disaster, the International Committee of the Red Cross (ICRC) said late Wednesday (January 19), calling for its return.
Red Cross Hit via Third-Party Cyberattack (Dark Reading) The incident compromised the personal data and confidential information of more than 515,000 "highly vulnerable people," the Red Cross reports.
Memorial Health System alerts patients to possible data breach (News and Sentinel) Personal information for more than 200,000 people may have been accessible during a cyber attack on Memorial Health System last year, although officials say there is no indication any identity theft or unauthorized use of the data occurred. Patients from Memorial whose personal health information, Social Security number, account number or date of […]
Security Patches, Mitigations, and Software Updates
Cisco Patches Critical Vulnerability in RCM for StarOS (SecurityWeek) The vulnerability (CVE-2022-20649) can be exploited remotely, without authentication, to execute code with root-level privileges.
SolarWinds Patches Serv-U Vulnerability Propagating Log4j Attacks (SecurityWeek) SolarWinds this week released patches for a Serv-U vulnerability that Microsoft says has been abused for the propagation of Log4j attacks.
Admins urged to patch SolarWinds Serv-U bug against Log4j attacks (Computing) Hackers are actively exploiting the bug in the wild, according to Microsoft
Microsoft beefs up Edge's security against zero-day attacks (Computerworld) In the latest beta release of its Edge browser, Microsoft introduced a new feature for IT admins to better secure the Chromium-based app against web-based attacks on desktop systems.
ICONICS and Mitsubishi Electric HMI SCADA (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: ICONICS and Mitsubishi Electric
Equipment: ICONICS Product Suite, Mitsubishi Electric MC Works64
Vulnerabilities: Cross-site Scripting, Incomplete List of Disallowed Inputs, Plaintext Storage of a Password, Buffer Over-read
2.
Philips Vue PACS (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Philips
Equipment: Vue PACS
--------- Begin Update A Part 1 of 4 ---------
Mitsubishi Electric GOT and Tension Controller (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 5.9
ATTENTION: Exploitable remotely
Vendor: Mitsubishi Electric
Equipment: GOT and Tension Controller
Vulnerability: Buffer Access with Incorrect Length Value
2.
Mitsubishi Electric GOT and Tension Controller (Update B) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Mitsubishi Electric Corporation
Equipment: GOT and Tension Controller
Vulnerability: Out-of-bounds Read
2.
Trends
2022 Third-Party Breach Report (Black Kite) Key Findings Ransomware became the most common attack method of third-party attacks, initiating 27% of breaches analyzed in 2021. Software publishers were the most common source of third-party breaches for a third consecutive year, accounting for 23% of related incidents. The average time between an attack and the disclosure date was 75 days. The healthcare […]
2022 State of the CIO Executive Summary (IDG) The 2022 State of the CIO executive summary explores the business & tech initiatives for 2022 as well as the CIO's increased involvement in cybersecurity & operational efficiency.
Rapid7 : Is the Internet of Things the Next Ransomware Target? (MarketScreener) Ransomware attacks over the last couple years have been traumatic, impacting nearly every business sector and costing billions of dollars. The targets have mostly been our data: steal it,... | January 21, 2022
US data protection: Online habits and data breaches (ProtonVPN Blog) We asked 1,000 Americans questions about their online habits to reveal what they are doing to keep their online data secure.
Should Retailers Purchase Cyber Insurance to Mitigate Ransomware Risk? (PRWeb) Messaging Architects, an eMazzanti Technologies Company and cybersecurity expert, provides helpful cyber insurance guidance for retailers in a new article.
Cyberattack surge causing havoc for UK professional services organisations finds new report by Keeper Security (Yahoo) Professional services companies in the UK have experienced 62 cyberattacks in the last 12 months - one every six days - according to new research by Keeper Security. The company's 2021 Cybersecurity Census Report has also revealed that almost half (48%) of IT decision makers working at professional services companies have kept a cybersecurity attack on their organisation to themselves, raising questions about how badly affected businesses really are by these attacks.
Marketplace
KnightSwan Acquisition Corporation Announces Pricing of $200 Million Initial Public Offering (Business Wire) KnightSwan Acquisition Corporation (the “Company”), a special purpose acquisition company, announced the pricing of its initial public offering of 20,
Fleet Raises $5M Backed by GitLab Founder to Make Device Management Open Source (GlobeNewswire News Room) Fleet, an open-source device management platform that helps developers, security teams, and...
Money Moves: DC cyber firm Virtru just landed a $60M Series C, with plans to double headcount (Technical.ly) Plus, Curbio nabs $65 million, HawkEye 360 gets yet another boost, and a roundup of other big funding news, government contracts and IPO inklings.
District 87's cybersecurity insurance cost to jump 334% (WGLT) The District 87 school board voted Wednesday night to pay over $22,000 for cybersecurity insurance, as part of the Suburban School Cooperative Insurance Program.
Proofpoint Joins the National Technology Security Coalition as a National Underwriter (EIN) The National Technology Security Coalition (NTSC) announced that Proofpoint is joining the organization as a National Underwriter.
Google Pays Out Over $100,000 for Vulnerabilities Patched With Chrome 97 Update (SecurityWeek) Google has announced the release of 26 security patches as part of its latest Chrome update, including one for a critical-severity bug.
PerimeterX Appoints Key Executives to Expand Leadership Team and Accelerate Growth (PerimeterX) Cybersecurity leader broadens management team with seasoned industry veterans responsible for revenue, finance, alliances and service delivery
Syntax Appoints Dessalen Wood as Chief People Officer (PR Newswire) Syntax, a leading multi-cloud and mission-critical applications managed cloud provider, today announced the appointment of Dessalen Wood as...
Telos Corporation Announces Changes to Board of Directors (GlobeNewswire News Room) Company appoints Bradley Jacobs and Derrick DockeryBernard Bailey will not stand for reelection after 16 years of service ASHBURN, Va., Jan. 21, 2022 ...
Twitter shakes up its security team. (New York Times) Parag Agrawal, Twitter’s new chief executive, terminated the company’s head of security this week. Twitter’s chief information security officer is also leaving.
Vade Announces Severin Walker as New Director of Provider Products and Services (Vade Secure) Former top cyber exec at Comcast and Chairman of the Board at M3AAWG named to new role to support company’s rapid growth.
Products, Services, and Solutions
Cybersecurity Company Red Sift Launches OnINBOX Remediation to Empower Organizations to Quickly Resolve Phishing Emails (WFMZ) Red Sift, a leading provider of vital cybersecurity products, launched a new product today that will help security experts drastically reduce the amount of
ITC Secure and Omada join forces to simplify identity lifecycle management with modern identity governance (PR Newswire) Omada, a global leader of Identity Governance and Administration (IGA) and ITC Secure (ITC), a leading advisory-led cyber security services...
IT Leaders Select Druva as Best SaaS Platform for Data Resiliency (Druva) Druva Data Resiliency Cloud’s Comprehensive Offering and World-Class Customer Service Earns 13 Industry Awards
Exabeam Chosen as a Core Defense Layer of Deloitte’s Managed Extended Detection and Response Suite (Exabeam) Exabeam, the leader in Next-gen SIEM and XDR, today announced that it has been chosen by Deloitte to help operationalize Managed Extended Detection and Response (MXDR) by Deloitte in an expansion of the existing Exabeam-Deloitte alliance.
Tautuk Provides OT Visibility to Defend Easily Compromised Field Solutions (Tautuk) External Receptors Offer Near-Real-Time Alerting and Device Provenance
Visualize Attack Paths in Production Environments with ThreatMapper (Deepfence) How to install ThreatMapper, the open source security observability platform that hunts for vulnerabilities in production & assesses your risk of exploit
Protegrity partners with Google Cloud to accelerate secure data analytics (Help Net Security) Protegrity announced it has partnered with Google Cloud to support the upcoming release of BigQuery remote functions.
IronNet Combats Growing Cyber Attacks Against Education Sector (Business Wire) IronNet today announced a partnership with a Texas school district to help defend the district’s networks against increasing cyber attacks.
CrowdStrike Falcon Platform Selected to Help Power Managed Extended Detection and Response by Deloitte (Business Wire) CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced th
The Ocean Race teams up with Acronis (Ocean Race) Acronis, a global leader in cyber protection with dual headquarters in Schaffhausen, Switzerland and Singapore, will be the Official Cyber Protection Partner of the iconic round-the-world sailing competition, The Ocean Race.
Technologies, Techniques, and Standards
Tonga begins to come back online after volcanic eruption (The Record by Recorded Future) Online activity is starting to trickle out of the island nation of Tonga after a massive volcanic eruption.
IPv6 Considerations for TIC 3.0 (CISA) The transition of federal networks to Internet Protocol version 6 (IPv6) has been prioritized by the Federal Government since the release of Office of Management and Budget (OMB) Memorandum (M) 05-22, “Transition Planning for IPv6,” in 2005.
Cisco: Patching bugs is about more than CVSS numbers (SearchSecurity) New research from Cisco's Kenna Security shows companies should consider the exploit potential of a vulnerability, rather than just its CVSS score.
Design and Innovation
20 years after Gates’ call for trustworthy computing, we’re still not there (Computerworld) Then-Microsoft CEO Bill Gates spelled out what his company needed to do to build in better security two decades ago. And yet….
Beyond patching: Why a deterministic cyber approach is needed (DATAQUEST) The US-based CISA recently announced a major patching directive, but an optimal security strategy should begin from the inside out
Legislation, Policy, and Regulation
Cyber Insights 2022: Nation-States (SecurityWeek) Cyber Insights 2022 is a series of articles examining the potential evolution of threats over the new year and beyond. Six primary threat areas are discussed:
Australia, UK to 'fight back' against hostile states in cyber - minister (Reuters) Australia and Britain will "fight back" against cyber attacks from China, Russia, and Iran, defence minister Peter Dutton said ahead of consultations with Britain in Sydney.
UK government ignites debate over privacy vs. safety (Computerworld) The UK plans a multi-million dollar campaign against end-to-end encryption as used in iMessage, WhatsApp, and other messaging platforms.
Attacking end-to-end encryption will jeopardise children's safety, ICO warns (Computing) The warning comes following a government-backed campaign that urges social media sites to delay the rollout of E2EE in their apps
The NSA is getting a lot more cybersecurity power (TechRadar) New memorandum allows the NSA to issue binding operational directives for other government agencies
Statement of Senate Intel Chair Mark R. Warner on national security memorandum to improve cybersecurity (Brunswicktimes Gazette) On Jan. 19, 2022 U.S. Sen. Mark R. Warner (D-VA), Chairman of the Senate Select Committee on Intelligence and co-chair of the Senate Cybersecurity Caucus, issued the following
Senate Panel Approves Antitrust Bill Restricting Big Tech Platforms (Wall Street Journal) Apple, Amazon and Google say the bipartisan legislation barring tech platforms from favoring their own products could disrupt popular services for businesses and consumers.
Senate committee votes to advance major tech antitrust bill (CNBC) The bill has significant implications for Amazon, Apple and Google in particular.
CISA director tells mayors to make cyber a 'kitchen-table' issue (StateScoop) Jen Easterly urged mayors to pursue more cyber hygiene and modernization — and offered an update on the new cybersecurity grant program.
U.S. mayors pressed to address cybersecurity precautions (UPI) Cities can't prevent cyberattacks, but they can take steps to mitigate and recover from breaches, the director of the Cybersecurity and Infrastructure Security Agency told the U.S. Conference of Mayors on Thursday.
Bank of Russia Seeks to Outlaw Mining and Trading of Crypto (Bloomberg) Central bank proposed a far-ranging ban in a report Thursday. Russia’s FSB is also pushing for a ban on cryptocurrencies.
Russia proposes ban on use and mining of cryptocurrencies (Reuters) Russia's central bank on Thursday proposed banning the use and mining of cryptocurrencies on Russian territory, citing threats to financial stability, citizens' wellbeing and its monetary policy sovereignty.
Is it time for open source to be treated as a public good? (Computing) Open source is everywhere, including critical infrastructure. Should governments be playing more of a role in its governance?
Litigation, Investigation, and Law Enforcement
Russian Cybersecurity Firm Draws U.S. Federal Scrutiny, Concern from National Security Experts (Forensic News) A Russian cybersecurity company placed on a U.S. Commerce Department export ban list for having “enabled the activities of malicious Russian cyber actors” has maintained an active U.S. presence that has attracted the scrutiny of federal investigators, a Forensic News investigation can reveal.
Police chief on NSO: If there was abuse of power, we’ll fix it (Jerusalem Post) Shabtai tries to shift focus of the NSO probe by saying Pegasus was used prior to his term.
Israel police chief orders probe into NSO spyware claims (Al Jazeera) Police commissioner says internal investigation of force using NSO spyware did not yield cases of unlawful surveillance.
Police targeted activist with NSO software, saved info on his sex life — report (Times of Israel) New information contradicts law enforcement officials' denials of report that Pegasus was used against non-suspects without oversight
NSO Ghana op exposed: Never-before-seen Pegasus spyware footage, workers’ passports (Haaretz) TV report says NSO struck a shady deal with the Ghanaian government, which allegedly planned to use Pegasus to snoop on opposition figures ahead of a 2017 election
Dark Web Recon: Cybercriminals Fear More Law Enforcement Action in the Wake of the REvil Takedown (Trustwave) In the wake of the takedown of the REvil/Sodinokibi ransomware gang by the Russian Federal Security Service (FSB) on January 14, Eastern-European cybercriminals are feeling the ground shake. In the days following the FSB action, Trustwave SpiderLabs researchers have analyzed a slew of Dark Web chatter and have found that this potential new world is breeding fear in that community.
DA: Chico State computer hacker sentenced (Allen Media) The hacking led to a list of students that applied for vaccine exemptions being posted online.
Meta, Snap Sued Over Social Media ‘Addicted’ Girl’s Suicide (Bloomberg) Companies accused of wrongful death by mother of 11-year-old. Meta has said it’s addressing negative social comparisons.