Dateline Moscow, Kyiv, and New York: Nuclear threats and a partial mobilization.
Ukraine at D+109: More nuclear threats and a partial mobilization. (CyberWire) As its battlefield fortunes continue to deteriorate, Russia recalls up to 300,000 reservists, prepares sham plebiscites in four still partially occupied regions, and threatens the West with nuclear annihilation.
Russia-Ukraine war: List of key events, day 210 (Al Jazeera) As the Russia-Ukraine war enters its 210th day, we take a look at the main developments.
Ukraine war live: EU accuses Putin of ‘dangerous gamble’ after his nuclear threat and ‘partial mobilisation’ of Russia (the Guardian) EU warns of ‘consequences’ after Russian president calls up military reserves and says he is not ‘bluffing’ after nuclear warning
'Walls full of pain': Russia's torture cells in Ukraine (BBC News) The BBC's Orla Guerin meets survivors of atrocities in the ruined, recaptured city of Izyum.
Russia moves toward annexing Ukraine regions in a major escalation (Washington Post) The Kremlin’s puppet authorities in occupied areas declared plans for staged referendums to approve joining Russia
Four occupied Ukraine regions plan imminent ‘votes’ on joining Russia (the Guardian) ‘Referendum’ announcements in Donetsk, Luhansk, Zaporizhzhia and Kherson may indicate move to annex territories
Putin announces partial mobilisation and threatens nuclear retaliation in escalation of Ukraine war (the Guardian) Russian president threatens west with nuclear retaliation, saying ‘we will use all the means at our disposal’
More cracks emerge in Russia’s military as separatist regions in Ukraine call for emergency annexation (Washington Examiner) ‘RUSSIA IS FAILING’: Russia's faltering military is failing to achieve even Vladimir Putin's more limited, scaled-down goal of capturing “the entire territory of Donbas,” a senior defense official told reporters at the Pentagon Monday.
‘We thieves and killers are now fighting Russia’s war’: how Moscow recruits from its prisons (the Guardian) Inmates describe visits by Yevgeny Prigozhin, reported head of the Wagner group, who is said to offer pardons for those who enlist
Putin sets partial military call-up, won’t ‘bluff’ on nukes (AP NEWS) Russian President Vladimir Putin ordered a partial mobilization of reservists in Russia on Wednesday, risking a deeply unpopular step that follows a string of humiliating setbacks for his troops nearly seven months after invading Ukraine.
Putin announces partial military mobilization for Russian citizens (Axios) It's effective from today, Putin said.
Putin's 'partial mobilisation' will send tens of thousands to their deaths (The Telegraph) Ukrainian forces have killed or wounded 80,000 professional Russian soldiers - what will they do with this mobilised reserve?
Putin Taps 300,000 Reservists To Fight In Ukraine As He Backs Referendums In Russian Occupied Territories (Forbes) Several Russian-occupied territories in Ukraine are set to conduct what the U.S. and other Western nations have dismissed as “sham” referendums to join Russia later this week.
Vladimir Putin set to declare occupied land in Ukraine part of Russia (The Telegraph) Kremlin has warned it will defend any annexed territory by ‘all means’, raising prospect it could deploy nuclear weapons
'I'm not bluffing on nuclear weapons', Putin warns West (The Telegraph) President tells nation in televised speech that hostilities in Ukraine now threaten the very existence of Russia
Putin ally threatens London with nuclear strike in alarming BBC interview (The Telegraph) Sergei Markov said Western countries would be to blame for nuclear war because of their 'crazy behaviour' in Ukraine
Putin is cornered and dangerous - the prospect of a nuclear war is now closer than ever (The Telegraph) Russian president set to push through a series of measures that will escalate the conflict at a time when the Kremlin is losing
Russian lawmakers toughen punishment for soldiers (AP NEWS) Russia's Kremlin-controlled lower house of parliament on Tuesday approved legislation that toughens punishment for soldiers breaching their duties, in an apparent effort to boost discipline in the ranks amid the fighting in Ukraine.
Russian Sandworm Hackers Impersonate Ukrainian Telecoms to Distribute Malware (The Hacker News) Researchers have discovered a threat cluster linked to Sandworm that continues to target Ukraine with commodity malware.
Pro-Ukraine Hacktivists Claim to Have Hacked Notorious Russian Mercenary Group (Vice) The hacktivist group known as the Ukraine IT Army published a screenshot that showed the group hacked into a website allegedly linked to the Wagner group.
Russia in the Balkans After Ukraine: A Troubling Actor (Carnegie Endowment) Russia has proven that it knows how to be a master of distraction and how to take advantage of ethnic cleavages, bolster hardline nationalist politicians, and complicate the region’s lagging reform agendas.
US, Iran to speak at UN; Zelenskyy to appear from Ukraine (AP NEWS) Leaders of two of the world's most-watched nations — U.S. President Joe Biden and Iranian President Ebrahim Raisi — will be among those who have their say on the second day of the U.N.
Winning the War in Ukraine Will Take More Than Defeating Russia (World Politics Review) One of the most important exercises in any war is also one of the most difficult: assessing its progress. The war in Ukraine is no exception, but with the lightning gains of Ukraine’s recent counteroffensive having slowed somewhat, it seems like a good time to make a cautious attempt to take stock of where things stand.
Russian official Alexei Gorinov jailed for criticising Ukraine war gives final moving speech (The Telegraph) The 60-year-old uses his last remarks, which you can read in full below, to accuse Moscow of wreaking destruction in the European country
Putin’s Russian Empire is collapsing like its Soviet predecessor (Atlantic Council) Vladimir Putin’s invasion of Ukraine was meant to extinguish the Ukrainian state once and for all. Instead, Russian influence in the post-Soviet region is in danger of receding to levels not witnessed in hundreds of years.
Weaponizing education: Russia targets schoolchildren in occupied Ukraine (Atlantic Council) The Kremlin is attempting to impose the russification of Ukrainian schoolchildren in occupied areas as part of Moscow's campaign to extinguish Ukrainian statehood and eradicate all traces of Ukrainian national identity.
Most multinationals remain in Russia and fund Putin’s invasion of Ukraine (Atlantic Council) Despite much coverage of multinational corporations leaving the Russian market in protect over the invasion of Ukraine, in reality the majority of international companies have yet to fully exit Russia.
Russian stocks fall sharply as Putin threatens West with nuclear war (The Telegraph) Leader's warning sends sterling and euro plunging as investors take flight to the dollar
Attacks, Threats, and Vulnerabilities
UK and allies expose Iranian state agency for exploiting cyber vulnerabilities for ransomware operations (NCSC) Joint advisory highlights threat from cyber actors affiliated with Iran’s IRGC.
Fresh Phish: Netflix Bad Actors Go Behind the Scenes to Stage a Credential Harvesting Heist (INKY) For Netflix users, true crime and mystery could be coming in the form of a phishing email. Just one click unzips a disastrous credential harvesting scheme. Learn why this phishing threat evades most email security services and how INKY caught this bad actor before any damage was done.
Leveraging Netflix for credential harvesting. (CyberWire) INKY has discovered a threat actor targeting Netflix customers in a credential-harvesting campaign.
MFA Fatigue: Hackers’ new favorite tactic in high-profile breaches (BleepingComputer) Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. One component of these attacks that is becoming more popular with the rise of multi-factor authentication is a technique called MFA Fatigue.
Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games (Forbes) A teenage hacker purportedly managed to gain access to both Uber and Rockstar Games’ internal databases by deceiving a company employee using a social engineering attack.
Rockstar Games suffers leak of new Grand Theft Auto footage. (CyberWire) Rockstar Games has fallen victim to a hacker who leaked early development footage of the new Grand Theft Auto game that is in development.
Uber Says Breach Was by Lapsus$, a Teenage Hacking Group Motivated by Fame Over Money (Wall Street Journal) Over the past year, some of the world’s biggest technology companies have been bested by an international group of hackers—some of them teenagers—whose motivations seem at times unusual, said security experts.
ChromeLoader expands into ransomware on Windows and macOS (Register) Doesn't make cents, makes bigger bucks instead ... probably
Google tool for e-commerce sites being abused by hackers stealing card data, personal info (The Record by Recorded Future) Hackers are abusing Google’s Tag Manager containers to install malicious e-skimmers that steal payment card data and other information of e-commerce site shoppers.
Investigative journalism | A Finnish entrepreneur pulled the plug, and the most notorious Neo-Nazi websites in the US, 8kun and Daily Stormer, crashed. (Helsingin Sanomat) This is how 8kun and Daily Stormer, known for their neo-Nazi and Qanon content, went down. The infamous VanwaTech maintained the site's traffic with the help of a small Finnish server company.
Banks alert customers about mobile banking malware targeting over 200 apps (Business Standard) This malware captures the credentials when users log into their net-banking apps and access bank accounts
CISA, Claroty highlight severe vulnerabilities in popular power distribution unit product (The Record by Recorded Future) CISA released a warning about several vulnerabilities found in Dataprobe’s iBoot power distribution units allowing for remote exploitation.
OT cyber-attacks in transport and energy sectors on the rise (Control Engineering) While most cybersecurity attacks are agnostic of the industry, impacting both IT and OT there has been a rise in the number of OT cyber-attacks on transport and energy businesses in recent months, with too many companies remaining underprepared and responding to attacks on a reactive, ad hoc basis, argues Ralph Chammah, CEO of OwlGaze
Revolut breach impacts thousands, but no funds 'accessed' (Computing) The attack began, as many do, with a phishing scam
Thousands of customers affected in Revolut data breach (ComputerWeekly) Digital challenger bank has warned its customers to be vigilant after their data was exposed in a cyber attack.
LastPass source code breach – incident response report released (Naked Security) Wondering how you’d handle a data breach report if the worst happened to you? Here’s a useful example.
Notice of Recent Security Incident (The LastPass Blog) We have no evidence that this incident involved any access to customer data or encrypted password vaults. Our products and services are operating normally.
The LastPass incident. (CyberWire) No evidence of access to customer data or malicious code injection, but some theft of source code.
Crypto market maker Wintermute hacked for $160 million (The Block) Crypto market making firm Wintermute has been hacked for $160 million but the firm remains solvent, according to founder Evgeny Gaevoy.
Cyberattack on New York Racing Association leaked personal info of employees (The Record by Recorded Future) The New York Racing Association (NYRA) said a cyberattack in June led to the leak of sensitive information from employees and their beneficiaries.
Security Patches, Mitigations, and Software Updates
'Severe' Oracle Cloud infrastructure vulnerability found, fixed: Wiz (CRN Australia) Oracle officials responded “extraordinarily quickly”.
Microsoft Defender for Endpoint will turn on tamper protection by default (BleepingComputer) Microsoft says tamper protection will soon be turned on by default for all enterprise customers in Microsoft Defender for Endpoint (MDE) for better defense against ransomware attacks.
Medtronic NGP 600 Series Insulin Pumps (CISA) 1. EXECUTIVE SUMMARY CVSS v3 4.8 ATTENTION: Exploitable from an adjacent network Vendor: Medtronic Equipment: MiniMed 600 Series Insulin Pumps, Guardian Link 3 Transmitter, Guardian 2 Link Transmitter, Carelink USB, Contour Next Link 2.4 Vulnerability: Protection Mechanism Failure 2.
Hitachi Energy PROMOD IV (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.0 ATTENTION: Exploitable Remotely Vendor: Hitachi Energy Equipment: PROMOD IV Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to delete arbitrary files once the system is compromised.
Hitachi Energy AFF660/665 Series (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: AFF660/665 Firewall Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could overflow a buffer on the device and fully compromise it.
Dataprobe iBoot-PDU (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Dataprobe Equipment: iBoot-PDU FW Vulnerabilities: OS Command Injection, Path Traversal, Exposure of Sensitive Information to an Unauthorized Actor, Improper Access Control, Improper Authorization, Incorrect Authorization, SSRF 2.
Host Engineering Communications Module (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable from adjacent network/low attack complexity Vendor: Host Engineering Equipment: H0-ECOM100 Communications Module Vulnerability: Stack-based Buffer overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could crash the device being accessed, leading to a denial-of-service condition.
AutomationDirect DirectLOGIC with Ethernet (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: DirectLOGIC with Ethernet Communication Modules Vulnerabilities: Uncontrolled Resource Consumption, Cleartext Transmission of Sensitive Information 2.
AutomationDirect DirectLOGIC with Serial Communication (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.7 ATTENTION: Low attack complexity Vendor: AutomationDirect Equipment: DirectLOGIC with Serial Communication Vulnerability: Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a loss of sensitive information and unauthorized changes.
MiCODUS MV720 GPS tracker (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: MiCODUS Equipment: MV720 GPS tracker Vulnerabilities: Use of Hard-coded Credentials, Improper Authentication, Cross-site Scripting, Authorization Bypass Through User-controlled Key 2.
Trends
Cybersecurity Investments Are No Longer Optional, Officials Warn (Wall Street Journal) Shareholder pressure, insurance requirements and thinning patience should prompt better defenses, senior cybersecurity officials say.
What's behind the different names for hacker groups (Axios) Naming conventions for state-backed hacking groups vary from the technical to the whimsical.
Top 8 takeaways from the VMWare Cybersecurity Threat Report (BleepingComputer) VMware has recently released the 2022 edition of its annual Global Incident Response Threat Report. It is critically important for IT professionals to understand these trends and what they could mean for your organization's cyber security efforts. Let's break down VMware's 8 key findings and offer meaningful insights into each.
Marketplace
SentinelOne Launches S Ventures Fund (Business Wire) $100M Fund to Advance Enterprise Cybersecurity and Data Innovation
RKVST raises $7.5M in funding to enable organizations to build verifiable digital supply chains (Business Wire) RKVST, the integrity, transparency and trust platform for digital supply chain operations, announces the first close of a Series A funding round of $7
Proteus Acquisition Boosts Resourcive Cybersecurity Consulting Practice (Channel Futures) New York-based technology advisor Resourcive has purchased consulting firm Proteus Advisors in a move that increases Resourcive's cybersecurity expertise.
CrowdStrike to Acquire Reposify to Reduce Risk Across the External Attack Surface (CrowdStrike) CrowdStrike has agreed to acquire external attack surface management (EASM) vendor Reposify to help our customers identify and eliminate risk from vulnerable and unknown assets before an attacker can exploit it.
CrowdStrike to acquire security startup Reposify (CRN Australia) To beef up threat intelligence.
Palo Alto close to buying Israeli cyber co Apiiro (Globes) The deal, estimated to be worth upwards of $550 million, will be US company Palo Alto's eighth acquisition in Israel.
As Israel Reins in Its Cyberarms Industry, an Ex-intel Officer Is Building a New Empire (Haaretz) As Israeli cyber firms like Pegasus spyware creator NSO suffer a backlash that threatens their future, Intellexa – a company owned by an ex-Israeli intel officer – has set up shop in Athens, and business is booming
Grip Security Launches Partner Program to Help Companies Secure Business-Led IT (Grip) New program provides incentives and extensive support to accelerate partner sales traction and realize success in SaaS security
Twitch to ban Stake.com streams and other unlicensed gambling content (The Verge) xQc and other gambling streamers are gonna be pissed
Contrast Security to Discuss Major Market Shift to Cloud-Native & Importance of Serverless Application Security at InfoSec World 2022 (Contrast Security) Moving to Cloud-Native? Why Serverless App Security Needs to Be On Your Radar.
Video Interview: QinetiQ US CEO Shawn Purvis Talks Robotics, C5ISR, Contract Winning Strategies & More (GovConWire) Today, evolutions and advancements in modern warfare are driving major shifts in the technologies, weapons systems and capabilities that defense contractors provide. Now, more than ever, robotics, autonomous solutions and cyber are dominating the defense landscape, and companies like QinetiQ are using these shifts to steer strategies, investments and offerings.
Tenable Appoints Technology Industry Veteran Patricia Grant to Chief Information Officer (Tenable®) Tenable®, the Cyber Exposure Management company, today announced that it has appointed Patricia Grant to Chief Information Officer (CIO). As the leader of the IT organization, Grant will drive digital transformation, innovation and modernization to support the company’s ambitious business objectives.
Deep Instinct Appoints Former Palo Alto CEO and Zscaler COO Lane Bess as CEO (Business Wire) Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity, today announced that Lane Bess, former Palo Alto Networks CEO and
Eliza Hedegaard to join Saepio from Mimecast (Legal IT Insider) Legal technology veteran Eliza Hedegaard is to join Saepio Information Security from Mimecast, we can reveal.
Splunk names Tom Casey as SVP and GM, Platform (Help Net Security) Tom Casey, as the SVP and GM, will lead the company’s platform strategy, including development and operations of the Splunk Platform.
Kudelski Security Appoints Jacques Boschungas Senior Vice President & General Manager for EMEA (Yahoo Finance) Leveraging more than 25 years of experience in leading large-scale technology organizations, Jacques Boschung will be responsible for driving the growth of Kudelski Security in EuropeCheseaux-sur-Lausanne, Switzerland and Phoenix (AZ), USA – September 20, 2022 – Kudelski Security, the cybersecurity division within the Kudelski Group
Products, Services, and Solutions
Onfido launches Motion, the next generation of facial biometric technology, improving verification speed by 12X (Onfido) Next generation facial biometric technology improves verification speed by 12X, detecting the presence of a real physical person in seconds
Prisma Cloud Delivers Context-Aware Software Composition Analysis to Secure Deployment of Open Source Software (Palo Alto Networks) New SCA module offers proactive vulnerability remediation based on runtime context to achieve seamless code-to-cloud security
NVIDIA and Booz Allen Hamilton Expand Partnership to Bring AI-Enabled Cybersecurity to Public and Private Sectors (NVIDIA Newsroom) NVIDIA and Booz Allen Hamilton (NYSE: BAH) today announced an expanded collaboration to bring an AI-enabled, GPU-accelerated cybersecurity platform to customers in the public and private sectors.
Delinea Reduces Ransomware Risk for Customers (Delinea) Delinea has announced new and expanded capabilities for Privilege Manager and Connection Manager, its endpoint privilege management and secure remote access management solutions, respectively.
CrowdStrike and Coalition Join Forces to Transform Cyber Insurance Readiness (CrowdStrike) CrowdStrike today announced a partnership to help Coalition’s 160,000 cyber insurance policyholders meet key contingencies required to obtain or maintain a policy.
CHAS teams up with NormCyber to help contractors control cyber risk (Norm) NormCyber has announced a partnership with CHAS to provide 37,000 CHAS members with norm's manager cyber security services.
Commvault Enables Early Threat Detection and Zero Loss Strategy with Metallic® ThreatWise™ (PR Newswire) Commvault, a global enterprise leader in data management across on-premises, cloud, and SaaS environments, today announced the general...
Technologies, Techniques, and Standards
Invicti Security and ESG Release New Report on How Companies are Shifting Left and Right for Higher Quality, Secure Application Code (Invicti) Invicti Security has released a new white paper from independent industry analyst firm Enterprise Strategy Group (ESG). The report covers how Invicti customers are cost-effectively incorporating security into their development processes to secure their applications.
Developing a VFS that Emulates the Uroburos Rootkit (Praetorian) A discussion of modifying and implementing a hidden VFS similar to the Uroburos rootkit, plus a tool we developed as part of our research.
Research and Development
IARPA posts cyber psychology RFI (Intelligence Community News) On September 20, the Intelligence Advanced Research Projects Activity (IARPA) released a request for information on cognitive effects in cyber operations. Responses to this RFI are due no later than 5:00 p.m. Eastern on October 4.
Legislation, Policy, and Regulation
Severing Diplomatic Ties: A New Approach to Confronting State Cyber Aggression? (OODA Loop) There is little doubt that cyber attacks are used by both state and nonstate actors a medium to support their geopolitical views and positions during times of regional and global crisis.
President Tsai touts efforts to achieve broad cybersecurity defense (Focus Taiwan) Taipei, Sept. 20 (CNA) President Tsai Ing-wen (蔡英文) said Tuesday that her government is stepping up its efforts to build a comprehensive information security defense system, with the aim of making Taiwan a more resilient, safe and trustworthy country.
U.S. agency adds China Unicom, Pacific Networks to national security threat list (Reuters) The U.S. Federal Communications Commission (FCC) named Chinese telecom companies Pacific Networks Corp, its wholly-owned subsidiary ComNet (USA) LLC and China Unicom (Americas) as threats to U.S. national security, the regulator said Tuesday.
USA labels two more Chinese carriers national security risks (Register) Pacific Network Corp and China Unicom join the likes of Huawei, Hytera, Hikvision on list of dangerous suppliers
The government is (mostly) paying heed to a key cybersecurity commission (Washington Post) Cyberspace Solarium Commission recommendations are among top agenda items left for Congress this year
Cyberspace Solarium Commission members push to advance remaining recommendations (CyberScoop) Solarium members hopie to advance ideas such as a National Cybersecurity Certification and Labeling Authority and a Bureau of Cyber Statistics.
Cyberspace Solarium Commission calls for sustained investment in defense (The Record by Recorded Future) Despite having taken “significant steps” to strengthen the country's defenses against digital threats, the progress must be a "prelude" to further changes, the Cyberspace Solarium Commission urged Wednesday.
Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn (CyberScoop) The Bureau of Industry and Security has come under fire for approving the vast majority of technology export licenses to China.
US needs to reform efforts to stop enemy spies, report says (AP NEWS) A new Senate study warns that U.S. spy agencies’ efforts to stop China and other adversaries from stealing secrets are hampered by miscommunication and a lack of money and staff at the office intended to coordinate those efforts.
(U) Organizational Assessment: the National Counterintelligence and Security Center (Select Committee on Intelligence, United States Senate) The Select Committee on Intelligence (SSCI or the Committee) has long expressed interest in reviewing the United States Government (USG) counterintelligence (CI) enterprise...
Is $15.6 billion enough to protect critical infrastructure? (Help Net Security) This Help Net Security video talks about why an increase in spending is necessary and if it is enough to protect critical infrastructure.
FTC's Bedoya Defends Need For Broad Privacy Rulemaking (Law360) Federal Trade Commissioner Alvaro Bedoya on Tuesday shot back at criticisms about the breadth and scope of the agency's recently launched privacy rulemaking, arguing that the "seriousness" of the issue demands such an approach.
New York’s Landmark AI Bias Law Prompts Uncertainty (Wall Street Journal) Businesses and their service providers are grappling with how to comply with New York City’s mandate for audits of artificial intelligence systems used in hiring.
Litigation, Investigation, and Law Enforcement
Opinion The Pentagon’s alleged secret social media operations demand a reckoning (Washington Post) The U.S. military has apparently adopted a new national security strategy: internet trolling. The Post reports that the Pentagon will conduct a sweeping review of its policies regarding clandestine information warfare, after Facebook and Twitter removed fake accounts suspected of being run by the Defense Department.
Advisor to Europe's top court backs antitrust watchdogs looking at privacy (TechCrunch) Facebook has been arguing that antirust enforcers should essentially stay in their lane; they are not the oversight bodies for the EU's GDPR.
SEC Claims All of Ethereum Falls Under US Jurisdiction (Decrypt) In a civil complaint against a crypto influencer, the SEC suggested the U.S. government has jurisdiction over all Ethereum transactions.
FTC's Khan is 'extremely disturbed by' Twitter whistleblower allegations, says investigation could target CEO (MarketWatch) Federal Trade Commission Chairwoman Lina Khan said Tuesday she was 'extremely disturbed' by allegations made by a Twitter whistleblower that the company...
Elon Musk Will Sit for Deposition in Twitter Case Next Week (Bloomberg) Billionaire’s lead lawyer in buyout case also will be deposed. Musk seeks to walk away from $44 billion buyout of platform.
Ambry Genetics Reaches $12.25M Settlement Over Healthcare Data Breach (Health IT Security) The genetics company reached a multi-million-dollar settlement following a 2020 healthcare data breach that impacted more than 200,000 individuals.
Could Texas’ social media censorship law survive the Supreme Court? It’s not out of the question (Fortune) A federal appellate judge makes a reasonable—if not completely convincing—case for the constitutionality of the potentially costly statute.
Booz Allen would suffer if it harms NSA, economist testifies (Global Competition Review) It would not be profitable for Booz Allen Hamilton to submit an inferior bid to the National Security Agency following its acquisition of EverWatch, an economist testifying on behalf of the merging parties has said.