Dateline
Ukraine at D+232: Ukraine prepares a push into Kherson. (CyberWire) Russia works to consolidate its position in the Donbas as Ukraine prepares a major offensive against Kherson. SpaceX has told the US Department of Defense that it can no longer bear the cost of providing Starlink connectivity to Ukraine, and that it needs government funding to continue the service.
Russia-Ukraine war: List of key events, day 233 (Al Jazeera) As the Russia-Ukraine war enters its 233rd day, we take a look at the main developments.
Ukraine-Russia war latest: Kyiv could recapture Kherson city 'within a week' (The Telegraph) Ukraine could retake Kherson city as soon as next week.
Russia to evacuate civilians from Kherson as Ukrainians close in (The Telegraph) Kremlin-backed authorities are expecting fighting to reach the city itself and have asked for aid
Death Toll Rises as Russia Bombards Ukraine’s Cities for a Fourth Day (New York Times) Prompted by the expanded strikes, European countries made plans to develop joint air defenses and to train Ukrainian soldiers on European Union soil.
Ukraine's Kyiv area hit by Iranian-made kamikaze drones (AP NEWS) Ukraine’s capital region was struck by Iranian-made kamikaze drones early Thursday, officials said, sending rescue workers rushing to the scene as residents awoke to air raid sirens for the fourth consecutive morning following Russia’s major assault across the country earlier this week.
As morale suffers, Russia and Ukraine fight a war of mental attrition (Washington Post) A few months ago, as Ukraine’s military was still struggling to break through Russia’s defenses in the southern Kherson region, members of the 60th Infantry Brigade managed to snatch one of the Russians’ Motorola radios and listen in on their enemy’s conversations.
Ukraine presses Europe on air defences, seeks Russia's isolation (Reuters) President Volodymyr Zelenskiy made a new plea to Western partners to help beef up Ukraine's air defences on Thursday and called for further steps to isolate Russia.
No, Russia’s airstrike escalation is not retaliation for the Crimean Bridge (Atlantic Council) International media coverage depicting Russia's recent airstrike escalation as retaliation for the alleged Ukrainian attack on the Crimean Bridge risks creating false equivalency over Vladimir Putin's war of aggression.
Russia’s terror tactics: Putin escalates attacks on Ukrainian civilian targets (Atlantic Council) Vladimir Putin has launched a new phase of his Ukraine invasion and ordered the destruction of the country's civilian infrastructure. Ukraine's Western partners must urgently provide air defense systems to avert disaster.
Crippling civilian infrastructure has long been part of Russian generals' playbook – Putin is merely expanding that approach (Yahoo) Ukrainian firefighters battling flames at a power station hit by Russian missiles. Serhii Mykhalchuk/Global Images Ukraine via Getty ImagesIn response to massive battlefield setbacks, Russia has increased its attacks in Ukraine on everything from power plants and dams to railways, pipelines and ports. These attacks against civilian infrastructure are not random. Rather, they reflect an insidious calculus integral to modern Russian military theory. For more than 20 years, Russian military journal
As Putin escalates war, some in Russia’s business elite despair (Washington Post) When Vladimir Putin launched missile strikes targeting Ukrainian cities and critical infrastructure this week, the move seemed to earn the Russian president a reprieve from hard-liners who had been demanding more decisive action.
Barrage of strikes on civilian areas spurs urgency for air defense aid (Washington Post) NATO defense ministers, including Defense Secretary Lloyd Austin, met for a second day Thursday. NATO Secretary General Jens Stoltenberg vowed that the alliance would “stand by Ukraine for as long as it takes.”
NATO countries race to strengthen Ukrainian air defenses (Washington Post) Outraged over Russia’s recent strikes on civilian infrastructure targets, which disrupted power supplies in cities across Ukraine, NATO countries are vowing to boost support for Ukrainian forces, focusing in particular on the advanced air defense systems at the top of Kyiv’s wish list.
Ukraine Latest: Zelenskiy Demands Red Cross Mission to POW Camp (Bloomberg) Ukrainian President Volodymyr Zelenskiy said the Red Cross should have access to a prisoner of war camp, where at least 50 Ukrainians were killed in a July blast.
Exclusive: Musk's SpaceX says it can no longer pay for critical satellite services in Ukraine, asks Pentagon to pick up the tab (CNN) Since they first started arriving in Ukraine last spring, the Starlink satellite internet terminals made by Elon Musk's SpaceX have been a vital source of communication for Ukraine's military, allowing it to fight and stay connected even as cellular phone and internet networks have been destroyed in its war with Russia.
Killnet: don't underestimate the “script kiddies,” experts say (Cybernews) Politically motivated cybercriminals with unsophisticated tools can swiftly adopt far more destructive weapons. Experts say it would be a mistake to underestimate groups such as Killnet, which are often not taken seriously.
What Nixon’s Endgame Reveals About Putin’s (Foreign Affairs) Russia’s war in Ukraine could end like the Vietnam War.
Kremlin Talking Points Are Back in the U.S. Debate (Foreign Policy) Elon Musk, Tucker Carlson, and midterm candidates are peddling Russian propaganda on Ukraine.
Meet the Ukrainian TV star fundraising millions for the country’s war effort (Atlantic Council) TV host Serhiy Prytula is being tipped by many as a rising star of Ukrainian politics but for now he is fully occupied in his current role leading crowdfunding efforts for the Ukrainian Armed Forces.
Putin offers to make Turkey capital of Russian gas supply to the world (The Telegraph) Brussels accuses Kremlin of using its 'dirty fossil fuels as a geopolitical weapon' by redirecting energy deliveries away from EU
With RT still live, France’s hands are tied (POLITICO) It’s unclear whether French authorities can have RT France taken down from fringe platform Odysee.
Attacks, Threats, and Vulnerabilities
Iran’s Cyberattacks on Albania Highlight NATO’s Cyber Gaps (World Politics Review) Albania has suffered two cyberattacks attributed to Iran so far this year, both of which were severe enough to consider invoking NATO.
POLONIUM APT targets Israel with a new custom backdoor dubbed PapaCreep (Security Affairs) An APT group tracked as Polonium employed custom backdoors in attacks aimed at Israelian entities since at least September 2021. POLONIUM APT focused only on Israeli targets, it launched attacks against more than a dozen organizations in various industries, including engineering, information technology, law, communications, branding and marketing, media, insurance, and social services. Microsoft MSTIC […]
Suspicious Twitter accounts impersonating research group try to blame the NSA for Chinese hacks (The Daily Dot) A security researcher on Twitter has come across numerous accounts that appear to be blaming NSA for hacks linked to the Chinese government.
New Chinese Cyberespionage Group WIP19 Targets Telcos, IT Service Providers (SecurityWeek) A newly identified cyberespionage group operating out of China has been targeting IT services providers and telecommunications companies with signed malware.
Chinese-linked hackers targeted U.S. state legislature, researchers say (CyberScoop) Researchers with Symantec said the group that it has tracked for years has recently targeted government networks in the U.S. and Middle East.
Chinese Cyberspies Targeting US State Legislature (SecurityWeek) China-linked cyberespionage group APT27 was recently observed targeting a US state legislature.
U.S. state legislature, Middle Eastern gov’t targeted by espionage group through Log4j (The Record by Recorded Future) A group of hackers used the Log4j vulnerability to attack the legislature of a U.S. state in July and the government of a country in the Middle East.
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows (Cisco Talos) A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Feature-Rich 'Alchimist' Cyberattack Framework Targets Windows, Mac, Linux Environments (Dark Reading) The comprehensive, multiplatform framework comes loaded with weapons, and it is likely another effort by a China-based threat group to develop an alternative to Cobalt Strike and Sliver.
Lessons from China’s Cyberattack Strategy Can Help CISOs Better Manage Threats, Report Says (Nextgov.com) A new report from Booz Allen Hamilton analyzed more than a dozen Chinese-sponsored cyberattacks over the past decade.
NSA, CISA& FBI Alert on Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors - Check Point Customers Remain Fully Protected - Check Point Software (Check Point Software) Background Recently, the joint cybersecurity advisory (CSA) provided the top Common Vulnerabilities and Exposures (CVEs) used since 2020 by People’s
Claroty reveals new cryptographic key extraction method (SecurityBrief Australia) Claroty's Team82 has developed a new, innovative method to extract heavily guarded, hardcoded, global private cryptographic keys embedded within the Siemens SIMATIC S7-1200/1500 PLC and TIA Portal product lines.
‘Critical’ vulnerability found in Siemens industrial tool, allowing theft of cryptographic keys (The Record by Recorded Future) Siemens published patches to address a "critical" vulnerability in one of its most popular programmable logic controllers.
Foreign Election Disinformation Campaigns Well Under Way, Researchers Say (VOA) New cybersecurity report Finds evidence of activity by Russia, China and domestic US extremists
Windows Exchange servers hit by LockBit ransomware (Computing) Hackers likely used a new zero-day to compromise Exchange servers, researchers believe
Malicious Emails Surged for Election Workers in 2 Battleground States Ahead of Primaries (Nextgov) Research conducted by cybersecurity firm Trellix found that county election workers in Arizona and Pennsylvania saw an increase in phishing schemes ahead of their primary elections.
Mormon Church Says It Was Target of Cyberattack (Bloomberg) The Church of Jesus Christ of Latter-day Saints was the target of a cyberattack, the church announced Thursday.
A cyber attack breached some Latter-day Saint member data. Here’s what we know (Deseret News) The March breach of information systems of The Church of Jesus Christ of Latter-day Saints included personal data about church members and employees. Are you at risk?
Cyber attack accesses personal data of LDS church members, employees (FOX 13 News Utah (KSTU)) The Church of Jesus Christ of Latter-day Saints announced a cyber attack this year accessed personal data of church members, employees and others.
Mormon Church data stolen in 'state-sponsored' cyberattack (Register) Don't get your underwear in a twist
Heat left by users' fingertips could help hackers crack passwords, researchers claim (Hot for Security) Boffins at the University of Glasgow, in Scotland, have developed a system which
they claim demonstrates a new type of cybersecurity threat: a "thermal attack.
Cosmos co-founder says a major security vulnerability has been uncovered on IBC (Cointelegraph) Cosmos-based projects have thus far avoided much of the cross-bridge exploits happening on EVM chains this year.
Gaming Is Booming. That’s Catnip for Cybercriminals. (New York Times) Cybersecurity experts warn that threats lurk in cheat codes, microtransactions and messages from fellow players.
Mirai Botnet Launched 2.5 Tbps DDoS Attack Against Minecraft Server (SecurityWeek) A Mirai botnet launched a 2.5 Tbps DDoS attack against a Minecraft server and it’s the biggest attack seen by Cloudflare to date.
Singtel's Optus says no passport replacement needed for those affected by cyber attack (The Straits Times) Optus said it is "now communicating" this to affected customers as a result of discussions with the Australian government.
Read more at straitstimes.com.
Secret agents targeting drug cartels in Australia exposed in data hack (The Sydney Morning Herald) A massive leak of classified government documents has exposed the identities and methods of secret agents working to stop major drug importations to Australia.
AFP concerned for safety of anti-drug agents exposed by data hack (9News) A giant data leak of Colombian government files has exposed the identities of secret agents working to bus...
CommonSpirit Hospital Chain Grappling With Ransomware Attack (Wall Street Journal) Parts of the healthcare group took electronic patient records and portals offline after it disclosed the attack last week.
CommonSpirit confirms ransomware attack as U.S. hospitals deal with fallout (The Record by Recorded Future) One of the largest nonprofit health care systems in the U.S. confirmed that it was hit with a ransomware attack that caused IT outages at hospitals across the country.
NHS vendor Advanced won't say if patient data was stolen during ransomware attack (TechCrunch) The NHS technology vendor said its incident recovery is likely to be slow following an August ransomware attack.
UK billboard advertisers abusing personal data, report (Computing) Billboards using high definition cameras to identify gender, age and mood of passers-by, plus data harvested from mobile phones, all without consent says Big Brother Watch
Scammer Fools Woman Into Thinking They're an Astronaut Who Needs a Ticket Home (Futurism) Earlier this year, a fake astronaut conned an old woman into sending him a ton of money in order to get back home from the ISS — and catfished her to boot.
Security Patches, Mitigations, and Software Updates
CISA Recommends Following Microsoft’s Mitigation for Zero Day Exploits (JD Supra) Microsoft recently issued mitigation steps for vulnerabilities that are being actively exploited by threat actors. Microsoft stated that it is aware...
Exploit available for critical Fortinet auth bypass bug, patch now (BleepingComputer) Proof-of-concept exploit code is now available for a critical authentication bypass vulnerability affecting Fortinet's FortiOS, FortiProxy, and FortiSwitchManager appliances.
Siemens LOGO! (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.1 ATTENTION: Low attack complexity Vendor: Siemens Equipment: LOGO! Vulnerability: Insufficient Verification of Data Authenticity 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to manipulate a firmware update and flash the modified update to the device.
Siemens Industrial Edge Management (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: Industrial Edge Management Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to inject malicious maintenance requests by exploiting improper certification validation.
Siemens Solid Edge (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Solid Edge Vulnerability: Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in the current process.
Siemens SIMATIC S7-1200 and S7-1500 CPU Families (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.3
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: SIMATIC S7-1200 and S7-1500 CPU families
Vulnerability: Insufficiently Protected Credentials
Hitachi Energy Lumada Asset Performance Management Prognostic Model Executor Service (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/public exploits are available Vendor: Hitachi Energy Equipment: Lumada Asset Performance Manager (APM) Vulnerabilities: Allocation of Resources Without Limits or Throttling, Code injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could crash the Prognostic Model Executor and could allow remote code execution.
Siemens Desigo PXM Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Desigo PXM Devices Vulnerabilities: OS Command Injection, Exposure of Sensitive Information to an Unauthorized Actor, Cross-Site Scripting, Cross-Site Request Forgery, Improper Neutralization of Encoded URI Schemes in a Web Page, Execution with Unnecessary Privileges 2.
Siemens Nucleus RTOS FTP Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Nucleus Real-Time Operating System (RTOS) FTP Server Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to generate a denial-of-service condition on devices running the affected software.
Siemens TCP Event Service of SCALANCE And RUGGEDCOM Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE, RUGGEDCOM Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to render the device unusable.
Siemens SICAM P850 and P855 Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SICAM P850 and P855 devices Vulnerabilities: Session Fixation, Improper Neutralization of Parameter/Argument Delimiters 2.
Siemens JT Open Toolkit and Simcenter Femap (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: JT Open Toolkit and Simcenter Femap Vulnerability: Access of Uninitialized Pointer 2. RISK EVALUATION Successful exploitation of this vulnerability could crash the application or lead to arbitrary code execution.
Siemens SCALANCE and RUGGEDCOM Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Multiple SCALANCE and RUGGEDCOM products Vulnerability: Missing Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow low privileged attackers to escalate privileges.
Siemens APOGEE, TALON and Desigo PXC/PXM Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products Vulnerabilities: Uncontrolled Resource Consumption 2.
Siemens LOGO! 8 BM Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: LOGO! 8 BM Devices Vulnerabilities: Buffer Copy without Checking Size of Input; Improper Input Validation; Improper Validation of Specified Index, Position, or Offset in Input. 2.
Siemens SIMATIC HMI Panels (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC Human Machine Interface (HMI) Panels Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets.
Siemens SCALANCE X-200 and X-200IRT Families (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE X-200 and X-200IRT Families Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to steal session cookies and hijack a session.
Siemens Desigo CC and Cerberus DMS (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Desigo CC and Cerberus DMS Vulnerability: Use of Client-Side Authentication 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.
Mitsubishi Electric MELSEC iQ-R Series (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable remotely Vendor: Mitsubishi Electric Corporation Equipment: MELSEC iQ-R Series CPU Module Vulnerabilities: Exposure of Sensitive Information to an Unauthorized Actor, Insufficiently Protected Credentials, Overly Restrictive Account Lockout Mechanism 2.
Mitsubishi Electric MELSEC iQ-R Series (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Corporation Equipment: MELSEC iQ-R Series CPU Module Vulnerability: Authorization Bypass Through User-controlled Key 2.
Siemens PROFINET Stack Integrated on Interniche Stack (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: PROFINET Stack Integrated on Interniche Stack Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a denial-of-service condition.
Siemens SINEC NMS (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SINEC NMS Vulnerabilities: SQL Injection, Deserialization of Untrusted Data, Improper Privilege Management 2.
Siemens SCALANCE (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE Vulnerabilities: Cross-site Request Forgery, OS Command Injection, Classic Buffer Overflow, Command Injection, Path Traversal, Missing Encryption of Sensitive Data 2.
Siemens SCALANCE W1750D (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE W1750D Vulnerabilities: Improper Restriction of Operations Within the Bounds of a Memory Buffer, Command Injection, Path Traversal 2.
Siemens Apache HTTP Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Apache HTTP Server Vulnerabilities: NULL Pointer Dereference, Out-of-bounds Write, Server-side Request Forgery (SSRF) 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to access or modify resources, crash the device, or achieve code execution.
Siemens OpenSSL Affected Industrial Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Multiple industrial products Vulnerability: Infinite Loop 2. RISK EVALUATION Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.
Siemens Industrial Products with OPC UA (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC NET PC, SITOP Manager, TeleControl Server Basic Vulnerability: Null Pointer Dereference 2. RISK EVALUATION Successful exploitation of this vulnerability could crash the device by sending uncertain status code in a response message.
Trends
Axio 2022 Ransomware Preparedness Report (Axio) Benchmark your organization's preparedness for ransomware and learn the latest trends and data.
Unlocking the login challenge: how login fatigue compromises employee productivity, security and mental health (1Password) Most people start their workday the same – logging in to all of the many programs they use to get their work done. But signing in has become more complicated than ever – leaving employees frustrated and ultimately putting businesses' most important information at risk.
State of Security Data Management 2022 Report Reveals Overconfidence Masks a Pervasive Data Problem (Cribl) This industry-wide report explores the security data trends, challenges, and opportunities that companies are facing.
State of Security Data Management (Cribl) This industry-wide report explores the security data trends, challenges, and opportunities that companies are facing.
Gartner Identifies Three Factors Influencing Growth in Security Spending (Gartner) Spending on information security and risk management products and services is forecast to grow 11.3% to reach more than $188.3 billion in 2023., accoridng to Gartner. #GartnerSEC
Marketplace
Cyber cover to become ubiquitous as demand grows: GILC (ReinsuranceNe.ws) In a new report, Global Insurance Law Connect (GILC) predicts that cyber cover will become as ubiquitous as public liability or professional indemnity
Russia-Ukraine war: Lloyd's and Aon to set up innovation forum to accelerate solutions to help build resilience (Asia Insurance Review) The (re)insurance industry must continue the work already started in supporting clients in navigating the uncertainties of the on-going Russia-Ukraine war and building resilience, say Lloyd's, the world's leading marketplace for commercial, corporate and specialty risk solutions, and global
SecuriThings raises $21M for its connected device management platform (SiliconANGLE) SecuriThings raises $21M for its connected device management platform - SiliconANGLE
DataGrail Raises $45 Million for Data Privacy Platform (SecurityWeek) Data privacy platform DataGrail raises $45 million in Series C funding round led by Third Point Ventures.
£60m funding as Darktrace founder joins Immersive Labs (BusinessCloud) Leadership and board hires at Bristol-based cyber workforce resilience platform which also names new chair
Leidos Secures $1.5 Billion Sentinel Award (PR Newswire) Leidos (NYSE: LDOS), a FORTUNE® 500 science and technology leader, was recently awarded a prime task order to support the Department of Defense....
Godspeed Capital-backed SilverEdge Acquires QVine (Business Wire) SilverEdge Government Solutions (“SilverEdge”), a leading cybersecurity, software, and intelligence solutions platform serving the U.S. Defense and In
Celebrus 3X Gold Winner for Innovation, Technical Team and Website at (PRWeb) Celebrus announces it is awarded three gold Titan Awards in the 2022 business categories, recognizing the Celebrus products and
Products, Services, and Solutions
Tanium Benchmark Sets New Standard for Tracking and Improving Security and Operational Metrics (Business Wire) Tanium, the industry’s only provider of converged endpoint management (XEM), today announced the launch of Tanium Benchmark, an industry-first solutio
Juice Technology Receives ISO Certification for Charging Station Cyber Security (Dark Reading) Electric Vehicle Charging Station Leader Certified in Accordance with ISO/SAE 21434 "Road Vehicles – Cybersecurity Engineering".
Palo Alto Networks Ushers in the Next-Generation Security Operations Center With General Availability of Cortex XSIAM -- the Autonomous Security Operations Platform (PR Newswire) Delivering on the promise to help organizations leverage massive scales of data for their defenses, Palo Alto Networks (NASDAQ: PANW) today...
ngena Adds Versa Networks as Part of its Network-As-A-Service MultiTech Offering (Business Wire) ngena, the only global end-to-end orchestrated SD-WAN as a service company, today announced its partnership with Versa Networks, the recognized leader
Technologies, Techniques, and Standards
CISA Releases RedEye: Red Team Campaign Visualization and Reporting Tool (CISA) CISA has released RedEye, an interactive open-source analytic tool to visualize and report Red Team command and control activities. RedEye allows an operator to quickly assess complex data, evaluate mitigation strategies, and enable effective decision making. For more information, CISA encourages users to review RedEye on GitHub and watch CISA’s RedEye tool overview video.
Research and Development
Cynnovative increasingly integrated into DARPA's cyber innovation (Intelligence Online) Newcomer Cynnovative is among three companies selected for the DARPA's new pentest programme.
Academia
JCSD and Lincoln University announce new cybersecurity partnership (KOMU 8) The program will work to connect K-12 students to HBCUs to help close the diversity gap in the cybersecurity workforce.
Legislation, Policy, and Regulation
Turkey's parliament adopts media law jailing those spreading 'disinformation' (Reuters) Turkey's parliament on Thursday adopted a law proposed by President Tayyip Erdogan that would jail journalists and social media users for up to three years for spreading "disinformation", despite deep concerns over free speech.
UK Government Urges Action to Enhance Supply Chain Security (Infosecurity Magazine) The NCSC guidance has been issued amid a significant increase in supply chain attacks in recent years
Getting to the bottom of software supply chain security (Federal News Network) As federal agencies and contractors come to grips with the burden of protecting their software supply chain, understanding who had a hand in the development of their software products has taken on…
UK extends deadline to remove Huawei equipment from 5G network core (Reuters) Britain on Thursday extended the deadline to remove equipment and services from China's Huawei in core network functions to Dec. 31, 2023, from an original target of Jan. 28, 2023, after consulting with the company and telecoms operators.
U.S. FCC set to ban approvals of new Huawei, ZTE equipment (ETTelecom.com) FCC Chairwoman Jessica Rosenworcel last week circulated the proposed ban to the other three commissioners for final approval. The companies would not ..
With New Crackdown, Biden Wages Global Campaign on Chinese Technology (New York Times) U.S. officials pushed to choke off China’s access to critical semiconductor technology after internal debates and tough negotiations with allies.
U.S. Election Officials Are on Alert for Cyber, Physical Attacks (Wall Street Journal) Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, warned of multipronged threats that could include hacking of computer networks, disinformation on social media and harassment campaigns that affect poll workers in the physical world.
White House targets 3 critical infrastructure sectors for new cyber regulations (The Record by Recorded Future) Communications, water and healthcare are the next critical infrastructure sectors the Biden administration plans to work with to increase their baseline cybersecurity, White House deputy national security adviser Anne Neuberger said Thursday.
Analysis | Here's the next phase of Biden's plan to fortify industry cyberdefenses (Washington Post) Hospitals, medical devices, the water sector and public warning systems are next up.
White House Eyeing Cyber Work on Comms, Water, Healthcare Sectors (Meritalk) The White House is targeting the communications, water, and healthcare sectors for further regulatory attention aimed at improving cybersecurity in those critical infrastructure sectors, according to Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology.
Litigation, Investigation, and Law Enforcement
French Authorities Say They Have Nabbed a Youth Cyber-Gang That Stole $2.5 Million in NFTs | Artnet News (Artnet News) Five men between the ages of 19 and 24 have been indicted for a spree of NFT phishing attacks targeting Bored Ape holders.
Client-side scanning to detect child abuse material harmful (Register) Security expert challenges claim that bypassing encryption is essential to protecting kids
Will Alex Jones pay Sandy Hook families $1B? What to know about the huge award. (Washington Post) Infowars founder Alex Jones was ordered to pay nearly $1 billion to relatives of victims of the 2012 Sandy Hook mass shooting for spreading the lie that the massacre was staged — a stunning verdict that one lawyer called “probably one of the largest defamation verdicts in U.S. history.”
New Mexico’s Cybersecurity Office Investigating Unauthorized Access To Information Systems At State Agency (Los Alamos Daily Post) The Department of Information Technology’s (DoIT) Cybersecurity office is investigating unauthorized access at the state’s Regulation and Licensing Department (RLD).
What the Uber verdict means to CISOs: You're (probably) not going to jail (CSO Online) CISOs and potential CISOs worried about criminal risk won't go to jail if they follow four simple steps.