Dateline Moscow and Kyiv: Dissent from both sides.
Ukraine at D+244: Dissent, pro- and anti-war. (CyberWire) Ukraine advances in Kherson and Luhansk as Mr. Prigozhin criticizes Russia's war effort as insufficiently harsh. Ukraine documents Russian cybercrimes in the hope of eventually seeing the prosecuted.
Ukrainian forces advance against Russian fighters in Kherson and Bakhmut (Washington Post) Ukrainian forces continued their advance against the Russian military in the southern Kherson region Tuesday, pushed back Russian mercenaries from Bakhmut in eastern Donetsk, and gained new momentum in Luhansk, where they seized a key highway between the towns of Kreminna and Svatove.
Russia-Ukraine war: List of key events, day 245 (Al Jazeera) As the Russia-Ukraine war enters its 245th day, we take a look at the main developments.
Putin oversees military drills simulating 'massive nuclear strike' (The Telegraph) Vladimir Putin, the Russian President, personally oversaw military drills designed to simulate a "massive nuclear strike".
Russia-Ukraine war latest: 1,000 bodies exhumed in Kharkiv oblast, reports say (the Guardian) Bodies in Kharkiv oblast include 447 found in Izium, local media say
Ukraine defiant as Putin’s terror bombing plunges cities into darkness (Atlantic Council) Vladimir Putin's campaign to destroy Ukraine's critical civilian infrastructure marks a dramatic escalation in the Russian invasion of Ukraine as the increasingly desperate Russian ruler seeks to avert military defeat.
Ukraine cites success in downing drones, fixes energy sites (AP NEWS) Ukrainian authorities tried to dampen public fears over Russia's use of Iranian drones by claiming increasing success Monday in shooting them down, while the Kremlin's talk of a possible “dirty bomb” attack added another worrying dimension as the war enters its ninth month.
Russia notifies U.S. it will carry out expected nuclear drills (Reuters) Russia has notified the United States about its plans to carry out annual exercises of its nuclear forces, the U.S. government said on Tuesday, a move that Washington said lowers the risk of miscalculation at a time of "reckless" Russian nuclear rhetoric.
Putin’s Threats Worry Ukraine’s NATO Allies as Sign of Russian Desperation (Bloomberg) With the war in Ukraine entering its ninth month there are no signs of Russian preparations to use nuclear arms, but its troops continue to lose ground.
Biden Warns Russia Against ‘False Flag’ Nuclear Attack in Ukraine (Bloomberg) President Joe Biden warned Russia against using a nuclear or radioactive weapon in Ukraine and said he’s been in discussions Tuesday about the possibility.
Biden Warns Russia Against Using Nuclear Weapons as ‘Dirty Bomb’ Accusations Fly (New York Times) Russia and Ukraine accused each other of planning to use a bomb to spread radioactive material, raising fears in the West that Russia might use such an attack as a pretext to launch a nuclear weapon.
Zelenskyy Warns Israel: Putin Will Help Iran Go Nuclear in Exchange for Drones (Haaretz) Ukraine’s president tells Haaretz Democracy Conference that Tehran’s sale of suicide drones to Moscow happened partly because Israel decided to remain neutral in the conflict
Just How Close Are We to World War III, Exactly? (Bloomberg) We’re still testing how much conflict major powers can endure before they trigger nuclear war.
Putin admits Russia is facing 'issues' in the Ukraine war and told his team to make faster decisions (Business Insider) Putin's comments came days after the Russian central bank said the mobilization of men, to fight in the war, could hit the economy.
Mercenary chief vented to Putin over Ukraine war bungling (Washington Post) Yevgeniy Prigozhin, the Russian tycoon behind the mercenary group Wagner, personally told Putin that his military chiefs are mismanaging the war, U.S. officials said
Russia's chaotic draft leaves some out in cold, without gear (AP NEWS) The mobilized reservists that Russian President Vladimir Putin visited last week at a firing range southeast of Moscow looked picture-perfect. Kremlin video of the young men headed for the war in Ukraine showed them in mint-condition uniforms, equipped with all the gear needed for combat: helmets, bulletproof vests and sleeping bags.
Putin’s Risk Spiral (Foreign Affairs) The logic of escalation in an unraveling war.
What does ‘lose’ look like for the Russia-Ukraine war? We need room to discuss how this ends (The Telegraph) As wars rarely end on the battlefield, there is some merit in discussing what the end game looks like
Ukraine war proves Western technology is superior, German general says (Defense News) “The overall experience and observation they’re making is as soon as Western technology comes into play, Russia cannot cope with it.”
Ukraine-bound NASAMS are in US hands now: Raytheon (Defense News) Raytheon has delivered two sophisticated NASAMS air defense systems due for Ukraine to United States government, its chief executive said Tuesday.
Exclusive: U.S. considers HAWK air defense equipment for Ukraine (Reuters) The United States is considering sending older HAWK air defense equipment from storage to Ukraine to help it defend against Russian drone and cruise missile attacks, two U.S. officials told Reuters.
Ukraine Documenting Russian Hacks, Eyeing International Charges (Bloomberg) Breaches, denial-of-service attacks are paired with military strikes
German cyber agency warns threat situation is ‘higher than ever’ (The Record by Recorded Future) Germany’s federal cybersecurity office warned on Tuesday that ransomware, political hacking, and other cybersecurity threats facing the country are “higher than ever.”
Are the UK’s Cyber Forces Ready to Take on Russia? (The National Interest) The British public should discuss the country’s investment in and use of offensive cyber capabilities against Russia.
Russia’s Sberbank repels largest cyber attack in its history (Prensa Latina - Latin American News Agency) Moscow, Oct 26 (Prensa Latina) Sberbank, the most important bank in Russia, repelled one of the biggest cyber attacks in its history, which lasted 24 hours and seven minutes, the institution's vice-president, Stanislav Kuznetsov, informed.
House progressives retract Russia-diplomacy letter amid Dem firestorm (POLITICO) Party lawmakers were blindsided by Monday's release of a letter calling for direct negotiations in Ukraine, according to several people familiar with the situation.
‘Is Russia Committing Genocide in Ukraine?’ Might Be the Wrong Question (World Politics Review) It is tempting to call Russia’s war crimes in Ukraine “genocide,” but that may actually make it harder to hold Russia and Putin accountable.
Europe Should Have Listened to the Baltic States on Russia (World Politics Review) The Baltic states warned Europe and the rest of the world about the threat Russia posed. The world didn’t listen.
Europe must make this the last winter of weaponized Russian energy exports (Atlantic Council) Russian President Vladimir Putin hopes to freeze Ukrainians into submission in the coming months while also using energy supply cuts to pressure European leaders into abandoning their support for Ukraine.
Ukraine’s growing tech sector offers hope amid wartime economic pain (Atlantic Council) Ukraine's tech sector offers a rare glimmer of light amid the economic gloom of Russia's ongoing invasion with Ukrainian IT industry export revenues actually up by 23% during the first six months of 2022.
Attacks, Threats, and Vulnerabilities
Internet is shut down in Sudan on anniversary of military coup (The Record by Recorded Future) Online blackout on the anniversary of military coup lasted roughly eight hours.
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections (Mandiant) An influence campaign likely supporting People's Republic of China is aggressively targeting the U.S.
YouMail Robocall Scam Threat Advisory - October 2022 (PR Newswire) YouMail issued a new robocall threat advisory today warning that Americans are under threat from utility-related imposter robocalls. These...
Phishing Scammer Has Drained $1M in Crypto and NFTs in Past 24 Hours, Says On-Chain Sleuth (CoinDesk) A prolific scammer has so far netted more than $3.5 million in total, according to ZachXBT.
Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks (SecurityWeek) Two vulnerabilities in Jira Align could allow attackers to elevate privileges, obtain Atlassian cloud credentials, and potentially impact Atlassian infrastructure.
Agent Tesla stealer targets users worldwide (ITWeb) The malware is distributed as a self-extracting archive attached to the weaponised e-mail, says Kaspersky.
DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector (Microsoft Security Blog) In recent months, Microsoft has detected active ransomware and extortion campaigns impacting the global education sector, particularly in the US, by a threat actor we track as DEV-0832, also known as Vice Society.
Microsoft: Vice Society targets schools with multiple ransomware families (BleepingComputer) A threat group known as Vice Society has been switching ransomware payloads in attacks targeting the education sector across the United States and worldwide.
Microsoft ties Vice Society hackers to additional ransomware strains (The Record by Recorded Future) Microsoft tied hackers with the Vice Society ransomware gang to several different ransomware strains in a blog on Tuesday.
Parcel delivery scams are on the rise: Do you know what to watch out for? (WeLiveSecurity) As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season.
Four new phishing tactics to watch out for (Washington State Hospital Association) Most health care organizations perform cybersecurity awareness training, and their staff are on the lookout for phishing emails. However, cyber attackers are getting more savvy and are coming up with new phishing techniques that are harder to spot
Hive ransomware gang leaks data stolen during Tata Power cyberattack (TechCrunch) The leaked data so far includes sensitive employee information and internal corporate documents.
Cloudflare and Akamai experience elevated errors and delays (Data Center Dynamics) Looks like it's just one of those days for the Internet
Zscaler outage causing heavy packet loss, connectivity issues (BleepingComputer) A Zscaler service outage is causing loss of connectivity, packet loss, and latency for customers, with no information available as to what is causing the disruption.
WhatsApp is back online after a major two-hour outage (The Verge) WhatsApp is down worlwide.
How a Stolen Phone Can Spawn Phishing Attacks (Cyren) I and my girlfriend were on the train in Switzerland from Lausanne to Bern in the evening. We both had backpacks with us and put them in the overhead compartment above our seats.
Hackers hit cybersecurity conference (The Sydney Morning Herald) The Australian Institute of Company Directors launch of its new set of “cybersecurity governance principles” was left with a bit of a PR problem.
See Tickets discloses 2.5 years-long credit card theft breach (BleepingComputer) Ticketing service provider 'See Tickets' has disclosed a data breach, informing customers that cybercriminals might have accessed their payment card details via a skimmer on its website.
CISA Has Added One Known Exploited Vulnerability to Catalog (CISA) CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This type of vulnerability is a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the "Date Added to Catalog" column, which will sort by descending dates.
October 24th CISA KEV Breakdown | CVE-2022-41352 (Nucleus Security) In this Breakdown, Nucleus experts explore the six vulnerabilities added to the KEV since October 20, 2022
Security Patches, Mitigations, and Software Updates
Apple megaupdate: Ventura out, iOS and iPad kernel zero-day – act now! (Naked Security) Ventura hits the market with 112 patches, Catalina’s gone missing, and iPhones and iPads get a critical kernel-level zero-day patch…
Apple patches another actively exploited iOS, iPadOS zero-day (CRN Australia) Zero-day flaw in iOS and iPadOS.
Delta Electronics InfraSuite Device Master (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: InfraSuite Device Master Vulnerabilities: Deserialization of Untrusted Data, Path Traversal, Missing Authentication for Critical Function 2.
Johnson Controls CKS CEVAS (CISA) 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable Remotely/low attack complexity Vendor: CKS, a subsidiary of Johnson Controls Inc. Equipment: CEVAS Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
Delta Electronics DIAEnergie (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: DIAEnergie Vulnerabilities: Cross-site Scripting, SQL Injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to inject arbitrary code to retrieve and modify database contents and execute system commands.
Hitachi Energy MicroSCADA X DMS600 (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Hitachi Energy Equipment: DMS600 Vulnerability: Reliance on Uncontrolled Component 2. RISK EVALUATION Successful exploitation of this vulnerabilities could allow an attacker to gain unauthorized access to information.
Siemens Siveillance Video Mobile Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Siveillance Video 2022 R2 Vulnerability: Weak Authentication 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to access the application without a valid account.
HEIDENHAIN Controller TNC on HARTFORD Machine (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.1 ATTENTION: Exploitable remotely Vendor: HEIDENHAIN Equipment: HEIDENHAIN TNC 640 controlling a HARTFORD 5A-65E CNC machine Vulnerability: Improper Authentication 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a loss of sensitive data, manipulation of information, and denial-of-service.
Haas Controller (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Haas Automation, Inc Equipment: Haas Controller Vulnerabilities: Missing Authentication for Critical Function, Insufficient Granularity of Access Control, Cleartext Transmission of Sensitive Information 2.
AliveCor KardiaMobile (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.2 ATTENTION: Public exploits are available, low attack complexity Vendor: AliveCor Equipment: KardiaMobile Vulnerabilities: Authentication Bypass by Assumed-immutable Data, Missing Encryption of Sensitive Data 2. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to attackers stealing or faking personal cardiograms or enabling a denial-of-service attack.
Trends
Dragos Industrial Ransomware Analysis: Q3 2022 (Dragos) Ransomware continues to be one of the most threatening financial and operational risks to industrial organizations worldwide during the third quarter of 2022.
Scammers Most Likely to Impersonate DHL, Warns New Brand Phishing Report - Check Point Software (Check Point Software) Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity
Latest SonicWall Intelligence Reveals Unstable Cyber Threat Landscape, Amplifying Concerns for Security Professionals (PR Newswire) Global malware volume tops 4 billion, flat through three quarters Malware attempts dipped 8% in U.S., rose 3% in EMEA Despite 31% decline in global ransomware...
Security Stack: Insight Report (ThreatBlockr) As this report reveals, organizations need a more proactive approach to cybersecurity that includes gathering threat intelligence and gaining awareness of vulnerabilities, rather than depending on reactive solutions. Relentless cyberattacks require real-time intelligence that draws from the very best sources and automated protection that actively defends every moment of every day.
Data Breaches Rise By 70% Globally in Q3 2022 (Infosecurity Magazine) Russia had the most breaches overall and France had the highest breach density
Cybersecurity teams are reaching their breaking point. We should all be worried (ZDNET) Stress and burnout are having a massive impact on cybersecurity teams, leaving people and businesses more vulnerable than ever.
Marketplace
CyberWire and CyberVista merge (CyberWire) B2B audio news leader and online education innovator form the world’s first “news to knowledge” network.
Perygee Raises $4.75M Seed Round to Secure the Supply Chain’s Most Vulnerable IoT and OT Devices (Business Wire) Perygee, the company providing a lightweight and complete security platform for Internet of Things (IoT) and Operational Technology (OT), today announ
Valence Security Announces $25M Series A to Scale Delivery of Collaborative SaaS Security Remediation Solutions to Customers (Valence Security) In just under a year since exiting stealth in 2021, Valence Security, the industry leader in SaaS security remediation, is announcing its $25 million Series A round led by Microsoft’s M12 venture fund with participation from seed investor YL Ventures and additional investors including Porsche Ventures, Akamai Technologies, Alumni Ventures and Michael Fey, CEO of Island and former president of Symantec. This new investment round brings Valence’s total funding to $32 million.
How Norton's Acquisitions Changed the Antivirus Industry (Make Use Of) Avira, Avast, BullGuard, and beyond: Norton has taken over loads of companies in the past, so how have these affected the wider antivirus industry?
senhasegura Authorized as a CVE Numbering Authority (CNA) (Business Wire) senhasegura Authorized as a CVE Numbering Authority (CNA); PAM provider joins a select group at CVE® Program to catch cybersecurity vulnerabilities
Delinea Appoints Timothy Puccio as Senior Vice President of Global Channels and Alliances (PR Newswire) Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, today announced the appointment of Timothy...
Fortress Names Cybersecurity Industry Leader as Chief Revenue Officer (PR Newswire) Nick Nilan has been named Chief Revenue Officer (CRO) of Fortress Information Security, America's leading supply chain cybersecurity provider...
Avint Names Former CACI Exec Dr. Suresh Subbaratinam as Chief Technology Officer (PR Newswire) Avint LLC, a fast-growing federal cybersecurity and management consulting firm, today announced the hiring of Dr. Suresh Subbaratinam as CTO....
Egnyte Appoints Johnna Bowley, Vice President of Global Channel Sales (PRWeb) Egnyte, the secure platform for content collaboration and governance, today announced the appointment of Johnna Bowley to its sales leadership team
BIT Systems Exec Susan Indermill Named Strategic National Initiatives Director at CACI (ExecutiveBiz) Looking for the latest Government Contracting News? Check out our story: BIT Systems Exec Susan Indermill Named Strategic National Initiatives Director at
Lisa Cole Joins Cellebrite as Chief Marketing Officer (GlobeNewswire News Room) PETAH TIKVA, Israel and TYSONS CORNER, Va., Oct. 24, 2022 (GLOBE NEWSWIRE) -- Cellebrite DI Ltd. (Nasdaq: CLBT), a global leader in Digital...
Products, Services, and Solutions
ESET Refreshes Consumer Products to Mitigate Advanced Cyber Threats and Improve User Experience (ESET) ESET Refreshes Consumer Products to Mitigate Advanced Cyber Threats and Improve User Experience
The Cybersecurity Assessor and Instructor Certification Organization Launches Certified CMMC Professional Exam (Business Wire) The CAICO launches Certified CMMC Professional Exam.
Votiro Cloud Unveils RetroScan Feature to Deliver Threat Analytics Into All Prevented Cyber Threats (Business Wire) Votiro launches RetroScan feature to provide valuable threat intelligence detailing how many threats were prevented by Votiro and what they were.
Baltimore/Washington International Thurgood Marshall Airport Selects Telos to Process Background Checks for Aviation Workers (Telos Corporation) Ashburn, Va. – October 25, 2022– Telos Corporation (NASDAQ: TLS), a leading provider of cyber, cloud, identity and enterprise security solutions for the world’s most security-conscious organizations, today announced that the Maryland Aviation Administration has contracted with Telos to provide the Transportation Security Administration (TSA)-approved Designated Aviation Channeling (DAC) service for processing worker background checks at Baltimore/Washington International Thurgood Marshall Airport...
Illumio CloudSecure And Illumio Core Now Available in Microsoft Azure Marketplace (GlobeNewswire News Room) Global Azure customers can now accelerate their Zero Trust journeys and stop breaches from spreading across hybrid IT with Zero Trust Segmentation...
Armis Now Available in AWS Marketplace (Armis) Relationship simplifies the procurement, provisioning, and governance of the Armis asset visibility and cybersecurity platform.
Make Better Cybersecurity Decisions with Trusted Data Analytics (Bitsight) Marsh McLennan Study Finds Statistically Significant Correlation Between BitSight Analytics and Cybersecurity Incidents
Noname Security Announces Partnership with Health Insurance Leader Aflac (Noname Security) Noname Security announces partnership with Aflac, the leading provider of supplemental health insurance in the United States, to protect Aflac’s global estate of APIs.
Akamai Announces Next Generation DDoS Defense Platform (Akamai) Upgrade Boosts Akamai’s Dedicated Mitigation Capacity by 100% and Enhances Attack Fighting Capabilities for Increasingly Sophisticated DDoS Threats
StackHawk Makes Shifting Security Left a Reality, Integrates DAST into GitHub PR Workflows (PR Newswire) StackHawk, the company making application security testing part of software delivery, today announced GitHub Pull Request Checks, a new feature...
TAG Cyber Study of Security Automation Reveals 240% ROI for… (Swimlane) Swimlane , the low-code security automation company, today announced findings from a newly published analysis of the Swimlane Turbine platform conducted by TAG Cyber. The “ Return on Investment (ROI) Analysis of Swimlane Security Automation ” revealed that large…
CybeReady Unveils Manager’s Program to Enhance Cybersecurity Culture Across All Organizational Levels (EIN News) Manager’s Program Tool Delivers On-Demand Reports with Benchmark Data Between Departments, Monthly Snapshots of Department Performance and More
GitLab Security and Governance Solution Helps Secure Organizations’ End-to-End Software Supply Chains (GlobeNewswire News Room) The One DevOps Platform enables organizations to stay ahead of threat vectors, maintain compliance posture, and deliver secure software faster...
Revelstoke launches Revelstoke Express Partner Program (Revelstoke SOAR) Revelstoke Express Partner Program expands the company's partnerships through value-added partners, service providers, and alliance partners
PlainID Partners with Leading Data Integration and Management Provider Denodo (PR Newswire) PlainID, The Authorization Company™, the leading provider of authorization and policy-based access control, has announced a strategic...
Sonatype and CyberRes Fortify Expand Partnership to Provide Complete Application Security Solution (GlobeNewswire News Room) Expanded and Revitalized Solution Set Brings Greater Opportunities for Customers...
Lacework Brings Its CNAPP Solution To Google Cloud's Chronicle Security Operations (PR Newswire) Lacework, the data-driven cloud security company, today announced a new integration with Google Cloud's Chronicle Security Operations, bringing...
Technologies, Techniques, and Standards
CISA Upgrades to Version 2.0 of Traffic Light Protocol in One Week – Join Us! (CISA) On Nov. 1, 2022, CISA will upgrade from Traffic Light Protocol (TLP) 1.0 to TLP 2.0 in accordance with the recommendation by the Forum of Incident Response Security Teams (FIRST) that organizations move to 2.0 by the end of 2022. TLP Version 2.0 brings the following key updates:
Why Employers Should Embrace Competency-Based Learning in Cybersecurity (NIST) There is a growing movement toward increasing the use of competency and skills-based education and hiring practices
Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate (PR Newswire) Rezilion, an automated vulnerability management platform accelerating software security, announced today the release of the company's...
HR Departments Play a Key Role in Cybersecurity (Dark Reading) A more secure organization starts with stronger alignment between HR and the IT operation.
NSA’s new ‘nerve center’ ready to scan the world for threats to America (The Washington Times) The National Security Agency, which is in the middle of moving into a new “nerve center” on its Fort Meade campus, says it is still ready for whatever foreign threat may emerge against the Nov. 8 midterm elections.
The Government’s Most Secretive Agency Is Spilling Its Secrets (The Daily Beast) During the pandemic the notoriously secretive intelligence agency revamped its museum, which displays machines used to decode enemy messages in wartime.
Design and Innovation
The Crypto Story (Bloomberg) Where it came from, what it all means, and why it still matters.
Research and Development
U. researchers’ cryptography algorithm selected as national standard (The Brown Daily Herald) In July, the National Institute of Standards and Technologies selected four cryptography algorithms as national standards for public key security in order to prepare for an era of quantum computers, which uses quantum physics for more powerful computing and will compromise the security of current algorithms. Three of the four selected algorithms are based on technology developed by NTRU Cryptosystems, Inc., which was founded by a team of University researchers in 1996.
Academia
K-8 students learn cybersecurity through gamification (Security Magazine) K-8 students can learn cybersecurity techniques through a gamified education platform called Cyber Legends. Learn more in this case study.
Legislation, Policy, and Regulation
Biden and Sunak vow to support Ukraine and counter China in first call (the Guardian) US president and new British PM reaffirm ‘special relationship’ after Sunak becomes Britain’s third leader in 2022
Australia to tighten privacy laws, increase fines after series of data breaches (The Record by Recorded Future) Australia plans to strengthen its online privacy laws following several major data breaches, attorney-general Mark Dreyfus said in a statement on Saturday.
Proposed privacy breach fines could exceed $50 million (CRN Australia) Privacy Act amendments land in parliament.
Chinese Hackers Exploit Gaps in US Intelligence Sharing, Senator Says (Bloomberg) Senator Wyden wants FTC officials to have access to US secrets
Wyden: FTC Privacy Regulators Need Top Security Clearances and Classified Briefings to Protect Americans from Foreign Hacking Threats | U.S. Senator Ron Wyden of Oregon (Ron Wyden, United States Senator from Oregon) In Letter to Federal Trade Commission and the Office of the Director of National Intelligence, Wyden Calls for FTC Officials To Receive Access to Classified Threat Intelligence About Cybersecurity Threats; Regulators Need Best Information About Security Risks To Protect Americans
The FTC is doing more to protect data, but to some it’s still not enough (Washington Post) There’s a debate over how aggressive the FTC should be to protect data
Readout of Cybersecurity Executive Forum on Electric Vehicles and Electric Vehicle Charging Infrastructure Hosted by the Office of the National Cyber Director - The White House (The White House) This morning, the Office of the National Cyber Director (ONCD) convened government and private-sector leaders in a forum focused on cybersecurity issues in the electric vehicle (EV) and electric vehicle supply equipment (EVSE) ecosystem. This forum occurred as part of a larger series of executive-level meetings targeting various sectors, most recently a healthcare-focused event in…
CISA’s Wales says industry engagement on incident reporting rule will be robust, meet expectations (Inside CyberSecurity) Participation in CISA’s ongoing incident reporting listening sessions is in line with expectations, according to CISA executive director Brandon Wales, who spoke with Inside Cybersecurity in a wide-ranging interview on the upcoming regulation and stakeholder engagements.
OPM's Ahuja gets an earful from agencies over enhanced pay for cyber talent (FCW) The Director of the Office of Personnel Management is navigating the intense competition among federal agencies for in-demand cybersecurity workers.
CISA Seeks Feedback on Baseline Measures to Secure Cloud Configuration (Nextgov.com) Initial baselines address Microsoft services, and baselines for configuring rival services from Google are up next.
Litigation, Investigation, and Law Enforcement
The Supreme Court case that could change the internet (The Record by Recorded Future) Nohemi Gonzalez was killed in the 2015 ISIS attacks in Paris and now is at the heart of a Supreme Court case that will reconsider Section 230, part of a 1995 law shielding social media companies from liability. This week, the Click Here podcast explains Gonzalez v. Google, a case that could allow users to sue tech companies that use algorithms to sort through their content.
Google Enters Into Stipulated Agreement to Improve Legal Process Compliance Program (US Department of Justice) The Department of Justice today filed a stipulation and agreement resolving a dispute with Google over the loss of data responsive to a search warrant issued in 2016.
Optus customer site was on cybersecurity blacklist (Independent Australia) Following one of Australia's biggest cyber hacks, a shocking revelation of Optus' lax attitude to security has been discovered.
I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself? (the Guardian) Experts suggest using multifactor authentication and telling your bank to put extra security checks in place
Expert says Medibank should pay ransom as all customer's data exposed (Breaking Australian and World News Headlines - 9News) All customers - including ahm and international - had their personal data exposed to hackers in the recent ...
Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation (US Department of Justice) Dedicated Website (Raccoon.IC3.gov) Announced to Assist in Identifying Malware Victims
US Indicts Ukrainian for 'Raccoon Stealer' Malware That Hit Millions of Computers (PCMAG) The Justice Department estimates the Windows-based malware helped cybercriminals steal over 50 million unique credentials and forms of identification, such as bank account details.
Chinese Huawei ‘Spies’ Charged — FBI is Mad as Hell (Security Boulevard) The Chinese government sent two spies to extract information about the U.S. case against Huawei. But they didn’t expect their contact to be a double agent.
The Hunt for the Dark Web’s Biggest Kingpin, Part 1: The Shadow (WIRED) AlphaBay was the largest online drug bazaar in history, run by a technological mastermind who seemed untouchable—until his tech was turned against him.
‘Deepfakes’ of Celebrities Have Begun Appearing in Ads, With or Without Their Permission (Wall Street Journal) Digital simulations of Elon Musk, Tom Cruise, Leo DiCaprio and others have shown up in ads, as the image-melding technology grows more popular and presents the marketing industry with new legal and ethical questions.