Dateline
Ukraine at D+298: Saving bullets, not bodies? (CyberWire) Russia may be planning to expend manpower to conserve munitions. Ukraine warns of the prospect of a Russian winter offensive. Russia's cyber operations' negligible success probably represent a systemic problem--more severe in Russia, but not unique to Russia, either.
Russia-Ukraine war live: Putin arrives in Belarus for talks with Lukashenko; air raid alerts across Kyiv and most of Ukraine (the Guardian) Russian president lands in Minsk; officials announce air raid alerts after nine Iranian-made drones shot down in capital, say officials
Russian troops 'set up dragon's teeth' in Melitopol over fear of street battles (The Telegraph) Russian troops are reportedly setting up triangular concrete blocks known as 'dragon's teeth' on the streets of Melitopol in anticipation of street battles.
Russian War Report: Fierce fighting in Donetsk despite the onset of winter (Atlantic Council) As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains.
Russian Missile Barrage Knocks Out Power to Ukrainian Cities (Bloomberg) A salvo of more at least 76 Russian missiles knocked out power and water across Ukraine as President Vladimir Putin’s forces continued their campaign of attacking infrastructure.
Russian shelling targets heart of city of Kherson (Military Times) Russian military forces have shelled the center of Kherson, the major city in Ukraine that Russian soldiers retreated from last month.
Russia-Ukraine war live: Kherson city without electricity after Russian shelling, says regional chief (the Guardian) Power grid reportedly down after heavy shelling; Zelenskiy adviser says ‘unknown drone’ struck a military facility in western Russia
Ukraine Says Russia Is Training Soldiers for Possible New Offensive (New York Times) An adviser to President Volodymyr Zelensky urged Western allies to take seriously the threat of a new Russian onslaught, which could include mass infantry attacks.
Russia preparing large-scale offensive deep into Ukraine as far as Kyiv (The Telegraph) Ukrainian forces have hit the centre of occupied Donetsk with the biggest wave of strikes since 2014
Russia ‘may try to re-enact its early invasion plans of Ukraine on anniversary of war’ (the Guardian) Military commander warns Moscow may again try to seize Kyiv after invading from Belarus in the north
Russia-Ukraine war: Kyiv ‘preparing’ for Russia to invade from north, says commander – as it happened (the Guardian) Military commander predicts ‘possible offensive from Belarus at the end of February’, as air raid sirens reported in several regions including Kyiv, Lviv, Mykolaiv and Volyn
Russia’s new defensive lines may appear daunting - but looks can be deceiving (The Telegraph) While new satellite images show how extensive the obstacle belts are, if not utilised correctly, they’re more trouble than they’re worth
Ukraine-Russia war latest: Russia launches major missile attack on Kyiv and Kharkiv (The Telegraph) Morgues have become so overrun in the occupied city of Melitopol after Ukrainian missile strikes that Russians are being forced to send corpses 200 miles away to Crimea.
Key Ukrainian city's rapid fall leaves unanswered questions (AP NEWS) When about 100 Russian troops rolled into Kherson's Lilac Park on the morning of March 1, Oleh Shornik was one of about 20 lightly armed Ukrainian volunteers who didn't stand a chance against them.
Russia’s New Theory of Victory (Foreign Affairs) Christmas Day will be a grim milestone for the Ukrainian people. It will mark almost exactly ten months since Russian forces crossed into their country, bringing devastation on a scale not seen in Europe since World War II. Tens of thousands of Ukrainians have been killed. Millions have fled their homes. Most of the state has lost power, leading Kyiv to worry that—as winter sets in—many of its citizens will freeze.
Russia to scrap punishments for crimes in occupied Ukraine if ‘in interest of Russian Federation’ (The Telegraph) Offences ‘will not be considered a crime punishable by law’ if they have been carried out ‘to protect the interests’ of Russia
Patriot missile system not a panacea for Ukraine, experts warn (Breaking Defense) “We need to be careful about these scarce precious assets,” said Tom Karako, a missile defense expert with the Center for Strategic and International Studies. “While we're only sending one battery, once it's there, it's probably not going to come back."
Ukraine soldier achieves ‘the impossible’ by downing cruise missile with machine gun (The Telegraph) Ukrainian forces destroyed 60 of the 76 missiles that Russia launched on Friday, as the country’s power grid again came under heavy attack
Putin shown rallying top generals for fresh ideas as rumours of his increasing unpopularity grow (The Telegraph) Russian president's cancellation of high-profile press conference and ice hockey match have added to talk he is unwilling to face public
Putin Makes Rare Visit to Ukraine War Headquarters (New York Times) The meetings with his top brass seemed to signal a shift from his largely hands-off public posture to one conveying a more active role in war planning.
Putin’s War: The Inside Story of a Catastrophe (New York Times) Secret battle plans, intercepted communications and Russian soldiers explain how a “walk in the park” became a catastrophe for Russia.
A Russian tank unit deliberately attacked another Russian position in Ukraine, report says, illustrating vicious rivalries within Putin's army (Business Insider) The Russian attack on an allied group after an argument clearly showed the tensions that have been widely reported in the Russian war effort.
Russia received new batch of Iranian Shahed drones – Ukraine intel (Euromaidan) Russia has resumed strikes on Ukraine with Iranian Shahed kamikaze drones due to a new batch, but is using them more sparingly, representative of Ukraine’s Main Directorate of Intelligence (GUR) of the Ministry of Defense Andriy Yusov said on the air of the national telethon, as cited by Ukrainska Pravda.
Why International Aid to Ukraine Should Be Provided Without Delay (Wilson Center) In September, Russia started air attacks on Ukraine's power infrastructure. Since October 10, these attacks have become massive, happening almost every week across the country. According to officials’ statements, more than a half of Ukraine's power system is damaged. The power deficit is about 20 to 30 percent on average, but higher in some regions, like 33 to 38 percent in Kyiv.
We need you, Zelensky tells Rishi Sunak as 'he senses British support could decline' (The Telegraph) Ukraine said to be increasingly concerned UK is getting more cautious after PM commissions progress report into war
UK’s PM Sunak to announce $304m in new military aid for Ukraine (Al Jazeera) PM’s office says the new package will include ‘hundreds of thousands of rounds of artillery’ for use against Russia.
A Million Shells and More: Pentagon Revs Up Ukraine Weapons Aid and Bolsters Stockpiles (Bloomberg) From Patriot systems to NASAMS, a need to bolster stockpiles. Effort to repeat Covid pandemic’s ‘Warp Speed’ approach.
White House leans on Congress, rallies allies, to aid Ukraine through winter of war (POLITICO) Republicans threaten to trim funding, but will they prevail?
Germany delivers additional IRIS-T SLM surface-to-air missiles to Ukraine (Army Recognition) The German MoD (Ministry of Defense) announced on December 15, 2022, the delivery of more IRIS-T SLM surface-to-air missiles to Ukraine. The IRIS-T SLM is a surface-to-air defense missile system designed and manufactured by the German company Diehl Defence.
This DC party invite shows all the money to be made off the Ukraine war (Vox) A Ukrainian Embassy reception, sponsored by America’s biggest weapons makers.
Putin to Make Rare Visit to Belarus for Talks With War Ally (Bloomberg) Lukashenko, Putin to discuss security in Minsk on Monday. Belarus allowed Russia to invade Ukraine from its territory.
Fears Belarus will be drawn into Ukraine war as Putin meets Lukashenko (the Guardian) Belarusian leader stresses country’s independence as Russian president makes first visit since 2019
Could Putin Use Nuclear Weapons to Defend Crimea from Ukriane? (19FortyFive) Could Putin Use Nukes to Defend Crimea? Following reports of Western officials casting doubt on Ukraine’s ability to retake control of Crimea, NBC News claimed on Friday that a Biden administration recently told members of Congress that Ukraine has the military capability to achieve the goal. Two unnamed U.S. officials familiar with the matter told […]
Ukraine Latest: Energy Infrastructure Is Focus of US Envoy Visit (Bloomberg) Geoffrey Pyatt, assistant US secretary of State for Energy Resources, is leading a delegation to Kyiv on a visit intended to further efforts to repair and strengthen Ukraine’s energy infrastructure, the US Embassy said in a statement.
Russian man taken to draft office after advertising jacket for sale (The Telegraph) The 21-year-old selling a winter coat was confronted by investigators who marched him away and declared him fit for service
New supply chain attack targeted Ukrainian government networks (The Record by Recorded Future) Hackers have been targeting Ukrainian government networks with a new supply chain attack using fake Windows installers.
CISA researchers: Russia's Fancy Bear infiltrated US satellite network (CyberScoop) The agency said it discovered the Russian hacking group in a satellite communications provider with critical infrastructure customers.
2022 Cyber Review: The Year the Ukraine War Shocked the World (GovTech) This past year will be remembered as another year of ransomware attacks, data breaches impacting critical infrastructure and, most of all, global cybersecurity impacts from the Russian war with Ukraine.
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications (Carnegie Endowment for International Peace) Russia’s cyber operations in Ukraine have apparently not had much military impact. This was probably for a multitude of reasons: Russia’s offensive limitations, as well as the defensive efforts of Ukraine and its partners; the particular context of this war, as well as structural features of cyberspace and warfare generally.
Whatever Happened to Russia’s Vaunted Cyberoffensive? (Foreign Policy) The war in Ukraine is more about artillery shells than cyberexploits—for now.
How open-source intelligence has shaped the Russia-Ukraine war (GOV.UK) General Hockenhull, Commander Strategic Command, discussed the use of open source intelligence at a RUSI Members Webinar.
Front-line video makes Ukrainian combat some of history’s most watched (Washington Post) User-generated content has been essential to coverage of the war in Ukraine since it began in February. Soldiers, civilians, aid workers and other witnesses have posted footage of fighting and destruction in real time, making this war one of history’s most visually documented.
Drones critical to US info-warfare playbook, Air Force’s Kennedy says (Defense News) Military adoption and deployment of drones has ballooned in recent years, with the Russia-Ukraine war pushing their use into the popular spotlight.
Readout of Under Secretary of Defense for Intelligence and Security Ronald S. Moultrie’s Meeting With the Lithuanian Minister of National Defence Arvydas Anušauskas (U.S. Department of Defense) Under Secretary of Defense for Intelligence and Security Ronald S. Moultrie met with the Lithuanian Minister of National Defence, Arvydas Anušauskas.
Lithuania signs $495 million deal to buy HIMARS, ATACMs (Defense News) Lithuania and the U.S. have finalized a $495 million deal for as many as eight M142 High Mobility Artillery Rocket Systems.
Israel eyeing kinetic, non-kinetic options to disrupt Iran-Syria cargo flights (Breaking Defense) Mordechai Kedar, an Israeli senior expert on Iranian and Middle Eastern issues, told Breaking Defense that the new relations between Iran and Russia has encouraged Tehran to restart the cargo flights from Iran to Syria. "They feel good with their new friend and that explains their recent moves,” he said.
Under U.N. Pressure, EU Seeks to Unblock Transit of Russian Fertilizers (Wall Street Journal) The European Union implemented a new sanctions package on Russia that officials hope will significantly relieve food-security problems facing developing and poor countries.
Putin's next big gambit will be to starve the West's economies of oil (The Telegraph) Putin has shown he is willing to sacrifice his gas industry for an anachronistic land-grab
'I saw many tears in the soldiers’ eyes': War-ravaged Ukraine finds solace in the Bible (The Telegraph) Ukrainian Bible Society says demand has more than doubled since Russia’s invasion as many look for divine guidance or protection
Attacks, Threats, and Vulnerabilities
Chinese APT Group MirrorFace Interferes in Japanese Elections (Dark Reading) The MirrorFace group has deployed popular malware LodeInfo for spying and data theft against certain members of the Japanese House of Representatives.
Nozomi Networks Researchers Track Malicious Glupteba Activity Through the Blockchain (Nozomi Networks) This blog presents how Glupteba hides its C&C domains in the bitcoin blockchain, presenting various campaigns over the years.
Glupteba malware is back in action after Google disruption (BleepingComputer) The Glupteba malware botnet has sprung back into action, infecting devices worldwide after its operation was disrupted by Google almost a year ago.
Glupteba botnet is back after Google disrupted it in December 2021 (Security Affairs) The Glupteba botnet is back, researchers reported a surge in infection worldwide after Google disrupted its operation in 2021. In December 2021, Google announced it has taken down the infrastructure operated by the Glupteba botnet, it also sued Russian nationals Dmitry Starovikov and Alexander Filippov for creating and operating the botnet. The blockchain-enabled botnet has been […]
Colombian energy supplier EPM hit by BlackCat ransomware attack (BleepingComputer) Colombian energy company Empresas Públicas de Medellín (EPM) suffered a BlackCat/ALPHV ransomware attack on Monday, disrupting the company's operations and taking down online services.
Events D.C. data published online in apparent ransomware attack (Washington Post) Nearly two months after D.C.’s official convention and sports authority said it was the victim of a cyberattack that may have compromised sensitive information about its employees, a ransomware group now appears to have published a tranche of data and documents from the agency on the dark web.
FBI, FDA OCI, and USDA Release Joint Cybersecurity Advisory Regarding Business Email Compromise Schemes Used to Steal Food (CISA) The Federal Bureau of Investigation (FBI), the Food and Drug Administration Office of Criminal Investigations (FDA OCI), and the U.S. Department of Agriculture (USDA) have released a joint Cybersecurity Advisory (CSA) detailing recently observed incidents of criminal actors using business email compromise (BEC) to steal shipments of food products and ingredients valued at hundreds of thousands of dollars.
Cybercriminals’ latest grift: powdered milk and sugar by the truckload (The Record by Recorded Future) Cybercriminals are increasingly targeting companies in the food and agriculture sector with business email compromise (BEC) schemes.
DarkTortilla malware spreads on phishing sites masquerading as legitimate domains (SC Media) The .Net-based DarkTorilla malware has been around since 2015 and has been best known for dropping malware stealers and remote access trojans.
Microsoft warns of new Minecraft DDoS malware infecting Windows, Linux (BleepingComputer) A new cross-platform malware botnet named 'MCCrash' is infecting Windows, Linux, and IoT devices to conduct distributed denial of service attacks on Minecraft servers.
Hacker Halts Sale of FBI's High-Profile InfraGard Database (HackRead) Apparently, there has been a change of heart by the hacker.
Kaspersky uncovers new World Cup scams heading into final (GlobeNewswire News Room) Kaspersky researchers have shared an update on World Cup-related scams as the tournament final approaches. ...
Cyber Threats Loom as 5B People Prepare to Watch World Cup Final (Dark Reading) The 2022 FIFA Men's World Cup final in Qatar will be the most-watched sporting event in history — but will cybercriminals score a hat trick off its state-of-the-art digital footprint?
Cybercriminals Leverage File-Based Attacks to Infiltrate Critical Networks (Security Boulevard) According to Verizon’s 2022 Data Breach Investigations Report, office docs and emails continue to be proven ways that cybercriminals deliver harmful
CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks (IT Security News) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities impacting Veeam Backup & Replication software to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation in the wild. The now-patched critical flaws, tracked as CVE-2022-26500 and CVE-2022-26501, are both rated 9.8 on the CVSS scoring system, and could be leveraged to This article
Gamers Beware: Cybercriminals Are Coming for You Next (CNET) Cybercriminals find new targets as the amount of data collected by companies continues to grow.
New Zealand Archives Breach – Months To Notify Individuals (Scoop News) Urgency and care are always needed when a data breach occurs. There are lessons to be learned from the Archives New Zealand data breach that resulted in records containing sensitive health information being made publicly accessible, says Privacy ...
Fire Rescue Victoria blames cyberattack for dispatch system outage (The Age) Fire Rescue Victoria says it was the victim of a cyberattack that disrupted emails and its dispatch system, forcing firefighters to rely on radios and mobile phones.
Australian fire service operating 85 stations shuts down network after cyberattack (The Record by Recorded Future) Australia’s fire and rescue service in the state of Victoria has shut down its network and is operating manually after being targeted with a cyberattack.
Restaurant CRM platform ‘SevenRooms’ confirms breach after data for sale (BleepingComputer) SevenRooms, a restaurant CRM software and guest manRestaurant customer management platform SevenRooms has confirmed it suffered a data breach after a threat actor began selling stolen data on a hacking forum.agement service provider, has admitted it has suffered a data breach, result of a security incident on one of its vendors.
Up to 254,000 Medicare beneficiaries are getting new ID cards due to data breach at subcontractor. What they need to know (CNBC) Medicare officials said 254,000 beneficiaries may have had identifying information exposed in a ransomware attack that occurred in October.
Latest Uber Breach Underscores Third-Party Vendor Security Challenges (CyberArk) Uber is back in the spotlight, this time for a breach involving a third-party vendor. According to reports, an attacker accessed the vendor organization’s public cloud backup server, obtaining and...
Clearview Public Schools experiences data breach on Indeed.com (rdnewsnow.com) Clearview Public Schools is dealing with a data breach they say may have impacted at least 800 people.The brea...
Dallas Central Appraisal District launches new ‘bare bones’ site as cyber attack continues (Dallas News) The Dallas Central Appraisal District, responsible for determining property values in the county, has been hobbled by a cyber ransomware attack for the past...
Mobile Security: What to look out for this Christmas (Salt | Secure Communications) Christmas is less than a week away, so you need to make sure you take the right security precautions for your company, especially for their smartphones. It’s essential to make sure you adhere to good security procedures because many offices, warehouses, and manufacturing facilities close over the holiday season. You won’t find French Hens or […]
Security Patches, Mitigations, and Software Updates
Microsoft: No optional Windows Updates this month due to holidays (BleepingComputer) Microsoft has confirmed that Windows Update won't offer optional updates in December, with the software giant only focusing on security updates due to the holiday season.
New Keeper Update Adds iOS Features to Boost Your Security (Lifewire) Cybersecurity app Keeper just launched an iOS update with Siri shortcuts that allow you to voice control some of Keeper's features as well as new sharing options that let you share important information with others even if you, or they, don't use Keeper.
Client-side encryption for Gmail available in beta (Google Workspace Updates) What’s changing We’re expanding customer access to client-side encryption in Gmail on the web. Google Workspace Enterprise Plus, Education ...
Google Adds End-To-End Encryption To Gmail On The Web (Digital Information World) Google has made it clear that it’s picking up the pace in terms of beefing up security measures regarding Gmail on the web.
Samba Releases Security Updates (CISA) The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following Samba security announcements and apply the necessary updates.
CISA Releases Forty-One Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) CISA has released forty-one (41) Industrial Control Systems (ICS) advisories on 15 December 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
Prosys OPC UA Simulation Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Prosys OPC Equipment: UA Simulation Server Vulnerability: Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to obtain credentials and gain access to system data.
Siemens SCALANCE X-200RNA Switch Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits available Vendor: Siemens Equipment: SCALANCE Vulnerabilities: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS), Uncontrolled Resource Consumption, Use of Insufficiently Random Values, Improper Access Control, Exposure of Sensitive Information to an Unauthorized Actor 2.
Siemens Multiple Denial of Service Vulnerabilities in Industrial Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC Products, TIM 1531 IRC Vulnerabilities: Improper Input Validation, Improper Validation of Specified Quantity in Input, Improper Validation of Specified Type of Input, Improper Validation of Syntactic Correctness of Input 2.
Siemens Multiple Vulnerabilities in SCALANCE Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: RUGGEDCOM and SCALANCE devices Vulnerabilities: Code Injection, Use of a Broken or Risky Cryptographic Algorithm, Storing Passwords in a Recoverable Format, Improper Validation of Specified Quantity in Input, Improper Control of a Resource Through its Lifetime 2.
Siemens SIMATIC WinCC OA Ultralight Client (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC WinCC OA Ultralight Client Vulnerability: Argument Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated remote attacker to inject arbitrary parameters when starting the Ultralight Client via the web interface.
Siemens Simcenter STAR-CCM+ (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Simcenter STAR-CCM+ Vulnerability: Incorrect Permission Assignment for Critical Resource 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges.
Siemens Polarion ALM (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Polarion ALM Vulnerability: Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform host header injection attacks.
Siemens Products affected by OpenSSL 3.0 (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity/public exploits available Vendor: Siemens Equipment: Calibre ICE, Mcenter, SCALANCE X-200RNA switch family, SICAM GridPass, SIMATIC RTLS Locating Manager Vulnerabilities: Classic Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could allow for a denial of service or remote code execution.
Siemens APOGEE/TALON Field Panels (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: APOGEE PXC/TALON TC Vulnerabilities: Predictable Exact Value from Previous Values 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to hijack existing sessions or spoof future sessions.
Siemens SIPROTEC 5 Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIPROTEC 5 Vulnerabilities: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration.
Siemens Parasolid (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Parasolid Vulnerabilities: Out-of-bounds Write, Out-of-bounds Read 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
Siemens Mendix Workflow Commons (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Mendix Workflow Commons Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow authenticated remote attackers to read or delete sensitive information.
Siemens SISCO MMS-EASE Third Party Component (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SISCO MMS-EASE third party component Vulnerability: Resource Management Errors 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attackers to cause a denial-of-service condition on affected SIPROTEC 5 devices.
Siemens Teamcenter Visualization and JT2Go (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Teamcenter Visualization and JT2Go Vulnerabilities: Stack-based Buffer Overflow, Heap-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer 2.
Siemens APOGEE and TALON (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: APOGEE and TALON Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a low privilege authenticated attacker to gain high privilege access.
Siemens Mendix Email Connector (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Mendix Email Connector Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated remote attacker to read and manipulate sensitive information.
Siemens SCALANCE SC-600 Family (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE SC-600 Family Vulnerability: Out-of-bounds Write, Use After Free, Allocation of Resources Without Limits or Throttling 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a denial-of-service condition, corrupt memory, or potentially execute custom code.
Siemens SICAM PAS (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SICAM PAS Vulnerabilities: Uncontrolled Search Path Element, Improper Validation of Specified Type of Input, Cleartext Transmission of Sensitive Information 2.
Siemens Teamcenter Visualization and JT2Go (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Teamcenter Visualization and JT2Go Vulnerabilities: NULL Pointer Dereference, Out-of-bounds Write, Out-of-bounds Read, Use After Free, Divide by Zero, Allocation of Resources Without Limits or Throttling. 2.
Siemens SCALANCE X-200RNA Switch Devices (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: SCALANCE X-200RNA switch devices before V3.2.7
Vulnerabilities: Observable Timing Discrepancy; Race Condition; Improper Restriction of Operations within the Bounds of a Memory Buffer; Improper Input Validation; NULL Pointer Dereference; Use After Free; Cryptographic Issues;
Siemens SCALANCE X Switches (Update C) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE X200, X200IRT, X300 Vulnerabilities: Use of Hard-coded Cryptographic Key 2.
Siemens SCALANCE X Switches (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SCALANCE X Switches Vulnerability: Missing Authentication for Critical Function 2. UPDATE INFORMATION This updated advisory is a follow-up to the original advisory titled ICSA-20-014-03 Siemens SCALANCE X Switches that was published January 14, 2020, to the ICS webpage on www.cisa.gov/uscert.
Siemens SCALANCE X Switches (Update C) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 4.2 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Siemens Equipment: SCALANCE X switches Vulnerability: Protection Mechanism Failure 2. UPDATE INFORMATION This updated advisory is a follow-up to the advisory update titled ICSA-20-042-07 Siemens SCALANCE X Switches (Update B) that was published April 13, 2021, to the ICS webpage on us-cert.cisa.gov.
Siemens RUGGEDCOM Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: RUGGEDCOM Devices Vulnerability: Missing Encryption of Sensitive Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authorized threat actor to obtain privileges to access passwords.
Siemens Industrial Products Intel CPUs (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Low attack complexity Vendor: Siemens Equipment: SIMATIC, SINUMERIK Vulnerabilities: Missing Encryption of Sensitive Data 2. UPDATE INFORMATION This updated advisory is a follow-up to the original advisory titled ICSA-21-222-05 Siemens Industrial Products Intel CPU that was published August 10, 2021, to the ICS webpage on www.cisa.gov/uscert.
Siemens SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK (Update J) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.7 ATTENTION: Low attack complexity Vendor: Siemens Equipment: SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK Vulnerability: Unquoted Search Path or Element 2.
Siemens SICAM P850 and P855 Devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SICAM P850 and P855 devices Vulnerabilities: Session Fixation, Improper Neutralization of Parameter/Argument Delimiters 2.
Siemens SCALANCE and RUGGEDCOM Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Multiple SCALANCE and RUGGEDCOM products Vulnerability: Missing Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow low privileged attackers to escalate privileges.
Siemens Mendix SAML Module (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: Mendix SAML Module Vulnerability: Authentication Bypass by Capture-replay 2. RISK EVALUATION Successful exploitation of this vulnerability could allow remote attackers to gain unauthenticated access to the application.
Siemens PROFINET Stack Integrated on Interniche Stack (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: PROFINET Stack Integrated on Interniche Stack Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a denial-of-service condition.
Siemens Nucleus RTOS FTP Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Nucleus Real-Time Operating System (RTOS) FTP Server Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to generate a denial-of-service condition on devices running the affected software.
Siemens Teamcenter Visualization and JT2Go (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.8
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: Teamcenter Visualization and JT2Go
Vulnerabilities: Heap-based Buffer Overflow, Out-of-bounds Write, Out-of-bounds Read, Use After Free, Stack-based Buffer Overflow
Siemens Web Server Login Page of Industrial Controllers (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable Remotely/low Attack Complexity Vendor: Siemens Equipment: SIMATIC Industrial Controllers and Software Vulnerability: Cross-Site Request Forgery (CSRF) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to track the activity of other users.
Siemens OpenSSL Affected Industrial Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Multiple industrial products Vulnerability: Infinite Loop 2. RISK EVALUATION Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.
Siemens Industrial PCs and CNC devices (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Siemens Equipment: Industrial PCs and CNC devices Vulnerabilities: Improper Input Validation, Improper Authentication, Improper Isolation of Shared Resources on System-on-a-Chip, Improper Privilege Management 2.
Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC S7-1500 CPU GNU/Linux subsystem Vulnerabilities: Use of Unmaintained Third-party Components 2. RISK EVALUATION Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution.
Siemens SCALANCE X Switches (Update B) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.8 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: SCALANCE X switches Vulnerabilities: Cross-site Scripting 2. UPDATE INFORMATION This updated advisory is a follow-up to the original advisory titled ICSA-18-163-02 Siemens SCALANCE X Switches that was published January 14, 2020, on the ICS webpage cisa.gov/ics
Siemens Industrial Products (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: OPC Foundation Local Discovery Server of several industrial products Vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service condition on the service or the device.
Siemens KTK, SIDOOR, SIMATIC, and SINAMICS (Update C) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Siemens Equipment: KTK, SIDOOR, SIMATIC, and SINAMICS Vulnerability: Uncontrolled Resource Consumption 2.
Siemens PROFINET Devices (Update L) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: PROFINET Devices Vulnerability: Uncontrolled Resource Consumption 2. UPDATE INFORMATION This updated advisory is a follow-up to the advisory update titled ICSA-19-283-02 Siemens PROFINET Devices (Update K) published on October 14, 2021, to the ICS webpage on cisa.gov/ics.
Trends
Rezilion Research Rounds Up 2022 Vulnerabilities (Rezilion) Rezilion's research team offers a 2022 vulnerabilities recap with a look at the headline-making vulnerabilities discovered in the last year.
WatchGuard's Cybersecurity Predictions (WatchGuard Technologies) 2023 cybersecurity predictions from the WatchGuard Threat Lab, including Zero Trust, space hacks, cyber insurance, password-less authentication, and more
Ok boomer - Palo Alto Networks research finds Baby Boomers better at password reuse than Gen Z (iTWire) With a string of high-profile cyber attacks on Australian businesses in recent months, chances are high that it's going to happen again. Palo Alto Networks research found cyber security awareness still needs work, especially amongst the young: Baby Boomers are 76% more likely to use different pa...
Marketplace
CyberCube Announces $50 Million in Growth Capital Financing to Further Advance Cyber Risk Analytics (CyberCube) CyberCube, the market leader in cyber risk analytics, today announced $50 million in additional growth capital.
MariaDB Completes Merger and Lands on NYSE as “MRDB” (Business Wire) MariaDB announces the closing of its business combination with Angel Pond Holdings Corporation.
The Security Bulldog Chosen for Newchip's Intensive Global Pre-Seed Accelerator Program (PR Newswire) The Security Bulldog, a machine learning powered cybersecurity intelligence platform that enables enterprises to manage their attack surfaces...
Big Tech Laid Off Thousands. Here’s Who Wants Them Next (WIRED) Governments, nonprofits, and small startups hope to scoop up people let go by the likes of Meta and Amazon. It’s their big chance to lure top-tier talent.
Google has trained 40,000 people in cybersecurity so far: Vice President (Business Standard) The firm has committed to upskill 100,000 people, says Royal Hansen, adding that India was very similar to the US and Europe in terms of challenges and work in the domain of cybersecurity
WSJ News Exclusive | TikTok’s Efforts to Distance Itself From Chinese Parent Stumble Over Talent (Wall Street Journal) The short-video app is making big efforts to reduce ties with Beijing-based ByteDance, but it is still hiring staff in China for key functions.
Elon Musk Polls Twitter Users, Asking Whether He Should Step Down (Wall Street Journal) Mr. Musk has led Twitter for a little over seven weeks, after buying the social-media platform in a deal valued at $44 billion.
Musk asks: Should I stay as CEO? (Computing) Elon Musk has launched an online poll asking users to decide whether or not he should step down as the company's CEO.
Elon Musk’s Twitter Poll Shows Users Want Him to Step Down (Wall Street Journal) The poll showed that 57.5% of respondents want him to leave as head of the social-media platform, bringing it fresh uncertainty.
Elon Musk’s Twitter poll: 10 million say he should step down (the Guardian) Billionaire chief executive of Tesla insists there is no successor in the wings at social media platform
Musk unsuspends some reporters on Twitter. But their companies never left. (Washington Post) Despite outrage over a move viewed as hostile to free speech -- even by Musk’s conservative allies -- media companies continued to tweet, in keeping with their conflicted relationship with Twitter.
Twitter Reinstates Some Accounts of Suspended Journalists (Wall Street Journal) Elon Musk said he would lift the suspensions based on the results of a Twitter survey that asked users whether he should keep the accounts offline for a week or reinstate them immediately.
Elon Musk reinstates Twitter accounts of suspended journalists (the Guardian) On a wild day of bans, sudden U-turns and chaotic messaging, Musk abides by Twitter poll result that favoured restoring the accounts of reporters he accused of ‘doxxing’ him
Journalist suspensions widen rift between Twitter and media (AP NEWS) Elon Musk's abrupt suspension of several journalists who cover Twitter widens a growing rift between the social media site and media organizations that have used the platform to build their audiences.
Elon Musk Appeared In A Twitter Space To Defend His Decision To Ban Journalists Who Reported On An Account That Tracked His Private Jet (BuzzFeed News) The embattled Twitter CEO briefly turned up in the Twitter Space hosted by BuzzFeed News tech reporter Katie Notopoulos.
Elon Tries (Badly) To Defend The Banning Of Journalists As Twitter Starts Blocking Links & Mentions Of Mastodon (Techdirt) Look, I fucking warned Elon that this is exactly how it would go. It’s how it always goes. Remember Parler? They promised that they would moderate “based off the FCC and the Supreme cou…
Twitter suspends Mastodon's account and bans links to Mastodon servers (TechCrunch) Twitter suspended Mastodon's account Thursday after the social platform shared a link to someone who tracks Elon Musk's private jet.
No One on Twitter Is Safe From Elon Musk (WIRED) The entrepreneur says he’s cracking down on doxing. Many see his account-blocking spree as self-serving.
Even Elon Musk’s Allies Question Judgment After Link Ban, Account Suspensions (The Information) How chaotic has Elon Musk’s management of Twitter become? So chaotic that even longtime allies have started to get worried about the decision-making of Twitter’s new owner. Musk’s weekend careened from one soap opera to another, culminating in Twitter’s announcement Sunday morning of a new ...
Elon Musk Seeks Additional Funds for Twitter (Wall Street Journal) Ross Gerber, a shareholder in Twitter and Tesla, says he has been approached to put more money into the social-media platform.
Twitter Lays Off Engineers in Infrastructure Org, Days After Leaders Were Fired (The Information) Twitter laid off engineers in its infrastructure organization on Friday evening, reducing the staff in the part of the company that keeps the social media sevice running, according to a person familiar with the situation. The layoffs, which camedays after some leaders in the organization were ...
How Women Can Help Solve the Cyber Staffing Shortage (BizTech) Experts say that IT leaders can find success by investing in female staff and growing diverse teams.
Facebook to pay hackers up to $300,000 to uncover remote code execution bugs (The Record by Recorded Future) Meta has updated its bug bounty program to offer up to $300,000 for reporting bugs allowing attackers to remotely execute code on its apps.
Former TSA Acting Administrator Joins Leidos (WashingtonExec) Leidos has added Darby LaJoye as vice president and strategic account executive for the Department of Homeland Security. LaJoye will be responsible for
Products, Services, and Solutions
Malwarebytes strengthens threat prevention capabilities in Nebula platform (IT Security News) Malwarebytes expands Malwarebytes Nebula platform with additional threat prevention capabilities developed specifically for resource constrained organizations to reduce attack surfaces from a simple, easy-to-use cloud-based interface. The company released Cloud Storage Scanning (CSS) to also protect business-critical assets stored in the cloud and prevent the introduction of malware and other threats into digital ecosystems. “In
VU evolves the personal data paradigm to provide more control and security using Microsoft Entra Verified ID (PR Newswire) VU Inc., a global cybersecurity company with more than 350 million users worldwide, became one of the first global vendors specialized in...
Silobreaker selected as a named supplier for G-Cloud 13 (Silobreaker) For the sixth consecutive year, Silobreaker’s threat intelligence solution has been selected as a named supplier for listing on UK government’s public sector digital marketplace Silobreaker, a leading security and threat intelligence firm, today announces that it has been selected as a named supplier on Crown Commercial Service's (CCS) G-Cloud framework. G-Cloud 13 is the...
Google’s partnership with Palo Alto Networks yields enhancements for zero trust security (SiliconANGLE) Google’s partnership with Palo Alto Networks yields enhancements for zero trust security - SiliconANGLE
Fortinet expands global secure SD-WAN presence with new MSSP partnerships (ACE Times) MSSPs continue to invest in Fortinet Secure SD-WAN for its ability to converge networking and security
Technologies, Techniques, and Standards
Germany Offers Model for Space-Industry Cybersecurity Standards (Wall Street Journal) Cyber threats to the space sector are growing as the industry expands. European companies and officials want global standards to improve cybersecurity.
Protect Yourself from Social Security Scams (SSA) Protect Yourself from Social Security Scams
Keeping your retail business safe from the cyber grinches (CSO Online) It’s not just retailers looking forward to the holiday shopping season; it’s also a time of plenty for cunning cybercriminals.
How AI, Automation, and Zero Trust Can Improve Enterprise Networks (Network World) IT teams have a lot on their plates in terms of managing their organizations’ corporate networks. The good news: certain technologies can help.
Cyber Power Is a Key Element of Sea Power (U.S. Naval Institute) The skillful use of U.S. cyber power will be required to fight and win.
Design and Innovation
The Spawn of ChatGPT Will Try to Sell You Things (WIRED) Companies are exploring how to adapt powerful new chatbot technology to negotiate with customer service—and to persuade humans to buy stuff.
Academia
DTU educating cyber warriors of future (Mirage News) Just as students empty out of the auditoriums and teaching labs around DTU on Wednesday afternoons, the DTU Hackerlab comes to life. Here students
Three Ways Schools Can Fend Off Ransomware Attacks (74 Million) After years of targeting and extorting high-value corporate targets, ransomware attackers have turned to more vulnerable prey — school districts. With less funding, less-than-mature cybersecurity defenses and limited (or even nonexistent) controls over an abundance of sensitive data, educational institutions are prime targets for cybercriminals. As a number of recent notable attacks against school systems […]
Legislation, Policy, and Regulation
The digital future requires making 5G secure (Brookings) From smart cities to smart cars, to smart factories, the future will be built on ubiquitous microchips connected by wireless networks. Fifth generation (5G) technology promises to bring the high-sp…
European Commission Approves Trans-Atlantic Data Privacy Framework (cyber/data/privacy insights) On 13 December 2022, the European Commission issued a draft adequacy decision concluding that the EU-US Data Privacy Framework provides an adequate level of protection for personal data transferred from EU to US companies. Approved by the US following President Joe Biden’s executive order in October
EU warns Elon Musk has crossed 'red line' by suspending journalists (The Telegraph) Brussels vice-president says billionaire could face sanctions after dozens of high-profile reporters had accounts frozen
Germany ups reliance on Huawei for 5G despite security fears -survey (MarketScreener) Germany has become even more dependent on Huawei for its 5G radio access network equipment than in its 4G network despite growing worries about Chinese involvement in critical infrastructure,...
Biden Administration Calls on Congress to Rein In Crypto Risks (Wall Street Journal) A report from regulators renewed previous concerns with cryptocurrency-related vulnerabilities and gaps in oversight.
It’s official: The United States is developing a bank-to-bank digital currency (Atlantic Council) The New York Federal Reserve’s latest project shows the United States making its presence felt in the digital-currency race.
Lawmakers get serious about Cyber Command, NSA's "dual-hat" leadership (Axios) This year's defense policy package includes a provision setting up annual debate on the dual-hat structure.
For the 1st time, a Black female Marine is set to be a 2-star general (Marine Corps Times) Brig. Gen. Lorna Mahlock is on her way to becoming a major general.
Litigation, Investigation, and Law Enforcement
Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges (Federal Trade Commission) The Federal Trade Commission has secured agreements requiring Epic Games, Inc., creator of the popular video game Fortnite, to pay a total of $520 million in relief over allegations the company vio
Epic Games to Pay $520 Million Over Children’s Privacy and Trickery Charges (New York Times) The creator of popular games like Fortnite and Rocket League violated children’s privacy and duped millions of users into unwanted purchases, federal regulators said.
AIIMS cyber attack: Delhi Police seeks information on Chinese hackers through Interpol (India Today) In a letter to the CBI, Delhi Police has asked whether the Chinese IP addresses detected in the AIIMS cyber attack were being used by a company or an individual.
Ethiopia Obtains Phone-hacking Tech From Israeli Firm Cellebrite (Haaretz) As many other repressive regimes, the Ethiopian federal police have been using Cellebrite’s technology at the height of a civil war that caused tens of thousands of casualties and the prosecution of ‘unauthorized’ news outlets
Spyware Firms in Athens Raided after Greece Bans Their Sale (OCCRP) Greek police raided the Athens office of an Israeli company behind the Predator spyware, local media reported, as investigations into a wiretapping scandal that has rocked the country in recent months continue.
EU Court Strengthens "Right to be Forgotten" in Google Case (Taylor | English) In a ruling in early December, the EU's top court (CJEU) decided that search engines must remove "manifestly inaccurate" information from search results...
Protecting People From Online Threats In 2022 (Meta) We’re sharing a number of updates on our work to protect people globally from online threats.
Recapping Our 2022 Coordinated Inauthentic Behavior Enforcements (Meta) We're sharing insights that have stood out to us this year as we look back at our 200-plus CIB enforcements.
Threat Report on the Surveillance-for-Hire Industry (Meta) Since publishing our first threat report a year ago, we have continued to investigate and take actions against spyware vendors around the world, including in China, Russia, Israel, the United States and India, who targeted people in about 200 countries and territories.
Meta removes hundreds of accounts tied to spyware, surveillance-for-hire companies (Axios) Tech companies have become one of the first lines of defense against the proliferation of spyware.
Facebook Cracks Down on Spyware Vendors from U.S., China, Russia, Israel, and India (The Hacker News) Facebook has taken steps to disrupt accounts and infrastructure operated by spyware vendors from a number of countries.
Rail News - OIG: Amtrak should strengthen controls over high-security keys. For Railroad Career Professionals (Progressive Railroading) Progressive Railroading Daily News
Bankman-Fried is ready to ‘face the music,’ prison official says (Washington Post) The embattled crypto executive may consider extradition to the United States, according to an employee of Fox Hill prison
Sam Bankman-Fried Is Expected to Consent to Extradition From Bahamas (Wall Street Journal) The FTX co-founder has been in custody in Nassau since he was arrested on Monday.
Elon Musk's Twitter blocked links to rival Mastodon. That could raise alarms among regulators (CNN) Elon Musk's Twitter sparked an international outcry on Thursday by suspending a number of journalists at major news organizations who cover him.
Internet troll who wrote “Run over one cyclist to educate 100” cleared by judge (Road) Italy’s pro cyclist union slams ruling, which it says shows that “inciting violence against cyclists isn’t a crime”