Dateline Moscow, Kiev, Beijing, and London: Influence ops and hybrid warfare.
Ukraine dismantles disinformation botnet; UK warns of Russian invasion risk. (The CyberWire) Russia's hybrid war includes influence operations, complete with bot-farming and media amplification. And an Olympic meeting suggests the outlines of a joint Sino-Russian view of international relations.
Ukraine dismantles social media bot farm spreading "panic" (The Record by Recorded Future) The Ukrainian Security Service said on Tuesday that it shut down a bot farm that was spreading panic on social media and had also been used to send out bomb threats.
EXPLAINER: What are the key parts of Ukraine's peace deal? (AP NEWS) A peace agreement for the separatist conflict in eastern Ukraine that has never quite ended is back in the spotlight amid a Russian military buildup near the country's borders and rising tensions about whether Moscow will invade.
Ukraine prepares to unplug from Russian electricity amid invasion fears (Atlantic Council) Amid mounting fears of a full-scale Russian invasion, Ukraine remains determined to proceed with a planned trial disconnection from the Russian electricity grid in order to progress towards European energy integration.
Russia Has Taken Over Spanish-Language Airwaves on Ukraine (Foreign Policy) Kremlin-owned outlets are winning the information war with Spanish speakers.
Fears of Ukraine invasion rise as top Russian commanders fly to Belarus for massive joint military drill (Washington Post) Top Russian military commanders flew into neighboring Belarus on Wednesday for a massive joint military exercise amid Western alarm that it could provide cover for a multipronged invasion of Ukraine.
Russian APT Hackers Used COVID-19 Lures to Target European Diplomats (The Hacker News) According to ESET's T3 2021 Threat Report Russian APT Hackers Used COVID-19 Lures to Target European Diplomats
ESET Threat Report T3 2021 (WeLiveSecurity) The T3 2021 issue of the ESET Threat Report looks at the most notable trends that shaped the threat landscape from September to December 2021.
Boris Johnson says Ukraine crisis has entered ‘most dangerous moment’ (the Guardian) UK PM visits Nato’s headquarters as Russian forces continue military buildup on Ukraine border
Boris Johnson puts more troops on standby and tells Russia to show ‘real diplomacy’ over Ukraine (The Telegraph) Prime Minister to offer extra soldiers to counter Russian troop buildup and support humanitarian response in event of a conflict
Ukraine crisis: Boris Johnson warns Russia an invasion would be an 'absolute disaster' resulting in 'serious bloodshed' (The Telegraph) Boris Johnson has called on Europe to hold firm on Ukraine's right to join Nato, warning any Russian invasion would be an "absolute disaster" that would result in "serious bloodshed".
Watch: How trust between Russia and the West eroded - and what can be done about it (The Telegraph) The massing of troops on Ukraine's border is a symptom of the lack of trust and transparency between Moscow and the West
For Biden, wreaking havoc on Russia’s economy is the least bad option (Atlantic Council) Putin is testing the West’s resolve for tough measures—which is why maximalist banking sanctions are the linchpin of an effective deterrent.
Vladimir Putin's frozen conflict is already paying dividends (The Telegraph) The Kremlin is dragging its feet on talks with the West despite Putin's initial demands to satisfy Russian security concerns 'immediately'
With Putin poised to invade, Zelenskyy must prioritize Ukrainian unity (Atlantic Council) With Russian troops poised to launch a full-scale invasion of Ukraine, it is time for Ukrainian President Volodymyr Zelenskyy to put personal rivalries to one side and unite the country's political forces, says Kira Rudik.
Why Putin Is fixated on Ukraine (Newsweek) Much is made of the Russian president's KGB background, but less attention is paid to another side of Putin.
Would Russians Embrace War? (Foreign Affairs) An attack on Ukraine might erode Putin’s support.
US adversaries have been mastering hybrid warfare. It’s time to catch up. (Atlantic Council) Bad actors are embracing hybrid warfare. Time is of the essence for Washington to seize the advantage.
Bernie Sanders says U.S. "hypocritical" to reject Russia concerns over NATO expansion (Newsweek) The Vermont senator criticized Washington's "familiar drum beats" of war over the Ukraine crisis.
Attacks, Threats, and Vulnerabilities
ModifiedElephant APT and a Decade of Fabricating Evidence (SentinelOne) A previously unreported threat actor has been targeting civil society for over a decade. Read about how it operates and its relationships to other threats.
Hamas Cyberspies Return With New Malware After Exposure of Operations (SecurityWeek) Hamas-linked cyberspy group Molerats started using new malware in attacks on Middle Eastern governments after their operations were exposed last summer.
MoleRats APT Flaunts New Trojan in Latest Cyberespionage Campaign (Threatpost) Researchers from Proofpoint have spotted a new Middle East-targeted phishing campaign that delivers a novel malware dubbed NimbleMamba.
Lazarus hackers target defense industry with fake Lockheed Martin job offers (ZDNet) Updated: The APT has previously masqueraded as Northrop Grumman and BAE Systems.
News Corp Cyber Attack by Alleged Chinese Hackers Targets Wall Street Journal Reporters (CPO Magazine) A cyber attack on multinational media giant News Corp targeted dozens of Wall Street Journal (WSJ) reporters and was conducted by suspected Chinese hackers, according to an investigation by leading cybersecurity firm Mandiant.
Iranian Hackers Using New Marlin Backdoor in 'Out to Sea' Espionage Campaign (The Hacker News) Iran's hackers used a new Marlin backdoor for espionage campaign dubbed "Out to Sea"
Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit (Security Intelligence) Threat actors used a Telegram installer to infect users with the Purple Fox rootkit. See how sneaking in this way lets them bypass antivirus defenses.
Iran Hack Startles the Global Cybersecurity Community (Bloomberg) In the final days of 2021, a cybersecurity firm in Iran detailed a startling discovery: a mysterious piece of malicious code in a server made by Texas-based Hewlett Packard Enterprise Co.
Ransomware groups shift from big game hunting (SearchSecurity) Authorities from the United States, United Kingdom and Australia issued a joint cybersecurity advisory detailing ransomware trends from 2021.
2021 Trends Show Increased Globalized Threat of Ransomware (CISA) In 2021, cybersecurity authorities in the United States, Australia, and the United Kingdom observed an increase in sophisticated, high-impact ransomware incidents against critical infrastructure organizations globally
Two Months On, Many Developers Are Still Downloading Flawed Log4j Tool (Wall Street Journal) Despite warnings from U.S. officials that the security flaw could open the door for a surge in cyberattacks, vulnerable versions of the free utility tool continue to be downloaded at least tens of thousands of times each day.
CISA's public-private cyber defense group helped speed Log4j mitigation, experts say (FCW) A panel of cybersecurity pros testified that the Cybersecurity and Infrastructure Security Agency's collaborative operational body helped speed up response times and provide critical real-time insights on the Log4J software vulnerabilities to a vast range of companies and federal agencies.
Apache tells US Senate committee the Log4j vulnerability could take years to resolve (Cybersecurity Dive) While a software bill of materials could improve supply chain security, users still download vulnerable versions of software.
Georgia voter info posted online after breach of software company (Atlanta Journal-Constitution) A breach of a Woodstock,Ga.-based voting software company called EasyVote Solutions exposed Georgia voter registration information online, the company confirmed Tuesday.
Wave of MageCart attacks target hundreds of outdated Magento sites (BleepingComputer) Analysts have found the source of a mass breach of over 500 e-commerce stores running the Magento 1 platform and involves a single domain loading a credit card skimmer on all of them.
NaturalFreshMall: a mass store hack (Sansec) Last week Sansec detected a mass breach of over 500 stores running the Magento 1 ecommerce platform.
Vodafone Portugal: Restoration in Progress Post-Cyberattack (GovInfoSecurity) A "deliberate and malicious" cyberattack struck Vodafone Portugal, including its 4G/5G network, fixed voice, TV, SMS and voice/digital answering services.
Clicking these texts allows devious malware to take over your phone (Komando.com) Receive a weird text message about updating your Adobe Flash or COVID vaccine? Be careful as it could be money-stealing malware.
Study: Analyzing the Cybersecurity Hygiene of Ransomware Victims (RiskRecon) Download this study that leverages RiskRecon data to determine the cybersecurity hygiene of ransomware victims.
Analyzing the Cybersecurity Hygiene of Ransomware Victims (RiskRecon) In this blog, RiskRecon founder Kelly White provides a deep level of analysis on the cybersecurity hygiene of ransomware victims.
A sign of ransomware growth: Gangs now arbitrate disputes (AP NEWS) Cyber criminal gangs are getting increasingly adept at hacking and becoming more professional, even setting up an arbitration system to resolve payment disputes among themselves, according to a new report by the United States, Australia and the United Kingdom that paints a bleak picture of ransomware trends.
Security Patches, Mitigations, and Software Updates
Adobe Patches 13 Vulnerabilities in Illustrator (SecurityWeek) Adobe has patched 13 vulnerabilities in Illustrator, as well as flaws in Photoshop, After Effects, Creative Cloud and Premiere Rush — one in each.
ICS Patch Tuesday: Siemens, Schneider Electric Address Nearly 50 Vulnerabilities (SecurityWeek) Siemens and Schneider Electric have released 15 advisories this Patch Tuesday to address nearly 50 vulnerabilities found in their products.
Microsoft Patches for 51 Windows Security Defects (SecurityWeek) Microsoft’s Patch Tuesday train rumbled into Windows networks with fixes for 51 documented security vulnerabilities
Microsoft acted too late on major security threat, Okta exec says (VentureBeat) Microsoft moved slowly to disable "basic" identity authentication, which doesn't support MFA and brings major security risk, an Okta exec says.
Code42 Data Exposure Report: Data Visibility and Exposure Challenges Put the Spotlight on Risk of Cloud Technologies and Insider Risk Education Improvement (Business Wire) Code42 today released its Annual Data Exposure Report for 2022 on Insider Risk.
Compromised Credentials Affect 44% of Companies in Supply Chain (Panorays) In a new report, Panorays has identified the top five most common cyber gaps found among third-party organizations over 2021.
The top 5 most common third-party cyber gaps (Panorays) The widespread cyber issues you should be aware of for 2022.
Law Enforcement Blowback, Cyber Insurance Renewals Powering Anti-Ransomware Success (SecurityWeek) SecurityWeek Editor-at-Large Ryan Naraine examines several factors driving success in the fight against data extortion attack and .a noticeable dip in major data extortion attacks in the latter half of 2021
Data Highlights Growing Threat From Intelligent Bots Operated at Scale by Cybercriminals (SecurityWeek) A new report shows that eighty-six percent of attacks against accounts are now driven by bots that have become 3 times more complex than those seen in earlier years
A World Without Trust (Foreign Affairs) The insidious cyberthreat.
The Unnerving Rise of Video Games that Spy on You (Wired) Players generate a wealth of revealing psychological data—and some companies are soaking it up.
Think you can identify a scam? You are probably wrong (Cybershack) So you think you can identify an email or SMS scam. You would be wrong. Only 5% of Aussies scored 100% in recent KnowBe4 tests.
Inside the numbers of another big year for cyber mergers, acquisitions and investments (CyberScoop) Sustained demand for cybersecurity services and continued innovation across the industry helped 2021 become a record-setting year for deals involving cyber companies, analysts say.
2021 was a record-breaking year for cybersecurity startups (TechCrunch) Cybersecurity startups raised a record-breaking $29.5 billion in venture capital last year.
Auckland MSSP Cyber Research NZ acquired by Melbourne’s CyberCX (CRN Australia) To expand its presence in the NZ cybersecurity market.
CyberCX expands in NZ with the acquisition of Cyber Research NZ (SecurityBrief) CyberCX has announced the successful acquisition of NZ cybersecurity company Cyber Research NZ, bringing additional capability and experience to its service offerings.
Salt Security Raises $140 Million Series D Round Led by CapitalG at $1.4 Billion Valuation (PR Newswire) Salt Security, the leading API security company, today announced that it raised $140 million in Series D funding, led by CapitalG, Alphabet's...
Canonic Security Exits Stealth with $6M in Seed Funding from First Round Capital (PR Newswire) Canonic Security, a cybersecurity startup protecting SaaS business applications, today emerged from stealth with $6 million in seed funding...
Mandiant quiet on Microsoft rumors (CRN Australia) Touts new channel tools.
Mandiant reports steady growth amid Microsoft acquisition rumours (Silicon Republic) There are reports that Microsoft is in talks to bolster its cybersecurity business with the acquisition of Mandiant.
Mandiant and SentinelOne announce strategic partnership (Gulf Business) Through the strategic alliance, the cybersecurity firms aim to help organisations strengthen their ability to mitigate cyberthreats.
Microsoft could be planning a rather pricey cybersecurity upgrade (TechRadar) Software giant reporting eyeing up bid for security firm Mandiant
Socure Triples Customer Count and Valuation in 2021 (Socure) In 2021, Socure tripled customer count and valuation, emerging as the market leader in the identity verification space. Read the press release now.
Rapid7 reports 2021 revenue of $535 million, beats Wall Street estimates (ZDNet) The security automation technology firm delivered fourth quarter revenue of $151.6 million, up 34% from a year ago.
Omada and iC Consult Expand Partnership into the UK and North American Markets (PR Newswire) Omada A/S ("Omada"), a global leader in Identity Governance and Administration (IGA), announced today an expanded partnership with iC Consult,...
KnowBe4’s General Counsel Alicia Dietzen Wins Top 10 Corporate Counsel (PRWeb) KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced that its General Counsel Alicia
Aqua Security Bolsters Leadership in Channel and Sales (Aqua) Former Palo Alto, Sumo Logic Execs join amid explosive growth and surging demand for end-to-end cloud native security solutions.
BlackFog Welcomes David Schnurstein as Director of Threat Intelligence (Security Boulevard) Former Police Captain and Commander for the Grand Rapids, MI Police Department to support forensic investigations for anti data exfiltration leader.
Brendan Peter joins Socure as VP of Government Relations (Help Net Security) Socure announced that Brendan Peter has joined as VP of government relations to accelerate the adoption of identity verification solutions.
Former Palantir Exec Mark Shepardson Named Parry Labs CTO (GovCon Wire) Looking for the latest GovCon News? Check out our story: Mark Shepardson joins Parry Labs as chief technology officer. Click to read more!
Products, Services, and Solutions
Menlo Security designated FedRAMP ‘In process’ for its Cloud Security Solution - Menlo Security (Menlo Security) Menlo Security, a leader in cloud security, today announced it has achieved the “In Process” designation for the Federal Risk and Authorization Management Program (FedRAMP) to protect government networks worldwide. In addition, Menlo Security is now listed on the FedRAMP marketplace website. The FedRAMP In Process designation also enables Menlo Security to provide its solutions to State, Local and Education (SLED) organizations.
Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics (Aviatrix) New capabilities added to Aviatrix ThreatIQtm improve enterprise security posture to reduce business risk
VAST Data Teams With Commvault to Deliver Modern Data Protection Platform, Delivers 50x More Performance for Rapid Ransomware Recovery (Business Wire) VAST Data, the storage software company breaking decades old tradeoffs, today announced a partnership with Commvault to launch an integrated, modern b
Telstra launches new government cybersecurity offerings (CRN Australia) New “Sovereign Secure Edge” and cyber detection and response capabilities.
IDMWORKS Launches Real-Time IAM Insights Dashboard (PR Newswire) IDMWORKS, consistently referenced by Gartner and Forrester as a top Identity and Access Management consultancy, today announced its...
Vade Pioneers a New Approach to Phishing Awareness Training (PR Newswire) Vade, the global leader in threat detection and response with 1 billion mailboxes protected worldwide, today announced that it has been awarded...
Dynatrace Delivers Software Intelligence as Code (Business Wire) Dynatrace (NYSE: DT) announced today it is delivering software intelligence, including broad and deep observability, application security, and advance
Dynatrace Delivers the Industry’s Most Complete Observability for Multicloud Serverless Architectures (Business WIre) Software intelligence company Dynatrace (NYSE: DT) today announced that it has extended the Dynatrace® platform’s broad and deep observability and adv
Hornetsecurity Launches Industry-First All-in-One Security and Backup Service for Microsoft 365 (Business Wire) Hornetsecurity's 365 Total Protection Enterprise Backup provides Microsoft 365 business users with the security and data loss prevention they need.
The Time Is Now—Get Out of Ransomware Jail! (Zerto) When it comes to ransomware, it’s not a matter of “if,” it’s “when.” Ransomware attacks are here to stay as they continue to rise in both volume and severity and as cybercriminals keep developing new and unexpected methods to encrypt data.
IBM Bolts On Cyber Vault for Ransomware Recovery (SDxCentral) IBM announced a cyber vault service for its flash storage array systems to assist customers in faster recovering from cyberattacks.
Palo Alto Networks Adds Deep Learning Algorithms to Security Platforms (Security Boulevard) Palo Alto Networks today released an update to its firewall's core operating system, PAN-OS, that expands the depth of the artificial intelligence (AI)
Avast and Cyber Insurance Specialist OSR Launch Cyber Safety Insurance For UK Households (PR Newswire) Avast, a global leader in digital security and privacy, and Optimum Speciality Risks (OSR), a leading cyber insurance provider, have launched a...
Palo Alto Networks Introduces PAN-OS 10.2 Nebula: The Industry's First Inline Deep Learning Protection for Network Security to Help Stop Sophisticated Attacks as They Happen (PR Newswire) Palo Alto Networks (NASDAQ: PANW), a 10-time leader in network firewalls, today announced Nebula, the latest upgrade of its industry-leading...
Telos Corporation Accelerates Growth to Process Background Checks for Aviation Workers at U.S. Airports (GlobeNewswire News Room) Cybersecurity leader’s aviation channeling service experiences consistent growth, with five renewals and two new customers...
DomainTools Debuts New Domain Discovery and Monitoring Solution Iris Detect (DomainTools) DomainTools Iris Detect Integrates Best in Class Technologies from Farsight Security Acquisition, Empowering Organizations to Move Faster to Block Threats
Dynatrace Application Security detects and blocks attacks automatically in real-time (Dynatrace news) Dynatrace has enhanced its Application Security Module to provide real-time, automatic attack detection and blocking.
Dynatrace launches DevSecOps partner integrations for context-aware adaptive automation (Dynatrace news) Dynatrace has launched its DevSecOps Automation Partner Program, enabling alliance and solution partners to extend the DevSecOps capabilities
Technologies, Techniques, and Standards
Lack of applicability of NIST Special Publication 1800-32 to process sensors (Control Global) As there is still confusion about the cyber security of process sensors and other Purdue Reference Model Level 0,1 field devices, I was asked to review NIST Special Publication (SP) 1800-32 “Securing Distributed Energy Resources: An Example of Industrial Internet of Things Cybersecurity” for applicability to legacy process sensors (e.g., pressure, level, flow, temperature, voltage, current, etc.).
Zero trust adoption will continue to mature (Help Net Security) Illumio and Forrester Consulting explored how orgs are approaching their zero trust strategies in 2022 to better navigate the remote world.
Log4Shell and Log4j Vulnerability (Booz Allen Hamilton) Log4j vulnerability opens the need for continued and persistent cyber hunt operations.
Protecting Cryptocurrencies and NFTs - What's Old is New (SecurityWeek) Five steps that end-users can take to protect themselves against cryptocurrency losses
3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I (Threatpost) Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.
What it Means to Redefine Success in Cybersecurity (Radware Blog) Any action that reduces the bad guy’s chance of success is useful, almost any change can become an element of improved cybersecurity.
Design and Innovation
How Dutch hackers are working to make the internet safe (ComputerWeekly.com) How the personal mission of a Dutch hacker grew into a serious organisation with international ambitions.
Marshall joins US Cyber Command Academic Engagement Network (Herald-Dispatch) Marshall University has been selected as a member of the U.S. Cyber Command Academic Engagement Network, according to a news release.
Explore the Emerging Field of Cybersecurity (Royal News) The University of Scranton’s new degree in cybersecurity and homeland security aims to prepare students for work in an emerging field.
Legislation, Policy, and Regulation
France Issues Processor Guidelines on “Reusing Personal Data to Improve or Develop Services or Products" (cyber/data/privacy insights) On January 12, 2022, the French Data Protection Authority (CNIL) issued guidance (available in French only) that sets out the conditions for processors to reuse the personal data entrusted by controllers for their own purposes. The CNIL notably refers to a scenario where a processor wants to reuse t
U.S. Chamber urges FTC to hold off on incident reporting rule; financial groups say avoid duplication (Inside Cybersecurity) Key industry groups are weighing in on the FTC’s proposed cyber incident reporting requirement for a wide variety of financial entities, with the U.S. Chamber of Commerce urging a pause in the rulemaking to avoid fragmented efforts and two major financial groups calling for greater attention to possible redundancy and duplication.
FCC Attempts to Explain Rip-and-Replace Shortfall: Large Carriers Could Get Squeezed Out (Telecompetitor) The FCC rip-and-replace program for Huawei equipment faces a budget shortfall. Here's why and what the agency plans to do about
How zero trust architecture keeps defence IT assets secure (Army Technology) The US DoD recently opened a new portfolio management office to help its agencies and commands accelerate the adoption of zero trust.
It’s time to give the IT supply chain the security it deserves (Fast Company) IT supply chain attacks are fast becoming a favorite approach of adversaries.
Demilitarize civilian cyber defense, and you’ll gain deterrence (Defense News) By constantly flexing the military’s cyber muscles to defend the homeland from inbound criminal cyber activity, the public demand for a broad federal response to illegal cyber activity is satisfied. Still, over time, the potential adversary will understand our military’s offensive cyber operations’ tactics, techniques and procedures.
Federal dollars could help rural governments dodge ransomware attacks (thealpenanews.com) When Webster Township in Washtenaw County was attacked by ransomware, officials had to implement a new website, new emails and new anti-virus and ransomware software to resolve the problem. It was one of 77 ransomware attacks in the U.S. last year that were confirmed by the cybersecurity company, Emsisoft. To lessen such attacks, […]
Litigation, Investigation, and Law Enforcement
Twitter Tells U.S. Senator It’s Cutting Ties to Swiss Tech Firm (Bloomberg) Co-Founder of Mitto allegedly ran secret surveillance service. Mitto has launched internal investigation into allegations.
Russian Law Enforcement Take Down Several Cybercrime Forums (SecurityWeek) Russian authorities this week announced that they have seized Ferum Shop, Sky-Fraud, and Trump’s Dumps, three well-known online shops for stolen payment card data.
The DOJ’s $3.6B Seizure Shows How Hard It Is to Launder Crypto (Wired) A couple allegedly used a “laundry list” of technical measures to cover their tracks. They didn’t work.
Business Rapper Was Bad at Bitcoin Laundering (Bloomberg) Also Wall Street departures, bribery, and an NFT car.
How The Crypto Couple Went From Wannabe Tech Luminaries To Targets In The Biggest Financial Seizure In Justice Department History (Forbes) Ilya “Dutch” Lichtenstein raised money from Mark Cuban and other well-known investors. His wife, Heather Morgan, built a following as a quirky rapper and
social media luminary.
Self-styled “Crocodile of Wall Street” arrested with husband over Bitcoin megaheist (Naked Security) The cops say they’ve recovered 80% of a $72 million cryptocoin heist… but the recovered funds alone are now worth over $4 billion!
Ransomware victims paid more than $600 million to cybercriminals in 2021 (The Record by Recorded Future) More than $600 million in cryptocurrency could be tied to ransomware payments in 2021, with the Conti ransomware gang accounting for nearly one-third of those payments, blockchain analysis firm Chainalysis said in a report today.
FBI Received 1,600 SIM Swapping Complaints in 2021 (SecurityWeek) The FBI this week announced that between 2018 and 2021 it has received more than 1,900 complaints related to SIM swapping.
Serbian resident pleads guilty to multi-million dollar BEC scheme (The Record by Recorded Future) A Serbian-Hungarian dual citizen pleaded guilty on Tuesday to operating a $3.7 million business email compromise (BEC) scheme, according to an announcement from the U.S. Department of Justice.
Meta, Chime file lawsuit against alleged phishing scam on Facebook, Instagram (Reuters) Facebook parent Meta Platforms said on Tuesday it had filed a joint lawsuit with digital banking company Chime against two Nigeria-based individuals who engaged in phishing attacks to deceive people and gain access to their online financial accounts.
The hacked account and suspicious donations behind the Canadian trucker protests (Grid News) The jumble of misinformation, online fundraising groups and amplification from right-wing political figures suggests there’s more to these protests than meets the eye.
‘Demo attached’: NSO pitched Pegasus spyware to NYPD, emails reveal (Haaretz) Motherboard reveals that as part of NSO Group’s bid to enter American market, ‘NYPD intel’ received showcase of spyware
Ex-Gumshoe Nabs Cybercrooks with FBI Tactics (Threatpost) Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work with cyberattackers.