Ukraine at D+412: Ukraine prepares its counteroffensive. (CyberWire) Russia entrenches in its occupied territories as Ukraine prepares its spring offensive. The US investigates its leak, and Canada parries a Russian DDoS attack.
Russia-Ukraine war: List of key events, day 413 (Al Jazeera) As the Russia-Ukraine war enters its 413th day, we take a look at the main developments.
Russia-Ukraine war live: EU pledges to hold war criminals to account after beheading video (the Guardian) EU says unverified video is a ‘brutal reminder’ of ‘Russian aggression’ after Zelenskiy’s plea for action
Zelenskiy urges world leaders to act over PoW beheading video (the Guardian) Footage appears to show Russian soldiers beheading Ukrainian prisoner of war, with another showing two beheaded servicemen
Ukraine Confident in Spring Counteroffensive Despite Leaks, Pentagon Chief Says (Wall Street Journal) Emergence of seemingly classified documents won’t thwart Kyiv’s plans, according to Lloyd Austin.
Russian forces in Crimea brace for possible Ukraine assault (Military Times) The Moscow-appointed leader of Crimea says the region is on guard for what may be an impending Ukrainian counteroffensive.
Ukraine’s Best Chance (Foreign Affairs) A successful offensive could end the war with Russia.
Ukraine war latest: Russia speeds up mobilisation (The Telegraph) The Russian State Duma has unanimously approved legislation creating an electronic call-up system for conscription notices, which will facilitate the mobilisation of more troops into the nation’s armed forces.
Russia Moves to Make Draft Evasion More Difficult (New York Times) A new law would bar anyone called up to fight in Ukraine from leaving the country, among other restrictions, even as the Kremlin insists it is not planning a new conscription.
Russia moves to tighten conscription law, pressing more men to fight (Washington Post) When Russian President Vladimir Putin announced a mobilization in the fall to commandeer reinforcements for the war against Ukraine, thousands of men fled the country or went into hiding. But tough new measures approved by Russia’s lower house of parliament on Tuesday will make it almost impossible for Russians to dodge conscription in the future.
Human wave tactics are demoralizing the Russian army in Ukraine (Atlantic Council) Vladimir Putin's invasion of Ukraine has not gone according to plan but he still hopes to win a long war of attrition. However, Russia's reliance on human wave tactics risks undermining morale within his invading army, writes Olivia Yanchik.
Russian nukes in Belarus: Putin’s creeping annexation continues (Atlantic Council) Putin's plan to place nukes in Belarus has been widely interpreted as as an escalation in his ongoing nuclear saber-rattling tactics but it will also greatly strengthen the Russian dictator's grip over the neighboring country.
What’s Really Going on Between Russia and China (Foreign Affairs) Behind the scenes, they are deepening their defense partnership.
South Korea to lend 500,000 rounds of artillery shells to US -report (Reuters) South Korea has reached an agreement to lend the United States 500,000 rounds of 155mm artillery shells that could give Washington greater flexibility to supply Ukraine with ammunition, a South Korean newspaper reported on Wednesday.
A leak of files could be America’s worst intelligence breach in a decade (The Economist) The classified material covers Ukraine’s army and CIA reports
Interagency Effort Assessing Impact of Leaked Documents, Strategizing Way Forward (U.S. Department of Defense) Inside DOD, an effort is underway to look at the scope and scale of the distribution on social media platforms of what appears to be classified Defense Department information.
What we know about the Pentagon document leak (Axios) The source of the leak remains unknown and determining who is responsible could be difficult.
The ongoing scandal over leaked US intel documents, explained (Vox) What you need to know about those top-secret files that got posted on Discord.
Pentagon leak threatens Biden's foreign policy doctrine ahead of overseas trip (Axios) Strengthening U.S. alliances and supporting Ukraine are two central planks of Biden's foreign policy.
Schumer calls for all-senator briefing on leaked Ukraine documents (The Hill) Senate Majority Leader Chuck Schumer (D-N.Y.) on Tuesday called for the Biden administration to brief senators on the leak of a set of highly classified documents about the Ukraine war. A Schumer s…
The key countries and revelations from the Pentagon document leak (Washington Post) A leak of classified U.S. military documents has offered a glimpse of not only how the United States gathers intelligence, but also what it thinks about other countries.
Exclusive: Leaked U.S. intel document claims Serbia agreed to arm Ukraine (Reuters) Serbia, the only country in Europe that has refused to sanction Russia for its invasion of Ukraine, agreed to supply arms to Kyiv or has sent them already, according to a classified Pentagon document.
Up to 50 UK special forces present in Ukraine this year, US leak suggests (the Guardian) Documents appear to list number of western special forces personnel in Ukraine in February and March
Egypt denies leak about supplying Russia with 40,000 rockets (Al Jazeera) A senior Egyptian official denied The Washington Post’s report, saying it ‘has no basis in truth’.
DDoS attacks block PM Trudeau’s web site (IT World Canada) A pro-Russian threat group is believed to be behind a distributed denial of service (DDoS) attack that has blocked access to Prime Minister Justin Trudeau's official web site. The attack appears to have been timed to coincide with the government's meeting today with Ukrainian Prime Minister Denys Shmyhal. As of 1:30 p.m. Eastern, the Canadian
Ukrainian hackers say they have compromised Russian spy who hacked Democrats in 2016 (Reuters) It wasn't immediately clear what information the hackers had managed to steal or how significant it was. The senior military spy's inbox could potentially hold insight into Russia's hacking operations.
Ukraine resumes electricity exports in latest show of wartime resilience (Atlantic Council) Ukraine resumed energy exports to Europe in early April. The move confirmed the failure of Russia's six-month energy infrastructure bombing campaign and underlined Ukraine's remarkable wartime resilience, writes Aura Sabadus.
Ukraine’s energy sector survives winter (Atlantic Council) Vladimir Putin's winter bombing campaign targeting Ukraine's civilian infrastructure failed to achieve its goal of breaking Ukrainian resistance and freezing the country into submission, writes Suriya Evans-Pritchard Jayanti.
Biden calls family of Evan Gershkovich, WSJ reporter detained in Russia (NBC News) "We’re making it real clear that it’s totally illegal what’s happening, and we declared it so," Biden told reporters before he boarded Air Force One.
Is there logic to Russia’s wrongful detentions of Americans? (The Hill) We can hate the idea that Americans are being taken hostage by foreign governments — a special category of hostage-taking called “wrongful detention” — though this practice is likely to continue un…
UK imposes sanctions on ‘enablers’ accused of helping oligarchs hide assets (the Guardian) Two Cyprus-based individuals alleged to have aided Roman Abramovich and Alisher Usmanov among those targeted
Attacks, Threats, and Vulnerabilities
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say (TechCrunch) Researchers found malware developed by QuaDream, a little-known government spyware maker, which was used against journalists and politicians.
Another Israeli spy app has been sold to 10 countries, researchers say (Washington Post) Citizen Lab and Microsoft report the hacking tool QuaDream has been used against politicians and journalists, but they did not identify the victims
New Spyware Firm Said to Have Helped Hack iPhones Around the Globe (Wall Street Journal) Hacking tools sold by Israeli vendor QuaDream have been used to break into the iPhones of journalists and political opposition figures, cybersecurity researchers said.
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia (Microsoft Threat Intelligence) Microsoft Threat Intelligence analysts assess with high confidence that a threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream. QuaDream reportedly sells a platform they call REIGN to governments for law enforcement purposes. REIGN is a suite of exploits, malware, and infrastructure designed to exfiltrate data from mobile devices.
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers (The Citizen Lab) At least five civil society victims of QuaDream’s spyware and exploits were identified in North America, Central Asia, Southeast Asia, Europe, and the Middle East. Victims include journalists, political opposition figures, and an NGO worker. Traces of a suspected iOS 14 zero-click exploit used to deploy QuaDream’s spyware.
A cyber attack hit the water controllers for irrigating fields in the Jordan Valley (Security Affairs) A cyber attack paralyzed the water controllers for irrigating fields in the Jordan Valley that are operated by the Galil Sewage Corporation. A cyberattack blocked several controllers for irrigating fields in the Jordan Valley. The systems operated by the Galil Sewage Corporation monitor the irrigation process and wastewater treatment in the Jordan Valley. The company experts […]
North Korean hackers linked to 3CX supply-chain attack, investigation finds (Record) Enterprise phone company 3CX said on Tuesday that a recent supply-chain attack on its network — which was used by hackers to attempt to install malware on clients’ desktops — was very likely conducted by a group connected to North Korea.
North Korean cyber aggression is getting slightly more sophisticated, experts warn (Axios) Last month, several cyber firms found North Korean state-backed hackers deploying malware in video-conference tool 3CX.
Internet Crime Complaint Center (IC3) | Criminals Pose as Chinese Authorities to Target US-based Chinese Community (IC3) The FBI warns of criminal actors posing as Chinese law enforcement officials or prosecutors in financial fraud schemes targeting the US-based Chinese community.
FBI warns of cybercriminals posing as PRC to target Chinese communities (Record) Scammers are posing as law enforcement officers or prosecutors from the People’s Republic of China in an effort to defraud people in the U.S., the bureau says.
Fake ChatGPT preys on Facebook users (Washington Post) Fake ChatGPT preys on Facebook users
Ransomware gangs increasingly deploy zero-days to maximize attacks (CyberScoop) Microsoft issued a patch for a zero-day that researchers at Kaspersky said was used to deliver Nokoyawa ransomware.
From listKeys to Glory: How We Achieved a Subscription Privilege Escalation and RCE by Abusing Azure Storage Account Keys (Orca Security) In this blog, we describe how we discovered a critical exploitation path, utilizing Microsoft Azure shared key authorization, and provide key mitigation steps.
Spyware Offered to Cyberattackers via PyPI Python Repository (Dark Reading) Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.
Beware of companies offering paid sextortion assistance (Help Net Security) Shady companies are taking advantage of sextortion victims' vulnerability to offer "sextortion assistance" services for huge sums.
German Superyacht Maker Targeted by Ransomware Cyberattack (Bloomberg) German shipbuilder Lürssen, which makes military vessels as well as luxury yachts, has become the target of a ransomware cyberattack.
Evotec SE provides update on cyber attack (Evotec) Business continuity upheld at all global sites after cyber attack. Forensic examination ongoing with external experts.
Toyota says security lapse at Italy offices may have led to customer data exposure (Record) Japanese car giant Toyota said that security lapses at its offices in Italy may have exposed customer data.
Over a Million Financial Records Exposed in Data Incident Involving Fintech Company (Website Planet) Cybersecurity researcher Jeremiah Fowler discovered and reported to WebsitePlanet a non-password protected database that contained a large number of
'The consumers are now sitting ducks': Latitude rebuffs hackers' payment demands (ABC) Latitude Financial will not pay a ransom to those behind a cyber attack, as the details from 14 million customer records remain at risk of being released.
Important Technology Update (Rochester School District 535) On Thursday, April 6, irregular activity was discovered on the Rochester Public Schools’ technology network, and in response the school district immediately shut down the network and all major technology systems.
Rochester Public Schools confirm data breach; experts explain why it's happening more often (KARE 11) Rochester Public Schools is the latest district to cancel classes over network security concerns. Experts say cybercriminals are targeting them for a reason.
Cybersecurity expert weighs in on Rochester schools network cyberattack (KTTC) RPS hasn’t released additional information regarding the issues, but staff met Monday to develop a plan to allow students to return to school on Tuesday, without the use of technology.
60% of e-shop phishing scams exploit Apple's brand name (Atlas VPN) With approximately 60% of e-shop financial phishing threats in 2022, Apple continues to be the brand that fraudsters most frequently impersonate.
CISA Adds One Known Exploited Vulnerability to Catalog (Cybersecurity and Infrastructure Security Agency CISA) CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
Security Patches, Mitigations, and Software Updates
PSIRT Vulneraibilities (FortiGuard) April 2023 Vulnerability Advisories
Fortinet Releases April 2023 Vulnerability Advisories (Cybersecurity and Infrastructure Security Agency CISA) Fortinet has released its April 2023 Vulnerability Advisories to address vulnerabilities affecting multiple products. An attacker could exploit one of these vulnerabilities to take control of an affected system.
Apple Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected device.
Security Update Guide (Microsoft Security Response Center) Updates this Month. This release consists of security updates for the following products, features and roles.
Security Update Guide (Microsoft Security Response Center) The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.
Microsoft Releases April 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.
Microsoft Patches Another Already-Exploited Windows Zero-Day (SecurityWeek) For the second month in a row, Microsoft patches an already-exploited vulnerability in its flagship Windows operating system.
Patch Tuesday: Microsoft fixes actively exploited zero-day and seven 'critical' flaws (Computing) Computing is the leading information resource for UK technology decision makers, providing the latest market news and hard-hitting opinion.
Mozilla Releases Security Advisories for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) Mozilla has released security advisories for vulnerabilities affecting multiple Mozilla products. A cyber threat actor could exploit these vulnerabilities to take control of an affected system.
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) Adobe has released security updates to address multiple vulnerabilities in Adobe software. An attacker can exploit these vulnerabilities to take control of an affected system.
Adobe Plugs Gaping Security Holes in Reader, Acrobat (SecurityWeek) Adobe documents 56 security defects in multiple products, some serious enough to expose Windows and macOS users to code execution attacks.
SAP Security Patch Day - April 2023 (Onapsis) SAP released new and updated security patches for its April 2023 SAP Patch Day. Read a comprehensive summary and how Onapsis contributed.
CISA Releases Two Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) CISA released two Industrial Control Systems (ICS) advisories on April 11, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
ICS Patch Tuesday: Siemens, Schneider Electric Address Dozens of Vulnerabilities (SecurityWeek) Siemens and Schneider Electric’s Patch Tuesday advisories for April 2023 address a total of 38 vulnerabilities found in their products.
State of the Cybercrime Underworld (Cybersixgill) Each day, Cybersixgill collects approximately 10 million intelligence items from the deep, dark, and clear web. This continuous insight into cybercriminal discourse and activity allows us to constantly track the pulse of the underground and monitor how it changes and evolves over time.
Malware Monthly - March 2023 (Sonatype) March 2023's Malware Monthly dives into a series of information stealers uploaded to the PyPI registry, the latest OpenAI data leak, and more.
Mend.io Finds Over 80 Percent of Malicious Packages in Existing Code Bases Capable of Data Exfiltration (Mend) New Report on Malicious Packages Shows Exponential Threat of Application Infiltration TEL AVIV, Israel and BOSTON – April 11, 2023 – Mend.io, a leader in
The State of APIs and API security in 2023 (FireTail) This document is based on research conducted by the FireTail team, employees of FireTail Inc, and FireTail International Limited, as well as third-party publications. Third-party research and analysis is quoted and cited correspondingly
2023 State of Hybrid Work and Browsing Security Report: Hybrid Work Takes a Toll on Security Posture (PR Newswire) Red Access, today published its inaugural 2023 State of Hybrid Work and Browsing Security Survey Report — a report that sheds light on the...
2023 State of Hybrid Work and Browsing Security (Red Access) The 2023 State of Hybrid Work and Browsing Security Survey Report sheds light on the challenges faced by CISOs in today’s age of hybrid work. The primary points of interest include the impact of the hybrid workforce on security posture, the new risks it introduces, and strategies for hybrid work security moving forward.
Menlo Security Illustrates Importance of Browser Security (Menlo Security) Menlo Security shared results from the 10th Annual Cyberthreat Defense Report. This report highlights the importance of browser isolation technologies.
Consumers take data control into their own hands amid rising privacy concerns (Help Net Security) Growing awareness of privacy's significance worldwide is leading to increasing concerns among consumers about their personal data privacy.
GlobalData warns rising ransomware attacks posing major cybersecurity threat to travel and tourism industry (GlobalData) cybersecurity concerns within the industry have escalated with a 4% year-on-year (YoY) rise in 2022, reflecting the prevailing sentiment, says GlobalData
The State of Pentesting 2023 Report (Cobalt) Explore a thorough analysis of pentesting data with Cobalt's State of Pentesting Report 2023 and improve your security awareness.
Inside-Out Defense Launches with Industry’s First Platform to Provide Real-Time Detection and Remediation to Privilege Access Abuse (Inside Out Defense) Start-Up Funded by Bain & Company Delivers Holistic Approach to Solving Privilege Access Abuse
Announcing the NetBox Labs Series A and Our Plans to Upend Network Management and Automation Forever (Blog | NetBoxLabs) Learn how NetBox Labs will make network automation easier than ever, and empower teams to tackle complexity at any scale, thanks to its Series A funding.
OSINT Company Fivecast Raises $20 Million (SecurityWeek) Australian OSINT software company Fivecast has raised $20 million in a Series A funding round led by Ten Eleven.
Tech industry’s pain is NSA’s gain, cyber leader says about layoffs (Record) Rob Joyce, the NSA's cyber director, says that the agency has seen an "uptick" in job interest as the tech industry has laid off tens of thousands of people in recent months.
Cybersecurity Firm Zscaler Loses Coveted Spot in Gartner Ranking Due to ‘Sales Arrogance’ (The Information) Competition between the two of the biggest cybersecurity firms selling software monitoring employee access to cloud applications and data is set to intensify after influential market research firm Gartner cut its ranking on the market leader, Zscaler. In a regular update about the best ...
OpenAI Will Pay People to Report Vulnerabilities in ChatGPT (Bloomberg) Many in tech have tried to find workarounds in AI systems. New bug bounty program will offer rewards from $200 to $20,000.
Elon Musk is rebranding Twitter as X Corp (Quartz) The name change is part of the billionaire's goal to make an "everything app"
Elon Musk tells BBC that owning Twitter has been quite painful (BBC News) The multi-billionaire defends his running of the firm in a hastily-arranged interview from Twitter HQ.
CRITICALSTART® Closes Fiscal Year with Accelerated Growth Amid Sharp Rise in Demand for its Technology-Based Approach to MDR (PR Newswire) Today, Critical Start, a leading provider of Managed Detection and Response (MDR) cybersecurity solutions, announced continued expansive...
Benchmark Executive Search Names New Members to its National Security Advisory Board (Business Wire) In Conjunction with Benchmark Expanding its Board of Director Practice, Distinguished Security Experts Join Top Search Firm as Trusted Advisors
Cavelo Launches Technology Advisory Board (Cavelo) Cavelo Inc. announces the formation of its Technology Advisory Board and the appointment of Eldon Sprickerhoff as its founding member.
Industry Veterans Join SecureAuth - A Leader in Authentication and Access Management to Support Global Expansion (SecureAuth) Kelly Wenzel Appointed as Chief Customer Officer, Howard Greenfield Added to Advisory Board as Customer Adoption Accelerates IRVINE, Calif. – April 12, 2023 – SecureAuth, a leader in authentication and access management, today announced the addition of two seasoned executives to support accelerating customer adoption of its passwordless continuous authentication with invisible MFA solution. Kelly […]
Products, Services, and Solutions
Ontinue Launches New SecOps Cost Optimization Capabilities to Help Organizations Better Predict, Optimize and Manage their Data Ingestion (PR Newswire) Ontinue, a leading managed detection and response (MDR) provider and winner of the 2022 Microsoft Security MSSP Partner of the Year award,...
Syxsense’s Latest Product Release Gives Organizations Robust Capabilities to Easily Automate Complex Security and IT Management Playbooks (Business Wire) Other platform updates include performance enhancements around device scanning, unmanaged device discovery, agent lockdown, Bitlocker encryption key storage, and more.
NSA Adds DIGISTOR® FIPS 140-2 L2 SSDs to the Commercial Solutions for Classified (CSfC) Component List as a Hardware Full Drive Encryption Component (DIGISTOR) DIGISTOR FIPS SSDs are the first and only commercial SSDs to be listed by the NSA, making them the only affordable, secure storage option for building secure DAR solutions that meet top-secret NSA-level requirements.
Cohesity Collaborates with Microsoft to Simplify How Businesses Protect and Secure Their Data from Cyber Threats Including Ransomware Attacks (Business Wire) Cohesity Unveils Key Security and Cloud Integrations with Microsoft and Announces an Expanded AI Vision
Sumsub releases transaction monitoring guide to advise businesses on fighting fraud and staying compliant (Business Wire) Experts from Sumsub and Pismo offer practical insights on setting rules for transaction monitoring and handling its typical challenges
Data Theorem’s Leading Supply Chain Security and Cloud Security Solutions Win Multiple 2023 Govies Government Security Awards (Business Wire) Independent Panel of Judges Honors Supply Chain Secure with Top Application Security Award; Cloud Secure Earns Gold Award in Cloud Solutions & Services Awards Category
Keeper Security Debuts Sleek New User Interface for its Password Management Platform (Fast Mode) FW: Press Release: Keeper Security Debuts Sleek New User Interface for a Friendlier, More Intuitive Experience
CampusGuard‘s Rebranded RedLens Infosec Unit Delivers Array of Cybersecurity Services (MSSP Alert) RedLens InfoSec provides penetration testing, vulnerability assessments and scanning, password auditing and more.
Armis and TrueFort Announce Strategic Partnership (Armis) Armis and TrueFort have announced a strategic partnership and integration to empower customers with improved visibility, intelligence, and control of connected assets, including IoT and operational technology (OT) environments. The collaboration will enable better security and segmentation policies to increase operational resilience and prevent unauthorized lateral movement. Customers can discover and map IT and OT environments to enforce intelligent policies, preventing malicious actors from moving undetected between the two.
Searchlight Cyber Announces Secure Virtual Browser for Cyber Investigators to Safely Access the Dark Web (Business Wire) Stealth Browser enhances award-winning Cerberus investigation platform by allowing investigators to isolate their infrastructure from malware on the dark web
Infinidat Announces Tight Integration with Kasten by Veeam for Container-Based Workload Backup, Veeam Data Platform v12 Certification (GlobeNewswire News Room) Infinidat, a leading provider of enterprise storage solutions, today announced the expansion of its...
Metomic Launches Free Tool to Show Users Sensitive Data Hiding in Their Google Drive Account (Business Wire) In a matter of seconds, the free tool identifies “high-risk” files that may include sensitive data stored within a Google Drive account and who has access to them
Palo Alto Networks Achieves DoD IL5 Provisional Authorization for Prisma Access Zero Trust Solution (Palo Alto Networks) The Department of Defense can now protect its distributed mission-critical infrastructure with cloud-delivered security of Prisma Access SANTA CLARA, Calif., April 12, 2023 /PRNewswire/ -- To...
Concentric AI Launches Channel Partner Program to Enhance Partner Revenue Opportunities with Leading Data Security Posture Management Platform (Business Wire) AI-based Semantic Intelligence Platform Uses Deep Learning to Discover, Monitor and Protect Unstructured and Structured Data Delivering Unique Value for Channel Partners’ Customers
Hackuity’s New Smart Exposure Explorer Provides Unified Vulnerability Encyclopedia (Hackuity) Hackuity, the risk-based vulnerability management provider, today announced the newest feature to its platform to help organizations evaluate the real threats associated with CVEs.
Zigbee PRO 2023 Improves Overall Security While Simplifying Experience (PR Newswire) The Connectivity Standards Alliance, an organization of hundreds of companies creating, maintaining, and delivering open global standards for...
Cymulate Ups the Game on Exposure Management (Business Wire) Company closes risky gaps between Vulnerability Scanning and Attack Surface Management across hybrid infrastructure
Descope Launches Startup Program For Frictionless, Secure Authentication (Descope) Descope today announced its Hello World Startup Plan through which eligible startups can use Descope’s Pro Tier free of charge for one year.
Wazuh Releases the Latest Version of the Industry’s Leading Open Source Security Platform (GlobeNewswire News Room) Wazuh 4.4 Features Include IPv6 Support for the Enrollment Process and Agent-Manager Connection, as well as Enhanced Azure Integration in Linux Agents...
Cerbos Supercharges the Ability to Manage and Enforce Authorization Policies at Limitless Scale, Closes $7.5 Million in Seed Funding (GlobeNewswire News Room) Introduces Cerbos Cloud, a Managed Service Offering for Popular Open Source Product Cerbos Used by 100s of Organizations in Production Today With 10s of...
Entrust Launches Zero Trust Ready Solutions for Passwordless Authentication, Next-Generation HSM, and Multi-Cloud Key Compliance (Business Wire) Company adds new passwordless, certificate-based authentication with smart keys and FIDO2 passkeys to IAM solution.
Baffle Joins AWS ISV Accelerate Program (GlobeNewswire News Room) Data-Centric Security Platform Helps Amazon Web Services Customers Reduce the Risk of Data Breaches, Improve Compliance...
DirectDefense and Claroty Partner to Secure Customers’ Cyber-Physical Systems (Business Wire) Partnership bolsters DirectDefense’s Real-Time Monitoring Services with Claroty’s Visibility, Protection, and Threat Detection Platform for the XIoT
Pax8 secure industry vet David Powell as new sales strategy VP (CRN) Powell brings a background on both the MSP and vendor side of the business
Akamai Makes Partner Program Even More Rewarding and Simpler (Akamai) Program enhancements boost financial incentives for partners while making it easier to do business with Akamai
Contrast Security to Address Challenges of Code Security with Roll Out of New "Shift Smart" Strategy at RSAC 2023 (PR Newswire) Contrast Security (Contrast), the code security platform built for developers and trusted by security, today announced it will unveil "Shift...
Corvus and Core Specialty to Deliver Expansion of AI-Powered Excess Tech E&O and Cyber Product (Business Wire) Core Specialty’s first in the Cyber and Tech E&O market
Schneider Electric doubles down on sustainable, digital industrial transformation at Hannover Messe (PR Newswire) Schneider Electric, the leader in the digital transformation of energy management and automation, will unveil an array of new technologies and...
Technologies, Techniques, and Standards
CISA Releases updated Zero Trust Maturity Model (Cybersecurity and Infrastructure Security Agency) Second version incorporates key feedback received during 2021 public comment period
CISA Releases Zero Trust Maturity Model Version 2 (Cybersecurity and Infrastructure Security Agency CISA) CISA has released an update to the Zero Trust Maturity Model (ZTMM), superseding the initial version released in September 2021. ZTMM provides a roadmap for agencies to reference as they transition towards a zero-trust architecture. ZTMM also provides a gradient of implementation across five distinct pillars to facilitate federal implementation, allowing agencies to make minor advancements toward optimization over time.
CISA publishes update to Zero Trust Maturity Model (FedScoop) The updated maturity model adds an additional maturity stage – optimal – alongside traditional, initial and advanced.
CISA releases updated guidance for zero trust security architectures (FCW) The Cybersecurity and Infrastructure Security Agency is encouraging increased automation and enhanced security for access controls in its latest roadmap for agencies and organizations working to achieve zero trust.
Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign (Microsoft Security) This guide provides steps that organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2022-21894 via a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus. UEFI bootkits are particularly dangerous as they run at computer startup, prior to the operating system loading, and therefore can interfere with or deactivate various operating system (OS) security mechanisms such as BitLocker, hypervisor-protected code integrity (HVCI), and Microsoft Defender Antivirus. Though this could impede investigations and threat hunting efforts, several artifacts can still be leveraged to identify affected devices.
Microsoft Releases Guidance for the BlackLotus Campaign (Cybersecurity and Infrastructure Security Agency CISA) Microsoft has released Guidance for investigating attacks using CVE-2022-21894: The BlackLotus Campaign. According to Microsoft, “[t]his guide provides steps that organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2022-21894 via a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus.” An attacker could exploit this vulnerability to take control of an affected system.
The Army Wants SBOMs—and So Should the Other Services (Defense One) Software bills of materials are key to keeping track of what code is running your weapons or systems.
Banks take part in government cyber war games (Cybersecurity Connect) The federal government has begun running Australia’s major banks and financial organisations through scenario-based exercises in response to the growing number of cyber attacks on critical infrastru
Design and Innovation
US cyber chiefs warn of threats from China and AI (Register) It's not all doom and gloom because ML also amplifies defensive efforts, probably
With a wave of new LLMs, open-source AI is having a moment — and a red-hot debate (VentureBeat) Open source AI has been having a moment, following a wave of LLM releases and an effort to push back on the shift to closed, proprietary LLMs.
Where’s the AI Culture War? (The Atlantic) Somehow, artificial intelligence has remained strikingly nonpartisan.
Research and Development
Microsoft Research’s Yael Tauman Kalai receives 2022 ACM Prize in Computing (ACM) Kalai recognized for breakthroughs in verifiable delegation of computation and fundamental contributions to cryptography. Kalai’s contributions have helped shape modern cryptographic practices and provided a strong foundation for further advancements.
AI literacy might be ChatGPT’s biggest lesson for schools (MIT Technology Review) Plus: The complex math of counterfactuals could help Spotify pick your next favorite song.
Legislation, Policy, and Regulation
Push to ban ransomware payments following Australia’s biggest cyberattack (Cointelegraph) The Australian tech industry is pushing the government to ban ransomware payments following one of the country's largest cyber attacks.
Biden Administration Weighs Possible Rules for AI Tools Like ChatGPT (Wall Street Journal) Fears are growing over the potential use of artificial intelligence to commit crimes and spread falsehoods.
Battle could be brewing over new FCC data breach reporting rules (CSO Online) An expanded data breach definition and the telcos’ desire to link notifications to “concrete harm” are among the most controversial aspects of the proposed FCC data breach reporting rules.
On the heels of the US cyber strategy, CISA set to release secure by design principles (CyberScoop) CISA Director Jen Easterly said the agency plans to release the principles this week to encourage more safe coding practices.
U.S. House to vote on bill to address potential Huawei, ZTE threats (Reuters) The House of Representatives is set to vote next week on a bill to crack down on Chinese telecommunications companies Huawei and ZTE Corp that have been deemed security threats by the U.S. government.
Here are the leading AI regulation options for Congress and the administration (Washington Examiner) The popular adoption of artificial intelligence in the form of apps such as the image generator Midjourney and the chatbots ChatGPT and Bard has led to a greater interest in regulation of the industry.
Where parental snooping is becoming the law (POLITICO) A new digital-safety idea is spreading through state houses — but there’s a case it could backfire on families.
Five Things to Know About NSA Mass Surveillance and the Coming Fight in Congress (American Civil Liberties Union) Congress must take this opportunity rein in the pervasive government surveillance enabled by Section 702.
National Cybersecurity Center Bolsters Leadership with Announcement of Three New Board Members (National Cybersecurity Center) Colorado Springs, CO – April 12, 2023 The National Cybersecurity Center (NCC) announced Wednesday the addition of three new esteemed board members, adding to the diverse and respected leadership of the organization. The NCC welcomed attorney and author Mark D. Rasch; Ray Yepes, CISO, State of Colorado and representative of Colorado Governor Jared Polis to […]