Dateline
Ukraine at D+439: Drone strikes and disinformation. (CyberWire) President Putin doubles down on angry disinformation during Victory Day observances.
Russia-Ukraine war: List of key events, day 440 (Al Jazeera) As the war enters its 440th day, we take a look at the main developments.
Ukraine Shoots Down 35 Drones Over Kyiv as Attacks Kill 4 (Military.com) The bombardments came as Moscow enforced tight security on the eve of traditional Red Square commemorations marking the defeat of Nazi Germany in World War II.
Russian missiles downed over Kyiv as Putin makes angry Victory Day speech (the Guardian) Putin defends invasion, claiming enemies seek his country’s destruction, as security fears cast shadow over celebrations
Ukraine-Russia war latest: 'A real war has been unleashed... we have repulsed international terrorism,' says Putin (The Telegraph) Vladmir Putin has said that Russia has repulsed '"international terrorism" as he blamed the West for sparking war in Ukraine in his annual Victory Day speech.
Russia bans drones, jet skis, ride-hailing ahead of WWII parade (Military Times) Russia is clamping down ahead of its WWII parade, after a drone incident at the Kremlin, curbing drones, jet skis and car-sharing services.
Ukraine will now celebrate ‘Europe Day’ on Russia’s ‘Victory Day’ (The Hill) Ukraine will now celebrate “Europe Day” on Russia’s “Victory Day,” Ukrainian President Volodymyr Zelensky announced Monday. The Kyiv leader decreed that Ukraine will celebrate Europe Day May 9, th…
A Russian Su-34 accidentally bombed a Russian city. Here's what it tells us about Putin's forces. - Breaking Defense (Breaking Defense) “Using the Su-34 to drop unguided bombs is like pressing a Rolls-Royce automobile into being used as a taxicab," a former Russian aviation designer told Breaking Defense.
Russia is sending museum pieces into war, but experts say they may still be effective (CNN) A cargo train loaded with tanks chugs along under the crisp, spring sun. "Wow," a woman says, pointing her camera phone at the convoy. "This is the second train, there was one like it just before."
‘A monstrous statement’: Kremlin spokesman responds to Ukraine’s intelligence chief Kyrylo Budanov’s promise to ‘keep killing Russians’ (Meduza) The Kremlin Press Secretary Dmitry Peskov condemned Ukraine’s military intelligence chief Kyrylo Budanov’s statements in a Yahoo News interview published last week.
Can Ukraine Get Justice Without Thwarting Peace? (Foreign Affairs) Now is not the time to create a special tribunal for Russia.
China’s support may not be ‘lethal aid,’ but it’s vital to Russia’s aggression in Ukraine (Atlantic Council) A close look at trade data shows that Beijing is already providing critical support for Moscow's war aims. Policymakers should not get hung up on the "lethal aid" red line.
Von Der Leyen Arrives In Kyiv As Russia Launches Missiles At Ukrainian Capital (RadioFreeEurope/RadioLiberty) European Commission President Ursula von der Leyen has arrived in Kyiv for talks with Ukrainian President Volodymyr Zelenskiy on May 9 after Russia launched another missile attack at the Ukrainian capital overnight -- the fifth since the start of the month and the second in as many days.
Britain prepares to send long-range missiles to Ukraine (Washington Post) The U.K. is pushing the Biden administration into providing Ukraine with weapons that can reach further into Russian-held territory
Biden Administration Announces Additional Security Assistance for Ukraine (U.S. Department of Defense) The Department of Defense announced a new security assistance package to reaffirm the steadfast U.S. support for Ukraine.
US set to announce $1.2 billion aid package to Ukraine with counteroffensive looming | CNN Politics (CNN) The US is set to announce a $1.2 billion aid package to Ukraine as early as Tuesday, according to a US official familiar with the package, with Ukraine's counteroffensive against Russian forces looming.
Focus on the war, not just the battles (The Hill) The outcome of the Ukraine war is not foreordained. All wars come down to a test of will.
Reverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613) (CERT-UA) The government computer emergency response team of Ukraine CERT-UA discovered the fact of distribution of e-mails using compromised accounts with the subject "bill/payment" with an attachment in the form of a ZIP archive.
CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine (The Hacker News) Ukraine's CERT-UA warns of RoarBAT wiper malware causing destructive attacks on state organizations, and invoice-themed phishing campaigns.
CERT-UA warns of an ongoing SmokeLoader campaign (Security Affairs) Ukraine’s CERT-UA warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. CERT-UA warns of an ongoing phishing campaign that is distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are using emails sent from compromised accounts with the subject “bill/payment” with […]
Russians launch mass cyber attack on online service for queueing to cross border by trucks (Ukrainska Pravda) The Russians launched a cyber attack on YeCherha (E-Queue), the online service for booking a place to cross the border by truck.
Five Takeaways From the Russian Cyber-Attack on Viasat’s Satellites (Infosecurity Magazine) The 2022 AcidRain wiper attack, which shut down satellite services for thousands of people in Ukraine and Western Europe, was extensively discussed during the CYSAT conference in Paris
EU Targets Eight Chinese Companies in Russia Sanctions Push (Wall Street Journal) The bloc is looking to target firms believed to have provided Moscow electronic items that can be used for military purposes.
Attacks, Threats, and Vulnerabilities
AndoryuBot – New Botnet Campaign Targets Ruckus Wireless Admin Remote Code Execution Vulnerability (CVE-2023-25717) (Fortinet Blog) FortiGuard Labs details how a unique botnet leverages a Ruckus vulnerability and examines its behavior once inside an infected device. Learn more.…
Iranian state-sponsored hackers exploiting printer vulnerability (Record) Hackers based in Iran are exploiting a recently-discovered vulnerability affecting a popular printing management software, according to new research.
Microsoft: Iranian hacking groups join Papercut attack spree (BleepingComputer) Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers.
New PaperCut RCE exploit created that bypasses existing detections (BleepingComputer) A new proof-of-concept (PoC) exploit for an actively exploited PaperCut vulnerability was released that bypasses all known detection rules.
SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey (BlackBerry) The BlackBerry Research and Intelligence team has been actively monitoring the SideWinder APT group, whose latest campaign targets Pakistan government organizations by using a server-based polymorphism technique to deliver the payload.
Exploring the Rise of Israel-Based BEC Attacks (Abnormal) A recent study uncovered the emergence of an Israel-based threat group that launches sophisticated, multistage BEC attacks targeting global enterprises.
1 in 6 Security Experts Say There’s a “High-Level” Threat of AI Tools Being Used to Hack Passwords | Password Manager (Password Manager) An Intelligent.com survey finds that 56% of cybersecurity professionals are concerned about hackers using AI-powered tools to steal passwords.
Hackers publish MSI private keys, enabling signed malware (TechSpot) Security researchers have confirmed that private keys for MSI products and Intel Boot Guard are loose in the wild. Hackers could use the keys to sign malware...
Intel investigating leak of Intel Boot Guard private keys after MSI breach (BleepingComputer) Intel is investigating the leak of alleged private keys used by the Intel BootGuard security feature, potentially impacting its ability to block the installation of malicious UEFI firmware on MSI devices.
NextGen Healthcare says hackers accessed personal data of more than 1 million patients (TechCrunch) NextGen Healthcare has admitted to a data breach that saw hackers access the personal data of more than 1 million patients
1M NextGen Patient Records Compromised in Data Breach (Dark Reading) BlackCat ransomware operators reportedly stole the sensitive data.
Cloud-Based EHR Vendor Notifying 1 Million of Data Breach (Gov Info Security) Cloud-based electronic health records vendor NextGen Healthcare is notifying more than 1 million individuals of a data compromise involving stolen credentials. The
Hackers Target Hospitals, Disrupt Ability To Offer Patient Care | Entrepreneur (Entrepreneur) From 2016 to 2021, ransomware attacks on hospitals more than doubled, and nearly 44% of affected institutions said the attack impacted their ability to deliver healthcare.
Cyberattacks on health care are increasing. Inside one hospital's fight to recover (NPR) U.S. hospitals have seen a record number of cyberattacks over the past few years. Getting hacked can cost a hospital millions of dollars and expose patient data, and even jeopardize patient care.
Twitter admits 'security incident' broke Circle privacy (Register) Perhaps one of the thousands of people laid off from the biz could have fixed it, just a thought
LockBit 3.0 Leaks 600 GBs of Data Stolen From Indian Lender (Gov Info Security) The LockBit 3.0 ransomware group on Monday leaked 600 gigabytes of critical data stolen from Indian lender Fullerton India two weeks after the group demanded a $3
Brightline: At Least 964,300 Individuals Affected by Fortra GoAnywhere Hack (HIPAA Journal) Brightline, a provider of virtual behavioral and mental services to families, has confirmed it was affected by the cyberattack on Fortra’s GoAnywhere MFT Brightline has listed 58 Covered Entities on its website that were affected by the cyberattack on the Fortra GoAnywhere MFT solution and has confirmed that at least 964,300 individuals have been affected, although the total is likely to exceed 1 million.
Clop ransomware gang deletes data stolen from pediatrics care provider Brightline (teiss) The Clop ransomware gang has apologised for targeting US-based pediatric behavioural and mental health care provider Brightline and says it has deleted data stolen from the company.
Hackers stole database with customer info from Western Digital (Record) The owner of the popular SanDisk and WD data storage brands confirms that hackers stole a database containing names, billing and shipping addresses, email address and phone numbers.
Looming Threats Face California’s Water Infrastructure (GovTech) The challenges of defending water infrastructure are numerous. Many of the systems in California – and nationwide – are still operating with outdated software, poor passwords and other weaknesses that could leave them at risk.
Ransomware Still Attacking Dallas City Government (NBC 5 Dallas-Fort Worth) The City of Dallas is still in the midst of a ransomware attack Monday as officials worked to bring computer service back to all city functions.
Dallas cyberattack highlights ransomware’s risks to public safety, health (Washington Post) Investigators weren’t able to get information on the history of police calls to the home of a mass killing suspect due to a ransomware attack that knocked Dallas government computers down, law enforcement officials told Rebecca Lopez of news channel WFAA in a story this weekend.
Dallas courts, fire and police networks still crippled from ransomware incident (Record) Dallas officials say city agencies are slowly recovering. The Royal ransomware group took credit for the attack.
London Fitness Gym Chain Exposed 500k Customer Receipts Online (Website Planet) Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to Website Planet about a non-password protected database that contained over 1.3
Whiteford Taylor & Preston LLP Issues Notice of Data Incident (PR Newswire) On or about May 11, 2022, Whiteford Taylor & Preston, LLP ("Whiteford") became aware of a potential unauthorized access into the Whiteford...
Security Patches, Mitigations, and Software Updates
CyberGhost VPN patches command injection vulnerability (SC Media) Researcher who discovered the bug left fuming over the difficulties he had disclosing it.
Trends
IRONSCALES Threat Index Reveals New Insights on Phishing and BEC Threats (IRONSCALES) Inaugural IRONSCALES Threat Index reveals emerging threats that evade traditional defenses, credential theft, and BEC payment scams are on the rise.
Threat Hunting: Focusing on the Hunters and How Best to Support Them (SANS Institute) This is SANS’s eighth year of conducting our Threat Hunting Survey, where we go out to organizations around the globe to understand how they have conducted threat hunting over the last year and try to gain some insight into what they may do in the coming year. Much of the work we put into this report involves taking raw statistics from our respondents and translating them into patterns and trends forming in the industry over the last year.
70% of US IT Leaders Told Not to Disclose Data Breaches (Security Boulevard) Not all cybersecurity breaches get reported. A new report from Bitdefender found that although IT leaders have an obligation to report attacks, over 42% of them have been told to keep quiet when a breach should have been reported. Shockingly, in the U.S., this number rises to 70.7%.
SpyCloud Report: 2.27B Exposed Assets Tied to Fortune 1000 Employees; Cybercriminals Hit the Jackpot with Session Cookies (Business Wire) The technology sector had the highest number of malware-infected employees, most exposed corporate credentials and the majority of all stolen cookies.
Voice of Practitioners: The State of Secrets in AppSec (GitGuardian Blog) Our latest report gathered answers from 507 IT and security decision-makers to study awareness about the risks posed by secrets sprawl and operational maturity in large enterprises.
Marketplace
Optery Raises Seed Round to Modernize and Scale Personal Data Removal to Protect Consumers and Businesses from Online and Offline Attacks (GlobeNewswire News Room) Led by Bayhouse Capital, round will help Optery accelerate product enhancements, scale hiring and growth...
Keeper Security Announces Minority Growth Equity Investment from Summit Partners (PR Newswire) Keeper Security ("Keeper" or the "Company"), a leading provider of zero-trust and zero-knowledge cybersecurity software, today announced that...
Army posts RFI for protecting data sets in AI/ML applications (Intelligence Community News) On May 5, the U.S. Army posted a request for information (RFI) for Testing, Validating, and Protecting Army Data Sets for Use in Artificial Intelligence (AI) and Machine Learning (ML) Applications. Responses are due by 5:00 p.m. Eastern on May 12.
Arctic Wolf Named to CNBC Disruptor 50 List for Second Consecutive Year (GlobeNewswire News Room) Cybersecurity leader recognized for security operations innovation...
Why CrowdStrike, Cloudflare, and Okta Stocks All Popped Today | The Motley Fool (The Motley Fool) Zscaler is getting all the headlines, but one of its cybersecurity stock rivals is a much better bargain.
Zscaler Pre-Announces Strong Results. The Cybersecurity Stock Soars. (Investor's Business Daily) Cybersecurity firm Zscaler (ZS) on Monday pre-announced fiscal third-quarter results and raised full fiscal-year outlook, sending ZS stock soaring. Zscaler stock had retreated 20% in 2023 as of Friday amid stiff competition from startup Netskope and Palo Alto Networks (PANW).
Why Downtrodden Zscaler Stock Suddenly Soared Today (The Motley Fool) The business is performing slightly better than expected.
TXOne Networks Booms as Companies Globally Prioritize Protecting ICS, Operations and Revenues (Business Wire) TXOne Networks builds out team and grows Americas presence to meet demand for OT-native security solutions
Paperclip and Securadin Partner to Align Security Innovation with Evolving Compliance (GlobeNewswire News Room) Securadin now recognizes searchable encryption and Paperclip’s SAFE® encryption-in-use solution as a key to solving privacy and risk related to exposed,...
WithSecure joins CyberPeace Builders program (News Powered by Cision) The program connects WithSecure™ consultants and researchers with non-profits in need of security
CRN names 11 Sophos executives to 2023 Women of the Channel list (Sophos News) Recognition for extraordinary contributions to channel initiatives, leadership, and support for partners and customers.
MeriTalk Names 2023 Cyber Defenders Award Winners (Business Wire) 40 government and industry leaders recognized for their contributions to cyber programs in Federal IT
CyberFox Taps Wes Spencer As VP Of Cybersecurity Strategy (CRN) Spencer will help identify and create product focus strategies for CyberFox.
Products, Services, and Solutions
OneSpan Delivers Innovative Customer Success Packages to Support Entire Customer Journeys (OneSpan) Modern unified success service offerings provide faster time to value, mission-critical support, and increased user adoption to meet evolving customer needs
Truecaller aims to help WhatsApp users combat spam (Reuters) Truecaller will soon start making its caller identification service available over WhatsApp and other messaging apps to help users spot potential spam calls over the internet, the company told Reuters on Monday.
ShelterZoom brings its Document GPS solution to 1,000+ resellers via Cranel partnership (ReBlonde) ShelterZoom, a leading blockchain-based, smart document SaaS provider, partners with Cranel Inc., a U.S.-based distributor of document-management software and hardware solutions, to provide the latter’s network of value-added resellers with the Document GPS solution.
IBM Offers New QRadar Security Suite for Threat Detection and Response (Database Trends and Applications) IBM is unveiling its new security suite designed to unify and accelerate the security analyst experience across the full incident lifecycle. According to the company, the IBM Security QRadar Suite represents a major evolution and expansion of the QRadar brand, spanning all core threat detection, investigation, and response technologies, with significant investment in innovations across the portfolio.
CACI and Torchlight team up to provide safe access to dark web (Verdict) CACI International and Torchlight AI have formed an alliance to provide safe and secure access to surf the open, deep, and dark web.
Stefanini Cyber Defense Partners Globally with Shield-IoT to Secure any Connected Device at Mass-Scale (PR Newswire) Stefanini Cyber Defense, a Stefanini Group company specializing in advanced Intelligence and Cyber Defense solutions, announced today a global...
ThreatBlockr Announces Integration with GreyNoise to Guard Against False Positives (Business Wire) GreyNoise RIOT tool provides ThreatBlockr with a whitelist data set of 60 million known good IPs
CyberArk Identity Flows Accelerates Cybersecurity Risk Response (Business Wire) New Advanced Automation Capabilities and Integrations with Gurucul, Proofpoint and SentinelOne Enable Proactive Threat Protection
Checkly Unveils Innovative CLI Uniting Monitoring and Testing Through (PRWeb) Checkly, the leading provider of monitoring solutions powered by a monitoring as code (MaC) workflow, has announced the general availability of its new, innovative com
KSOC releases the first Kubernetes Bill of Materials (KBOM) standard (EIN Presswire) The open source tool enables cloud security teams to quickly respond to new CVEs in third-party Kubernetes tools
Forward Networks Recognized with Global InfoSec Award for Cloud Security (PR Newswire) Forward Networks announced today it has been recognized with the Hot Company in Cloud Security Award from Cyber Defense Magazine's 2023 Global...
Industry-first Integration from Fortra Allows Organizations to Supercharge Their Automation Footprint (Benzinga) Newly Released Automate Execution Method Leads to Improved Process Efficiency, Increased Productivity, and Faster Turnaround Times MINNEAPOLIS (PRWEB) May 09, 2023 Fortra announced today a compelling connection between
MTRIX Selects Veridium as a New Partner for Trusted Digital Identities (Business Wire) Veridium Tapped for Trusted Digital Identities and Consistent, Frictionless User Experience Across All Environments - From Fat and Remote Clients to iPads and Mobile Devices.
Dependency Confusion Supply Chain Attacks: 49% of Organizations Are Vulnerable (Orca Security) In this blog, we explain how a Dependency Confusion attack can take place, what measures can be used to minimize the risk and how Orca helps with mitigation.
Technologies, Techniques, and Standards
CISA Developing an SBOM Ecosystem to Improve Open-Source Software Visibility (FedTech) Agencies still need to figure out how to require and use a software bill of materials.
Colonial Pipeline ransomware attack's unexpected legacy (Axios) Looking back at the legacy of the Colonial Pipeline ransomware attack, experts are still unclear on why this was the incident that sparked such a massive sea change across policymaking and boardrooms.
Compliance Pointers for the New National Cybersecurity Strategy: Defending Critical Infrastructure and Investing in Tomorrow (Intelligence Community News) The National Cybersecurity Strategy contains many initiatives that apply to public and private organizations, state and local governments, utilities, healthcare, and educational industries. The good news is federal agencies can get a head start on implementing several initiatives today.In this article, IC Insider Thales Trusted Cyber Technolgies focuses on Defending the Critical Infrastructure, and Investing in a Resilient Future.
Why the 'Why' of a Data Breach Matters (Dark Reading) The motivations of an attacker help establish what protections to put into place to protect assets.
It’s Time to Acknowledge Big Tech Was Always at Odds with Journalism (Tech Policy Press) Continue ReadingIt’s Time to Acknowledge Big Tech Was Always at Odds with Journalism
Council Post: Making The Most Of Your Advisory Board’s Data Security Expert (Forbes) Data security experts serve as powerful allies, helping organizations make informed decisions and reducing the long-term costs associated with data incidents.
2021 Voice of the CISO Report (Proofpoint) The Proofpoint 2021 Voice of the CISO report surveyed 1,400 CISOs from around the world. We invited them to share their first-hand experiences during the past 12 months and offer their insights for the next two years.
Design and Innovation
CISA Welcomes Inaugural Cyber Innovation Fellows | CISA (Cybersecurity and Infrastructure Security Agency CISA) Today we welcome the first two CISA Cyber Innovation Fellows, experts from the private sector who will join our cybersecurity teammates tackling some of the toughest cyber challenges.
Alphabet to unveil A.I. updates at Google I/O, showing off creative writing and coding capabilities (CNBC) Google's hefty investments in artificial intelligence will be on display at its annual developer conference this week.
How to Make the Quantum (Computing) Leap (CIO) Three steps to start deploying quantum computing applications.
Technology Innovation Institute Launches the TII McEliece Challenges to Test the McEliece Cryptosystem as a Candidate for Post-Quantum Encryption (PR Newswire) Technology Innovation Institute (TII), a leading global scientific research center and applied research pillar of Abu Dhabi's Advanced...
Research and Development
Pentagon’s AI office rebooting global experiments for JADC2 (Defense News) Craig Martell said his team took the reins of the Global Information Dominance Experiments to “understand what’s the right way to get after JADC2.”
Chinese Researchers Say They Broke RSA Encryption. Will That Affect You? - American Security Today (American Security Today) Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the announcement points up a chilling fact: Within the next decade, there’s a strong possibility quantum computers will break common encryption codes. Does […]
Academia
Young students compete in cybersecurity competition at UW (Kitchener) Students in grades seven to twelve from Canada’s top teams competed in the sixth CyberTitan competition at the University of Waterloo (UW) on Monday.
Legislation, Policy, and Regulation
The Global Battle to Regulate AI Is Just Beginning (WIRED) Europe’s parliament is struggling to agree on new rules to govern AI—showing how policymakers everywhere have a lot to learn about the technology.
Vietnam wants Facebook, YouTube, TikTok users to verify identities (Nikkei Asia) News coincides with authoritarian state's plan for sweeping probe of TikTok
Vietnam to require social media users to verify identity (Reuters) Vietnam is preparing to make it mandatory for social media users of both local and foreign platforms to verify their identity in a bid to rein in online scams, state media reported on Monday.
Singapore Eyes Sweeping Powers to Police Online Content, Apps (Bloomberg) Government will be able to order platforms to remove content. Proposed law contemplates offences against national harmony.
China-Canada ties sour over tit-for-tat diplomatic expulsions (Nikkei Asia) Beijing retaliates for Ottawa declaring Chinese envoy persona non grata
Turkish elections ‘secured’ against cyber threats (Daily Sabah) Türkiye has taken every measure against potential power shortages at key buildings that will be used during the upcoming elections, Energy Minister Fatih...
Re-defining the basics of Australian privacy law (JD Supra) In support of Privacy Awareness Week and this year’s theme of ‘back to basics’, we provide you with an in-depth analysis of the key proposals that...
European committee investigating spyware abuses advances long-awaited report (Washington Post) Regulations potentially on deck for E.U. following spyware report approval
White House considers ban on ransom payments, with caveats (Cybersecurity Dive) Experts suggest the effort, a reversal from the administration's previous stance, is fraught with complications that could cause unintended consequences.
Nationwide push to require social media age verification raises questions about privacy, industry standards (CyberScoop) Arkansas and Utah have already passed restrictions and at least seven other states and Congress are considering similar age requirements.
Texas Cities Boost Security in Wake of Dallas Cyber Attack (Governing) A ransomware attack has caused outages for the city’s systems for the past three days. As Dallas struggles to restore service, other cities across the state have increased their cybersecurity efforts.
Sen. Schatz introduces bipartisan bill to protect keiki from harms of social media (Kauai Now) U.S. senators Brian Schatz, Tom Cotton, Chris Murphy and Katie Britt have proposed new legislation called the Protecting Kids on Social Media Act, aimed at safeguarding children from the harmful effects of social media.
Litigation, Investigation, and Law Enforcement
EU proposal to scan private messages for child abuse may be illegal (Computing) Lawyers say proposed client-side scanning measures likely break the law in several areas
China Signals Spying Fears Amid Probe of Consulting Firms (Wall Street Journal) The due-diligence industry is suddenly in the crosshairs of Beijing’s efforts to limit foreign influence in China.
China raids another global business consultancy, cites spying concerns (Washington Post) Chinese authorities have conducted raids on the offices of Capvision, an international consultancy, to investigate alleged national security risks, intensifying fears that China’s foreign business community is being caught up in an espionage crackdown.
Massachusetts Guardsman Jack Teixeira’s federal detention hearing set to resume after alleged leaks; more of his Discord posts reported (Boston Herald) Massachusetts Air National Guardsman Jack Teixeira is set to return to court this week, as the 21-year-old IT tech tries to get released from federal detention after he allegedly leaked military se…
FBI seizes 13 more domains linked to DDoS-for-hire services (BleepingComputer) The U.S. Justice Department announced today the seizure of 13 more domains linked to DDoS-for-hire platforms, also known as 'booter' or 'stressor' services.
Why the FTX Collapse Was an Identity Problem (Dark Reading) Cryptocurrency has a valuable role to play in a Web3 world — but only if the public can fully trust it.
On the trail of the Dark Avenger: the most dangerous virus writer in the world (the Guardian) The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
Apple Fails to Fully Reboot iOS Simulator Copyright Case (1) (Bloomberg Law) Apple Inc. failed to fully revive a long-running copyright lawsuit against cybersecurity firm Corellium Inc. over its software that simulates the iPhone’s iOS operating systems, letting security researchers identify flaws in the software.