Cyber Attacks, Threats, and Vulnerabilities
Chinese APT group targets India and Hong Kong using new variant of MgBot malware (Malwarebytes Labs) We uncovered an active campaign in early July that we attribute to a new Chinese APT group attacking India and Hong Kong with MgBot malware.
New ‘Meow’ attack has wiped dozens of unsecured databases (BleepingComputer) Dozens of unsecured databases exposed on the public web are the target of an automated 'meow' attack that wipes data without any explanation.
DeepSource resets logins after employee falls for Sawfish phishing (BleepingComputer) GitHub notified DeepSource earlier this month of detecting malicious activity related to the startup's GitHub app after one of their employees fell victim to the Sawfish phishing campaign.
Major Security Flaws Found in South Korea Quarantine App (New York Times) The defects, which have been fixed, exposed private details of people in quarantine. The country has been hailed as a pioneer in digital public health.
Phishing attacks hiding in Google Cloud to steal Microsoft account credentials (TechRepublic) By hosting phishing pages at a legitimate cloud service, cybercriminals try to avoid arousing suspicion, says Check Point Research.
Social Engineering Campaign Evades Anti-Phishing Logo Detection (IRONSCALES) New Social Engineering Campaign Exposes Inattentional Blindness to capture users credentials in fake login attack.
Joker to Blackrock: Latest Malware you should be beware of ! (The Mobile Indian) Fresh from the Joker Malware attack, another dangerous malware has struck India!
New security research from Bridgecrew shows nearly one in two Terraform Registry modules is misconfigured (PR Newswire) Bridgecrew, who came out of stealth mode this April, published its first research report to analyze the infrastructure-as-code (IaC) security...
IoT Botnets: Why the Next Mirai Could Be Worse (BankInfo Security) Cybercriminals are exploiting and using weak IoT devices in new ways, including as proxies for e-commerce fraud. Allison Nixon of Unit221b says that the next mass
Europe's Largest Telco Targeted in Recent Ransomware Attack (Tech Times) Here's the extent of the massive data breach.
RISD Announces College Has Been Hacked—Data Breach and Attempted Ransomeware Attack (GoLocalProv) Rhode Island School of Design announced late Tuesday night that data of the school has been breached. The data is was held by a third party company. According to RISD officials, credit card information and social security numbers were not compromised.
Hackers Stole Diebold Code And Are Using It To Empty Cash From ATMs (Forbes) Criminal hackers are employing a new tool to attack the company’s ATMs and it comes from a surprising source.
Nielsen data centre hit by suspected cyber attack (iTnews) TV ratings data delayed after 'unexpected disruption'.
Scotiabank contacting ‘limited number’ of customers after suspicious employee activity (Global News) 'The employee is no longer with the bank,' Scotiabank said in a statement.
Highpoint Foot and Ankle reports possible data breach (Go Erie) Highpoint Foot and Ankle discovered files with encrypted ransomware on the network in late May.
University of York hit by cyber-attack - personal details of students and staff may have been stolen (York Press) THE University of York has launched an investigation after personal details of students, staff and alumni may have been stolen by hackers.
College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data (CyberNews) We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive high school student academic information. Included in this unsecured bucket are GPA scores, ACT, SAT, and PSAT scores, unofficial transcripts, student IDs, and students’ and parents’ names, email addresses, home addresses, phone numbers and more. […]
Suspicious Email Not Part Of Widespread Breach In Cinnaminson (Cinnaminson, NJ Patch) A suspicious email that went out from the tax assessor's office last week was not part of a widespread breach, Cinnaminson officials said.
Cyber Against Granny (Information Security Buzz) Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the United States. Cybercrime can be defined as “any criminal activity in which a computer (or networked device) is targeted and/or used.” Cybercriminals with access to an older adult person’s information via a computer, smartphone, or other networked …
Treck TCP/IP Stack (Update E) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely
Vendor: Treck Inc.
Vulnerabilities: Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or Wraparound, Improper Null Termination, Improper Access Control
CISA is aware of a public report, known as “Ripple20” that details vulnerabilities found in the Treck TCP/IP stack. CISA is issuing this advisory to provide early notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
Security Patches, Mitigations, and Software Updates
G Suite security updates for Gmail, Meet, Chat and Admin (Google Cloud Blog) New updates in G Suite provide even stronger security around our key products: Gmail, Meet, Chat, and Admin. We’re also unveiling new ways to help IT admins more easily manage and secure devices.
Microsoft adds MFA, identity management to Azure Lighthouse (CRN Australia) Also intros cloud practice “playbooks”.
Zoom fixes ‘vanity URL’ security issue that left users exposed to phishing exploits (The Daily Swig) Now-patched flaw made it easy for attackers to impersonate legitimate organizations
Critical Adobe Photoshop Flaws Patched in Emergency Update (Threatpost) Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.
Balbix Report Reveals the Major Concerns and Risks Hindering CISOs’ Ability to Strengthen Security Posture (BusinessWire) Balbix Inc., provider of the industry’s first system for cybersecurity posture transformation, today released its 2020 Cybersecurity 360 Report. The r
Tessian | Nearly Half of Employees Make Mistakes with Cybersecurity Repercussions (RealWire) New research from email security firm Tessian reveals why people make mistakes, how blurred lines between work and home contribute, and the factors that influence cybersecurity behaviors
Do Financial Crime Investigators Have a Bull’s Eye on their Back? (Authentic8 Blog) Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission?
2020 Open Source Security & Risk Analysis (OSSRA) (Synopsys) The 2020 OSSRA report offers an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.
McAfee Report Shows Threat Actor Evolution During Pandemic (BusinessWire) Cybercriminals leverage pandemic as entry mechanism into systems across the globe
Telehealth Is the New Normal, But So Is Online Fraud (HealthITSecurity) Given the breadth and scope of fraud threats, healthcare systems need to take a comprehensive three-pronged approach to cybersecurity.
DDoS attacks saw huge rise during lockdown (ITProPortal) Compared to late last year, the number of DDoS attacks surged by more than 500 percent.
COVID-19 pandemic sparks 72% ransomware growth (Intelligent CIO Europe) Skybox Security, a global leader in cybersecurity management, has published the mid-year update to its 2020 Vulnerability and Threat Trends Report. The report analyses the vulnerabilities, exploits and threats in play over the first half of a year dominated by the chaos surrounding the COVID-19 pandemic. The report, compiled by Skybox Research Lab, aims to help […]
43 percent of employees make mistakes that have cybersecurity implications (BetaNews) A report released today by email security firm Tessian reveals that 43 percent of US and UK employees have made mistakes resulting in cybersecurity repercussions for themselves or their company.
Chris Vickery: AI Will Drive Tomorrow’s Data Breaches (Threatpost) Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.
Ordr Releases 2020 Enterprise IoT Report Highlighting Security and Shadow IoT Threats (Ordr) Ordr Enterprise IoT Adoption & Risk report analyzes risks from more than 5 million connected devices. The report unveils shadow IoT, compliance violations, and FDA recalls as key challenges to securing enterprise IoT.
What IT Needs to Know about OT/IoT Security Threats in 2020 (Nozomi Networks) As head of the security research team at Nozomi Networks Labs, today I’m proud to introduce our review of the OT/IoT threat landscape for the first half of 2020 (1H). During this time, our team saw an increase in threats to OT and IoT networks, especially IoT botnet, ransomware and COVID-19-themed attacks.
Summary of July 15, 2020 Purdue University Seminar on control system cyber security (Control Global) July 15, 2020 I gave a 1 hour presentation on control system cyber security for the Purdue University Summer Seminar Series. There were 183 pre-registrations of which 119 attended
Cybersecurity firm Darktrace to pick banks for blockbuster float (Sky News) The cybersecurity firm will pick banks in the coming weeks to spearhead a London listing, Sky News learns.
Darktrace to pick London for £2bn listing (The Telegraph) The cyber security company is understood to be preparing to pick bankers in the coming weeks.
Darktrace offers £1.5bn ray of light (Times) The barren London flotation market is set to brighten as Darktrace, the British cybersecurity company led by Poppy Gustafsson, moves ahead with a listing.Darktrace is preparing to choose banks to lead
Acronis Completed the Acquisition of DeviceLock (CIO Applications) Acronis will integrate DeviceLock’s technology into its Cyber Platform and continue working...
St. Louis cybersecurity startup Q-Net inks $3M contract with U.S. Air Force (St. Louis Business Journal) Q-Net said the Phase II contract involves partnering with the Air Force’s Cryptologic and Cyber Systems Division for development of an “impenetrable network” for military communications.
Qbase Gets $104M Defense Acquisition University IT Support BPA (GovCon Wire) Qbase has secured a potential five-year, $103.6M blanket purchase agreement from Washington Headquar
10 Cool Tech Startups That Raised Funding In June 2020 (CRN) Big-data and security startups such as Starburst Data and Area 1 Security raised funding in June 2020.
Five Major Israeli Cybersecurity Exits in 2020 (Israel Defense) Despite the coronavirus pandemic the first half of 2020 saw some big exists for Israeli cybersecurity companies.
GroupSense Records Substantial Year-Over-Year Growth Despite Economic Downturn (PR Newswire) GroupSense, a threat intelligence company, today announced achieving multiple key milestones from a successful first half of 2020 despite a...
Canada’s Bell considers working again with Huawei on 5G pending Government decision (Romania Insider) Canadian national telecom carrier Bell is open to working with Huawei again if the Canadian government allows it to
TikTok might be sold to US investors to ward off security concerns (The Next Web) A number of US-based investors are considering purchasing TikTok. The move could ease security concerns around the Chinese app.
Silent Cyber – No Longer Silent? (GC Capital Ideas) Silent (or non-affirmative) cyber refers to cyber-related exposure within many all-risk general insurance products. If no explicit cyber exclusion applies, coverage for losses caused by cyber perils may apply. This underlying exposure’s potential for aggregated loss is currently one of the major issues being considered by the (re)insurance industry, according to Siobhan O’Brien, International Cyber […]
Twitter to crackdown on QAnon as movement’s influence grows (BostonGlobe.com) Twitter said Tuesday evening that it had removed thousands of accounts that spread messages about the conspiracy theories known as QAnon, saying their messages could lead to harm and violated Twitter policy.
Twitter Bans QAnon Accounts, Citing Risk of Offline Harm (Wall Street Journal) Twitter said it would step up enforcement against followers of the QAnon conspiracy theory, becoming the first major platform to take aggressive action to limit the spread of a discredited movement that has festered online for years.
WSJ News Exclusive | Facebook Creates Teams to Study Racial Bias, After Previously Limiting Such Efforts (Wall Street Journal) The social media giant aims to study and address potential racial bias on its core platform and Instagram unit, in a departure from the company’s prior reluctance to explore the way its products affect different minority groups.
Facebook begins labeling, but not fact-checking, posts from Trump and Biden (CNN) After President Donald Trump posted an unfounded claim to Facebook on Tuesday that mail-in voting could lead to a "corrupt election," the social network slapped a label on it. But the label did not attempt to fact-check the post as true or false. Instead, it directed users to a government website to learn more about how to vote.
Bitdefender Poised to Accelerate Enterprise Growth With Key Leadership Hires (PR Newswire) Bitdefender, a leading global cybersecurity company protecting over 500 million systems worldwide, has consolidated the Business Solutions...
EFF Welcomes Cybersecurity Expert Tarah Wheeler to Advisory Board (Electronic Frontier Foundation) Cybersecurity policy expert. Security researcher. Women in tech advocate. Entrepreneur. Tarah Wheeler’s expertise and experience encompasses the most pressing issues in tech, and we’re honored to announce that she is joining EFF’s advisory board. She will be helping us with our work on information...
Druva Scales Security and IT Infrastructure With New CIO and CISO (BusinessWire) Druva, Inc., the leader in Cloud Data Protection and Management, today announced the appointment of Andrew Daniels as the company’s new Chief Informat
Products, Services, and Solutions
Panorays' Revolutionary 3rd Party Security Ratings Model (Panorays) Panorays' new Cyber Risk Rating combines essential cyber data with business context to help organizations make quick security decisions about suppliers.
Onapsis Releases Free SAP RECON Vulnerability Scanning Tool to Quickly Detect Potentially Compromised and Exposed SAP Applications (BusinessWire) Onapsis Releases Free SAP RECON Vulnerability Scanning Tool to Quickly Detect Potentially Compromised and Exposed SAP Applications
Snyk Strengthens Prioritization Capabilities to Increase Developer Efficiency and Reduce Risk (PR Newswire) Snyk, the leader in developer-first security, has announced the significant enhancements to its Prioritization capabilities, helping security...
SyncDog Enhances Mobile Threat Defense Capabilities with Zimperium (PR Newswire) SyncDog Inc., the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, today announced a...
LogMeIn Unlocks New Opportunities for MSPs by Offering LastPass Single Sign On and Enterprise Password Management (Yahoo) BOSTON, July 22, 2020 (GLOBE NEWSWIRE) -- LogMeIn, Inc. (Nasdaq: LOGM) today announced that Managed Service Providers (MSPs) worldwide can now sell, manage, and support LastPass Enterprise, its industry-leading password management and single sign-on solution, for their customers. As part of the LogMeIn
Attivo Networks Announces Endpoint Capabilities that Catch Attackers at Hello (BusinessWire) Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, introduced today new capabilities to its
BitDam Advanced Threat Protection for Microsoft OneDrive Now Available (PRWeb) BitDam, a leading provider of cybersecurity solutions that protect enterprise communications from unknown threats hidden in files and links, today announced
Quantum Xchange Releases Version 2.0 of its Quantum-Safe Key Distribution System Featuring New User Interface (PR Newswire) Quantum Xchange, a leader in quantum-safe products and services for crypto agility and quantum readiness, today announced the general...
TRIMEDX Announces Partnership With Medigate to Provide Real-Time Visibility Into Connected Medical Devices, Launches Expanded Offerings for Health Systems (BusinessWire) TRIMEDX announces partnership with Medigate to provide real-time visibility into connected medical devices, launches expanded offerings
Masergy Expands its SD-WAN Portfolio Offering the Broadest Choice, Flexibility, and Built-In SASE (BusinessWire) Masergy, the software-defined network and cloud platform for the digital enterprise, today launched the next generation of its SD-WAN portfolio. The n
Netwrix reinvents Account Lockout Examiner freeware to support remote workforces (Netwrix) The newest version of the tool enables IT administrators to investigate why users are locked out and get them back to work even faster.
WhiteHat Security’s ‘Drive the Future’ Initiative Accelerates Access to Critical Application Security to Protect Our Modern Digital Economy (BusinessWire) WhiteHat Security today announced the launch of its new 'Drive the Future' initiative.
Bamboo Technology teams with Stealthcare to fight cybersecurity threats to its government, corporate and NGO clients in the UK (PR Newswire) International cybersecurity leader Stealthcare has announced a new partnership with Bamboo Technology Group that gives this UK-based Managed...
KnowBe4 Launches New Browser Password Inspector Tool (PR Newswire) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it has launched a...
Perch Security Launches RMM Monitoring for Managed Service Providers (PR Newswire) In the continuing war against threat actors intent on breaching networks and stealing private data for their own ill-gotten financial gains,...
LogRhythm Releases Version 7.5 of NextGen SIEM Platform and New Open Collector Technology (BusinessWire) LogRhythm, the company powering today’s security operations centers (SOCs), today announced the launch of version 7.5 of the LogRhythm NextGen SIEM Pl
Thycotic Releases "Privileged Access Cloud Security For Dummies" (PR Newswire) Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, including 25 of the Fortune...
Cyber Security Products to Replace Symantec (Charity Digital) Symantec is no longer available at a discounted charity rate. We explore the alternatives to help your organisation find the right fit
Sequitur Labs Launches EmSPARK 2.0 Security Suite For Critical IoT Device Protection (Embedded Technology) Sequitur Labs today debuted the next generation of its comprehensive approach to embedded system security with the launch of EmSPARK 2.0 to prevent high-value, embedded devices from being compromised.
Vectra Launches New Advisory and Operational Cybersecurity Services (AiThority) Vectra, the leader in network threat detection and response (NDR), announced a range of new advisory and operational cybersecurity services
Digital Shadows announces integration with Atlassian Jira (PR Newswire) Digital Shadows, the leader in digital risk protection, has today announced full integration with popular issue and project tracking platform...
Technologies, Techniques, and Standards
Your small business could easily be wiped out by a cyberattack, here are 5 steps to take (Fox Business) One simple attack and the business that they've worked so hard to build could be shuttered forever.
4 Hardware-Based Endpoint Security Strategies for a Distributed Workforce (Tech) Cybercrime has become the inevitable downside of the lockdown economy.
The Psychology of Human Error (Tessian) By learning the psychology behind human error, businesses can better understand how to prevent mistakes from happening before they turn into breaches.
PrivateVPN CMO: 5G network will be a major focus for online security (Global Security Mag Online) In a recent interview with Precisesecurity.com, PrivateVPN Chief Marketing Officer Michael Smolski has discussed the role of the 5G network in regard to online security. He also talked about the impact of the coronavirus pandemic in pushing for the adoption of a VPN.
New York Gears Up for Cyberattacks on November Elections (Wall Street Journal) New York state is training election officials on cybersecurity measures this week in the latest attempt to shore up voting systems before November.
Design and Innovation
G Suite security updates for Gmail, Meet, Chat and Admin (Google Cloud Blog) New updates in G Suite provide even stronger security around our key products: Gmail, Meet, Chat, and Admin. We’re also unveiling new ways to help IT admins more easily manage and secure devices.
The Google BIMI Pilot and what it means for the future of the inbox! (Twilio Blog) Twilio posts cloud communications trends, customer stories, and tips for building scaleable voice and SMS applications with Twilio's APIs.
AuthIndicators Welcomes Google BIMI Pilot (PR Newswire) The AuthIndicators Working Group, which has developed the BIMI (Brand Indicators for Message Identification) specification, congratulates...
Valimail salutes Google for its support of BIMI (Valimail) Google announced today that it will be launching a pilot for BIMI (Brand Indicators for Message Identification), a new email specification, in Gmail.
Cybersecurity team partners with Wyoming State Library to provide cyber education (Wyoming Tribune Eagle) CHEYENNE – The Wyoming State Library and Wyoming Cybersecurity Action Network (CAN) Committee have teamed up to offer free “cyber-in-a-box” educational programs to libraries.
Applications Open for ESET’s Fifth Annual Women in Cybersecurity Scholarship (ESET) ESET to Award $5,000 Each to Three Graduate/Undergraduate Women in the United States Who Are Majoring in a STEM Field of Study
UTSA offers cybersecurity certificate for non-cyber workers (ExpressNews) The College of Business is offering the graduate certificate.
Legislation, Policy, and Regulation
Divide et impera: A look at Russia’s information warfare activities (C4ISRNET) If you notice a looming crisis in a Western country, a Russian propaganda campaign may be waiting in the wings.
Making Cyberspace Safe for Democracy (Foreign Affairs) The New Landscape of Information Competition
The New Big Brother: China and Digital Authoritarianism (A Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate) Dear Colleagues: The growth and development of the digital domain worldwide has fundamentally changed how individuals, companies, and nations interact, work, and communicate – and with it the structure of global governance.
Huawei and China-US tensions: Where do we go from here? (CNET) China's tech champion has been caught up in escalating political tensions, but it's determined to maintain and even boost its success on the international stage.
Huawei, ZTE are tools of Chinese hegemony in Asia, says former US National Security Advisor John Bolton (MediaNama) Taking control of 5G through “what seemed to be commercial companies like Huawei and ZTE” is a long-term Chinese strategy to assert its hegemony over Asia, former American National Security Advisor John Bolton said.
Explained: The new tech cold war (The Indian Express) US has moved to block China's access to chipmaking tools and designated Huawei, ZTE as national security threats. With the 5G rollout imminent, the tussle will not leave other countries, including India, untouched.
Expert warns Europe of "American trap" over Huawei ban (ECNS) Europe should resist U.S. pressure to isolate China and remain independent in its decision making in the face of so-called security concerns, a Spanish expert has said.
With Trump CIA directive, the cyber offense pendulum swings too far (Yahoo News) The CIA, it now appears, has received new authorization to engage in international cyberattacks without having to go through any interagency review.
Is TikTok really as much of a security threat as Huawei? (New Statesman) In February, the wildly popular social media app TikTok launched a recruitment drive in Europe.
House votes to ban TikTok on federal devices (POLITICO) National security concerns about TikTok, owned by Chinese tech giant ByteDance, have picked up steam amid fears that U.S. users’ personal information could fall into the hands of government officials in Beijing.
House-passed defense spending bill includes provision establishing White House cyber czar (TheHill) The House version of the annual National Defense Authorization Act (NDAA) passed Tuesday included a provision establishing a national cyber director at the White House, a role that would help coordinate federal cybe
White House Cites Intel Sharing Efforts in NDAA Veto Threat (Nextgov.com) The related provisions would implement major recommendations from the Cyberspace Solarium Commission.
New police powers to be broad enough to target Facebook (Brisbane Times) Police will be given new powers to fight online child sex abusers and other serious criminals on Facebook, with the social media giant to be treated like a giant "dark web".
Cyber war puts heat on telcos (Australian Financial Review) Stopping cyber threats before they reach their intended targets is increasingly happening in the telco pipes. Telstra's leadership will put pressure on others to lift their game.
Blacklisting of Chinese Firms Rattles American Supply Chains (Wall Street Journal) Beyond the compliance burdens, reputational risks are likely to dissuade U.S. companies from doing business with firms tied to the region where human-rights abuses of the Uighur minority are alleged.
To be competitive in 5G, the US must play offense, not defense (C4ISRNET) The U.S. squabbling with itself only yields an uncontested “win” for China.
Keeping America’s 5G Networks Secure, Now and Into the Future (Citizens Against Government Waste) During uncertain times, it is important for the United States to create a strong, stable, and secure 5G network.
The Cybersecurity 202: Joe Biden is putting the Kremlin on notice about election interference (Washington Post) Democrats are sounding alarms about foreign election interference and pledging to punch back hard against Russia or any other adversary that undermines U.S. voting.
Army re-orgs tech directorate (FCW) The Army has a new strategic operations directorate under the department's management office, an organization said to be a 'precursor' to the upcoming CIO reorganization.
Litigation, Investigation, and Law Enforcement
Two Chinese Hackers Charged in Global Computer Intrusion Campaign (Federal Bureau of Investigation) FBI Deputy Director David Bowdich delivered remarks during a press conference at the Department of Justice announcing charges against two Chinese hackers for their roles in a global computer intrusion campaign targeting intellectual property and confidential business information, including COVID-19 research.
US charges two Chinese spies in global hacking campaign targeting COVID-19 research (TechCrunch) The hackers are accused of a hacking spree lasting more than a decade.
U.S. Indicts Two Chinese Nationals for Hacking Hundreds of Organizations (SecurityWeek) The United States has announced charges against two individuals for hacking hundreds of organizations worldwide, including governments and COVID-19 responders
US Accuses Chinese Hackers in Targeting of COVID-19 Research (SecurityWeek) US charges two Chinese hackers for stealing hundreds of millions of dollars of trade secrets from companies across the world and more recently targeting firms developing a vaccine for the coronavirus.
How Chinese hackers pillaged computers' recycling bins to steal secrets and coronavirus research (The Telegraph) The suspects' spoils included weapon designs, pharmaceutical research and a yet-to-be released video game, according to US charges
Chinese pair in Australian business hack (Yahoo) Two hackers based in China allegedly targeted Australian defence and solar businesses and US COVID-19 researchers.
U.S. Orders China to Close Houston Consulate (Wall Street Journal) The U.S. ordered the closure of China’s consulate in Houston in order to protect American intellectual property and private information of U.S. citizens, the State Department said.
China Vows Retaliation After U.S. Shuts Down Houston Consulate (Bloomberg) Beijing calls U.S. decision ‘unprecedented escalation’. State Department says move to protect intellectual property.
Videos show flames, activity in courtyard of Consulate General of China in Houston (KPRC) Houston police and fire officials are responding to reports that documents are being burned in the courtyard of the Consulate General of China in Houston, according to the Houston Police Department.
Documents reportedly burning on the grounds of the Chinese Consulate in Houston (ABC13 Houston) Cans full of documents were seen being burned after the US reportedly ordered the Chinese consulate to close by the end of this week.
The Cybersecurity 202: Chinese hackers could work for the government — or themselves (Washington Post) A U.S. indictment of Chinese hackers who tried to steal coronavirus vaccine research demonstrates the increasingly fuzzy line between state-sponsored hacking and mere criminality.
Democrats raise concerns over Russian-linked campaign targeting Biden (KTVZ) Congressional Democrats’ request to the FBI to brief lawmakers on foreign election interference included concerns about a Russian-linked “disinformation” campaign to target former Vice President Joe Biden in the 2020 election, according to a source familiar with the matter. House Speaker Nancy Pelosi, Senate Minority Leader Chuck Schumer and the top Democrats on the House
Slack Files EU Antitrust Complaint Against Microsoft (Wall Street Journal) Microsoft is facing an antitrust complaint in the European Union over its push into workplace-collaboration software, joining a series of big tech firms under scrutiny on both sides of the Atlantic for allegedly abusing their dominance.
Army Denies Violating 1st Amendment in Esports Recruiting, Sponsoring Fake Giveaways (Military.com) The Army has temporarily stopped its esports team from streaming on Twitch while it reviews its policies.
Police OK To Use Tower Data To Track Suspect, Judge Says (Law360) North Carolina police did not violate the privacy of a suspected bank robber when they used a mass collection of cell tower information to determine his location during two jewelry store robberies in 2018, a North Carolina federal judge ruled Monday.
Mountain AI startup's founder Shaukat Shamim accused of $17M fraud scheme (Silicon Valley Business Journal) Instead of using AI for marketing analysis, Shaukat Shamim is accused of paying workers in India to watch videos and record their impressions.
FIA Cyber wing arrest four outlaws involved in fraud (The Nation) Cyber Crime Wing of Federal Investigation Agency (FIA) on Tuesday arrested four alleged outlaws involved in financial fraud, during two raids.
Judge Koh Nixes $30M Attorney Fee Award in Approving Yahoo Data Breach Settlement | The Recorder (The Recorder) U.S. District Judge Lucy Koh said that she is convinced that the size of the settlement fund is largely a function of the size of the settlement class, and ‘not entirely attributable to class counsel’s skill’” in an order Tuesday granting final approval of a class action settlement over Yahoo data breaches.