Cyber Attacks, Threats, and Vulnerabilities
Chinese hackers blamed for the spread of MgBot Trojan across India, Hong Kong (ZDNet) The APT is focused on breaking into both Windows PCs and Android mobile devices.
What's new for North Korean hackers? Kaspersky says they're polishing tools, finding new targets (CyberScoop) North Korean government-linked hackers have been deploying a malware framework for two years in a ploy to expand their target sets, according to Kaspersky.
Twitter says hackers accessed DMs for 36 users in last week's hack (ZDNet) Hackers targeted 130 accounts, tweeted on behalf of 45, and downloaded data from eight.
An update on our security incident (Twitter) An update on our security incident and what we know so far.
Politician Amongst Those Who Had DMs Accessed During Twitter Hack (The State of Security) More information relating to the attack which saw a number of high profile Twitter accounts hijacked for the purposes of spreading a cryptocurrency scam.
Twitter says hackers saw messages from 36 accounts, including Netherlands official (Reuters) Twitter said on Wednesday that the hackers who breached its systems last week likely read the direct messages of 36 accounts, including one belonging to an elected official in the Netherlands.
Twitter Hacking for Profit and the LoLs (KrebsOnSecurity) The New York Times last week ran an interview with several young men who claimed to have had direct contact with those involved in last week's epic hack against Twitter. These individuals said they were only customers of the person who had access to Twitter's internal employee tools, and were not responsible for the actual…
ASUS Router Vulnerable to Fake Updates and XSS (CVE-2020-15498 & CVE-2020-15499) (Trustwave) Recently ASUS patched two issues I discovered in the RT-AC1900P router firmware update functionality. These vulnerabilities could allow for complete compromise of the router and all traffic that traverses it.
Critical SharePoint flaw dissected, RCE details now available (BleepingComputer) Details are now available for exploiting a critical security vulnerability that affects Microsoft SharePoint, increasing the risk of attacks on unpatched systems.
Thieves Are Emptying ATMs Using a New Form of Jackpotting (Wired) The new hardware-based attack, which has targeted machines across Europe, can yield a stream of cash for the attacker.
Virtual Honey (Strategy Page) The Indian military continues to have problems with its personnel being recruited as spies by Pakistani agents pretending to be an Indian woman looking for love This is called a “honey-trap” and it is a classic espionage technique that has a
Prometei botnet and its quest for Monero (Cisco Talos) A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
What is BlackRock Android Malware? (Jagranjosh.com) After 'Joker' which affected 24 apps on Google Play Store, a new malware, 'BlackRock', has been spotted on the Play Store, which is stealing crucial
Instacart Customers’ Personal Info Is Being Sold Online (BuzzFeed News) Names, credit card data, addresses, and information on transactions as recent as yesterday are being sold online.
CouchSurfing investigates data breach after 17m user records appear on hacking forum (ZDNet) EXCLUSIVE: CouchSurfing working with law enforcement and security firm to investigate incident.
Twitter bans 7,000 QAnon accounts, limits 150,000 others as part of broad crackdown (NBC News) The company will classify QAnon as coordinated harmful activity in part because of a rise in harassment targeting high-profile critics of the president.
Twitter Takedown Targets QAnon Accounts (New York Times) The company permanently suspended thousands of accounts associated with the fringe conspiracy theory movement. Facebook was said to be preparing to take similar action.
Gedmatch confirms data breach after users’ DNA profile data made available to police (TechCrunch) The DNA analysis site's parent company said it was hit by two breaches over July 19 and July 20.
Leak Exposes Private Data of Genealogy Service Users (Threatpost) An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of Ancestry.com’s Family Tree Maker software at risk.
Popular Chinese-Made Drone Is Found to Have Security Weakness (New York Times) Researchers found a potential vulnerability in an app that helps power the drones, highlighting U.S. officials’ concerns that Beijing could get access to information about Americans.
The cyber threat to sports organisations (NCSC) The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.
Hackers try to steal £1m transfer fee during football club cyber attack, report reveals (Sky News) Cyber criminals almost forced the cancellation of a match when it crippled the club's CCTV and turnstile systems.
Cybersecurity at risk after hackers try to sabotage Premier League transfer deal (the Guardian) Professional sports organisations have been urged to tighten their cybersecurity after it was revealed hackers attempted to sabotage a Premier League transfer deal
Cyber cell warns of account hacking scam | Goa News - Times of India (The Times of India) Cyber crime cell of Goa police on Wednesday warned the citizens about an account hacking scam by fraudsters using call forward facility.
Erie Community College target of ransomware cyber attack (WGRZ) A spokesperson says threat was received early Wednesday morning and campus servers were immediately shut down.
Hackers disrupt Kent Chamber of Commerce Zoom meeting with racist messages (king5.com) Kent Chamber of Commerce CEO Zenovia Harris says the hackers took over a Zoom meeting and spewed racist messages and images. She believes it was a targeted attack.
Ontario man denied refund after hackers guess e-transfer password (Toronto CTV News) A man from King City, Ontario was shocked when his bank refused to reimburse him for an e-transfer he says was intercepted by hackers.
Ransomware Trends in Q2: How Threat Intelligence Helps (Digital Shadows) If you're anything like me, it can be a struggle to keep up with the latest ransomware news. Last quarter, it seemed like there was a new variant or high profile event every single week.
PwC Workforce Pulse Survey (PwC) There’s a clear opportunity for business leaders to make cybersecurity part of their broader safety agenda for employees.
SonicWall's Mid-Year Cyber Threat Report Finds Malicious Microsoft Office Files on Rise, Ransomware Up in US, Globally (SonicWall) The SonicWall Capture Labs threat research team today published the mid-year update to the 2020 SonicWall Cyber Threat Report, highlighting increases in ransomware, opportunistic use of COVID-19 pandemic, systemic weaknesses and growing reliance on Microsoft Office files by cybercriminals.
Telcos in the firing line as ransomware attacks hit new highs (Capacity) Telecom Argentina has become the latest to experience a ransomware attack, with perpetrators demanding the equivalent of US$7.5 million in the cryptocurrency Monero.
McAfee Labs COVID-19 Threat Report (McAfee) The dominant theme of 2020 has been the scale and impact cyber-related attacks have had on our wider society.
Four lessons from life-long ransomware expert Fabian Wosar (The Union Journal) Ransomware costs companies a frustrating US$75 million each year CTO of Emsisoft Fabian Wosar signs up with TechHQ in an interview and shared his knowledge on among the most harmful types of cybercrim
Decline in early cyber investments continues alongside coronavirus concerns (CyberScoop) Fewer meetings between security startups and investors contributed to a steep decline in the number of deals since COVID-19 spread throughout the world.
Tech Startup Funding Declines as Pandemic Drags On (Wall Street Journal) Venture-capital funding for U.S. startups declined in the first half of the year, threatening a key source of information-technology innovation for larger companies.
Succeeding In Our Mission Means that Attackers Don’t Succeed in Theirs (CyCognito) Attackers succeed when security teams have visibility gaps that they are unable to map. These paths of least resistance are the easy way into your organization.
CyCognito Raises $30 Million in Series B Funding (CyCognito) Our next level of funding enables us to increase our market reach, educating and serving the needs of companies in to gain an edge on attackers.
GrammaTech Acquires JuliaSoft to Expand Reach of CodeSonar® SAST Platform to Java and C# (BusinessWire) GrammaTech is used by the US military, NASA as well as automotive, aerospace, industrial and medical device manufacturers to secure their applications
Openpath raises $36m to expand globally (PlaceTech) The security startup specialising in modern mobile access control, closed a Series C funding round led by Greycroft, with Okta Ventures, LPC Ventures, Allegion Ventures and Sentre, including follow-on from existing investors.
ETF Partners’ €4 Million Series A Investment in Intigriti (Global Legal Chronicle) Jones Day advised ETF Partners LLP on the deal. ETF announced its €4 million investment into Intigriti as part of a total round of €4.1m, the …
Avast Relocates Hong Kong Based VPN Servers (Avast) Concerns that a new law in China could affect user privacy has led Avast to move its VPN servers from Hong Kong.
Apple offers modified phones to security researchers looking for iOS weaknesses (Reuters) Apple on Wednesday invited security researchers to apply to receive modified iPhones designed to help them hunt for flaws in the company's mobile operating system.
Indonesian businesses ramp up cybersecurity budget amid rampant attacks (The Jakarta Post) Indonesian companies plan to increase their cybersecurity budget this year amid the high number of attacks during the pandemic, signalling a growing awareness and commitment in digital safety, a survey by a cybersecurity company shows.
Hackers Beware: 12 Cybersecurity Companies in Atlanta to Know (Built In) Atlanta is one of the fastest growing tech markets in the country, but wherever there’s a high concentration of successful tech companies, there are inevitably people who want to take advantage of their data.
Juniper named a Champion in Canalys Leadership Matrix (Security Brief) Champions receive generally positive partner feedback, have a large share of shipments, maintain growth and show improvement in channel management.
ACCELQ Recognized as Leader in Automated Testing by Independent Research Firm (PR Newswire) ACCELQ and its automation testing suite has been recognized by leading research firm, Forrester. According to The Forrester Wave™: Continuous...
Acceptto Onboards Security Veteran Dr. John Zangardi to Board of Technical and Strategic Advisory (PR Newswire) Acceptto, the leader in passwordless continuous authentication and technology, today welcomes Dr. John Zangardi, former CIO for the Department...
Cybereason Hires Andrew Borene as Managing Director of U.S. Public Sec (PRWeb) Cybereason, a leader in endpoint protection, today announced the hiring of Andrew Borene as Managing Director for its U.S. public sector business. Borene brings more
Products, Services, and Solutions
Introducing JPaseto: Security Tokens For Java (Okta Developer) JPaseto is a PASETO security token library for Java, learn more in this post.
Tanium Brings Intelligence to the Edge with Zero Infrastructure Endpoint Management (AiThority) Tanium, the provider of unified endpoint management and security built for the world's most demanding IT environments, today announced Tanium as a Service
Centrify Unveils Client-based Password Reconciliation to Strengthen Admin Password Availability and Integrity | Centrify (Centrify) Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced Client-based Password Reconciliation, now included in version 20.3 of Centrify Privileged Access Service.
Centrify’s New Hyper-Scalable Privileged Access Service Revolutionizes Customer-Managed PAM Deployments (Centrify) SANTA CLARA, Calif. ― July 23, 2020 ― Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced the immediate availability of Centrify Hyper-Scalable Privileged Access Service (PAS), broadening its deployment options for the Centrify Privileged Access Se
Carbonetes Emerges from Stealth as the Industry's First Comprehensive Cloud Native Container Application Security Testing Solution (PR Newswire) Carbonetes, the industry's first comprehensive, cloud native container application security testing (CAST)-as-a-Service solution, emerged today...
AppOmni Strengthens Ping Identity's Visibility and Control Over Its Salesforce Instance (PR Newswire) AppOmni, the leading provider of Cloud Security Posture Management (CSPM) for SaaS, today announced the deployment of AppOmni solution by Ping...
Court Square Group and vArmour Announce Partnership to Offer Secure and Compliant Cloud For Life Science Industry (GlobeNewswire) Joint Solution Accelerates Time to Market While Protecting Critical Assets
Blackpoint Cyber Launches MDR 4.0, the Industry’s First Contextually Aware Breach Detection and Response Platform (GlobeNewswire) The updated managed detection and response (MDR) service was built by former NSA cyber operators and includes over 200 detection capabilities to provide 24/7 security for clients and partners
SolarWinds Announces Collaboration with Microsoft to Enhance Monitoring and Management for MSPs (Odessa American) SolarWinds (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced a collaboration with Microsoft that will integrate Microsoft 365 ™ capabilities with SolarWinds ® N-central ® and RMM.
WISeKey Provides IoT Birth Certificates (GlobeNewswire) WISeKey provides a unique identity for IoT devices in the form of an “IoT Birth Certificate” and protects this unique identity using its secure VaultIC semiconductor
Banks join IBM's financial services cloud as it doubles down on security, compliance (CIO Dive) More customers, partnerships and a geographic expansion are signs of the "momentum and investment" behind the financial services cloud, Hillery Hunter, VP, CTO of IBM Cloud, told CIO Dive.
Vodafone, Accenture Announce Managed Security Services Partnership (MSSP Alert) Vodafone Business & Accenture Security are working together to provide managed security services to small & medium-sized enterprises & corporations in Europe.
Steele Announces New “Risk Intelligence Data” Platform (JD Supra) Last week, Steele Compliance Solutions announced the global rollout of its new “Risk Intelligence Data” platform. As a global leader in ethics and...
Tanium launches better endpoint security and management for home working (SiliconANGLE) The COVID-19 pandemic has dramatically changed workforce dynamics from office-based locations to home working and its impact will be long-lasting.
Aryaka Announces Global Managed Security Partnership with Check Point Software Technologies (BusinessWire) Aryaka Announces Global Managed Security Partnership with Check Point Software Technologies
Vulcan Cyber Maturity Model Challenges Vulnerability Management Programs to Evolve (PR Newswire) Vulcan Cyber, the vulnerability remediation company, today announced the release of a new eBook titled, "The Vulnerability Remediation Maturity...
All the benefits of cloud AI with the security and privacy of an on-premise deployment; SOC 2 type 2, ISO 27001, and HIPAA certifications uphold best-in-class industry standards (GlobeNewswire) FortressIQ, the company delivering end-to-end process insights for the modern enterprise, today announced Privacy Enhanced Gateway (PEG), in addition to updated security certifications to mitigate customers' compliance and security requirements throughout their business transformation journeys.
Beyond Identity Joins Ping Identity’s Technology Alliance Program to Enable Passwordless Single Sign-On (Beyond Identity) Partnership Combines Beyond Identity’s Passwordless Authentication and Risk-Based Authorization With Ping Identity’s Single Sign-On to Bolster Enterprise Security While Improving the User Experience
Forescout and ServiceNow Advance Partnership to Protect Critical Infrastructure from Cyber Threats (GlobeNewswire) New integration continuously discovers and secures sensitive OT devices
Technologies, Techniques, and Standards
Securing OT Environments: Should Infosec Pros Learn to Shut Up and Listen? (Computer Business Review) "The system owner was totally unimpressed. His question was like ‘so what?’”
IBM Security BrandVoice: Zero Trust Isn’t Zero Sum: Let User Behavior And Risky Devices Dictate Security Hurdles (Forbes) We’re going to talk about Zero Trust, but the point here is not to raise your blood pressure; it’s to get some things straight.
Op-ed: With cyberattacks surging due to Covid-19, 'Digital distancing' could limit exposure (CNBC) Since the coronavirus pandemic began, cyberattacks targeting certain sectors have surged 238%, according to VMware Carbon Black. Now the company's head of cybersecurity strategy is urging people to 'digital distance' to limit exposure.
How Poor Interoperability is Hobbling Your Cybersecurity Effort (Infosecurity Magazine) If your cybersecurity tools don't talk to each other, your ability to handle incidents plummets
Stop business email compromise with three key approaches (SearchSecurity) Business email compromise is on the rise. How can you keep the hackers out of your organization's accounts? Read expert insight on how BEC works and how to effectively eliminate its threat in your organization.
The Great Reset requires FinTechs – and FinTechs require a common approach to cybersecurity (World Economic Forum) The World Economic Forum’s FinTech Cybersecurity Consortium released recommendations for a common approach to cybersecurity controls.
When it comes to cybersecurity, simply watching the outside is not enough (Silicon Republic) Siemens Ireland’s industrial cybersecurity lead talks about industrial digital transformation and the future of IIoT.
Surveillance Camera Statistics: Which City has the Most CCTV Cameras? (Comparitech) We've gathered data on CCTV cameras in use in 120 major cities across the globe to determine which cities have the most surveillance cameras per person.
Cybersecurity and the advancement of digital dentistry (Dental Tribune) At this point, it almost goes without saying: the future of dentistry is digital. Though modern dental practices still frequently rely on the manual skills of dental practitioners, digital tools such as diagnostic imaging and electronic patient records have been integrated into existing workflows with haste owing to their ability to improve quality of care and simplify routine procedures. However, there are certain issues that arise from this increased digitisation, none more pertinent than cybersecurity.
Working Virtually: Protect Tax Data at Home and at Work with the "Security Six" - MyChesCo (MyChesCo) With cyberthieves active during COVID-19, the Internal Revenue Service and the Security Summit partners are urging tax professionals to review critical security steps to ensure they are …
Design and Innovation
Did a Person Write This Headline, or a Machine? (Wired) GPT-3, a new text generating program from OpenAI, shows how far the field has come—and how far it has to go.
No lock is unbreakable – how history has strengthened data security (Security Magazine) Security has been and always will be important to humans. At the deepest level, all humans have an innate desire for security and protection and this desire now extends to our digital footprint.
Pentagon AI team sets sights on information warfare (C4ISRNET) The JAIC's newest mission area is joint information warfare.
The unlikely way to improve Air Force information warfare: forums (C4ISRNET) One way the Air Force’s new information warfare command is trying to bring together the disparate parts of the organization is through forums where leaders put representatives from different components in the same room.
Army 3-star general vows to ‘hunt down’ internet trolls in hilarious video (Task & Purpose) Simply amazing.
Local tech giants bring forth Covid-19 contact tracing tech for the workplace (Silicon Valley Business Journal) Three local tech players are introducing Covid-19 contact tracing technology for the workplace.
Mapúa opens Cybersecurity Academy (The Manila Times) Mapúa University has launched its Cybersecurity Academy to address the need for cybersecurity professionals in the face of increased threats and attacks on the digital space. Mapúa’s Center for Continuing Education and Special Competencies (CCESC) offers training courses covering the fundamentals of data and system security, which include threat intelligence, network security, digital forensic, configuration […]
Legislation, Policy, and Regulation
Troubled vision: Understanding recent Israeli–Iranian offensive cyber exchanges (Atlantic Council) Reported Iranian intrusions against Israeli critical infrastructure networks and alleged Israeli actions against Iranian proliferation-associated targets pose substantial new challenges to understanding ongoing competition and conflict in the Middle East.
Accuse, Evict, Repeat: Why Punishing China and Russia for Cyberattacks Fails (New York Times) So far, there is scant evidence that these punishments have limited the cyberattacks and other bad behavior from America’s two greatest rivals for influence and power around the world.
UK looks to new laws on spies after critical intel report (ABC News) Britain’s government has faced heated questions on national security after a damning intelligence committee report on Russian meddling in the nation’s politics concluded the U.K. should examine allegations of interference in the European Union referendum
Exclusive: French limits on Huawei 5G equipment amount to de facto ban by 2028 (Reuters) French authorities have told telecoms operators planning to buy Huawei 5G equipment that they won't be able to renew licences for the gear once they expire, effectively phasing the Chinese firm out of mobile networks, three sources close to the matter said.
Huawei welcomes government panel's cyber security strategy advice (ITWire) Chinese telecommunications equipment vendor Huawei Technologies has welcomed the steps outlined by the Federal Government's Industry Advisory Panel on the country's next cyber security strategy, saying the IAP chief Andrew Penn agreed with Huawei's submission that the best approach to cy...
As Huawei ban looms, waivers are an option (FCW) Waivers for a looming federal rule prohibiting agencies from signing new contracts with companies that use a list of Chinese-made communications gear are only a temporary fix, says one expert.
'Failure of capitalism' helped Huawei dominate 5G technology, policy expert tells MPs (Computing) Many western governments are thinking about how and why they became so dependent on a single vendor
Reps. Langevin, Gallagher applaud inclusion of cyberspace recommendations in NDAA - Homeland Preparedness News (Homeland Preparedness News) U.S. Reps. Jim Langevin (D-RI) and Mike Gallagher (R-WI), commissioners of the Cyberspace Solarium, applauded the inclusion of budget amendments to the 2021 National Defense Authorization Act (NDAA) that implement recommendations from the Solarium Commission’s report. The Cyberspace Solarium Commission, … Read More »
OCC Says Banks Can Offer Crypto Custody Services (Law360) The Office of the Comptroller of the Currency said Wednesday that national banks and federal savings associations are authorized to provide customers with cryptocurrency custody services, saying such activity is "a modern form of traditional bank activities related to custody services."
CISA turns to security experts with street cred to protect health sector (CyberScoop) The Department of Homeland Security’s cybersecurity agency is ramping up its efforts to protect medical organizations from hacking during the coronavirus pandemic by hiring multiple security specialists with strong ties to the health care sector, CyberScoop has learned.
TFI Applauds Extension of Key Security Program CFATS (TFI) The Fertilizer Institute (TFI) President & CEO Corey Rosenbusch today applauds the President and Congress for extending the Chemical Facility Anti-Terrorism Standards (CFATS) program for three years. “A long-term extension of the CFATS program is what the fertilizer industry supported and wanted to see. This provides industry the ability to properly plan and invest in measures that promote security at facilities. “The secure and safe handling of fertilizers is the highest priority for The Fertilizer Institute (TFI) and our members.
Top Intel Dem Demands Information On DHS Surveillance Of Protesters (Defense One) Heavy-handed tactics by the DHS in Portland, where protests have gripped the city for almost two months, have drawn intense scrutiny in Washington.
How the Internet Can Support Statecraft (The Cipher Brief) Col. Roman Vitkovitsky is the Director of Cyberspace Operations for the United States Marine Corps. He was previously the DARPA Service Chief Fellow and the Chief Strategist for DISA. The views presented here are those of the writer and do not necessarily represent the Department of Defense and its components. On December 31, 2019, health … Continue reading "How the Internet Can Support Statecraft"
Hybrid Warfare: How Cancel Culture Can Fuel a War (Radware Blog) Countries in conflict are starting rely on a hybrid variation of tactics and techniques, including cyber activity and information/influential campaigns.
Trudeau government relaxes fingerprinting rules for new hires during COVID-19 (The Outlook) The government has quietly relaxed a requirement to fingerprint prospective new federal hires as part of security screening, a move prompted by the need for physical distancing during the . . .
Increase in mail-in ballots due to COVID has created greater election integrity, government official says (ABC News) The COVID pandemic has created a paper trail for ballots.
Litigation, Investigation, and Law Enforcement
The Lapses That Let a Saudi Extremist Shoot Up a U.S. Navy Base (New York Times) The gunman who killed three in Florida was not directed by Al Qaeda, nor inspired solely by online ideology. He was a new kind of terrorist, harder to spot: an extremely enterprising freelancer.
Chinese hackers counted on no one clicking 'update' in decade-long spree (Mashable) The hackers targeted coronavirus research, video game source code, and weapons tech.
U.S. Closes Chinese Consulate in Houston Amid Surge in Chinese Espionage Cases (Foreign Policy) It’s the latest escalation in an increasingly tense bilateral relationship.
Culture of scientific exchange seen as a risk factor for life science cybersecurity (BioWorld) The U.S. government has charged two citizens of China with cybercrime in connection with purported hacking of research into vaccines for the SARS-CoV-2 virus, but more than one speaker on a July 22 webinar said scientists involved in basic life science research at universities fail to appreciate the need for cybersecurity, a problem they may take with them to the private sector.
Fake Businesses Are Fooling Real Banks Into Processing Online Drug Purchases (Wall Street Journal) One website advertised dog products. Another advertised flowers; another, home decorations. All of them were really fronts to process payments for marijuana or designer drugs, prosecutors said.
US offers $2 million for info on Ukrainians charged for SEC hack (BleepingComputer) The U.S. Department of State today announced rewards of up to $1 million for information that would lead to the arrest or conviction of Ukrainian nationals Artem Viacheslavovich Radchenko and Oleksandr Vitalyevich Ieremenko.
U.S. appeals court won't unseal papers in Facebook encryption fight (Reuters) A federal appeals court on Wednesday declined to unseal a ruling that let Facebook avoid wiretapping a criminal suspect who was using one of the company's encrypted services.
New York charges big title insurer First American over security gap (Reuters) First American Financial Corp , the second largest U.S. title insurer, was charged on Wednesday by New York's top financial regulator with exposing millions of documents with sensitive consumer information, in the regulator's first cybersecurity enforcement case.
New York Regulator Charges First American Unit Over 2019 Data Breach (Wall Street Journal) New York’s top financial regulator filed charges Wednesday against a subsidiary of insurance company First American Financial in the first enforcement action by the regulator under a set of rules requiring banks and other financial services companies to maintain cybersecurity protections.
Lawyers Demand the Military Stop Violating Free Speech on Twitch (New York Times) Army and Navy channels banned viewers from their live streams when they asked about war crimes. Accused of censorship, now the Army says it will pause streaming.
T-Mobile Accused Of Allowing $8.7M Crypto Co. Hack (Law360) Cryptocurrency venture Veritaseum Inc. and its founder Reginald Middleton hit T-Mobile with a negligence suit in New York federal court over the phone service's alleged failure to protect Middleton's personal data, which he said allowed a hacker to steal $8.7 million in cryptocurrency.
Steve Wozniak Leads Suit Against YouTube Over Bitcoin Scam (Law360) Apple co-founder Steve Wozniak is leading a lawsuit against YouTube and its parent company Google, accusing the tech giants of allowing the spread of a scam that has fleeced Bitcoin investors by using Wozniak's image to convince them to send cryptocurrency to online crooks.
Tufin Software Investors Say Offering Documents Misled Them (Bloomberg Law) Tufin Software Technologies Ltd. misled investors about its customer relationships and growth metrics during its 2019 public offerings, a suit filed in New York federal district court said.
Raytheon employee sentenced for keeping classified documents at his home (ABC News) Ahmed Serageldin worked on a ballistic missile defense system.