Cyber Attacks, Threats, and Vulnerabilities
Six-Year Surveillance Operation by Iranian Hackers Targeted Dissidents, Tracked Locations and Stole Personal Information (CPO Magazine) A six-year surveillance operation tied to state-sponsored Iranian hackers appears to have scooped up personal documents and tracked the phone location data of dissidents.
Election poses historic test for what Reagan called the US 'miracle' (Atlantic Council) 2020 is an important year for the US democratic process to run smoothly, with China leading an authoritarian post-COVID swing.
Ex-Google exec on how social media is a national security risk (Fox News) Tristan Harris from Netflix's 'The Social Dilemma' warns about a kind of WWIII of global information warfare happening now on social media on the 'Fox News Rundown.'
Curbing the rise of fake domains and misinformation campaigns (Computing) A failure to curb the growing problem of misinformation could have serious repercussions for the Internet and for society as a whole
Facebook won’t accept ads that ‘delegitimize’ US election results (TechCrunch) Following a particularly dark and vivid display of the threats to the 2020 U.S. election during Tuesday’s first presidential debate, Facebook has further clarified its new rules around election-related ads. Facebook is now expanding its political advertising rules to disallow any ads that …
U.S. state, local election computer networks still vulnerable to hacks (NBC News) "A lot of good stuff has been done," said one expert. "But let's face it, we've got 54 states and territories. The risk landscape is pretty broad."
Privacy, civil rights groups demand transparency from Amazon on election data breaches (TheHill) A group of more than a dozen privacy and civil rights organizations on Thursday demanded that Amazon disclose information about breaches of election data in order to increase the company’s public transparency ahead of November.
Ahead of U.S. election, malicious email campaign mimics Democratic pitches for volunteers (Reuters) Tens of thousands of emails sent on Thursday that asked recipients to volunteer for the Democratic Party ahead of the November U.S. election actually came from email scammers and carry malicious software, according to researchers at cybersecurity firm Proofpoint.
Emotet Emails Strike Thousands of DNC Volunteers (Threatpost) Hundreds of U.S. organizations on Thursday received emails purporting to come from the Democratic National Committee, in a new politically charged Emotet spear-phishing attack.
Emotet Makes Timely Adoption of Political and Elections Lures (Proofpoint) During the 76 days since Emotet’s return, researchers have observed activity reminiscent of past Emotet campaigns, like high message volumes and global distribution.
DOD, DHS expose hacking campaign in Russia, Ukraine, India, Malaysia (CyberScoop) "Sophisticated" hackers are launching cyberattacks against targets in India, Kazakhstan, Kyrgyzstan, Malaysia, Russia, and Ukraine, DOD and DHS say.
MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA (CISA) This Malware Analysis Report (MAR) is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA) and the Cyber National Mission Force (CNMF).
New APT Group XDSpy Targets Belarus and Russian-Speakers (Infosecurity Magazine) New APT Group XDSpy Targets Belarus and Russian-Speakers. ESET claims group has remained undetected since 2011
ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram (Security Magazine) ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East. The new spyware, detected by ESET security products as Android/SpyC23.A, builds upon previously reported versions with extended espionage functionality, new stealth features and updated C&C communication.
ESET Identifies 11 Latin American Malware Families (Decipher) There are multiple distinct banking Trojan families in Latin America, rather than one large group as has been previously believed, ESET researchers said at the Virus Bulletin 2020 conference.
Priority threat actors adopt Mirai source code (Official Juniper Networks Blogs) Mirai has become such a common discovery in the wild that it is beginning to be disregarded as white noise, played off as a simple attack that should be readily
Global Maritime Regulator Hit by Cyberattack (Wall Street Journal) The United Nations arm that regulates global shipping said its London headquarters has been hit by a cyberattack that brought down its website and internal web-based services.
Cyber attack: ‘Sophisticated’ cyber attack takes IMO offline (JOC) The IMO is the second high profile maritime industry victim to fall prey to cyber hackers this week.
IMO Cyber-attack Has Serious Implications (gCaptain) Photo © IMO For the past day and a half, visitors to the official International Maritime Organization website, www.IMO.org, have been greeted with the message “This website is under maintenan…
Ferry Operator Red Funnel Hit by Cyberattack (The Maritime Executive) The UK ferry company Red Funnel has been hit by a cyberattack, chief executive Fran Collins confirme...
Spammers add random text to shortened links to evade detection (BleepingComputer) Spammers are using a new technique of generating URLs to evade detection by humans and spam filters alike.
How a Chinese malware gang defrauded Facebook users of $4 million (ZDNet) SilentFade group utilized a Windows trojan, browser injections, clever scripting, and a Facebook platform bug to buy and post ads on behalf of hacked users.
A vulnerability in IBM Maximo discovered by Positive Technologies was fixed (Positive Technologies) A vulnerability in IBM Maximo discovered by Positive Technologies was fixed
The U.S. Exported QAnon to Australia and New Zealand. Now It’s Creeping Into COVID-19 Lockdown Protests (Time) The pro-Trump conspiracy theory has American roots
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service (Anomali) Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site.
The price of stolen remote login passwords is dropping. That's a bad sign (ZDNet) The cost of RDP credentials is going down - and it's probably happening because of poor cybersecurity is making log-in details easy to find.
Wibu-Systems CodeMeter (Update B) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Wibu-Systems AG
Equipment: CodeMeter
Vulnerabilities: Buffer Access with Incorrect Length Value, Inadequate Encryption Strength, Origin Validation Error, Improper Input Validation, Improper Verification of Cryptographic Signature, Improper Resource Shutdown or Release
2.
MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA (CISA) This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.
Hacked hospital chain says all 250 US facilities affected (Washington Post) The hospital chain Universal Health Services said Thursday that computer services at all 250 of its U.S. facilities were hobbled in last weekend’s malware attack and efforts to restore hospital networks were continuing.
Arthur J. Gallagher's ransomware attack highlights the threat financial institutions face amid lockdown restrictions (Business Insider) Arthur J. Gallagher suffered a ransomware attack last Saturday, as financial institutions face greater cyber risk during the pandemic.
Northern California Casino Still Closed After Cyber Attack (Vegas Slots Online) The Cache Creek Casino Resort in Northern California remains closed as investigations into a major cyber attack continue.
Security Patches, Mitigations, and Software Updates
IBM Fixes a Security Vulnerability in its Maximo Software (CISO MAG | Cyber Security Magazine) Security researchers discovered a vulnerability in IBM Maximo software that can lead to a compromise of internal enterprise networks
Cyber Trends
CISA Kicks Off 17th National Cybersecurity Awareness Month (Meritalk) The Cybersecurity and Infrastructure Security Agency (CISA) is partnering with the National Cyber Security Alliance (NCSA), a public-private partnership dedicated to the cause, to lead the 17th annual National Cybersecurity Awareness Month starting today.
New LastPass Report Finds 92 Percent of Businesses Believe Going Passwordless is the Future for their Organization (GlobeNewswire) Password-related challenges continue in remote work environment; Passwordless Authentication proves to be a secure and simple option
2020 Future Cyber Threats (Accenture) The latest extreme but plausible threat scenarios in financial services
Cybersecurity Awareness Month: 10 Ways to Improve Your Security in October (IGI) To kick off Cybersecurity Awareness Month we're starting with the basics—10 simple actions you can take to substantially improve your cybersecurity.
Midstream Oil and Gas Sector Overconfident in Cybersecurity Preparedness (PR Newswire) Jones Walker LLP today publicly released the findings of its 2020 Midstream Oil and Gas Cybersecurity Survey, examining cybersecurity...
To Build Diversity, USDA CISO Urges Cyber Professionals to Invest in Themselves (Meritalk) In a discussion about creating more diversity in the field of cybersecurity, Department of Agriculture CISO Venice Goodwine encouraged cyber professionals not to let anyone put them in a box, to invest in themselves, and to be deliberate in their career decisions.
Music to Hack To: My First CVE and 20 Years of Vulnerability Research (Akamai) October is National Cyber Security Awareness Month (NCSAM). I've been doing security and vulnerability research since 1994, and a lot has changed in the industry. For this post, in honor of NCSAM, I'm going to revisit my first CVE (Common...
Marketplace
Cisco To Acquire Security Startup Portshift For Reported $100M (CRN) Cisco plans to acquire Portshift, a firm that provides cloud application security capabilities and expertise to containerized environments, like Kubernetes.
Imperva to acquire database security startup jSonar (TechCrunch) Cybersecurity giant Imperva will acquire jSonar, a database security startup that recently landed $50 million from Goldman Sachs. Financial terms of the deal weren’t disclosed. The acquisition of jSonar, which provides security and compliance to databases on-premise or in the cloud, will help…
Imperva bolsters database security prowess with jSonar buy (Reseller News) Cyber security solutions vendor Imperva has struck a deal to acquire database security platform provider jSonar, a move the companies hope will lead to a “fundamentally” new approach to data security.
Fastly Completes Acquisition of Signal Sciences (Valdosta Daily Times) Fastly, Inc. (NYSE: FSLY), provider of an edge cloud platform, today announced it has successfully completed the acquisition of Signal Sciences (“Signal Sciences”).
Eclypsium Announces $13M Funding Round (BusinessWire) Eclypsium®, the enterprise device security company, announced today it has raised $13 million in new funding in an oversubscribed round.
This Danish scaleup enables businesses to convert data into actionable intelligence; raises €25.5M | Silicon Canals (Silicon Canals) Danish scaleup Logpoint announced €25.5M funding led by the Germany-based Digital+ Partners with participation from existing investors.
It seems $145M wasn't enough: BioCatch tags on $20M from 4 major multinational banks (Geektime) By leveraging 2000 biometric parameters to create comprehensive user threat profiles, BioCatch scores mega funding to bring a behavioral approach to cyber-security...
Netwrix receives majority investment from TA Associates (Netwrix) Netwrix to use the investment to grow its portfolio of data security solutions to support current customers and to expand globally.
Golden Raises $14.5M To Build An Intelligent Knowledge Database (Forbes) Golden announced that it has raised $14.5 million in Series A funding to build a wiki-style database of tech knowledge.
Nintex Announces Agreement to Acquire K2 Software, Inc. (PR Newswire) Nintex, the global standard for process management and automation, today announced a definitive agreement to acquire K2 Software Inc., an...
CACI wins $59M DOD comptroller task orde (Virginia Business) The Office of Under Secretary of Defense (Comptroller) awarded Arlington-based federal technology contractor CACI International Inc. a $59 million task order to support the Defense Finance and Accounting Service’s comptroller critical mission systems, the company announced Tuesday. The comptroller handles all budgetary and fiscal matters for the Department of Defense.
As Palantir hits the stock market, it continues to target government work (FedScoop) Palantir's chief operation officer spoke with FedScoop about the future of the company's government technology work after its stock market listing.
GSA awards Northrop Grumman $690M task order (Virginia Business) The U.S. General Services Administration (GSA) has awarded Falls Church-based Fortune 100 defense contractor Northrop Grumman Corp. a $690 million task order to develop a suite of data systems for the Defense Intelligence Agency (DIA). Under the contract awarded by the GSA’s Federal Systems Integration and Management Center (FEDSIM)…
How Facebook Entrenches Itself (New York Times) The more Facebook knits together its apps, the harder it becomes for a government to break it up.
Google is paying publishers more than $1 billion to create and curate high-quality content (Axios) It's Google's biggest financial commitment to the news industry in its history.
Ivanti gets VPN features through Pulse Secure acquisition (TechRadar) Remote working is the new normal and Ivanti wants to help organizations do it securely
Pulse Secure Wins Inaugural CybersecAsia Award for Best Mobile and Remote Security (GlobeNewswire) Pulse Secure, the leading provider of Zero Trust Secure Access solutions, today announced it has been conferred as the winner in the Best Mobile and Remote Security category at the inaugural CybersecAsia Awards 2020, an industry award organized by CybersecAsia in recognition of outstanding companies that have made significant advances and innovations in the field of cybersecurity in the last two years.
Another Acronym Cybersecurity Investors Need To Know (Investor's Business Daily) Investors in cybersecurity stocks need to know a new acronym. That's SASE, a new term for cloud security. Some expect the SASE market to boom.
The Maritime Transportation System ISAC Welcomes John Felker as Senior Advisor (EIN) Sr. Advisor Felker Brings Additional Maritime Cybersecurity Partnership Expertise to Information Sharing and Analysis Center
Products, Services, and Solutions
Introducing CESOC - Crystal Eye Security Operations Centre (Red Piranha) A SaaS solution, CESOC leverages the power of our Crystal Eye security platform to deliver the benefits of a full Security Operations Centre (SOC) providing a suite of operational capabilities such as escalation and response, vulnerability management and Automated Actionable Intelligence all in one integrated platform.
Rewind Backups Accepted into Shopify Plus Certified App Program (PRWeb) Rewind, the leading data protection software, announced that it has been selected for the Shopify Plus Certified App program. The announcem
The First Cybersecurity Docuseries TV Show Launching In November (KTVN) THE first TV show dedicated to cybersecurity and diversity is launching in November 2020 by award winning cybersecurity leader, Ken Underhill, CEH, CHFI.
CyberArk Achieves AWS Digital Workplace Competency Status (BusinessWire) CyberArk (NASDAQ: CYBR), the global leader in privileged access management, announced today that it has achieved Amazon Web Services (AWS) Digital Wor
Splunk Phantom and Respond Analyst Integration & Automation (Respond Software) Learn how the Respond Analyst investigates, scopes, triages and correlates events, increasing the incident remediation capabilities of Splunk Phantom.
Fortinet Expands Network Security Expert Training Institute Offerings to Further Advance Security Skillsets (GlobeNewswire) NSE Training Institute’s Certification Program Momentum Continues With More than Half a Million NSE Certifications Earned to Date
Secure Cyber Defense Introduces Fortinet's FortiSOAR to Enable Customers with Next Level Incident Response (BusinessWire) Secure Cyber Defense adds Fortinet's Security Orchestration, Automation and Response Platform, FortiSOAR for customers in the Midwest.
Airtel launches new cybersecurity product with CISCO, Radware, VMware, and Forcepoint for enterprises (Business Insider) Bharti Airtel has officially launched its Security Intelligence Centre to protect enterprises from cyberthreats. The company’s CEO Gopal Vittal claims that
From Passwords to Passwordless (Lastpass) Addressing the password problem as employees work from anywhere
Do You Need Antivirus for Your Chromebook? (MakeUseOf) If you use your Chromebook responsibly, you won't have any security issues. But if you're concerned, Chrome OS antivirus software is available.
Technologies, Techniques, and Standards
Top 5 Tips for Staying Ahead of Cyber Criminals During Heightened COVID-19 Workforce Attacks (Keyavidata) Cybersecurity and Threat Intelligence Expert Says Businesses Can Protect Data Simply and Affordably
Information Security Forum Research Demonstrates Importance of the Next Generation CISO (Global Security Mag Online) The Information Security Forum (ISF) has published Becoming a Next Generation CISO, the organizations latest digest which sets out the range of disciplines a next-generation Chief Information Security Officer (CISO) can be expected to master. These findings highlight how those leading the information security function can react, grow and ultimately prosper when confronted with today’s uncertain times.
State and Local Agencies Gain Visibility from Centralizing Logs (StateTech) Government agencies boost security and compliance with log aggregation.
What to do first when your company suffers a ransomware attack (The State of Security) The CISA and MS-ISAC have jointly released an in-depth guide that includes recommendations on reducing your chances of being the next ransomware victim
Securing Space 4.0 – One Small Step or a Giant Leap? Part 1 (McAfee Blogs) McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2 (McAfee Blogs) McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National
Defense-in-Depth (DiD) Strategies: Protect Higher Ed Users Against Cyberthreats (EdTech) Strengthening your defense-in-depth design is critical to higher education cybersecurity strategies during unprecedented times.
Design and Innovation
Weaponizing Automation Protects Cyber Systems (SIGNAL Magazine) While the DOD has purchased and used automated scanning tools for security and compliance, it has been slow to adopt automation for many other tasks.
Licel to Reveal Their Seven Security by Design Principles at Droidcon EMEA 2020 (PR Newswire) Licel - the global app protection company - are platinum sponsors of the annual conference that brings Android developers together. Licel will...
Researchers Fingerprint Exploit Developers Who Help Several Malware Authors (The Hacker News) Researchers fingerprint two Exploit Developers—"Volodya" (BuggiCorp) and "PlayBit"—who sold over a dozen Windows exploits to several cybercriminals.
Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints (Sesin) n the past months, our Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves.
Research and Development
BT and Toshiba use Quantum Cryptography to create 'unhackable' network (TechRadar) Quantum network will transmit secure data in Bristol
U.S. Army Research Lab Selects Palantir Technologies Inc. for $91M Artificial Intelligence and Machine Learning Development (Odessa American) Palantir Technologies Inc. (Palantir) announced today that it obtained a $91.2 million two-year contract from the U.S. Army Research Laboratory for research and development of artificial intelligence and machine learning capabilities.
Academia
Maryland to Bridge Cybersecurity Workforce Gap with Groundbreaking Bachelor's Degree Program (PR Newswire) The Maryland Higher Education Commission has approved a groundbreaking professional cybersecurity bachelor's degree – the Bachelor of...
IUPUI to offer master’s degree in cybersecurity for Purdue Cyber Apprenticeship Program (Purdue University) The Purdue School of Engineering and Technology at IUPUI (Indiana University-Purdue University Indianapolis) has announced a partnership with Purdue University’s Cyber Apprenticeship Program (P-CAP) to offer its Master of Science degree in Cybersecurity and Trusted Systems online to P-CAP apprentices. The master’s degree will allow students enrolled in Purdue’s innovative apprenticeship program to advance their careers to the highest level.
Mercer Named a Champion for Cybersecurity Awareness Month (Mercer News) Mercer University, for the fourth consecutive year, is a Champion for Cybersecurity Awareness Month, which promotes online safety and privacy.
Legislation, Policy, and Regulation
Huawei to be excluded from Germany’s 5G rollout: Report (GizmoChina) A new crackdown in Germany is set to have the government adopt new regulations that would effectively exclude Huawei from the country’s plan of rolling out 5G networking.
Israel Says Data Transfers To US Can't Rely On Privacy Shield (Law360) Israel's Privacy Protection Authority has announced that data transfers from Israel to the United States can no longer rely on the Privacy Shield pact, after the European Court of Justice invalidated the popular EU-U.S. data transfer mechanism in July.
Section 230 will be on the chopping block at the next big tech hearing (TechCrunch) It looks like we’re in for another big tech CEO hearing. The Senate Commerce Committee voted Thursday to move forward with subpoenas for Twitter’s Jack Dorsey, Facebook’s Mark Zuckerberg and Sundar Pichai, the CEO of Alphabet. The unusual decision to subpoena the social media chie…
Senate committee votes to subpoena CEOs of Facebook, Google and Twitter to testify (CNBC) The Senate Commerce Committee voted Thursday on a bipartisan basis to subpoena the CEOs of Facebook, Google and Twitter to testify.
Long-Awaited Bill for State and Local Cyber Support Passes House (Meritalk) Federal legislation to help strengthen the cybersecurity of state and local governments through a Department of Homeland Security grant program passed the House of Representatives on Sept. 30 – with impetus for the legislation coming from across the U.S. in the form of numerous ransomware and other attacks in recent years.
Lawmakers introduce bill targeting foreign disinformation on social media (TheHill) Reps. Abigail Spanberger (D-Va.) and John Katko (R-N.Y.) on Thursday introduced legislation intended to cut down on foreign disinformation on social media ahead of the election.
FBI cyber strategy maximizes deterrence through agency partnerships (Federal News Network) FBI Deputy Assistant Director Clyde Wallace said much of the bureau’s new strategy focuses on its leadership of the National Cyber Investigative Joint Task Force.
Iowa launches vulnerability disclosure program for election-related sites (StateScoop) Under the policy, security researchers can report flaws in websites related to voter registration, election results and other programs run by the secretary of state.
Secretary of State Pate announces election cyber security initiative (KWWL) Called a Vulnerability Disclosure Program (VDP), the initiative is in partnership with Bugcrowd and invites private sector security researchers to test the state's current system.
Oklahoma Launches Statewide Cyber Threat Sharing Platform (GlobeNewswire) Anomali-Powered ISAC Makes Critical Information About Election Security, Pandemic-Related Fraud, and Attacks on Remote Workers Available to Agencies Across the State
Litigation, Investigation, and Law Enforcement
Britain says Huawei security failings pose long-term risk: govt report (Reuters) China's Huawei Technologies has failed to convince British security officials that the security risks of using its products in UK national infrastructure can be adequately managed, according to a government report released on Thursday.
Huawei 'failed to improve UK security standards' (BBC News) Officials raise fresh concerns about firm's ability to tackle engineering problems with its products.
Britain found ‘critical’ weakness in Huawei equipment (South China Morning Post) Chinese telecoms giant made to fix flaws that could have put security of British networks at risk, government agency says.
US govt warns of sanction risks for facilitating ransomware payments (BleepingComputer) The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) today said that organizations that assist ransomware victims to make ransom payments are facing sanctions risks as their actions could violate OFAC regulations.
Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments (US Department of the Treasury) The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing this advisory to highlight the sanctions risks associated with ransomware payments related to malicious cyber-enabled activities.
Treasury Warns Against Keeping Ransomware Payments Quiet (Wall Street Journal) Victims of ransomware schemes and financial institutions could violate sanctions or anti-money-laundering rules—and face stiff penalties—if they facilitate or make payments to attackers, the U.S. Treasury Department said in a pair of advisories.
U.S. Treasury Warns Cyber Insurers Against Paying Ransomware Demands (Insurance Journal) The U.S. Treasury Department is warning that individuals or businesses that help facilitate ransomware payments may be violating anti-money laundering and
The Cybersecurity 202: A fight over how Georgia votes comes to a head just weeks before Election Day (Washington Post) A federal judge could rule as early as today in a legal fight that might upend how Georgia runs November’s election.
Recent arrests and high-profile convictions: What does it mean for the cyber threat landscape? (Digital Shadows) In the wonderful world of cyber threat intelligence and research, we often analyze the impact that cybercrime or nation-state activity has on the cyber threat landscape. Digital Shadows' latest
CFTC, Department of Justice file charges against owners of crypto derivatives exchange BitMEX (The Block) The Commodity Futures Trading Commission (CFTC) has filed charges against crypto derivatives exchange BitMEX and its owner-operators, including co-founder and CEO Arthur Hayes.
9 discarded ballots weren't fraud, state election chief says (AP NEWS) It appears that an election worker’s decision to throw out nine military ballots in Wilkes-Barre, Pennsylvania, amounted to a mistake and not “intentional fraud,” the...
AG Nessel Files Felony Charges Against Jack Burkman, Jacob Wohl in Voter-Suppression Robocalls Investigation (State of Michigan) Michigan Attorney General Dana Nessel has filed charges today against two political operatives for allegedly orchestrating a series of robocalls aimed at suppressing the vote in the November general election.
Border Phone Searches Don't Need Warrant, US Tells 1st Circ. (Law360) Border officials should be able to confiscate and search a traveler's smartphone or laptop without probable cause and a warrant, U.S. government lawyers told the First Circuit, asking the court to reverse a finding that basic device searches require reasonable suspicion.
Facebook sues two companies engaged in data scraping operations (TechCrunch) Facebook today says it has filed a lawsuit in the U.S. against two companies that had engaged in an international “data scraping” operation. The operation extended across Facebook properties, including both Facebook and Instagram, as well as other large websites and services, including …
HP Beats CFAA, False Ad Suit Over Printer Firmware Update (Law360) A California federal judge has tossed a proposed class action alleging HP Inc. violated consumer protection statutes and the Computer Fraud and Abuse Act by issuing automatic printer software updates that blocked customers from using rival ink cartridges, finding the company warned consumers about the update.
Data breach leads to lawsuit against Claire's (Legal Newsline) Claire’s Stores is being sued after reporting a data breach in July.
Recent 11th Circ. Ruling Upends $2.3M Citrix Data Breach Deal (Law360) A Florida federal judge has rejected a nearly $2.3 million settlement agreement proposed to end a class action accusing Citrix Systems Inc. of failing to protect workers' personal information from a 2018 data breach, finding it runs afoul of a recent Eleventh Circuit ruling on incentive awards and attorney fees.