Cyber Attacks, Threats, and Vulnerabilities
The US Blames Russia's GRU for Sweeping Cyberattacks in Georgia (Wired) By calling out Russia for digital assaults on its neighboring country, the US hopes to head off similar efforts at home.
US, UK formally blame Russia for mass-defacement of Georgian websites (ZDNet) US State Department and UK Foreign Office say Russia's military intelligence agency was behind October 2019 attack on Georgian web portals.
Election security woes only growing for 2020 presidential race, including DHS’ response (Federal News Network) The caucuses in Iowa showed it doesn’t require foreign adversaries or political enemies to screw up voting.
Kentucky state official says foreign adversaries 'routinely' scan election systems (TheHill) A senior election official in Kentucky said Tuesday that the state’s election systems are “routinely” scanned by foreign adversaries, and begged for the continued allocation of funds to help combat cyber threats.
Bernie: Some of My Angriest Online Bros May Be Russian Bots (The Daily Beast) The Senator denounced the vitriol from those supporting him online. Then, he floated the idea that it all might just be another Russian attempt to sow discord.
Analysis | The Cybersecurity 202: Most Democratic presidential campaigns score high on cybersecurity protections (Washington Post) But lots of hacking dangers lurk before the election.
Buttigieg, Sanders separated by thousandths of a point after Iowa recanvass (POLITICO) Sanders closed the state delegate gap with Buttigieg to microscopic levels after the recanvass.
CISA Shares Details About Ransomware that Shut Down Pipeline Operator (Nextgov.com) One cybersecurity firm links the incident to a December attack on the Coast Guard.
Assessment of Ransomware Event at U.S. Pipeline Operator (Dragos | Industrial (ICS/OT) Cyber Security) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator. Based on information shared with Dragos, as well as noted in public reporting, the CISA alert likely describes the same event reported by the U.S. Coast Guard in 2019.
Could this attack signal the future of ransomware? (Fifth Domain) A recent cyberattack on a pipeline operator exhibited a
Detecting Ryuk Ransomware (Red Canary) A member of Red Canary's Cyber Incident Response Team (CIRT) gives advice on detecting Ryuk, a particularly pervasive and destructive ransomware family.
Hacker group targeted law firms, released veterans’ stolen data related to PTSD claims (Military Times) The posted information includes details from VA personal injury cases, pain diary entries, fee agreements and HIPPA consent forms. It is unclear, however, whether clients from the firms are aware some of their sensitive information has already posted to the web.
Popular YouTube gaming channel hacked to run crypto scam (HackRead) Neebs Gaming, a highly popular YouTube gaming channel boasting of 1.88 million subscribers, was hacked over the weekend by unidentified crypto scammers, who changed its name and banner to Coinbase Pro to collect Bitcoin from its viewers/subscribers.
Document management apps exposing files on employee devices (Wandera) Document management apps failing to encrypt files while transferring them between the user and the cloud-based application that provides the service.
Zero-Day in WordPress Plugin Exploited to Create Admin Accounts (BleepingComputer) A zero-day vulnerability in the ThemeREX Addons, a WordPress plugin installed on thousands of sites, is actively exploited by attackers to create user accounts with admin permissions and potentially fully taking over the vulnerable website.
Hackers Were Inside Citrix for Five Months (KrebsOnSecurity) Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents.
Cryptocurrency Scams: Fake Giveaways Impersonate Followers of Political and Other Notable Figures (Tenable®) “Thank you Elon,” “God Bless You Elon” and “God Bless You Donald” – scammers have been lurking in the Twitter replies of the U.S.
Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum (ZDNet) MGM Resorts said security incident took place last summer and notified impacted guests last year.
MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer (Threatpost) This week a hacking forum posted data from the breach—which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.
Data Breach: Student Data Compromised in Leak Involving Libyan Ministry of Education (WizCase) WizCase has recently found an open Elasticsearch database from the Libyan Ministry of Education. The server contained 2GB of data with PIIs, including full names, passport numbers, photos, email addresses, and more from more than 55,000 exchange students from around the world. What’s Going On? The WizCase web security team, led by Avishai Efrat, ...
Lookout Phishing AI provides an inside look into a phishing campaign targeting mobile banking users (Lookout) Lookout Phishing AI recently discovered a phishing campaign targeting customers via SMS messaging to lure them to fake websites of well-known Canadian and American banks.
Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security (BleepingComputer) Switzerland's Reporting and Analysis Centre for Information Assurance (MELANI) today warned of ongoing ransomware attacks targeting the systems of Swiss small, medium-sized, and large companies.
When Rudy Giuliani tweets a typo, hackers get an opening (CNET) When one letter off leads you to malicious advertisements rather than the former cybersecurity czar's website.
The Investigators: Collierville ransomware attack cost over $100,000; town now considering legal action (WMC Action News 5) The simple task of opening an email could end with hackers holding your digital life hostage. That is what happened to the Town of Collierville last summer.
JPS victim of cyberattack (WAPT) Jackson Public Schools is recovering from a cyberattack.
Security Patches, Mitigations, and Software Updates
Cisco critical bug: Static password in Smart Software Manager – patch now, says Cisco (ZDNet) Cisco urges customers using its smart licensing software to upgrade now because of a 9.8/10 severity flaw.
Critical Adobe Flaws Fixed in Out-of-Band Update (Theatpost) Two critical Adobe vulnerabilities have been fixed in Adobe After Effects and Adobe Media Encoder.
Microsoft Adds Enterprise Windows 10 Tamper Protection Controls (BleepingComputer) Microsoft announced today that support for the Windows 10 Tamper Protection feature has been added to Microsoft Defender ATP Threat & Vulnerability Management for additional info on exposed machines in their organization.
Kaspersky denies it’s responsible for Windows 10 update fails as blame game commences (TechRadar) Update was supposed to fix Kaspersky Rescue Disk
Cyber Trends
Dragos 2019 Year in Review reports on industrial threat activity groups, vulnerabilities, threat hunting and executive insights | Dragos (Dragos) Annual report on vulnerabilities, threat activity groups, incident response and threat hunting from Dragos intelligence and threat operations teams.
BlackBerry Cylance 2020 Threat Report Highlights (BlackBerry Cylance) See our analysis of 2019's BlackBerry Cylance customer and industry data to see what security trends you should prioritize as you continue to shore up your tools, technology, techniques, and overall defenses against the ever-evolving threat landscape.
The 2020 Healthcare Breach Report (Bitglass) In this report, Bitglass uncovers the state of cybersecurity for healthcare firms over the last year. By parsing data from the US Department of Health and Human Services' "Wall of Shame" database, the Next-Gen CASB was able to learn about the leading trends and challenges faced by healthcare organizations today.
Cybersecurity Perspectives 2020 (Scale Venture Partners) We're pleased to share Scale's annual survey on trends in enterprise cybersecurity. This year's report again delivers insight into how CISOs and other senior executives are thinking about the many forces shaping cybersecurity strategy.
New DivvyCloud Report Finds Breaches Caused by Cloud Misconfigurations Cost Enterprises Nearly $5 Trillion (DivvyCloud) DivvyCloud, the leading provider of security and compliance automation for cloud and container environments, today released its 2020 Cloud Misconfigurations Report, which substantiates the growing trend of data … Read more
Webroot: ‘Tremendous’ Return Prompts Massive Jump in Phishing Attempts (Channel Futures) Tyler Moffitt, Webroot's security analyst, tells us the growth in phishing attempts can be attributed to how they deliver a tremendous return on investment for cybercriminals, and phishing attempts are easy and cheap to launch, yet continue to trick undereducated end users into downloading malware or sharing their credentials. Phishing is one of the most successful delivery methods for malware.
Cybersecurity Perspectives 2020: Security and Privacy in the New Regulatory Era (Scale Venture Partners) With each passing year, security grows more complex as hackers find new ways to threaten organizations and businesses race to keep up with new and evolving security solutions.
Financial Organizations Are Attacked Mostly by State-Sponsored Organizations, Says Verint Exec (CTECH) Itzik Vager, vice president of cybersecurity at Verint, spoke at the Dark-Web Economy conference held Wednesday in Tel Aviv by Herzog Fox & Neeman and Herzog Strategic, in partnership with CTech by Calcalist
Cyber Attack Statistics You Need to Know (CPO Magazine) With cybersecurity threats growing every year, information on the most vital cyber attack statistics could help organizations better understand them and their potential damages.
Marketplace
CrowdStrike co-founder Dmitri Alperovitch steps down to launch nonprofit (CyberScoop) Dmitri Alperovitch, CrowdStrike’s chief technology officer and co-founder, has left to launch a nonprofit, according to a tweet he sent Wednesday.
ForgePoint Capital raises $450M for its second cybersecurity investment fund (SiliconANGLE) ForgePoint Capital raises $450M for its second cybersecurity investment fund - SiliconANGLE
QuintessenceLabs Secures Funding from In-Q-Tel (BusinessWire) QuintessenceLabs Secures Funding from In-Q-Tel
Security Unicorn SentinelOne Scores $200M Series E (SDXCentral) Endpoint security company SentinelOne closed a $200 million Series E funding round, which brings its total raised to $429.5 million and its valuation above $1.1 billion.
Netskope attracts $340m in additional investment, led by Sequoia Capital Global Equities (ITWeb) The investment was led by Sequoia Capital Global Equities.
ZeroFOX Announces New $74 Million Funding Round Led by Intel Capital (BusinessWire) ZeroFOX announces the closing of a new round of funding led by Intel Capital.
BluBracket scores $6.5M seed to help secure code in distributed environments (TechCrunch) BluBracket, a new security startup from the folks who brought you Vera, came out of stealth today and announced a $6.5 million seed investment. Unusual Ventures led the round with participation by Point72 Ventures, SignalFire and Firebolt Ventures. The company was launched by Ajay Arora and Prakash…
Huawei security chief, after court setback, says the Chinese tech giant needs to do more explaining (CNBC) Huawei's Andy Purdy spoke a day after a judge rejected its challenge to a U.S. law that restricted its ability to do business with federal agencies and their contractors.
SEC Awards Booz Allen $113M New Cybersecurity Contract (BusinessWire) On December 12, 2019, the Securities and Exchange Commission (SEC) awarded Booz Allen Hamilton (NYSE: BAH) an extensive 10-year contract, totaling $11
CACI continues battle for $300M DIA contract (Washington Technology) CACI International has filed a second bid protest over $300 million contract to support the Defense Intelligence Agency and Central Command's intelligence directorate.
SASE Gaining Momentum: Can Palo Alto Maintain Dominance? (Yahoo) Here we discuss a few companies, including Palo Alto Networks (PANW), which have the resources to overcome the challenges and build a completely SASE-based security model.
Nir Zuk slams Check Point's lack of ambition (Globes) The Palo Alto Networks founder and CTO blasts Check Point for putting too much emphasis on profit rather than investing in growth.
Press Release: Acceptto Announces 2X Year-Over-Year Growth Over Last 12 Months (Accepto) New Integrations, Certifications, Patents Strengthen Global Shift to a Passwordless Future for Enterprises. Learn more.
Cracking the Code: Nontraditional Paths into Cyber Security (HeadStuff) Cyber security today is more important than it has ever been before. More and more business sectors are realizing that they are in need of cyber security measures and it is projected that the cyber security market is expected to reach $244.4 billion by 2024. Fortunately, there are many different ways to find oneself working …
Security consultancy Lares expands into Canada (Consulting) Lares, a Denver-based security consulting firm, has expanded into Canada with a new Toronto location.
Keyfactor Launches Partner Network, Announces Channel Leadership Appoi (PRWeb) Keyfactor, the leader in securing digital identities, today announced the launch of the Keyfactor Partner Network, its global channel partner program, and the
Praetorian Adds Cam McMartin to Board of Directors (Yahoo) Praetorian, a cybersecurity company on a mission to make the world safer and more secure, announced today the addition of former SailPoint Technologies executive Cam McMartin to its board of directors.
Veeam Appoints Gil Vega as Chief Information Security Officer (Yahoo) Managing Director and CISO at CME Group, Inc. joins Veeam, the leader in Cloud Data Management
ThreatConnect hires four new senior management team members (Help Net Security) ThreatConnect, provider of an intelligence-driven security operations platform, announces the hiring of four new senior management team members.
CrowdStrike Promotes Michael Sentonas to Worldwide CTO (BusinessWire) CrowdStrike® Inc. (Nasdaq: CRWD), a leader in cloud-delivered endpoint protection, today announced the appointment of Michael Sentonas as the company’
Products, Services, and Solutions
Cloudian Announces Collaborative Solution With Veeam for Hardened Ransomware Protection (Globe Newswire) Features On-premises S3 Object Lock and U.S. Government-certified Data Immutability, Providing Assured Restore in the Event of an Attack
Rohde & Schwarz Launches Software Plug-In for NAT Detection & Mobile Tethering Tansparency (Fast Mode) ipoque launched an easy-to-integrate software plug-in for network address translation (NAT) detection and mobile tethering transparency
NowSecure Announces World’s First Mobile IAST Technology (Globe Newswire) Interactive Security Testing (IAST) Instrumentation Enables Deepest Test Coverage
Breach Clarity offers financial institutions a breach risk intelligence platform (Paypers) Fraud prevention and detection tech company Breach Clarity has developed a new ML platform for financial service providers to enable highly targeted protections for customers.
Trustwave Unveils Cloud Security Services For Palo Alto Networks Prisma Cloud (BusinessWire) Trustwave today unveiled a new portfolio of consulting and managed security services for Palo Alto Networks Prisma Cloud.
SentinelOne: From Endpoint Protection to Cybersecurity Data Lake (MSSP Alert) SentinelOne introduces the Singularity Platform -- a type of cybersecurity data lake that uses AI to help organizations guard against cyber threats.
SolarWinds Gets Nerdy, Adds Important Layer to Partner Success Programs (Channel Futures) One of the biggest hurdles MSPs face is how to work on their business, instead of just working in it. This program is designed to add to SolarWinds’ broader set of initiatives that have one singular objective: to help MSPs understand and maximize the most important business growth areas including security, automation, and operations.
Recorded Future Introduces Security Operations and Response Module (Homenewshere.com) Recorded Future, the global leader in security intelligence, today announced its plans for a new approach to building an intelligence-led cybersecurity program, designed to
KnowBe4 releases a sequel to its video cyberthriller (St Pete Catalyst) Clearwater cybersecurity training company KnowBe4 has released a second season for The Inside Man, a video series that brings the pitfalls in office IT security to life. "From social engineering, insider threats and passwords, to third-party apps and AI, The Inside Man teaches your users real-world application that makes learning how to make smarter security [...]
Cyware Labs Enhances Suite of Cyber Fusion Solutions with "The Human Element" (Yahoo) Cyware’s 2.0 suite of cyber fusion products enables organizations to detect, analyze, and act on security threats.
IronKey D300 features advanced security, achieves NATO Restricted Level Certification (Help Net Security) The Kingston IronKey D300, IronKey D300S and IronKey D300SM have been listed in the NATO Information Assurance Product Catalogue for security products.
Virsec Launches Solution for Continuous Application Protection from Development through Production (BusinessWire) Virsec will launch its new solution for continuous application protection, from development through production, at RSAC 2020.
Guardicore Threat Intelligence Firewall Hardens Security Policies in Modern Data Centers (Guardicore) The Guardicore Threat Intelligence Firewall feature goes beyond traditional firewall measures to help harden security profiles in complex cloud environments.
Level 2 Legal Launches Dedicated Compliance and Privacy Practice Areas (PRWeb) Level 2 Legal Solutions, a leading legal services company, today announced the formation of new Compliance and Privacy Practice Areas specifically geared towards
ProcessUnity Expands Vendor Risk Management Software with New Best Practices Configuration (Globe Newswire) New Out-of-the-Box Configuration Provides Quick-to-Deploy, Comprehensive Solution for Third-Party Risk Management
U.S. Department of Veterans Affairs Deploys Forescout Across 1.3 Million Devices - Forescout (Forescout) Forescout Technologies, Inc. (NASDAQ:FSCT), the global leader in device visibility and control, today announced that the U.S. Department of Veterans Affairs (VA) has deployed the Forescout platform across 1.3 million unique devices at more than 280 physical locations, hitting a critical cybersecurity milestone for the Agency. As the …
SyncDog and SecureAge Partner to Offer Universal Encryption, Securing Data Flow Across All Employees’ Devices (BusinessWire) SyncDog Inc., the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, today announced their partne
RiskLens FAIR Enterprise Model™ - RiskLens (RiskLens) RiskLens enterprise enables the Factor Analysis of Information Risk (FAIR) model. The RiskLens FAIR Enterprise Model™ delivers tech, services and outcome based solutions.
The best free antivirus for 2020: Keep your PC safe without spending a dime (PCWorld) Many of the best mainstream antivirus vendors offer a free version of their security suites. Here are our top five choices for free AV for PCs.
Technologies, Techniques, and Standards
An open letter to cyber security policy makers – control system cyber security is different than IT and requires an understanding of issues unique to control systems (Control Global) With the annual RSA Cyber Security Conference next week in San Francisco, I thought this would be an opportune time to discuss the validity of cyber security policies for control system environments.
Barr, Wray and top security officials: Help us protect the 2020 elections and your vote (USA TODAY) Our state-based system protects us from election disruption. You can help by being on guard against social media disinformation and divisive messages.
Cyber security drill held by Estonia in NATO Parliamentary Assembly (Baltic News Network) In Brussels, during the NATO Parliamentary Assembly, Estonian experts have held a strategic cyber drill, where member state legislators have been asked to look for solutions in a simulated cyber incident, ERR reports.
What DNS encryption means for enterprise threat hunters (WeLiveSecurity) As DNS encryption can blindside network defenders to malware communication, how can businesses hunt for cyber-threats in the DNS over HTTPS era?
Forcepoint's Eric Trexler on Three Strategies Agencies Should Adopt to Protect Data in Public Cloud (ExecutiveBiz) Eric Trexler, vice president of global governments and critical infrastructure at Forcepoint, wrote in a Nextgov article published Tuesday that there are three strategies federal agencies should implement to secure data in the public cloud and the first one calls for agency leaders to understand tha
What to know about user authentication and cyber security (Information Age) The amount of cyber attacks that are caused by hacking online retailer accounts remains high, so how can user authentication be improved?
72% of organisations plan to implement Zero Trust capabilities this year (Intelligent CIO Europe) As 72% of organisations plan to implement Zero Trust capabilities in 2020 to mitigate growing cyber-risk, nearly half (47%) of cybersecurity professionals lack
Companies Don't Trust Themselves With Zero Trust (Security Boulevard) Zero trust may be an ideal solution to an increasingly porous cybersecurity approach. So why aren't more organizations trusting?
Is Security for Containers and Microservices the Same? | Radware Blog (Radware Blog) From an information security point of view, protecting containerized applications or microservices can be interpreted in two ways.
Webcast: Enterprise Recon For Purple Teams (Black Hills Information Security) Do you know what your attackers know? There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. Join Jordan Drysdale and Kent Ickler as they discuss and demonstrate Purple Team Enterprise Reconnaissance methods that increase …
How Havre Public Schools Handled A Ransomware Attack (Montana Public Radio) Havre Public School’s computer system was infected with a ransomware virus in early February.
Design and Innovation
An Indian politician is using deepfake technology to win new voters (MIT Technology Review) The news: A deepfake of the president of India’s ruling Bharatiya Janata Party (BJP), Manoj Tiwari, went viral on WhatsApp in the country earlier this month, ahead of legislative assembly elections in Delhi, according to Vice.
Cryptographic “tag of everything” could protect the supply chain (MIT News) Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting.
Research and Development
SailPoint Granted New Round of Patents for SailPoint Predictive Identity™ (Yahoo) SailPoint Technologies Holdings, Inc. (NYSE: SAIL), the leader in enterprise identity management, today announced that the company has been granted additional U.S. patents related to the SailPoint Predictive Identity™ platform, the company’s Artificial Intelligence (AI) and Machine Learning (ML)-enabled
Intel's cryogenic Horse Ridge chip aims to make quantum computers faster and smaller (Computing) The chip uses radiofrequency capabilities to control 128 qubits with a single device
Academia
()
Legislation, Policy, and Regulation
DoT gets right to bar Chinese firms from govt telecom tenders (Livemint) The move is set to hit Chinese telecom equipment suppliers such as Huawei, ZTE and UTStarcom.The US has also pressed its allies to ban companies such as Huawei from participating in 5G networks
China Expels Three Wall Street Journal Reporters (Wall Street Journal) China revoked the press credentials of three Wall Street Journal reporters based in Beijing, the first time in the post-Mao era that the Chinese government has expelled multiple journalists from one international news organization at the same time.
U.S. urges EU to use 5G by Ericsson, Nokia, Samsung, seen on par with Huawei (Reuters) EU countries have no reason to use 5G mobile technology from Huawei because Swed...
Europe, Overrun by Foreign Tech Giants, Wants to Grow Its Own (New York Times) The European Union outlined proposals to bolster its digital economy and keep it from being overly reliant on foreign companies, while cracking down on those companies.
EU bets on industrial data, new rules to catch up in global tech (Reuters) The European Commission plans to create a single European market for data, hopin...
EU Prepares to Push Businesses to Share Data (Wall Street Journal) To promote AI innovation, regulators want to make it easier for companies to gain access to each other’s industrial data.
Big Tech to Face More Requirements in Europe on Data Sharing, AI (Wall Street Journal) American tech companies will soon need to meet new requirements in the European Union regarding artificial intelligence and sharing data with smaller rivals, as the bloc seeks to assert its “technological sovereignty” from the U.S. and China.
Europe sets out plan to boost data reuse and regulate ‘high risk’ AIs (TechCrunch) European Union lawmakers have set out a first bundle of proposals for a new digital strategy for the bloc, one that’s intended to drive digitalization across all industries and sectors — and enable what Commission President Ursula von der Leyen has described as ‘A Europe fit for t…
Facebook’s proposed regulations are just things it’s already doing (The Verge) And yet they’re still better than what some governments are proposing
Barr threatens tech's prized legal shield (TheHill) Attorney General William Barr is threatening the legal shield that prevents internet companies such as Facebook and Google from facing lawsuits over the extreme, exploitative and sometimes violent posts that circulate on their power
Our Collective Responsibility to Secure the Reseller Channel from Cyber Threats (Homeland Security Today) Bad actors know that targeting the reseller channel is one of the simplest and easiest ways to disrupt the supply chain.
Navy, Beset by Aging Tech, Pushes for Rapid Modernization (Wall Street Journal) Aging and fragmented technology has left the Navy unable to fully defend itself from persistent cyberattacks from China and elsewhere, defense officials said, prompting an effort to upgrade and secure computer networks.
U.S. Navy Cyber Warfare Development Group Opens Cyber Foundry (MeriTalk) The U.S. Navy Cyber Warfare Development Group (NCWDG) announced the opening of the Cyber Foundry at Fort Meade, Md., on Feb. 18.
DHS released $1.8B in funding opportunities for preparedness grants (Homeland Preparedness News) The U.S. Department of Homeland Security (DHS) released funding opportunities for eight preparedness grant programs totaling nearly $1.8 billion. The grant programs provide funding to state and local governments, as well as transportation authorities, nonprofits, and the private sector, to … Read More »
Trump Taps Loyalist Ambassador With No Intelligence Background as Nation’s Acting Top Intel Official (KTLA) President Donald Trump on Wednesday announced that Richard Grenell, the U.S. ambassador to Germany, will become acting director of national intelligence, a move that puts a staunch Trump ally in charge of the nation's 17 spy agencies, which the president has only tepidly embraced.
“Rick has represented our Country exceedingly well and I look forward to working with him,” Trump tweeted.
Trump Names Richard Grenell as Acting Head of Intelligence (New York Times) The move places a loyalist atop the intelligence agencies that the president has long battled.
DoD policy chief John Rood forced out (Defense News) The Pentagon’s top policy official has been pushed out of the department.
Litigation, Investigation, and Law Enforcement
Assange lawyer claims congressman offered pardon on behalf of Trump in exchange for absolving Russia in WikiLeaks DNC case (Washington Post) A lawyer for Julian Assange said in a British court Wednesday that former Republican congressman Dana Rohrabacher, an ally of President Trump, made an offer to the WikiLeaks founder on behalf of Trump to pardon Assange in exchange for saying that Russia had nothing to do with the 2016 hack and leak of emails from the Democratic National Committee.
Ex-lawmaker denies Trump pardon offer to Assange (BBC News) Dana Rohrabacher denies a claim he offered a White House clemency deal to the Wikileaks founder.
My Meeting with Julian Assange (Dana Rohrabacher) There is a lot of misinformation floating out there regarding my meeting with Julian Assange so let me provide some clarity on the matter: At no time did I talk to President Trump about Julian...
Exclusive: Google users in UK to lose EU data protection - sources (Reuters) Google is planning to move its British users' accounts out of the control o...
How Saudi Arabia Infiltrated Twitter (BuzzFeed News) “Proactive and reactively we will delete evil my brother.”
Apple Wants to Stop Publication of 'App Store Confidential' Book Due to Inclusion of 'Business Secrets' (Mac Rumors) Apple is aiming to stop the sale of a new insider book called "App Store Confidential," written by former Apple employee Tom Sadowski who ran...
Facebook faces tax court trial over Ireland offshore deal (Reuters) Facebook Inc is slated to begin a tax trial in a San Francisco court on Tuesday,...
()