Cyber Attacks, Threats, and Vulnerabilities
State Department blames ‘swarms of online, false personas’ from Russia for wave of coronavirus misinformation online (Washington Post) A top State Department official warned Thursday that Russia is behind “swarms of online, false personas” that sought to spread misinformation about coronavirus on social-media sites, stressing the “entire ecosystem of Russian disinformation is at play.”
Surge of Virus Misinformation Stumps Facebook and Twitter (New York Times) Secret labs. Magic cures. Government plots. Despite efforts by social media companies to stop it, false information about the coronavirus is proliferating around the world.
Defending Against COVID-19 Cyber Scams (CISA) The Cybersecurity and Infrastructure Security Agency (CISA) warns individuals to remain vigilant for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19.
Multiple nation-state groups are hacking Microsoft Exchange servers (ZDNet) Government-backed groups are exploiting CVE-2020-0688 to take over Exchange email servers.
Detecting CVE-2020-0688 Remote Code Execution Vulnerability on Microsoft Exchange Server (TrustedSec) TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
DNA testing firms at risk of state-sponsored hacks, says 23andMe security chief (The Telegraph) A top DNA testing company has accused foreign countries of wanting to steal its genetic data and said NHS information could also be targeted.
Hackers Use Israel's Defense Minister’s Account for Pro-Palestinian Tweets (CTECH) Naftali Bennett's official Twitter account was hacked on the night between Friday and Saturday, apparently by Turkish or pro-Palestinian hackers
Phishing Gets in Digital Motion with Vertigo-3PC (The Media Trust) Mobile-specific malvertising campaign targets devices in motion and explodes its reach in four weeks among Demand Side Platforms
Malvertisers have deployed a unique twist on their campaigns that involves multiple checks and redirects to deploy phishing content to unassuming users. Detected and tracked by The Media Trust’s Digital Security Operations team since January, this campaign used dozens of domains to target mobile-web users, tripling its reach in four weeks.
New credit card data leak affects Singapore, Malaysia users: cybersecurity firm (South China Morning Post) Technisanct, based in India, said the breaches involved details from cards issued by top banks in at least six Southeast Asian countries.
‘Data breach claim unsubstantiated’ (Sun Daily) Any claims by cybersecurity firms on leaked credit card data being sold online should be backed with evidence, a cyber security expert ...
Microsoft Confirms ‘Really, Really High’ Hacking Risk For Millions Of Users: Here’s What You Do Now (Forbes) The numbers are shocking, "crazy," says Microsoft. And 89% of you have left yourselves open to this risk.
Zoho zero-day published on Twitter (ZDNet) Security experts fear the bug may be soon exploited by ransomware gangs.
Researchers say they found a hole in PayPal's security. But PayPal isn't fixing it (Fortune) Researchers say they found a way to bypass an important security check in the payments service. But PayPal says customers shouldn't be concerned.
17-Yr-Old RCE Flaw Can Hack Several Linux Systems (TechWorm) A 17-year-old critical Remote Code Execution vulnerability affects PPP daemon software implemented in almost all Linux based operating systems.
Emotet Actively Using Upgraded WiFi Spreader to Infect Victims (BleepingComputer) Emotet's authors have upgraded the malware's Wi-Fi spreader by making it a fully-fledged module and adding new functionality as shown by multiple samples that were recently delivered to infected devices.
Attackers Distributing Malware Under Guise of Security Certificate Updates (Dark Reading) Approach is a twist to the old method of using fake software, browser updates, Kaspersky says.
Telus-Owned Koodo Mobile Announces Data Breach, Stolen Info for Sale (BleepingComputer) Telus-owned Koodo Mobile has suffered a data breach after their systems were hacked and customer data from August and September 2017 was stolen by the attackers.
AMD processors from 2011 to 2019 vulnerable to two new attacks (ZDNet) Academics disclose new Collide+Probe and Load+Reload attacks on AMD CPUs.
Durham City and County services targeted in cyber attack, 80 servers taken offline (ABC11 Raleigh-Durham) Officials are unsure how the attack happened, but are focused on bringing the servers back online while also finding the source of the attack.
Ryuk Ransomware Behind Durham, North Carolina Cyberattack (BleepingComputer) The City of Durham, North Carolina has shut down its network after suffering a cyberattack by the Ryuk Ransomware this weekend.
Defense contractor CPI hit by ransomware attack (TechCrunch) Exclusive: The radar and electronic warfare technology maker was knocked offline in January and recovery is still under way.
Malware attack continues to affect paper mill in Powell River (Powell River Peak) Papermaking capacity at the Powell River mill is still compromised after a malware attack. According to a media release issued on March 5, Paper Excellence Canada is now in the second week of an . . .
Evraz hit by cyberattack, prompting temporary layoff for workers (Regina Leader-Post) The company confirmed that the attack affected systems in both Canada and the U.S. and caused “interruptions” to its Regina steel mill.
Cyberattack hits Evraz’s North American operations meaning temporary shutdown at Regina steel mill (620 CKRM The Source) Workers at Regina's Evraz Steel Mill are getting some unexpected time off. A cyberattack on Evraz's North Amer...
Evraz Steel workers provided layoff updates following cyber attack (620 CKRM The Source | Country Music, News, Sports in Sask) Workers at Regina's Evraz Steel mill have been given updates on their layoff statuses before the start of the ...
Council Post: Ransomware's Dark Future (Forbes) The stakes are high and suggest that companies need to dramatically improve their ability to detect a network attack or intruder and quickly curtail it.
Japan drops to 5th position in list of most cyber-secure countries: Report (CISO MAG) Japan may be in the list of the most cyber-secure countries in the world. But its position is dropping due to ransomware attacks. Japan Cybersecurity.
Next-Gen Ransomware Packs a 'Human' Punch, Microsoft Warns (Threatpost) Ryuk, DoppelPaymer, Parinacota and other ransomware groups are getting more sophisticated, Microsoft warns.
Ransomware more targeted and inflicting greater damage than ever (ITProPortal) Hackers demanding huge sums to surrender data.
Beware Of This New Windows 10 Ransomware Threat Hiding In Plain Sight (Forbes) A newly discovered ransomware strain is using Windows Explorer to hide in plain sight
Ransomware costing schools, local governments and hospitals millions (Intelligencer) Cyber criminals are increasingly hitting school districts, hospitals, government agencies and small businesses, forcing them to pay big money to unlock their systems and restore data, according the FBI. Souderton Area School District, St. Mary and Bristol Borough are just a few local organizations targeted by ransomware who have reported their breaches publicly.
Vegas casino operator may have just been hit by a ransomware attack (CalvinAyre.com) Two casinos owned by TLC Casino Enterprises suffered widespread outages consistent with an outside hack.
Chrome extension cons cryptocurrency users out of hardware wallet key (Naked Security) Ledger has warned users about a rogue Chrome extension that duped users into giving up the keys to their hardware crypto wallets.
Twitter flags video retweeted by President Trump as ‘manipulated media’ (Washington Post) It’s the first time the social network has enforced a new policy to fight doctored videos and photos
Biden video was not manipulated, Scavino says (Fox News) Dan Scavino, the director of social media at the White House, took to Twitter early Monday to deny the charge that a retweeted video that showed Joe Biden stumbling during a recent speech was manipulated.
Analysis | The Cybersecurity 202: Former 2020 contenders take lead on slamming Trump over disinformation (Washington Post) This is one way candidates are remain unified against Trump.
Tens of thousands of political ads on Facebook lacked key details about who paid for them, new report finds (Washington Post) Four years after Russian agents weaponized the social-networking site and its powerful targeting tools in the 2016 presidential election, some key Facebook defects that could "enable a malicious advertiser to avoid accurate disclosure of their political ads," NYU researchers found in their study.
The Great Fake: Scammers are luring shoppers to fake websites and sellers (WKYC) Shoppers don't find out until after they hand over their money.
Cyberattack exposes personal details of thousands of Foodmandu users (My Republica) Personal information of more than 50,000 users of Foodmandu, a popular food delivery online service, has been publicly exposed following a cyber attack by a hacker.
Huawei backdoors explanation, explained (Errata Security) Today Huawei published a video explaining the concept of "backdoors" in telco equipment. Many are criticizing the video for being tone deaf....
Public barred from cyber-attack meeting (BBC News) Redcar and Cleveland Council's systems are down after a ransomware attack on 8 February.
Redcar and Cleveland Council expelled public and press from council meeting discussing ransomware outbreak (Computing) Public and press thrown-out of resources committee meeting last week because ‘sensitive’ information about ransomware attack would be discussed
Security Patches, Mitigations, and Software Updates
Cisco fixes three high-level bugs, but a fourth remains unpatched (SC Media) Cisco Systems this week issued disclosed a dozen software vulnerabilities, including four high-severity flaws, one of which has not been patched.
Google Pixel 4 to get crucial facial recognition security update soon (Deccan Herald) Google's 2019-based flagship phone Pixel 4 had a boatload of features including Soli Radar-based motion sense detection, powerful processor, top-notch camera hardware with facial recognition system.
The office as we know it may not recover from the coronavirus (The Telegraph) If Covid-19 spreads in the same way in the West, we are probably about to embark on an unprecedented experiment in remote working
Companies That Got Out of China Before Coronavirus Are Still Tangled in Its Supply Chains (Wall Street Journal) The epidemic has revealed a central problem for the global manufacturing industry: China’s shadow has grown so long that even companies that have moved on can’t wriggle free of the country’s grip on supply networks.
South by Southwest Hit Hard by Coronavirus Cancellation (Wall Street Journal) The chief executive of South by Southwest said organizers are unsure how they will keep the festival going after the city canceled it because of the novel coronavirus, which he said could cost them millions.
Passwords still dominant authentication method, top cause of data breaches (Help Net Security) Passwords remain the dominant method of authentication and top cause of data breaches, according to research released by MobileIron.
'GDPR didn't stoke the wave of data protection we anticipated' - security vendor Thales (CRN) Security specialist’s head talks to CRN about changing up its partner profiles, why the UK is ahead of its peers with cloud security, and the opportunities available to them
98% of DDoS Attacks are Less than 10Gbps, Confirms Corero (Yahoo) Corero Network Security (LSE: CNS) – the leader in real-time, high-performance, automatic DDoS attack detection and mitigation, has published their Full Year 2019 DDoS Trends Report today.
21% of South Korea’s mobile data is already 5G (5Gradar) Less than a year after launching in South Korea, 5G traffic now makes up over a fifth of the country's mobile data usage.
Lessons learned on written social engineering attacks (DiabloHorn) I’ve had some interesting conversations on the topic of performing social engineering attacks via email and decided to share some of my past lessons learned. The focus will not be so much on …
Cybersecurity in the Aeronautics Industry (Aeronautics) Frankie Wallace is a freelance journalist with an interest in aviation news and politics. Wallace graduated from the University of Montana’s Journalism School and currently resides in Boise, Idaho. The views expressed in this article are solely his and do not represent those of Aeronautics Online. Although it appears that flying is one of the…
A list of security conferences canceled or postponed due to coronavirus concerns (ZDNet) Some conferences have canceled, some have postponed the event, while others have gone virtual.
Huawei to hell: company stays but consumers are leaving (Australian Financial Review) Data shows Australian consumers are losing interest in the Chinese telco's devices after the disconnect with Google services.
Ex-minister to earn up to €200,000 as Huawei lobbyist (independent) Former European affairs minister Dick Roche is set to earn up to €200,000 this year as a lobbyist for Chinese tech giant Huawei, one of the world's most controversial companies.
Grindr has been sold by its Chinese owner after the US expressed security concerns (The Verge) The owner had a June 2020 deadline to sell Grindr.
Accenture acquires Context Information Security to strenghten its existing portfolio (Help Net Security) Accenture has acquired Context Information Security, a leading cyber defense consultancy, previously owned by parent company Babcock International Group.
HelpSystems Acquires Cobalt Strike to Expand Core Security Business (Globe Newswire) Top pen-testing solution joins Core Security in HelpSystems roster of infrastructure protection solutions to meet surging market demand
HelpSystems Makes Another Acquisition, Scooping Up Cobalt Strike (American Inno) Local software development firm HelpSystems announced Wednesday that it has acquired Cobalt Strike, a penetration-testing solution that enables companies to emulate the tactics of hackers to identify security weaknesses.
WatchGuard Acquires Panda Security for Endpoint Protection (MSSP Alert) WatchGuard acquires Panda Security, extending from network to endpoint security. Deal doubles down on MSP & MSSP partnerships, threat detection & response.
Panda Security Turns 30, Brand Set for Extinction on WatchGuard Buyout (Computer Business Review) Spain's Panda Security, an endpoint protection specialist that turned 30 this year, is being snapped up by the US's WatchGuard Technologies
Forescout Announces Expiration of “Go-Shop” Period (Globe Newswire) Acquisition by Advent International On-Track to Close in the Second Quarter of 2020
Digital Ally, Inc. Granted Extension by NASDAQ (Globe Newswire) Digital Ally Expects to Regain Compliance Required by NASDAQ by June 30, 2020
DreamPort complex at USC Aiken will boost state's cybersecurity efforts, official says (Aiken Standard) Aiken could soon become a cybersecurity pioneer for South Carolina and serve as a springboard into broader cyber-defense fields and missions, U.S. Army Brig. Gen. Brad Owens said Friday morning
Welcome to Malvern — hackers beware (Times) Stroll around the picturesque spa town of Malvern and you are likely to bump into a technology entrepreneur trying to find ways to make the internet a safer place.“Walking in the hills, going to
Twitter, Elliott Strike Truce That Leaves CEO Dorsey in Place (Wall Street Journal) Twitter and activist hedge fund Elliott Management agreed to a truce that will shake up the social media company’s board but leave its CEO Jack Dorsey in place.
Checkmarx Appoints Ron Kormanek to Executive Management Team (Yahoo) Checkmarx, a global leader in software security solutions for DevOps, today announced that Ron Kormanek, vice president of North America sales, has been appointed to the company’s executive management team as it continues to drive rapid customer adoption and set the new standard for secure software development
Products, Services, and Solutions
Staying Ahead of Emerging Threats (Bishop Fox) Bishop Fox's Continuous Attack Surface Testing managed security service helped clients when a critical-severity vulnerability threatened Citrix appliances.
Fortinet scraps metal tiers in program update (ARN) Fortinet has formally scrapped its precious metal tier structure in an overhaul of its global partner program.
FireEye Wins Navy-Hosted AI Cybersecurity Challenge (ExecutiveBiz) FireEye has won a $100K prize as the first place champion of a cybersecurity contest held by the Naval Information Warfare Systems Command.
The Risk of Microsoft Owning Your Identity (JumpCloud) With Active Directory struggling to authenticate modern IT infrastructure, IT teams are concerned about the risk of Microsoft owning your identity.
Echoworxs Enhanced Multi-factor Authentication Improves Cybersecurity With User-focused Design (Financial Buzz) Echoworx, the industry leader in message encryption, today unveiled enhancements to its OneWorld cloud-based security
Jumbo Privacy CEO: We Protect 80,000+ Users from Sharing Private Data with Social Networks (PreciseSecurity.com) PreciseSecurity.com recently interviewed Jumbo Privacy Chief Executive Pierre Valade where an array of privacy-related issues were discussed.
Is SaaS the New Trojan Horse in the Age of Cloud Computing? (Menlo Security) Traditional Security Products Are Not Designed to Protect Enterprises Against SaaS-based Attacks
Technologies, Techniques, and Standards
Lessons for the US military from the Russian invasion of Ukraine (Military Times) There are “plenty of military lessons” for the U.S. in Ukraine, which has been fighting the Russian military for six years.
Internet Standards Emphasize User Privacy At Expense of Enterprise Security (Decipher) New Internet technologies bring more privacy to the network, but they have the side effect of breaking security in enterprise networks, Internet pioneer Paul Vixie said at RSA Conference 2020.
Sanders Campaign Looks to Protect Emails - WSJ.com (Wall Street Journal) Sen. Bernie Sanders's presidential campaign has enlisted an outside firm to beef up the security of its email systems, part of what security experts say are necessary protections as the election season intensifies.
The Sanders campaign started working with Agari Data Inc. in the past few weeks, the
Service Announcement: The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working (Panorays) As COVID-19 forces companies to implement large-scale remote working, here’s how companies can assess their vendors’ security readiness for this change.
Remote working due to coronavirus? Here’s how to do it securely… (Naked Security) Don’t let teleworking due to concerns over the coronavirus (Covid-19) put your cybersecurity health at risk….
CEOs quit social media to keep them secure (Avast) CEOs are changing their personal online habits to protect themselves, and the organizations they lead, from cyber criminals
National Day of Unplugging – how switching off can boost business security (Data Security Blog | Thales eSecurity) Disconnecting from your mobile device, laptop or tablet can be as good as a holiday. Simply taking a pause from...
Maximizing customer engagement when fraud prevention is top of mind (Help Net Security) With the number of data records breached in 2019 surpassing 4 billion, fraud prevention and regulatory compliance are top priorities for FIs.
Design and Innovation
How Wikipedia’s volunteers became the web’s best weapon against misinformation (Fast Company) In the Facebook era, the volunteer editors behind the archaic-looking website have built Wikipedia into a formidable force for truth.
With painted faces, artists fight facial recognition tech (AP NEWS) As night falls in London, Georgina Rowlands and Anna Hart start applying makeup. Instead of lipstick and eyeliner, they’re covering their faces with geometric shapes. Rowlands...
Research and Development
SymTCP: New approach to protecting Army systems without massive amounts of manual intervention (Help Net Security) Researchers at the Army's corporate laboratory and the University of California have identify a novel cybersecurity approach to protect Army systems.
Canada's cyber intelligence agency working on 'Holy Grail' of encryption (CBC) Canada’s cyber security centre says it’s working on the “holy grail” of encryption to protect government data from security breaches.
84% of Employers find Cybersecurity Certifications that align with Military Job Roles as the Gold Standard for Hiring (EC-Council Official Blog) University of Phoenix and EC-Council release a joint survey that highlights the cyber certifications employers seek in new candidates
ROTC cadets at UNM studying cybersecurity measures (Albuquerque Journal) ROTC cadets at UNM studying security measures
Hackers Compete at NYU Tandon (Washington Square News) In Tandon School of Engineering’s gymnasium, no table was spared from the barrage of half-finished energy drinks and snacks strewn among computers. Small teams collaborated at these tables to create new uses for various kinds of technology.
Legislation, Policy, and Regulation
‘What’s the next step?’: US officials are rethinking how to dissuade cyberattacks (Fifth Domain) U.S. officials acknowledge that their current deterrence strategy isn't working. With several nation-state presenting threats to the 2020 election, how should deterrence policy change?
China: New Rules Criminalize ‘Negative’ Cyber Talk (Eurasia Review) The communist government in China has tightened the gag on cyberspace with a new set of rules that make it a violation to talk about what the state construes as “negative content.” The …
Russian Cyber Attacks Against Georgia, Public Attributions and Sovereignty in Cyberspace (Just Security) "The attack on Georgia shows the opportunity costs of states not firmly grounding their reactions in the language of international law."
Georgia Joins NATO’s Cyber Threat Intelligence Sharing Platform (Civil.ge) Georgian Cyber Security Bureau, a state body charged with tackling cyber threats, joined Malware Information Sharing Platform, Georgia’s Ministry of Defense reported on March 5. Ministry of D…
Despite ‘consensus’ with DoD, ODNI moving ahead with its own AI principles (Federal News Network) Building off the Defense Department’s recent adoption of five artificial intelligence principles, the Office of the Director of National Intelligence will soon release its own public set of AI principles.
France says Huawei’s investments will not influence its 5G position (New Europe) French finance minister Bruno Le Maire said that investments by the Chinese tech giant Huawei will not influence France’s 5G expansion plans.
Last week, Huawei announced that it would open a factory dedicated to 5G equipment in France, for which it would invest at least €200 million and would emp
UK defense committee to probe security of 5G network on Huawei concerns (Reuters) Britain's parliamentary defense committee will investigate the security of ...
Telecom firms urge FCC flexibility as carriers replace Chinese equipment (SC Media) At a Senate hearing, telecom officials gave recommendations to lawmakers who seek to restrict and replace telecom equipment deemed to pose a security risk.
Is $1B enough to rip out Huawei gear from the US? (Light Reading) The work involved in ripping Huawei equipment out of US networks is extensive, setting up the potential for costs above the $1 billion Congress has already set aside for the effort.
Trump orders Chinese company to divest ownership of U.S. firm, citing national security concerns (Washington Post) The order suggests the White House is concerned about Chinese access to hotel-guest data
New US Bill Aims to Protect Researchers who Disclose Govt Backdoors (BleepingComputer) New legislation has been introduced that amends the Espionage Act of 1917 to protect journalists, whistleblowers, and security researchers who discover and disclose classified government information.
Tech Firms Seek to Head Off Bans on Facial Recognition (Wall Street Journal) Technology companies are pushing for laws that would restrict use of facial-recognition systems—and head off the outright bans some cities and states are moving toward.
U.S. Govt. Makes it Harder to Get .Gov Domains (KrebsOnSecurity) The federal agency in charge of issuing .gov domain names is enacting new requirements for validating the identity of people requesting them
The cybersecurity risks lurking in OMB’s data center policy (Federal Times) How the Office of Management and Budget classifies certain facilities is creating potentially problematic blind spots, according to a watchdog's report.
The Pentagon’s first class of cybersecurity auditors is almost here (Fifth Domain) The Pentagon hopes to have the first class of auditors to evaluate contractors’ cybersecurity ready by April, a top Department of Defense official said March 5.
MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values (Security Boulevard) Is America’s working definition of “national security” too narrow for the digital age?Yes, observes retired Admiral Michael Rogers, who served as a top White House cybersecurity advisor under both Presidents Obama and Trump. Related: The golden age of … (more…)
Dubai becomes the first city in UAE to apply security standards for ICS (TechRadar) Enoc, Dewa, Dubai Airports and RTA key in co-developing and implementing the new security standard
Editorial: Trust not earned with election security (Daily Commercial) When the issue at hand is security, we understand the need for secrecy.
Litigation, Investigation, and Law Enforcement
Watchdog warns of election security issues this year and chides federal agency (Washington Post) GAO says Homeland Security agency is not well-positioned to execute a nationwide strategy for securing election infrastructure
Election Security: DHS Plans Are Urgently Needed to Address Identified Challenges Before the 2020 Elections (Government Accountability Office) In January 2017, the Secretary of Homeland Security designated election infrastructure as a critical infrastructure subsector. The designation allowed DHS to prioritize assistance to state and local election officials to protect key election assets, including voter registration databases and voting equipment.
Drug traffickers, extortionists, and bank robbers keep posting clues to their crimes on Facebook (Quartz) “If I was still running a squad, we could make a living just off of this foolishness,” said one ex-cop.
Facebook sued by Australian information watchdog over Cambridge Analytica-linked data breach (the Guardian) Facebook alleged to have committed serious breaches with data collected by This is Your Digital Life app used by Cambridge Analytica for political profiling
FISA court bans officials involved in Carter Page wiretaps from seeking surveillance (Washington Examiner) Justice Department and FBI officials under review for their role in the flawed wiretaps of former Trump campaign associate Carter Page are banned from having any involvement in the pursuit of electronic monitoring through the Foreign Intelligence Surveillance Court.
Former Obama Admin Acting DHS Inspector General Indicted on Theft, Fraud Charges (Law & Crime) A 59-year-old Maryland man who served as the Acting Inspector General for the U.S. Department of Homeland Security between the 2011 and 2013 years of Barack Obama's presidency has been indicted for alleged theft and fraud.
Judge cites Barr’s ‘misleading’ statements in ordering review of Mueller report redactions (Washington Post) Judge Reggie Walton criticized the attorney general in a written opinion raising doubts about Barr’s credibility.
NASA: Boeing software team had too much power over Starliner capsule (UPI) Boeing's software team had too much influence over final decisions regarding the company's Starliner capsule, a top NASA administrator said Friday.
US regulators will force Boeing to rewire 737 MAX jets: report (France 24) US regulators will force Boeing to rewire 737 MAX jets: report
FBI investigating cybersecurity threat at Arkansas Children’s Hospital (KLRT - FOX16.com) Officials with Arkansas Children’s Hospital says they have contacted the FBI after a recent cybersecurity threat. Officials with Arkansas Children’s Hospital released…
Arkansas Children's Hospital contacts FBI after cybersecurity threat (KTHV) According to the children's hospital's Facebook page, a recent cybersecurity threat took place and they have contacted the FBI in response.
Cartersville Man Pleads guilty to defrauding investors in a foreign currency trading scam (Coosa Valley News) Kevin Perry has pleaded guilty to defrauding investors in a foreign currency trading scam that began when he was a teenager. “Clients that invested with Perry’s company were assured they were secur…