Emotet reappears in the wild. Mirai-based DDoS attack. SharkBot hits European banking customers. Intel addresses bugs. | #cybersecurity | #cyberattack


Attacks, Threats, and Vulnerabilities

Emotet malware is back and rebuilding its botnet via TrickBot (BleepingComputer) The Emotet malware was considered the most widely spread malware in the past, using spam campaigns and malicious attachments to distribute the malware.

Emotet botnet returns after law enforcement mass-uninstall operation (The Record by Recorded Future) The Emotet malware botnet is back up and running once again almost ten months after an international law enforcement operation took down its command and control servers earlier this year in January.

Researchers Spot Comeback of the Emotet Botnet (GovInfoSecurity) The Emotet botnet, which was hampered by law enforcement earlier this year, is making a comeback. The resurgence appears to be due to help from old friends:

7 million Robinhood user email addresses for sale on hacker forum (BleepingComputer) The data for approximately 7 million Robinhood customers stolen in a recent data breach are being sold on a popular hacking forum and marketplace.

NCC warns of new cyber attack group in Africa’s telecoms space (Daily Post Nigeria) The Nigerian Communications Commission (NCC) has called the attention of the Nigerian public to the existence of another hacking group orchestrating

Cloudflare blocked multi-vector DDoS attack that peaked at almost 2 Tbps (Computing) Attack was launched from 15,000 bots running Mirai malware on compromised Internet of Things (IoT) devices and unpatched GitLab instances

Cloudflare Battles 2 Tbps DDoS Attack Launched by Mirai Botnet (SecurityWeek) Web security services provider Cloudflare says it mitigated a distributed denial of service attack that peaked at almost 2 terabytes per second (Tbps).

A new Android banking trojan named SharkBot is makings its presence felt (The Record by Recorded Future) Security researchers have discovered a new Android banking trojan capable of hijacking users’ smartphones and emptying out e-banking and cryptocurrency accounts.

CISA Warns of Serious Flaws in Many DDS Implementations (Decipher) CISA is warning ICS operators of a number of vulnerabilities in some open-source and proprietary data distribution service implementations that can lead to remote code execution.

Multiple Data Distribution Service (DDS) Implementations (CISA) 1. EXECUTIVE SUMMARY

CVSS v3 8.6
ATTENTION: Exploitable remotely/low attack complexity
Vendors: Eclipse, eProsima, GurumNetworks, Object Computing, Inc.

IoT Protocol Used by NASA, Siemens and Volkswagen Can Be Exploited by Hackers (SecurityWeek) Researchers have shown that a widely used protocol named Data Distribution Service (DDS) is affected by vulnerabilities that could be exploited by threat actors for various purposes.

Intel details two security bugs affecting several processor generations (Computing) A malicious actor could exploit these flaws to escalate privilege on a vulnerable machine

New secret-spilling hole in Intel CPUs sends company patching (again) (Ars Technica) Researchers figure out how to obtain the “fuse encryption key” unique to each CPU.

INTEL-SA-00562: BIOS Reference Code Advisory (Intel) Potential security vulnerabilities in the BIOS reference code for some Intel® Processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities.

Positive Technologies Discovers Vulnerability in Intel Processors used in Laptops, Cars and Other devices (Positive Technologies) Flaw can be exploited to gain access to encrypted files, for espionage, and to bypass copyright protection

DDR4 memory protections are broken wide open by new Rowhammer technique (Ars Technica) Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits.

New Rowhammer technique bypasses existing DDR4 memory defenses (BleepingComputer) Researchers have developed a new fuzzing-based technique called ‘Blacksmith’ that revives Rowhammer vulnerability attacks against modern DRAM devices that bypasses existing mitigations.

Blacksmith (COMSEC Computer Security Group) We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort.

Diebold Nixdorf ATM Flaws Allowed Attackers to Modify Firmware, Steal Cash (SecurityWeek) A couple of vulnerabilities in Diebold Nixdorf ATMs could have allowed for an attacker to replace the firmware on the system and withdraw cash.

On the recent vulnerability in Diebold Nixdorf ATMs (Habr) Disclaimer: This article is published solely for information purposes and is in no way a guide to action. The vulnerabilities described in the article were discovered by the author as part of the…

FBI systems compromised to send out fake attack alerts (WeLiveSecurity) Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks

Twitter Vigilantes Are Hunting Down Crypto Scammers (Wired) Open source investigators are struggling to maintain law and order in the wildest recesses of cryptocurrency’s Wild West.

HPE says Aruba customer data compromised after data breach (TechCrunch) The company said an unauthorized person used a private key to access customer data stored in its cloud.

CHD warns of data breach (Masslive) As of now, CHD says there is no indication of any fraudulent use of any data or reports of related identity theft since the date of the incident.

Cavoukian on Newfoundland cyber attack: ‘It’s appalling’ (IT World Canada) One of Canada’s leading privacy experts is outraged that hackers were able to access the data of thousands of patients and hospital employees in the Newfoundland and Labrador healthcare system. “It’s appalling,” former Ontario privacy commissioner Ann Cavoukian, now executive director of the Global Privacy and Security by Design Centre, said in an interview. “What […]

SOMC still dealing with effects of cyber attack (WOWK 13 News) PORTSMOUTH, OH (WOWK)—Southern Ohio Medical Center is still investigating a cyber attack from Thursday, and according to a message sent to patients, the hospital has canceled some Monday appointmen…

The Troubling Rise of Internet Access Brokers (Dark Reading) Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

Vulnerability Summary for the Week of November 8, 2021 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

Security Patches, Mitigations, and Software Updates

Samba update patches plaintext password plundering problem (Naked Security) When Microsoft itself says STOP USING X, where X is one of its own protocols… we think you should listen.

TÜV SÜD: Cybersecurity Trends in 2022 (TÜV SÜD) Cybercrime-as-a-Service (CaaS), growing consumer and industry awareness and supply-chain security feature among the major cybersecurity trends in 2022. The increasing professionalism of cybercriminals in the field of ransomware is also confronting companies with the need to make appropriate preparations.

Lumen Quarterly DDoS Report Q3 2021 (Lumen) Is anyone else tired? When looking at the sheer scale of the cybersecurity landscape it can feel like a never-ending stream of changes.

A Quarterly Review of the Evolving Cyber Threat Landscape: Q3, 2021 (ZeroFox) Between August and October of this year, the global cyber threat landscape changed in a number of significant ways. We saw persistent ransomware attacks,

Employees from Nearly 50% of Businesses Have Been Approached to Assist in Ransomware Attacks, Hitachi ID Survey Reveals (HItachi) Ransomware attacks are plaguing organizations, and they are becoming increasingly disruptive and sophisticated.

[Analyst Report] 2021 Software Vulnerability Trends (Synopsys) An Analysis by Synopsys Application Security Testing Services

Cyber Security in the Public Sector: Global Trend Toward Increasingly Lucrative Public Sector Targets (Check Point Software) There’s nothing quite like a global pandemic with legally enforceable lockdowns to expose the public sector’s dependence on outdated digital

42% of UK Gamers Have Experienced a Cyber-Attack on Their Account or Device (Infosecurity Magazine) The report uncovered some alarming trends around gamer-to-gamer cyber risks

OPINION | Data breaches cost big bucks; court won’t call, threaten you (Albuquerque Journal) OPINION | Full recovery from a cyberattack could take a business up to two years

The Long Tail of Attacker Innovation (NETSCOUT) Given the unprecedented nature of the past 18 months, NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) fully expected that their “up and to the right” mantra woul

Number of Malicious Shopping Websites Jumps 178% ahead of November e-Shopping Holidays, Breaking Records (Check Point Software) Highlights: Check Point Research (CPR) spots over 5300 different malicious websites per week, marking the highest since the beginning of 2021 Numbers show

Ransomware Susceptibility High for Leading U.S. Defense Contractors (PR Newswire) Twenty percent of America’s largest 100 defense contractors are highly susceptible to a ransomware attack, according to new research from Black…

82 Percent of Health Systems Reported Experiencing an IoT Cyberattack in Last 18 Months (PR Newswire) Medigate, healthcare’s leading clinical device data security and integration platform, today announced it has launched a research collaboration…

Forrester DevOps Report 2021 (Thycotic) See how your peers are coping with the Security Innovation Paradox: How to innovate faster without sacrificing security

Marketplace

Team Cymru Announces Acquisition of Attack Surface Management Provider Amplicy (Team Cymru) Team Cymru, known for its visibility into Internet-based malevolence, and its behavior-based cyber intelligence, will combine with Amplicy’s insight engine to identify customer assets, remote connectivity, third- and fourth-party vendor assets, and provide risk scoring – for a more complete picture of all application and infrastructure vulnerabilities.

Network threat detection and response startup Netography raises $45M (SiliconANGLE) Network threat detection and response startup Netography Inc. revealed today that it has raised $45 million in new funding to boost technology innovations and enhancements, channel expansion and sales.

IBM Plans to Acquire ReaQta, Expanding Security Portfolio (Database Trends and Applications) IBM Security has announced plans to acquire ReaQta, a provider of endpoint security solutions designed to leverage AI to automatically identify and manage threats, while remaining undetectable to adversaries. IBM also detailed a new suite of XDR offerings under the QRadar brand. Upon closing, ReaQta’s offerings will become part of this portfolio, adding expanded native XDR capabilities to IBM’s security portfolio aimed at helping clients adopt continuous monitoring and rapid response as part of a zero trust approach.

UK cyber startup Immersive Labs acquires US-based Snap Labs — and there’s a climate angle (TechCrunch) Cybersecurity startup Immersive Labs — which recently closed a $75 million Series C funding round giving it a significant war chest — is acquiring U.S.-based cyber startup Snap Labs in an undisclosed deal, although Immersive says it’s a “multimillion-dollar figure” and will be a mix of stock …

Google’s AU$1 billion Digital Future Initiative to create 28,000 local jobs (ZDNet) Google’s investment of AU$1 billion over five years will be put into building Australia’s technology talent, digital infrastructure, and developing local tech partnerships.

Cyber firm Avast tops FTSE 100 as it edges closer to US takeover (CityAM) Cyber firm Avast climbed to the top of the FTSE100 after NortonLifeLock’s takeover of the British cybersecurity company grew closer after the US conditions for its takeover had been satisfied.

NortonLifeLock’s Recommended Merger with Avast Cleared by U.S. Department of Justice (PR Newswire) NortonLifeLock (NASDAQ: NLOK), a global leader in consumer Cyber Safety, today announced the expiration of the waiting period under the U.S….

Booz Allen spins out SnapAttack cyber product shop (Washington Technology) Booz Allen Hamilton is spinning out SnapAttack, a commercial cybersecurity product shop it created but Booz Allen will primary channel for federal customers looking to buy the cyber threat hunting software.

Ethical Hackers Reduce $27 Billion in Risk During COVID-19 Vulnerability Surge (PR Newswire) Bugcrowd, the world’s first crowdsourced cybersecurity platform for multiple solutions, today released its annual Inside the Mind of a Hacker…

Huawei Recruits Smartphone Partners to Sidestep U.S. Sanctions (Bloomberg) It could license designs to third parties to access components. Trump-era sanctions have cut off Huawei from U.S. technology.

“The NSO incident does not harm the reputation of Israeli cyber” (CTECH) CyberArk chief Udi Mokady believes Israel’s position as a cyber powerhouse is safe, and that “our grandchildren will also deal with cybersecurity”

Concentric AI Becomes Member of Microsoft Intelligent Security Association (MISA) (Yahoo Finance) Concentric Inc., a leading vendor of intelligent AI-based solutions for protecting business-critical data, today announced that it has joined the Microsoft Intelligent Security Association (MISA).

Immuta Joins Snowflake’s Data Governance Accelerated Program | Immuta (Immuta) Immuta, the leader in universal cloud data access control and a Premier Snowflake partner, today announced it has joined the Data Governance Accelerated Program from Snowflake, the Data Cloud company. This new program provides joint customers best-in-class security, access control, auditing, and privacy management. Immuta is the universal cloud data access control platform,…

Privacera Joins Snowflake Data Governance Accelerated Program to Simplify and Govern Multi-Cloud Data Sharing (PR Newswire) Privacera, the unified data access governance leader founded by the creators of Apache Ranger™, today announced it has joined the Governance…

Cyber Experts Join Palo Alto Networks — The Newest PSAC Members (Palo Alto Networks Blog) Palo Alto Networks announces four new government leaders to the PSAC. These new members contribute a customer voice and point of view.

Akamai announces Future of Life Online Challenge, awarding digital innovators $1 million in services (PR Newswire) Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s most trusted solution to power and protect digital experiences, today announces the…

Akamai Announces Senior Leadership Changes (PR Newswire) Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s most trusted solution to power and protect digital experiences, today announced that Mani…

Splunk CEO Doug Merritt Exits After $1B Silver Lake Investment (CRN) Doug Merritt resigned Monday as Splunk’s president and CEO effective immediately less than five months after Silver Lake invested $1 billion into the data platform giant. 

Splunk announces CEO’s departure ahead of positive Q3 results (ZDNet) CEO Douglas Merritt will step down effective immediately.

SIA names new director of standards and technology (Security System News) SILVER SPRING, Md.—The Security Industry Association (SIA) has named Edison Shen, who previously served as a program manager in the Building Infrastructure and Transportation Systems divisions at the

Exabeam Appoints Technology Finance Veteran Holly Grey as Chief Financial Officer (BusinessWire) Exabeam today announced the appointment of Holly Grey as CFO.

OneSpan Appoints Accomplished Cyber Security and Cloud Services Veteran Matthew Moynahan as Chief Executive Officer (Businesswire) OneSpan Inc. (NASDAQ: OSPN), a global leader in digital banking security and e-signatures, announced today that the Company’s Board of Directors has a

GPSIA Executive Director David Grossman to Depart Organization (Via Satellite) David Grossman, the executive director of the GPS Innovation Alliance (GPSIA) is leaving the organization after leading GPSIA for three and a half years.

SecurID Expands Leadership Team: Greg Nelson Appointed President and Chief Business Officer (SecurID.com) SecurID, the trusted identity platform and an RSA business, today announced that it had made another key hire to its leadership team, appointing Greg Nelson as President and Chief Business Officer.

AuthID.ai Appoints Financial Regulatory & Compliance Leader Neepa Patel to Board of Directors (MarketScreener) Patel joins as the biometric authentication company enters its next phase of growth

David Howell Named ThreatX Chief Marketing Officer (Businesswire) ThreatX, the leading web application and API protection platform, today announced the hiring of Chief Marketing Officer David Howell.

Products, Services, and Solutions

African Satellite Cellular Backhaul Network Expands Coverage With Gilat Hubs (Via Satellite) Africa Mobile Networks (AMN) has deployed hubs from Gilat Satellite Networks as it expands a cellular backhaul network in Africa. Gilat announced Monday

Airbus Brings Enhanced Satellite Capabilities to the UK Navy (Via Satellite) Airbus has announced details of a United Kingdom maritime government deployment of satellite communications. The company is delivering the primary

NowSecure Integrates with GitHub Actions for Developer-First Mobile App Security (PR Newswire) NowSecure, the leading standards-based mobile app security and privacy software company, today announced a new NowSecure GitHub Action to…

Code42 and Splunk Partner to Enhance Detection and Response to Insider Threat Events (BusinessWire) Code42, announced it is to deliver its data exfiltration alerts and dashboards within the Splunk® Security Operations Suite.

Outfox modern attackers with continuous offensive security. (Bishop Fox) Cosmos (formerly CAST) proactively defends dynamic attack surfaces by combining advanced technology, automation, and expert-driven testing.

Optiv Expands Focus on Safeguarding Federal Sector from Cyber Threats (Optiv) Optiv, the cyber advisory and solutions leader, is expanding to ensure the successful delivery of strategic services in the federal sector, helping organizations upgrade their defenses as part of a comprehensive approach to cybersecurity.

Honeywell Pro-Watch 5.5 Integrated Security Suite (Security Info Watch) Provided improved situational awareness, system uptime and productivity

Microsoft Adds Security Program for Nonprofits (The NonProfit Times) Microsoft Adds Security Program for Nonprofits

Cyren & KnowBe4 Partner to Help Enterprises Fight Phishing and Business Email Compromise (StreetInsider.com)
Product integration partnership harmonizes Security Awareness Training and automated detection and remediationMCLEAN, VA / ACCESSWIRE / November 15, 2021 / Cyren (NASDAQ: CYRN), a provider of email security and…

Datadobi Software Enhancements Power Agile Multi-Cloud Expansion, Flexible Data Reorganization, Lower Costs (Datadobi) DobiMigrate Version 5.13 new API programmatically configures unstructured data migrations on-premises and in the cloud and is the next step in Datadobi’s roadmap of new features.

Keeping Research Projects Secure: The Global Poverty Research Lab at the Northwestern University (Boxcryptor) Find out in our customer story, why encrypting files with Boxcryptor is so important to the Global Poverty Research Lab at the Northwestern University.

VuWall Video Wall Management Software is First in Category to Earn Certification for Integration With Genetec Security Center 5.10

(VuWall) VuWall’s Integrated Genetec Plug-in Allows Security Center Operators to Manage Video Walls Directly From Their Familiar Security Desk Interface

Leaseweb Global Adds Google Cloud Capabilities to Leaseweb Cloud Conne (PRWeb) Leaseweb Global, a leading hosting and cloud services provider, today announced it has expanded its Leaseweb Cloud Connect solution to provide fast, secure con

Terranova Security Introduces Click and Launch Cyber Security Awareness Training Solution, Saving Organizations Time and Money (PR Newswire) Today, Terranova Security, the global partner of choice in security awareness, introduced its Click and Launch solution, dedicated awareness and…

Cybellum and HCL Technologies Partner to Deliver Solutions That Address Automotive Cybersecurity Risk Assessment and Regulatory Requirements (PR Newswire) Cybellum, a leading automotive cybersecurity threat and risk assessment solution provider, today announced it has entered into a strategic…

Genesis Global selects AU10TIX’s AI Technology to upgrade and automate KYC processes (PR Newswire) Genesis Global has partnered with AU10TIX, a leading global provider of fully automated identity verification technology to further enhance the…

1Password 8 for Windows is here! (1Password Blog) Got a Windows PC? You can now enjoy the modern design, improved productivity, and enhanced security & privacy of the all-new 1Password 8.

Cowbell Cyber Releases First Insurance-focused Risk Assessment for AWS Customers (PR Newswire) Cowbell Cyber, the industry’s first AI-powered cyber insurance provider for small to medium enterprises (SMEs), announced it is the first…

Technologies, Techniques, and Standards

New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks (CISA) The White House, via Executive Order (EO) 14028: Improving the Nation’s Cybersecurity, tasked CISA, as the operational lead for federal cybersecurity, to “develop a standard set of operational procedures (i.e., playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity” for federal civilian agency information systems.

In Alabama, Training for Cyber Crime and Competing in War Games (Wall Street Journal) In a nondescript building in a Birmingham suburb, the Secret Service is hosting police and National Guard officers to pump up cyberforensics around the country.

Data rules for machine learning: How Europe can unlock the potential while mitigating the risks (Atlantic Council) Artificial intelligence (AI) will increasingly shape societies and the global economy. Machine learning—which is responsible for the vast majority of AI advancements—is enhancing the way businesses and governments make decisions, develop products, and deliver services. How will the European Union unlock the potential of AI, while mitigating the risks?

How Do You Perform a Cyber Insurance Risk Assessment? – business.com (business.com) A cyber insurance risk assessment finds the systems and assets most at risk of cyberattack. Learn about cyber insurance and how risk assessments work.

How to Run Your Own Secure, Portable PC From a USB Stick (Wired) Build a super-safe computer you can take anywhere.

Cyber security for law firms part 2: 6 key lessons we can learn from the cyber security mistakes of other law firms (Lexology) The mishaps of some law firms in terms of their cyber security shortcomings have been well documented. Rather than risk the pain of a cyber-attack…

Design and Innovation

The Department of Defense is issuing AI ethics guidelines for tech contractors (MIT Technology Review) The controversy over Project Maven shows the department has a serious trust problem. This is an attempt to fix that.

About DIU’s Responsible AI Initiative (Defense Innovation Units) We’re a fast-moving DoD organization contracting with commercial companies to solve national security problems

IBM says its new quantum chip outmuscles conventional supercomputers (Fast Company) The new processor crosses the 100-qubit line for the first time, the company says.

Containers are maturing – Data protection needs to keep pace (Intelligent CIO North America) Dave Russell, VP, Enterprise Strategy, Veeam, explores the pressing need for data protection to keep pace with the maturation of containers and how businesses can accelerate their modern data protection strategy. Unbeknown to most, containers have been around since the 1970s. But it wasn’t until the advent of Docker in 2013 and Kubernetes in 2014 […]

Research and Development

Fujitsu and Ben-Gurion University Embark on Joint Research at New Center in Israel for Precise and Secure AI (IT News Online) Fujitsu Limited and BGN Technologies, the technology transfer company of Ben-Gurion University of the Negev (BGU), have signed a three-year comprehensive joint research agreement to develop technologies and solutions to contribute to the realization of safe, real-world applications of AI and machine learning technologies.

Illumio Wins Government Award to Deliver Ransomware Containment on Endpoints to National Security Collaboration Center (GlobeNewswire News Room) STTR Phase I Award to Accelerate NSCC’s Zero Trust Security Adoption…

Why lifeless AI is not intelligent (TechTalks) In “Birth of Intelligence” neuroscientist Daeyeol Lee provides a fresh perspective on the evolution of intelligence and its implications for AI.

Academia

New ManagedMethods Report Reveals 30% of K-12 School Districts Lack Cloud Application Security (Newswire) Latest research findings suggest school districts are under-protected against cyberattacks targeting data in cloud applications

Legislation, Policy, and Regulation

US, EU talk sanctions, security aid to Kiev If Russia advances against Ukraine (ANI News) Washington [US], November 15 (ANI/Sputnik): The United States and European allies have been talking about potentially sanctioning Moscow or increasing security assistance to Kiev should Russia take military action against Ukraine, Bloomberg reported on Monday.

U.S. and allies weigh reprisals if Russia moves against Ukraine (The Japan Times) The effort is also aimed at steering Putin away from further aggression on Ukraine by making clear there would be a strong and coordinated response, sources said.

U.S. “has no strategy” for cyber war, Garry Kasparov warns (Newsweek) The former world chess champion, who is now Avast’s security ambassador, outlined how America should deal with cyber threats.

Aussies would join US to defend Taiwan; Defense Minister says ‘inconceivable’ they wouldn’t (Breaking Defense) The reliably bellicose Global Times’ editor, Hu Xijin, slammed Dutton’s remarks in a Tweet, promising a “heavy attack” on Australia if it should get involved in any Taiwan conflict.

New plans to boost cyber security of UK’s digital supply chains (GOV.UK) New measures to enhance security of businesses’ IT services published

Senate to Consider NDAA This Week, May Add USICA as Amendment (Meritalk) With the House consideration of the Build Back Better Act (BBBA) – Democrats’ $1.75 trillion-plus budget reconciliation bill – pushed to this week, Senate Majority Leader Chuck Schumer, D-N.Y., said that the Senate will begin consideration of the fiscal year (FY) 2022 National Defense Authorization Act (NDAA) this week.

DHS Program Aims to Recruit Cybersecurity Talent (Decipher) The Cybersecurity Talent Management System from the Department of Homeland Security (DHS) aims to overhaul the government’s efforts in recruiting – and retaining – top cyber talent.

UAE calls for united front to combat global ‘cyber pandemic’ (National News) With 2021 shaping up to be the ‘worst’ on record for cyber security, 69% of organisations expect cyber spending to rise in 2022

What should be next on Congress’ cybersecurity agenda? (The Record by Recorded Future) Congress is weighing a lot of cybersecurity proposals, but their future is murky.

NSA, National Cryptologic Foundation form partnership (Homeland Preparedness News) National Security Agency (NSA) recently announced a partnership with the National Cryptologic Foundation to strengthen domestic cybersecurity education and cybersecurity job possibilities. The collaboration is expected to promote a deeper understanding of prior domestic cryptologic successes; support public/private collaboration to … Read More »

Biden Names Pick for Pentagon Watchdog, Filling Job That’s Been Vacant for Half a Decade (Military.com) Robert Storch has been the National Security Agency/Central Security Service inspector general since January 2018.

Litigation, Investigation, and Law Enforcement

Kaspersky teams up with INTERPOL and civil society organizations for training on stalkerware  (Zswya) The goal of the online training, which involved more than 210 participants, was to help enhance capacity building within law enforcement agencies, support victims requesting assistance, and hold perpetrators to account

In Perspective | The crackdown on cyber mercenaries (Hindustan Times) Last week, the US Commerce Department sanctioned blacklisted four companies for “malicious cyber activities”. The crackdown adds some friction to the development of such cutting-edge technologies and signals a deterrence to other democratic allies

Epic Games says Google overstated Fortnite security flaw in effort to hurt company (News Observer) In August 2018, Google sent out the warning as far and wide as it could.

Cambridge Mayor Andrew Bradshaw Charged For Distributing Revenge Porn, State Prosecutor Says (CBS Local Baltimore) If convicted, Bradshaw would face a maximum penalty of two years’ incarceration and a $5,000 fine for each count.

Mayor of Cambridge charged with violating Maryland’s Revenge Porn Statute (47abc) Mayor Andrew Bradshaw CAMBRIDGE, Md. – Maryland State Prosecutor Charlton T. Howard III announced Andrew Bradshaw, the mayor of Cambridge, has been charged with 50 counts of distributing revenge porn. The criminal information that was filed on Monday alleges that Bradshaw created multiple accounts on Reddit, using public user names consisting of modifications of the name and birthdate of a…

Cambridge mayor arrested, charged with distribution of revenge porn (MyEasternShoreMD) Cambridge mayor Andrew Bradshaw was arrested and charged with 50 counts of distributing revenge porn on Monday, Nov. 15, according to Maryland State Prosecutor Charlton T. Howard III.



Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

64 − fifty seven =