Pinellas County, Florida: the latest on the water treatment attack.
U.S. Gov Warning on Water Supply Hack: Get Rid of Windows 7 (SecurityWeek) The U.S. government’s cybersecurity agency is pleading with critical infrastructure defenders to rip-and-replace Windows 7 from their networks as a matter of urgency.
Water control system cyber incidents are more frequent and impactful than people are aware (Control Global) Control system cyber incidents can be either unintentional or malicious. Depending on the sophistication of an attacker, it might not be possible to tell the difference.
U.S. Water Supply Has Few Protections Against Hacking (Wall Street Journal) The vulnerability of the more than 50,000 community systems that supply most Americans with water was highlighted by a cyber intrusion at a treatment plant in Florida this month.
When cybersecurity info sharing makes headlines (GCN) When the sheriff of Oldsmar, Fla., held a press conference to discuss a hack into the city’s water treatment facility, many cybersecurity experts were surprised – not by the hack, but by the publicity.
Duck River Utility Commission confirms security following Florida cyber attack (Manchester TImes) Duck River Utility Commission, the agency that Tullahoma and Manchester receives its water from, has issued a statement following a water plant cyber attack in Florida.
Area water treatment plants prepare for cybersecurity attacks (Olean Times Herald) After a Florida water plant was cyber attacked this past week, local water departments note they have been preparing for such attacks for years.
Cyber Attacks, Threats, and Vulnerabilities
North Korea targets Pfizer in vaccine hack (Computing) South Korean intelligence says the attack was probably meant to raise money for its poorer northern neighbour
North Korean hackers tried to steal Pfizer vaccine know-how, lawmaker says (Reuters) South Korea’s intelligence agency has said North Korea attempted to steal information on coronavirus vaccines and treatments by hacking Pfizer Inc, a lawmaker briefed by the agency said on Tuesday.
French IT monitoring company’s software targeted by hackers: cyber agency (Reuters) Hackers have spent up to three years breaking into organizations by targeting monitoring software made by the French company Centreon, France’s cybersecurity watchdog said on Monday.
Campagne d’attaque du mode opératoire Sandworm ciblant des serveurs Centreon (CERT-FR) Objet: Campagne d’attaque du mode opératoire Sandworm ciblant des serveurs Centreon
France: Russian state hackers targeted Centreon servers in years-long campaign (ZDNet) New ANSSI report exposes new Sandworm APT attacks targeting IT companies using Centreon servers.
Russian Sandworm hackers linked to attacks on French IT providers (SiliconANGLE) Russian Sandworm hackers linked to attacks on French IT providers – SiliconANGLE
France Ties Russia’s Sandworm to a Multiyear Hacking Spree (Wired) A French security agency warns that the destructively minded group has exploited an IT monitoring tool from Centreon.
Sandworm Hackers Hit French Monitoring Software Vendor Centreon (SecurityWeek) France’s national cybersecurity agency is publicly blaming the Sandworm APT group for a string of long-term intrusions at European software and web hosting organizations, including Centreon.
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies (Anomali) ScreenConnect Remote Access Tool Utilizing Ministry of Foreign Affairs-Themed EXEs and URLs: Static Kitten is likely using features of ScreenConnect to steal sensitive information or download malware for additional cyber operations targeting government agency employees.
Pro-India hackers use Android spyware to spy on Pakistani military (BleepingComputer) This week a report has revealed details on the two spyware strains leveraged by state-sponsored threat actors during the India-Pakistan conflict.
The malware strains named Hornbill and SunBird have been delivered as fake Android apps (APKs) by the Confucius advanced persistent threat group (APT), a state-sponsored operation.
Supermicro Statement on Bloomberg’s Claims (PR Newswire) Super Micro Computer, Inc. (SMCI), a global leader in enterprise computing, storage, networking solutions and green computing technology,…
SolarWinds: How Russian spies hacked the Justice, State, Treasury, Energy and Commerce Departments (CBS News) Bill Whitaker reports on how Russian spies used a popular piece of software to unleash a virus that spread to 18,000 government and private computer networks.
FireEye CEO says SolarWinds hack was found after security staff noticed issue with employee account (Global News) Watch FireEye CEO says SolarWinds hack was found after security staff noticed issue with employee account Video Online, on GlobalNews.ca
SolarWinds hack was ‘largest and most sophisticated attack’ ever: Microsoft president (Reuters) A hacking campaign that used a U.S. tech company as a springboard to compromise a raft of U.S. government agencies is “the largest and most sophisticated attack the world has ever seen,” Microsoft Corp President Brad Smith said.
Microsoft: SolarWinds attack took more than 1,000 engineers to create (ZDNet) Microsoft reckons that the huge attack on security vendors and more took the combined power of at least 1,000 engineers to create.
Many SolarWinds Customers Failed to Secure Systems Following Hack (SecurityWeek) Many SolarWinds customers failed to secure their systems following the massive hack, and Microsoft believes over 1,000 hackers were likely involved in the attack.
Russians outsmarted DHS cyberattack detection program in hack (CBS News) Investigators believe Russia is behind a massive cyber hack that hit several federal agencies, including the Treasury, Commerce, and Justice Departments. Sunday, 60 minutes investigates the largest and most sophisticated cybersecurity breach of federal systems in U.S. history.
7 Things We Know So Far About the SolarWinds Attacks (Dark Reading) Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
Facebook is limiting Myanmar military’s reach on its platform (Engadget) Facebook has detailed how it’s handling the political situation Myanmar in a new post, where it has revealed that it’s limiting the distribution of all content posted by the country’s military.
Disinformation is a cybersecurity threat (The Indian Panorama) India, Must Read, Opinions, Perspective, Science & Technology | The disinformation infodemic requires a concerted and coordinated effort by governments, businesses, non-governmental organizations, and other entities to
Clubhouse in China: Is the data safe? (Stanford Internet Observatory) The audio chat app “Clubhouse” went viral among Chinese-speaking audiences. Stanford Internet Observatory examines whether user data was protected, and why that matters.
Clubhouse says it will improve security after researchers raise China spying concerns (The Verge) A new report found Clubhouse user IDs were transmitted in plaintext
Notion’s hours-long outage was caused by phishing complaints (TechCrunch) Users were unable to access their files, calendars, and documents for hours.
Vulnerability in VMware vSphere Replication Can Facilitate Attacks on Enterprises (SecurityWeek) VMware has patched a vulnerability in its vSphere Replication product that can facilitate attacks on enterprises.
Slack users asked to change their password immediately after major data breach (The Financial Express) Taking prompt action, the company has sent emails to a large section of its affected Android users to change their login credentials at the earliest.
Researchers spot massive increase in RDP attack attempts (Help Net Security) Between Q1 and Q4 2020, telemetry recorded a staggering 768% increase in RDP attack attempts, according to ESET researchers.
Could your baby monitor be unsafe and unsecured? (SafetyDetectives) The SafetyDetectives cybersecurity team has discovered a vulnerability affecting baby monitors, provoked by their misapplication/misconfiguration, which provide
Microsoft said the number of web shells has doubled since last year (ZDNet) Microsoft says it’s seeing around 140,000 web shells a month, up from roughly 77,000 last August.
Sophos Uncovers New Evasion Techniques Used to Bypass Security (TahawulTech) Sophos Uncovers New Delivery and Evasion Techniques Used By Agent Tesla to Bypass Security.
‘Agent Tesla’ Trojan can now bypass endpoint security tools, warns Sophos (ITP net) Agent Tesla is a widely used information stealer and Remote Access Tool (RAT), known since 2014
Malvertising campaign on PornHub and other top adult brands exposes users to tech support scams (Malwarebytes Labs) PornHub, RedTube and several other top adult sites have been showing visitors fake popup warnings leading to tech support scams.
Spike in ransomware complaints flooding FBI include attacks on hospitals (The Washington Times) An uptick in ransomware complaints flooded the FBI in the final months of 2020, including a spate of attacks on hospitals, The Washington Times has learned.
Copycats emerge after researcher exploits design flaw to breach Microsoft, Apple, Tesla (SC Media) After a security researcher was able to breach Tesla, Apple and others, more than 150 copycats emerged, most claiming to be researchers. (“tesla” by
Telegram privacy feature failed to delete self-destructing video files (BleepingComputer) Telegram has fixed a security issue where self-destructing audio and video recording were not being deleted from user’s macOS devices as expected.
This phishing email promises you a bonus – but actually delivers this Windows trojan malware (ZDNet) Researchers at Fortintet identify phishing attacks distributing new variant of Bazar trojan, a malware that creates a full backdoor onto infected Windows PCs.
Palo Alto firewall software vulnerability quartet revealed (The Daily Swig) Researchers unveil details of security flaws in enterprise firewall technology
SMS tax scam unmasked: Bogus but believable – don’t fall for it! (Naked Security) Everyone loves a tax refund – just don’t get so excited that you forget to check for telltale signs of a scam.
Scammers target US tax pros in ongoing IRS phishing attacks (BleepingComputer) The Internal Revenue Service (IRS) has warned US tax professionals of identity thieves actively targeting them in a series of phishing attacks attempting to steal Electronic Filing Identification Numbers (EFINs).
IRS, Summit partners issue urgent EFIN scam alert to tax professionals | Internal Revenue Service (US Internal Revenue Service) The Internal Revenue Service, state tax agencies and tax industry today warned tax professionals of a new scam email that impersonates the IRS and attempts to steal Electronic Filing Identification Numbers (EFINs).
Beware links to Discord’s website — it could be malware [updated] (Tom’s Guide) Popular chat service’s network allegedly being abused by criminals
Dax-Côte d’Argent hospital in France hit by ransomware attack (The Daily Swig) Egregor ransomware gang involved, according to reports
Bannock County provides update on 2020 hacking incident (Idaho State Journal) The Bannock County Commissioner’s office on Thursday released more information about a data breach at the county courthouse this past summer.
Canadian vehicle rental service hit by ransomware (IT World Canada) One of Canada’s biggest car and truck rental agencies is trying to recover after being hit by a ransomware attack, while a B.C. real estate company says a January attack led to ransomware
Leading Canadian rental car company hit by DarkSide ransomware (BleepingComputer) Canadian Discount Car and Truck Rentals has been hit with a DarkSide ransomware attack where the hackers claim to have stolen 120GB of data.
Data Breach at Syracuse University Leaves Almost 10,000 Names, SSNs Exposed (Campus Security & Life Safety) Syracuse University has recently informed about 9,800 of its students, alumni, and applicants of a data security breach that might have exposed their names and Social Security numbers.
Cat lawyer’s out-of-date software points to larger cybersecurity problems (Fortune) Failure to update old software can leave people open to hacks.
Yandex said it caught an employee selling access to users’ inboxes (ZDNet) The Russian company said the employee sold access to 4,887 user email accounts.
In Transit, Interconnected, at Risk: Cybersecurity Risks of Connected Cars (Trend Micro) The use of connected cars continues to grow. While the vehicles’ link to technologies such as 5G and the cloud present opportunities for improving efficiency and safety, it can also attract risks from threat actors as well.
Vulnerability Summary for the Week of February 8, 2021 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
Security Patches, Mitigations, and Software Updates
Microsoft rolls out out-of-band update for Windows 10 WPA3 bug causing blue screen crashes (Computing) The issue affects only a small number of users, according to the company
Siemens Patches 21 Vulnerabilities in 2 Tools (GovInfo Security) Siemens has mitigated 21 vulnerabilities in two of its virtualization software tools that, if exploited, could enable attackers to gain remote control, exfiltrate
2021 Vulnerability Statistic Report Press Release (Edgescan) Over 65% of the CVEs Edgescan found in 2020 are more than 3 years old, with 32% dating back to 2015 or earlier Edgescan’s 2021 Vulnerability Stats Report Offers a snapshot of the overall state of cyber security globally DUBLIN, 15th FEB 2021 – Edgescan, providers of the award winning Fullstack Vulnerability Management
New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises and Offers Alternatives for Secure Remote Access (GlobeNewswire) 2021 Research Highlights Growing Security Vulnerabilities Around Targeted Social Engineering, Ransomware and Malware Attacks
Avoid Fear of Missing Incidents With Automation and XDR (FireEye) Security analysts are facing a serious dilemma known as Fear of Missing Incidents, or FOMI, and that’s where eXtended Detection and Response (XDR) can help.
Hiding in plain sight: Bulletproof Hosting’s dueling forms (Intel 471) Bulletproof hosting, in its many forms, is the foundation for so much of the cybercrime we see today.
5 cybersecurity trends MSPs must address in 2021 (Help Net Security) MSPs can make better cybersecurity plans for how they can service their customers, and they can take the time to refine their strategies.
‘We risk creating a society that only connects on-screen’ – CITL CEO Tree Hall on life post-pandemic (Computing) We must keep the benefits of remote working – and remember that humans are social creatures, says CITL CEO Tree Hall
How the security landscape has darkened under the Covid cloud (Computing) Computing is the leading information resource for UK technology decision makers, providing the latest market news and hard-hitting opinion.
My Phony Valentine: Covid Fuels Romance Scams (Wall Street Journal) Romance scams have surged during the pandemic, compliance officers and regulators say. The scenario is putting some companies on high alert for suspicious financial transactions.
A Case Against the Peeping Tom Theory of Privacy (Wired) Yes, it’s creepy when companies can track your every move. But that’s not the only problem.
The Biggest Weakness of the UK Finance Sector is Cybersecurity (Global Banking & Finance Review) Over recent months, the UK finance sector has been sorely affected by the consequences of Brexit, with cross-European institutions and much of the City of London’s share-trading work now moved to European capitals and future development jeopardised. Work to shore-up business and ensure continuity has occupied […]
Ad Tech Could Be the Next Internet Bubble (Wired) The scariest thing about microtargeted ads is that they just don’t work.
Palo Alto Networks acquires Israeli startup Bridgecrew for $200 million (CTECH) This is the seventh Israeli company purchased by the Silicon Valley cyber powerhouse
Datadog to acquire application security management platform Sqreen (TechCrunch) Cloud monitoring platform Datadog has announced that it plans to acquire Sqreen, a software-as-a-service security platform. Originally founded in France, Sqreen participated in TechCrunch’s Startup Battlefield in 2016. Sqreen is a cloud-based security product to protect your application directly. O…
Base Operations raises $2.2 million to modernize physical enterprise security (TechCrunch) Typically when we talk about tech and security, the mind naturally jumps to cybersecurity. But equally important, especially for global companies with large, multinational organizations, is physical security — a key function at most medium-to-large enterprises, and yet one that to date, hasn’…
Threat intelligence company Intelligence Fusion secures GBP400,000 funding (Private Equity Wire) Intelligence Fusion has secured a GBP400,000 investment from a number of sources to continue its growth in the expanding global intelligence market.
Strata Raises $11 Million to Tackle Multi-Cloud Identity Management (SecurityWeek) Strata Identity, a startup on a mission to unify on-premises and cloud-based authentication and access systems for multi-cloud environments, has raised $11 million through a Series A funding round.
Darktrace float hit as UBS quits over Mike Lynch links (Sunday Times) One of the investment banks hired to lead the £4 billion float of Darktrace has quit amid concerns about its links to tech tycoon Mike Lynch.UBS is said to have told the Cambridge-based cyber-security
£4bn Darktrace float dealt blow as UBS quits as sponsor (Sky News) Darktrace has picked former Capita executive Gordon Hurst as its chairman ahead of a potential IPO, Sky News learns.
AustCyber merges with Stone & Chalk to boost local capability in emerging tech (ZDNet) Touted as combining the ‘greatest concentration of cybersecurity industry expertise’ with the ‘most developed technology commercialisation infrastructure that Australia has ever built’.
Apax takes majority stake in Herjavec Group (MicroscopeUK) Managed security services provider with a global footprint is snapped up by private equity player.
NAVAIR looking for emerging cyber research and development (C4ISRNET) Naval Air Systems Command looks to industry to fill gaps in cyber warfare weapon systems.
What’s in a name? How tech startups craft interesting, pronounceable and affordable monikers (Baltimore Business Journal) Baltimore-area startup executives share the stories behind some of the company names you’ve probably heard many times, but never quite understood.
Code42 Expects Security Business to Double in 2021 (BusinessWire) Code42 is beginning 2021 with strong momentum in its security business, growing ARR more than 100% and doubling its security customer base in 2020.
Parler is back online, more than a month after tangle with Amazon knocked it offline (Washington Post) The social media site popular with Trump supporters went dark when its cloud support was cut.
As cyberattacks peak, so does the demand for Profero’s services (CTECH) The CEO of the Israeli cybersecurity startup, which specializes in helping companies address and manage the aftermath of a security breach, says it is turning people away as hackers take advantage of Covid-19 pandemic
Major Australian media company strikes Google news pay deal (AP NEWS) Seven West Media has become the largest Australian news media business to strike a deal with Google to pay for journalism in a partnership announced Monday before the…
Vikram Sharma, CEO of Quintessence Labs on Leadership in the Quantum Era (OODA Loop) Vikram Sharma is the founder and CEO of Canberra Australia based QuintessenceLabs. His company provides solutions based on quantum technology to strengthen cryptographic key creation and management at scale. This is an urgent need in this era of increasingly sophisticated cyberattacks, and key to protecting data now and into the future. In this OODAcast we ask Vikram for his views on what every CEO, including non-technical CEOs, need to know about the world of quantum effects. He provides explanations in very clear ways that can help inform business strategies.
Allgress, Inc. Announces Expansion of International Operations with the Opening of New Office in Bedfordview, Gauteng, South Africa (PR Newswire) Allgress, Inc., an industry-leading provider of Integrated Risk and Compliance Management solutions with headquarters in Livermore, CA, USA,…
Socure Taps Industry Expert Rong Cao as New Senior Vice President of Technology (BusinessWire) Socure, the leader in Day Zero identity verification, today announced the appointment of Rong Cao as its new Senior Vice President of Technology. Cao,
LookingGlass Welcomes Business Executive Dana Mariano as Chief Financial Officer (GlobeNewswire) Industry-Leading Executive to Lead the Company’s Operational Success
Former Minneapolis CIO lands in K-12 cybersecurity job (StateScoop) Fadi Fadhil left the city government in December to work for Palo Alto Networks as a cybersecurity consultant specializing in the education sector.
Ivanti Snags VMware’s Erik Randles To Lead Global Channels (CRN) Fast-growing automation vendor Ivanti has brought in former VMware go-to-market leader Erik Randles to help integrate the Ivanti, MobileIron and Pulse Secure partner programs together.
Ivanti appoints Erik Randles as SVP of global channels and alliances (Help Net Security) Ivanti announced the appointment of Erik Randles, the company’s new senior vice president of global channels and alliances.
aiden Gets a Boost from Its Blockbuster Board of Trusted Advisors (PR Newswire) aiden, a leading provider of autonomous endpoint security managed services, today unveiled the roster of accomplished professionals, including…
Cybersecurity Association of Maryland, Inc. Appoints New Executive Director to Drive Vision (BusinessWire) The Cybersecurity Association of Maryland, Inc. (CAMI) appoints new Executive Director, Tasha Cornish, to drive its vision.
Products, Services, and Solutions
ZeroNorth’s New Advanced AppSec Analytics Empower Organizations to Make Informed Strategic Risk and Operational Decisions (ZeroNorth) ZeroNorth unveiled its Advanced AppSec Risk Analytics. Using vulnerability data analyzed by the ZeroNorth AppSec automation and orchestration platform, these business intelligence (BI) analytics deliver a single source of truth on the overall risk and health of an organization’s AppSec program.
VigiTrust Launches Foundational Risk Assessment on VigiOne Platform (GlobeNewswire) Integrated Risk Management SaaS Platform Now Enables Users to Conduct Full Risk Assessments Before Managing Compliance
Social Security Administration Exercises First Option Year on Contract to Deploy Telos Corporation’s Xacta (GlobeNewswire) SSA to leverage cyber risk management solution to assess and authorize systems hosted in Amazon Web Services
WatchGuard Adds New Capabilities to WatchGuard Cloud Management Platform (Dark Reading) Cyber security’s comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
Endace and Corelight step in to enhance incident response workflows (Security Brief) Endace and Corelight have entered into a strategic partnership to deliver security teams with insights and detailed forensic data to further enable rapid incident response.
The Cybereason Difference: Why PenTesters Don’t Want to be Our Valentine (Cybereason) A look at some of the reasons why we often get notes from our customers to the effect of, “I’m having fun watching our pentesters get frustrated over and over again as they attempt to bypass Cybereason – literally throwing the kitchen sink at it to no avail!”
CyberSeek launched to track Australian cyber jobs and skills market (Which-50) An interactive mapping tool was launched today to track the state of the Australian cyber security job market in real time. Currently, the tool shows
UL Recognizes iSiCHECK as First Smart Badge to Achieve IoT Security Rating (UL) UL verifies IoT security capabilities of iSiCHECK smart badge meeting critical cybersecurity benchmarks.
Technologies, Techniques, and Standards
A Secure Supply Chain Requires Independent Visibility Into Firmware (Eclypsium) To secure their supply chains from ongoing attacks, organizations must have the ability to independently assess and verify their technologies down to the firmware level.
The Role of Artificial Intelligence in Cybersecurity (Booz Allen Hamilton) Here’s our 5-minute read on cyber & artificial intelligence (AI)—part 2 of our 2021 technology spotlight series.
How ransomware negotiations work (CSO Online) Here’s what experienced negotiators say your organization should expect if it ever needs to pay a ransomware demand.
“Security is a team sport,” says Microsoft Security Response Center head (CTECH) Eric Doerr responds to Solorigate incident, calls on cyber community to share information to thwart bad actors
The Untold History of America’s Zero-Day Market (Wired) The lucrative business of dealing in code vulnerabilities is central to espionage and war planning, which is why brokers never spoke about it—until now.
4 tips for aligning security with business objectives (SearchSecurity) The ability to align security with business objectives, goals and strategies sets top-performing CISOs apart from their peers, according to experts. In this feature, CISOs and analysts shared practical advice for improving cybersecurity-business alignment in the enterprise.
What Is Incident Response Life Cycle? (EC-Council Official Blog) Learn about the various incident response plans, processes, and how one can benefit from it. Read on to find out how to become an incident response handler in the expanding world of cybersecurity.
Here’s how 5G security can be your industrial virtual airbag! (Ericsson) The airbag is one of the most used and well-known safety systems in the world. But can 5G security act as a virtual airbag, ensuring the correct and timely deployment of safety systems to prevent harm to people and other critical assets? We find out…
Fallen victim to online fraud? Here’s what to do… (Naked Security) Practical tips on how to avoid getting scammed in the first place, as well as what to do if it does happen.
Companies advised to test whether employees are ‘cyber smart’ (Maryland Daily Record) The benefits department sends out a company-wide email. They need information such as passwords and usernames from all employees. However, as a thank you for your time, if you are one of the first 25 employees to turn yours in, you get a free Starbucks gift card. Who doesn’t love free stuff? But before you start counting …
When is a bug bounty not a bug bounty? (Naked Security) Latest episode – watch now!
Retirement Planning Gives Bigger Role to Theft Prevention as Risks Lurk Online (Wall Street Journal) With cyber fraud becoming more common, safeguarding your 401(k) account is a valuable habit.
Design and Innovation
DHS, NSA creating reusable pieces to zero trust foundation (Federal News Network) The Department of Homeland Security and the National Security Agency are on the leading edge to do more than test the concepts of zero trust.
Palo Alto Networks Joins Flexible Firewall Party. Will Cisco Follow Suit? (SDxCentral) Palo Alto Networks will soon change its licensing for all of its software firewalls and security services to a consumption-based approach.
Research and Development
Microsoft’s Big Win in Quantum Computing Was an ‘Error’ After All (Wired) In a 2018 paper, researchers said they found evidence of an elusive theorized particle. A closer look now suggests otherwise.
Radware & Yeshiva University Partner for Online Learning Program (Radware Blog) Radware has partnered with Yeshiva University to teach college students practical cybersecurity courses centered around Radware’s solutions.
ASU’s cybersecurity dojo (ASU News) Arizona State University’s pwn.college is teaching next-gen cybersecurity martial artists all the right moves to thwart cyberattacks.
Scottish schoolgirls succeed in UK cyberspace security competition (Bollyinside) Girls in Scotland demonstrated their digital skills and code-breaking prowess as they watched thousands of rivals compete in the UK’s flagship cyberspace security competition.
Legislation, Policy, and Regulation
Myanmar junta’s planned cyber law condemned (Bangkok Post) Human rights activists inside and outside Myanmar have expressed alarm at a cybersecurity law that the new military junta is seeking to pass as its first piece of legislation.
France pushes for big changes to proposed EU tech regulation (Financial Times) Paris wants member states to have more power to act against illegal content
ASD says cyber attack intervention will be ‘rare’ under critical infrastructure Bill (ZDNet) The power awarded under the draft legislation may see government modifying the functioning of computers or even deleting software if it was to step in.
Microsoft asks government to stay out of its cyber attack response in Australia (ZDNet) Government intervention would result in ‘The Fog of War’, further complicating any attempt to mitigate cyber attack response, the company said.
Spotlight: Massive data leaks put Brazil’s institutions to the test (BNamericas) The latest throve of data leakage reportedly included personal information by President Bolsonaro.
Focus: New Brazilian data privacy law could drive growth of regional cyber market (Insurance Day) The new regulatory requirements, including the tougher penalties, will drive demand and alter the mix of coverages needed in Brazil and, potentially, across the region
Aiming to Cash In on Data, European Firms Grapple With Privacy Laws (Wall Street Journal) Companies in Europe want to share the personal data of consumers with other firms or turn it into business applications without violating privacy rules, but there is no consensus on how to avoid revealing such potentially sensitive information.
Cybersecurity experts say U.S. needs to strike back after SolarWinds hack (CBS News) In the wake of the SolarWinds hack, cybersecurity experts told 60 Minutes that the U.S. must be willing to attack Russia and other adversaries, or the hacks will keep coming.
Security Think Tank: Biden must address insider security threat first (ComputerWeekly) As US president Joe Biden sets out his agenda for the next four years, we consider the opportunities for renewed international collaboration on cyber security, what aspects of cyber Biden should focus on, and ask how the industry can make its voice heard.
In Biden World, Economic Policy Is National Security Policy (Wall Street Journal) The Biden administration, worried about American competitiveness, is deploying a quiet but revolutionary way of thinking about national security—economic policy and foreign policy no longer are separate.
CMMC: Stopping Cyber Espionage Like Chinese Theft of F-35 Data (Breaking Defense) CMMC 1 is “what you’ve got to have to make sure your neighbor is not in your Netflix,” quipped Stacy Bostjanick, director of CMMC. “It’s very easy, and commensurate with basic cyber hygiene. I recommend that everyone get there, but as a COTS provider, you don’t have to.”
Biden Paused Trump’s WeChat and TikTok Bans: Now What? (Just Security) Courts rejected Trump’s attempts to ban WeChat and TikTok, reining in presidential power. What will Biden do with this legacy?
The Cybersecurity 202: Industry groups urge Congress to include cybersecurity funding in coronavirus relief package (Washington Post) Cybersecurity groups are urging Congress to make federal and state cybersecurity funding a priority as lawmakers iron out a $1.9 trillion dollar coronavirus relief package.
Langevin hopeful new Armed Services panel will shine new spotlight on cybersecurity (TheHill) Rep. Jim Langevin (D-R.I.), the newly minted chairman of the House Armed Services Committee’s new cybersecurity subcommittee, is looking to bring a new spotlight to the nation’s defensive cyber capabilities and international cyber diplomacy.
US Court system demands massive changes to court documents after SolarWinds hack (TechRepublic) Multiple senators have demanded a hearing on what court officials know about the hackers’ access to sensitive filings. The effects could make accessing documents harder for lawyers.
National Guard task force that supports Cyber Command changes over (Defense News) The 123rd Cyber Protection Battalion is mobilizing to support Task Force Echo V, which helps with U.S. Cyber Command operations.
Regulators Are Homing In On Perils Of Ransomware Payouts (Law360) A New York state regulator’s recent warning that insurers are funding future ransomware attacks by paying extortionists on behalf of victims is the latest sign of authorities’ growing scrutiny of the payouts, but it’s far from clear whether the guidance will spur a slowdown in what has become a booming industry of cybercrime.
Litigation, Investigation, and Law Enforcement
Top court ruling on South Africa’s spy law is a victory for privacy, but loopholes remain (The Conversation) The Constitutional Court judgment is a huge victory, not only for journalists and lawyers who stand to benefit directly and immediately, but for broader society.
Activists in India were jailed because of Israeli spyware plant (TRT World) A group of Indian activists accused of a plot to eliminate the Indian prime minister were entrapped via a notorious Israeli made spyware.
Israel spyware used to plant evidence on jailed India activists (Middle East Monitor) Vital evidence used against a group of Indian activists accused of plotting to overthrow the government was planted on a laptop before being seized by police, according to a new forensics report. O…
Egregor ransomware operators arrested in Ukraine (ZDNet) Arrested suspects are believed to be clients of the Egregor RaaS, not the Egregor gang itself.
Egregor ransomware affiliates arrested by Ukrainian, French police (BleepingComputer) A joint operation between French and Ukrainian law enforcement has reportedly led to the arrests of several members of the Egregor ransomware operation in Ukraine.
Brazilian authorities start probe as 102 million consumers are exposed in new leak (ZDNet) The National Data Protection Authority is investigating the country’s second largest data protection incident of 2021
The extradition case against Huawei’s CFO comes to London (Quartz) Why is Huawei’s Meng Wanzhou suing HSBC in the UK? A look into the complex dynamic between Huawei, HSBC, the UK, and China.
Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E01 (Malwarebytes Labs) This week on Lock and Code, we talk to Adam Kujawa, security evangelist and director of Malwarebytes Labs, about the dangerous malware Emotet
CBP Trade and Travel Report Fiscal Year 2020 (US Customs and Border Protection) U.S. Customs and Border Protection’s mission of protecting the borders of the United States and facilitating legitimate trade and travel is not only a critical component of national security, it is a significant driving force of the country’s economic prosperity.
One of the World’s Most Prolific Cybercriminals Has Retired – And May Well Be a Bitcoin Billionaire (Elliptic) According to Elliptic’s analysis, the founder of one of the most popular carding marketplaces, Joker’s Stash, has retired having amassed a fortune of over $1 billion.
Darknet crypto kingpin JokerStash retires after illicit $1 billion run – research (Union Leader) The kingpin or kingpins of the world’s biggest illicit credit card marketplace have retired after making an estimated fortune of over $1 billion in cryptocurrency, according to research
Exclusive: Google’s $76 million deal with French publishers leaves many outlets infuriated (Reuters) Alphabet Inc’s Google has agreed to pay $76 million over three years to a group of 121 French news publishers to end a more than year-long copyright spat, documents seen by Reuters show.
FBI Investigating After Cyber Attack on Central Piedmont Community College (Spectrum News 1) Personal data isn't believed to be compromised.
Leave.EU donor Arron Banks loses data breach appeal (the Guardian) Tribunal ruling noted Brexit campaign and insurance company owned by its key backer had a ‘two-faced approach to regulation’
New York City’s Surveillance Battle Offers National Lessons (Wired) A lack of police transparency highlights how citizens need to remain vigilant to take back control over their privacy.
Minneapolis bans its police department from using facial recognition software (TechCrunch) Minneapolis voted Friday to ban the use of facial recognition software for its police department, growing the list of major cities that have implemented local restrictions on the controversial technology. After an ordinance on the ban was approved earlier this week, 13 members of the city council v…
Huawei Canada VP defends Meng Wanzhou, won’t condemn detention of two Michaels (Global News) Huawei Canada vice-president Morgan Elliott insisted repeatedly that Huawei CFO Meng Wanzhou has done nothing wrong, but wouldn’t say the same of the two Michaels.
Florida based child welfare organization suffers data breach (Includes interview) (Digital Journal) It has been revealed that the organization The Florida Healthy Kids Corporation (FHKC), a U.S. provider of children’s health insurance, suffered from a data breach which exposed the addresses of several thousands of people.
Three Charged Over Fraudulent Vaccine Website (Infosecurity Magazine) Baltimore County trio indicted over spoofed Moderna website selling fake coronavirus vaccines
Three Baltimore-Area Men Facing Federal Charges for Fraud Scheme Purporting to Sell Covid-19 Vaccines (US Department of Justice) A federal criminal complaint has been filed charging three men on the federal charge of conspiracy to commit wire fraud in connection with a scheme to allegedly sell purported COVID-19 vaccines. The criminal complaint was filed on February 9, 2021 and was unsealed today upon the defendants’ arrests. Charged in the criminal complaint are: Olakitan Oluwalade (“Olaki”), age 22, of Windsor Mill, Maryland; Olaki’s cousin, Odunayo Baba Oluwalade (“Baba”), age 25, of Windsor Mill; and Kelly Lamont Williams, age 22, of Owings Mills, Maryland.
Feds Defend Robocall Ban’s Constitutionality At 6th Circ. (Law360) In a bid to intervene in a Sixth Circuit challenge to the national robocall ban, the federal government argued that the U.S. Supreme Court did not gut the entire prohibition when it killed a carveout to the law last year.
‘Money Mule’ Operator Gets Seven-Year Prison Sentence (SecurityWeek) The U.S. Department of Justice secures a seven-year prison sentence for a Ukrainian man running a lucrative money-mule laundering scheme.