Updates on worms and ransomware. Formal attribution of Exchange server attacks coming. DoubleVPN taken down. | #cybersecurity | #cyberattack


Attacks, Threats, and Vulnerabilities

Trend Micro Warns of Ransomware Targeting Industrial Control Systems (PR Newswire) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released a new report highlighting the growing risk of…

SMB Worm “Indexsinas” Uses Lateral Movement to Infect Whole Networks (Guardicore) Guardicore Labs reveals more details on the Indexsinas (NSABuffMiner) SMB worm. The campaign has been active since at least 2019 and has managed to infect servers from a wide range of industries, including healthcare, hospitality, telecommunications and education.

Authentication Bypass in Adobe Experience Manager Impacts Large Organizations (SecurityWeek) Detectify flags an authentication bypass issue in Adobe’s AEM CRX Package Manager that allows attackers to execute arbitrary code remotely,

Details of RCE Bug in Adobe Experience Manager Revealed (Threatpost) Disclosure of a bug in Adobe’s content-management solution – used by Mastercard, LinkedIn and PlayStation – were released.

Here’s how malware steals files (NordLocker) We analyzed how one malware stole 6 million files, 26 million online accounts, and 2 billion cookies.

High-Severity Vulnerabilities Found in Several Phoenix Contact Industrial Products (SecurityWeek) A total of 10 vulnerabilities, including many rated ‘high severity’, have been found across several Phoenix Contact industrial products.

Malvuln Project Catalogues 260 Vulnerabilities Found in Malware (SecurityWeek) Malvuln has catalogued hundreds of vulnerabilities discovered in malware, and while the project has yet to actually prove useful to anyone, its developer is not discouraged.

Hackers exploited 0-day, not 2018 bug, to mass-wipe My Book Live devices (Ars Technica) Western Digital removed code that would have prevented the wiping of petabytes of data.

Data for 700 million LinkedIn users up for grabs on hacker forum (WeLiveSecurity) A hacker is selling personal data scraped from the accounts of 700 million LinkedIn accounts, including information such as names, email addresses and phone numbers.

Exclusive: 700 Million LinkedIn Records Leaked June 2021 (PrivacySharks) A recent data breach involving 700 LinkedIn records has been exposed. The leak is the largest that LinkedIn has experienced so far.

LinkedIn breach reportedly exposes data of 92% of users – 9to5Mac (9to5Mac) A second massive LinkedIn breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. The database …

Indian tech startup exposed Byju’s student data (TechCrunch) A vendor’s server storing data on students at Byju’s was left on the internet without a password.

Russian hackers had months-long access to Denmark’s central bank (BleepingComputer) Russian state hackers compromised Denmark’s central bank (Danmarks Nationalbank) and planted malware that gave them access to the network for more than half a year without being detected.

Babuk Ransomware Mystery Challenge: Who Leaked Builder? (BankInfoSecurity) The code used to build copies of Babuk ransomware – to infect victims with the crypto-locking malware – has been leaked, after someone posted the software to virus-scanning service VirusTotal. Whether the leak was intentional – perhaps a rival gang seeking to burn the operation – remains unclear.

Cobalt Strike Usage Explodes Among Cybercrooks (Threatpost) The legit security tool has shown up 161 percent more, year-over-year, in cyberattacks, having “gone fully mainstream in the crimeware world.”

How legitimate security tool Cobalt Strike is being used in cyberattacks (TechRepublic) Normally used by organizations for penetration testing, Cobalt Strike is exploited by cybercriminals to launch attacks, says Proofpoint.

Cybercriminals are deploying legit security tools far more than before, researchers conclude (CyberScoop) Financially motivated cybercriminals are increasingly turning to Cobalt Stike, a legitimate tool that cybersecurity professionals use to test system security, researchers at Proofpoint found. The cybersecurity firm declined to disclose specific numbers but reported a 161% increase in attacks using Cobalt Strike in 2020 compared to 2019.

Video game industry under relentless cyber attacks (ComputerWeekly) Web application attacks against the global video game industry grew by 340% in 2020 as more people turn to gaming during pandemic lockdowns

UMC recovering from cyber attack earlier in June (KSNV) Cybercriminals have targeted University Medical Center here in the Las Vegas valley. UMC says its security recognized suspicious activity on the hospital’s computer network this month. The cybersecurity team responded quickly by restricting external access to UMC servers, and a hospital spokesman says there have been no disruptions to patient care or clinical systems.

Anson officials expects full recovery from cyber attack by end of July | Anson Record (Anson Record) Most government services are anticipated to be restored by the end of July, following the ransomware attack on the Anson County Government in early May.

SmileDirectClub (SDC) Reels Under Cyber Attack, Pandemic Woes (Yahoo Finance) SmileDirectClub (SDC) apprehends systems outage to have an adverse impact on its second-quarter revenues to the tune of approximately $10-$15 million.

Security Patches, Mitigations, and Software Updates

New Security Measures Announced for Google Play Developer Accounts (SecurityWeek) Google has announced new security measures for developer accounts on Google Play, meant to ensure that each account is created by a real person.

Exacq Technologies exacqVision Web Service (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 5.3
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Exacq Technologies, Inc., a subsidiary of Johnson Controls Inc.
Equipment: exacqVision Web Service
Vulnerability: Cross-site Scripting
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to send malicious requests on behalf of the victim.

Exacq Technologies exacqVision Enterprise Manager (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 4.3
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Exacq Technologies, Inc., a subsidiary of Johnson Controls Inc.
Equipment: exacqVision Enterprise Manager
Vulnerability: Cross-site Scripting
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to send malicious requests on behalf of the victim.

Panasonic FPWIN Pro (CISA) 1. EXECUTIVE SUMMARY

CVSS v3 5.9
ATTENTION: Low attack complexity
Vendor: Panasonic
Equipment: FPWIN Pro
Vulnerability: Improper Restriction of XML External Entity Reference
2. RISK EVALUATION

Successful exploitation of this vulnerability could allow a remote attacker to retrieve sensitive information from the file system where affected software is installed.

JTEKT TOYOPUC PLC (CISA) 1. EXECUTIVE SUMMARY

CVSS v3 6.5
ATTENTION: Exploitable from an adjacent network/low attack complexity
Vendor: JTEKT Corporation
Equipment: TOYOPUC PLC
Vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer
2. RISK EVALUATION

Successful exploitation of this vulnerability could crash the device being accessed.

AVEVA System Platform (CISA) 1. EXECUTIVE SUMMARY

CVSS v3 8.8
ATTENTION: Exploitable from adjacent network/low attack complexity
Vendor: AVEVA Software, LLC
Equipment: System Platform
Vulnerabilities: Missing Authentication for Critical Function, Uncaught Exception
2.

Claroty Secure Remote Access Site (CISA) 1. EXECUTIVE SUMMARY

CVSS v3 5.5
ATTENTION: Low attack complexity
Vendor: Claroty
Equipment: Secure Remote Access (SRA) Site
Vulnerability: Authentication Bypass Using an Alternate Path or Channel
2. RISK EVALUATION

Successful exploitation of this vulnerability enables an attacker with local (Linux) system access to bypass access controls for the central configuration file of the SRA Site software.

Avanan Releases 1H 2021 Global Phish Cyber Attack Report (Avanan) Avanan released its 1H 2021 Global Phish Cyber Attack Report

Travel scams up 4x as pandemic recedes and travelers take flight (Bolster Blog) Planning your hot vax vacation? Beware, travel scams are up over 4x since the start of the year!

The State of Pentesting 2021: Common Vulnerabilities, Findings, and Why Teams Struggle With Remediation (Cobalt) The State of Pentesting report provides a detailed overview of vulnerabilities and identifies the trends and hazards that impact the cybersecurity community.

Consumers fear businesses are prioritizing speed over security as onli (PRWeb) Consumers around the world fear that businesses are now compromising online security in their efforts to deliver seamless digital experiences. Ac

Cyberattacks and threats continue to break records, warns Check Point Research (Check Point Software) 70% year-on-year increase in cyberattacks on US organizations in May 2021, and 16% increase since beginning of year 97% year-on-year increase in

Cyber Theft of Customer Data a Growing Risk for US Health Insurers (Fitch Wire) Fitch Ratings-New York/Chicago-29 June 2021: The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the expansion of remote healthcare delivery and growing digitization of insurance transactions, clinical records and billing.

Phishing: The growing threat to your business (NZ Business) How clever cybercriminals can take advantage of your busy employees to steal credentials, money, and data – and what you can do to prevent it from happening. It only takes a matter of minutes for cybercriminals to bait, hook, and catch a phishing victim among your employees and then leverage that success into a broader cyberattack on your business. Unfortunately, this was very much the case with the Waikato DHB cyberattack, with an attachment in a phishing email thought to be the entry point.

SMBs willing to spend more money to protect their data (Help Net Security) Cybersecurity remains a top priority for SMBs worldwide, and they are willing to spend money to protect their data, Vanson Bourne reveals.

Avast Threat Labs finds U.S. most vulnerable to tech support fraud (PR Newswire) Today Avast (LSE:AVST), a global leader in digital security and privacy, reports tech support fraud remains a massive issue in the U.S….

Which UK region has been hit the hardest by cybercrime? (PR Newswire) Findings from an academic study between Avast (LSE:AVST), a global leader in digital security and privacy, and the research division of the…

Study: US, UK, and Saudi Arabia lead in commitment to cybersecurity (Atlas VPN) Cybersecurity practices are constantly evolving as new technologies arise. Some countries that have more resources are prepared for cyber threats better than others.

Marketplace

Cisco closes acquisition of Kenna Security (SeekingAlpha) Cisco Systems (CSCO -0.4%) has completed its acquisition of Kenna Security, adding Kenna’s vulnerability management platform into its own SecureX platform

Accenture acquires Sentor to enhance its cyber defense services in Sweden (Help Net Security) Accenture has acquired Sentor, a provider of cyber defense and managed security services to enhance its cyber defense services in Sweden.

Theta Lake Joins the Wells Fargo Accelerator Program (Theta Lake) New collaboration expands innovation focus on compliance and security for modern chat, video, and voice compliance

DevOps platform JFrog acquires AI-based IoT and connected device security specialist Vdoo for $300M (TechCrunch) JFrog, the company best known for a platform that helps developers continuously manage software delivery and updates, is making a deal to help it expand its presence and expertise in an area that has become increasingly connected to DevOps: security. The company is acquiring Vdoo, which has built a…

Augtera Networks raises $13M for ‘Network AI’ (Light Reading) A group of executives from the likes of Cisco, Juniper and Gainspeed are fronting a new startup called Augtera Networks that hopes to leverage artificial intelligence (AI) and machine learning (ML) technologies to more quickly detect networking troubles.

Six Months After Its Series A, Noname Security Raises $60M As Securing APIs Stays Hot With Investors (Crunchbase News) Palo Alto, California-based API security provider Noname Security locked up a $60 million Series B, just about six months after closing a $25 million Series A late last year

Versa Networks Secures $84M in Series D Funding to Accelerate SASE Growth (Versa Networks) Latest Funding Round to Support New Sales and Marketing Initiatives for ‘Rocket Ship’ SASE Market and Fuel Company’s Aggressive Growth Plans for 2021 and Beyond

Sevco Security Launches with $15 Million in Funding to Scale Adoption of Industry’s First Cloud-Native Security Asset Intelligence Platform (BusinessWire) Sevco Security launches with $15M funding round to scale adoption of the industry’s first cloud-native security asset intelligence platform.

Anti-Threat Intelligence Firm GreyNoise Scores Investment From CIA-backed In-Q-Tel (SecurityWeek) GreyNoise, which describes itself as an “anti-threat intelligence” company, helps analysts distinguish between malicious and benign internet traffic, has attracted an investment from In-Q-Tel

HealthVerity Raises $100 Million in Series D Funding (SecurityWeek) Healthcare data management provider HealthVerity this week announced that it has raised $100 million in Series D funding, which brings the total raised by the company to $142 million.

Deep Instinct IPO Rumors Swirl As Cybersecurity Company Gains Attention (Market Realist) As ransomware attacks become more common, Deep Instinct is getting attention. Will the cybersecurity company IPO?

Accenture, Avanade Join Dell, Microsoft, VMware in 5G Open Innovation Lab (ChannelE2E) Accenture, Avanade, Ericsson and Spirent have joined the 5G Open Innovation Lab, a global innovation ecosystem for 5G and edge solutions.

The Open Tech Pledge Movement to Increase Representation of Marginalized Persons on Boards and C-Level Positions in Tech (BusinessWire) The Open Tech Pledge Movement to Increase Representation of Marginalized Persons on Boards and C-Level Positions in Tech

Cybersecurity Industry Leader Samir Kapuria Joins Crosspoint Capital Partners as Managing Director (PR Newswire) Crosspoint Capital Partners (“Crosspoint”), a private equity investment firm focused on cybersecurity, privacy, and infrastructure software…

Brandsmiths | Leading data protection and cyber security specialist joins Brandsmiths (RealWire) Innovative law firm ramps up recruitment of senior practitioners in tech-focused fields
LONDON – London and Manchester-based law firm Brandsmiths continues its strategy to bring in the best talent to serve IP-rich businesses

Bulletproof founder Anthony Woodward named Logicalis Australia’s new CEO (CRN Australia) Leaves Accelera, the firm he founded following Bulletproof’s acquisition.

SAIC Appoints New Board Member Milford McGuirt (BusinessWire) Milford W. McGuirt, retired managing partner of KPMG’s Atlanta office, named to the company’s board of directors

J.R. Tietsort Joins Aura as Chief Information Security Officer (PR Newswire) Aura, a leading provider of comprehensive digital security solutions for consumers, today announced the appointment of J.R. Tietsort to Chief…

Devo Technology Adds Former Microsoft and Carbon Black Executives to Expanded Leadership Team (GlobeNewswire News Room) Industry Veteran Gunter Ollmann Joins as CSO; New CFO, Jennifer Grunebaum Accelerates Devo Path Toward IPO…

Igor Volovich as Newest Member of Board of Advisors (rThreat) rThreat is proud to announce Igor Volovich as the newest member of our Board of Advisors. Learn more about this announcement and his background.

Bugcrowd Welcomes New VP of Customer Experience, Bolstering Company Mission to Provide Exceptional Service Throughout the Customer Journey (BusinessWire) Bugcrowd, the industry-leading crowdsourced cybersecurity platform, today announced Ellie Wu has joined its executive team as Vice President of Custom

Products, Services, and Solutions

Airlock Digital signs major health & wellness group as ransomware and cyber attacks lead consumer enterprises to adopt Essential Eight (PRWire) Consumer enterprises responding to heightened risk environment by embracing the ACSC’s Essential Eight as the de facto Australian cyber security standard

eSentire, the Market’s Top Managed Detection and Response Security Provider, Expands its Leading 24/7 EMEA Operations (GlobeNewswire News Room) The Growing Demand for MDR Services in EMEA Fuels the Company’s Expansion as eSentire Introduces Regional Leadership and Recruits Additional Cybersecurity…

GOFBA Launches Chat, a Secure Communication Platform to Provide a Safer Online Experience (PR Newswire) GOFBA, a leading secure search engine and communication platform, announced today the launch of GOFBA Chat and a digital communication platform…

Flashpoint Named Key Partner Of Palo Alto Networks’ New Cortex XSOAR (AiThority) Flashpoint, the globally trusted leader in actionable threat intelligence, announces its early adoption and support of Palo Alto Networks’

Check Point Software Enhances Hybrid Data Center Security Portfolio (MSSP Alert) Check Point Software updates Quantum hybrid data center security portfolio to help organizations manage workloads across data center & cloud environments.

TCS enhances Quartz for enabling more secure Crypto and Digital Assets transactions; Stock rises 1% (India Info Online) Quartz leverages Thales Luna Hardware Security Modules that provide secure encryption, signing and authentication services to protect cryptographic keys against compromise.

Össur Builds Modern, Zero Trust Security Framework with Citrix® (BusinessWire) As a leading provider of prosthetics and orthotics, Össur is dedicated to improving people’s mobility so they can live life without limitations. When

Internet Noise Contributing to Unnecessary Alert Overload for SOC Teams (Dark Reading) Cyber security’s comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.

NetSPI adds ransomware attack simulation to its penetration testing portfolio (Minneapolis-St. Paul Business Journal) The service works by emulating real-world ransomware attacks to find and fix vulnerabilities in a companies cybersecurity defenses.

ISARA Corp. Introduces Advance Crypto Agility Suite to Address Critical Cryptographic Blind Spots (GlobeNewswire News Room) Software gives organizations control and insight into their information security infrastructures to minimize vulnerabilities and disruption…

MariaDB Collaborates With AWS to Deliver SkySQL on AWS (MariaDB) The collaboration between MariaDB and AWS ensures massive scalability and availability for businesses deploying a high-performance DBaaS on AWS.

NetSTAR Celebrates 20 Years of Unrivaled Global Leadership Experience in Internet Categorization (PR Newswire) NetSTAR Inc, the global leader in OEM integrated solutions for URL categorization, web and SaaS app categorization, and threat intelligence,…

Next Generation of Telos’ Cyber Risk Management Platform Alleviates Audit Fatigue via Automated Control Mapping – Telos Corporation (Telos Corporation) Xacta.io 1.6.1 expands support for multi-regulatory compliance

Singapore fintech OneHypernet partners with R3 for settlements solution (Tech in Asia) Singapore-based fintech platform OneHypernet announced a partnership with R3, an enterprise software firm, to build a decentralized multilateral netting solution.

R3 Announces Partnership With Payments Network OneHypernet (R3) OneHypernet to build multilateral netting solution using R3 platforms, Corda and Conclave, emphasizing a growing demand for privacy-enhancing solutions.

Swimlane Becomes System of Record for Cybersecurity with Latest Release (BusinessWire) Latest release of Swimlane enables security operations teams to bridge the divide between data overload and true end-to-end security automation.

vArmour Joins Microsoft Intelligent Security Association (MISA) (GlobeNewswire News Room) Company Brings Application Relationship Management, Identity and User Application Access Controls to Microsoft Customers…

Confluera Enhances Cloud Detection and Response Solution with GreyNoise Anti-Threat Intelligence (PR Newswire) Confluera, the leading provider of next-generation cloud detection and response, today announced the integration of GreyNoise Intelligence into…

Buoyant Introduces Buoyant Cloud: The Best Way to Run Linkerd in Mission-critical Environments (PR Newswire) Buoyant, the creators of the world’s lightest and fastest service mesh, Linkerd, today announced the public beta release of Buoyant Cloud, the…

STEP CG and Elisity Announce Strategic Partnership to Resell Zero Trust Edge and IoT/OT Security (BusinessWire) STEPcg (www.STEPcg.com), an award winning, managed IT, Security, and Cloud Services provider has added Cognitive Trust pioneer Elisity (www.elisity.c

Technologies, Techniques, and Standards

Small Devices Can Cause Big Problems: Improving Enterprise Mobile Device Security (NIST) Mobile phones—those mini-computers in our pockets—are a permanent fixture in today’s workplace.

Object Management Group Publishes the REST for CORBA Specification Version 1.0 Beta (Object Management Group) The international technology standards organization Object Management Group® (OMG®) announced it had published the REST for CORBA specification version 1.0 Beta. The new spec defines a standard and interoperable mechanism that enables CORBA (Common Object Request Broker Architecture) objects to be exposed as REST (REpresentational State Transfer) architecture services.

IBM Contributes Kestrel Threat Hunting Tool to OASIS Open Cybersecurity Alliance (OCA) (OCA) Kestrel lets threat hunters ‘devote more time to figuring out what to hunt, as opposed to how to hunt’

IBM Kestrel threat hunting language granted to Open Cybersecurity Alliance (ZDNet) The contribution is aimed at giving cybersecurity experts more time to conduct forensic activities.

IBM Open Sources Kestrel for Threat Hunting (SDxCentral) IBM contributed Kestrel, an open-source programming language for threat hunting, to the Open Cybersecurity Alliance (OCA) today.

The evolution of cryptography in mobile networks and how to secure them in the future (Ericsson) Mobile network security has come a long way in the decades since cryptography was first introduced into the GSM standard. We take an in-depth look back over the algorithms and protocols that brought us this far – and see how well prepared we are for the quantum challenges of the future.

Supplementing Data Security Requirements (Phase 1) (Nacha) The existing ACH Security Framework Rule — including its data protection requirements — will be supplemented to explicitly require large, non-FI Originators, Third-Party Service Providers and Third-Party Senders to protect deposit account information by rendering it unreadable when it is stored electronically.

Ignorance is bliss — for hackers (Security Brief) Failure to employ best-of-breed security practices may result in a very uncomfortable talk with CEOs and boards of directors.

No Silver Bullet Will Solve the Cyber Crisis (IndustryWeek) Intel executive discusses the importance of a big picture view to cybersecurity.

NSA, Cybercom Leader Says Efforts Have Expanded (U.S. DEPARTMENT OF DEFENSE) Adversaries have heavily invested in cyberspace operations and capabilities. As such, cyber operations, cybersecurity and information operations are increasingly important to the joint force, the

CYBERCOM: Navy-Marine Integration Must Extend Across the Cyber Realm to Protect Weapons Systems, Data (USNI News) The Navy and Marine Corps must be prepared to handle cyber attacks like the recent attack embedded in routine software updates on thousands of government and business networks, said the nation’s top cybersecurity official. “Continuing Navy-Marine Corps integration must account for the information environment, especially adversary intrusions, information operations and next-gen cryptography,” Army Gen. Paul …

Protect your practice from cybercrime (BizCommunity) Healthcare providers are not immune to rise in cybercrime, particularly because their databases are rich with patients’ health and banking information…

Design and Innovation

Cybersecurity software tool uses trickery to ward off potential threats from hackers | Federal News Network (Federal News Network) Researchers at the Pacific Northwest National Laboratory have come up with a cybersecurity software tool that builds on the old notion of honeypots.

Academia

Alert Logic and Lone Star College Launch Cybersecurity Scholarship Fund (Alert Logic) Alert Logic is collaborating with Amazon Web Services, Inc. on a 3-day online summit on cloud security, compliance, threat response, and increased productivity.

Legislation, Policy, and Regulation

UN Security Council Confronts Growing Threat of Cyber Attacks (SecurityWeek) The UN Security Council on Tuesday will hold its first formal public meeting on cybersecurity, addressing the growing threat of hacks to countries’ key infrastructure, an issue Joe Biden recently raised with his Russian counterpart Vladimir Putin.

UN official warns digital technologies open areas for attack (Federal News Network) The U.N. disarmament chief is warning that digital technologies are lowering barriers to malicious intrusions and opening potential areas for governments, armed groups, terrorists and criminals to…

Can Biden Solve the North Korea Puzzle? (Foreign Policy) Biden opened the door for talks with Kim Jong Un, but Pyongyang is playing hard to get.

Administration to release attribution for Microsoft vulnerabilities in ‘coming weeks’ (TheHill) The Biden administration is working to formally attribute the exploitation of vulnerabilities in Microsoft’s Exchange Server application, which left thousands of organizations vulnerable to attack, “in the coming we

White House Plans to Attribute the Microsoft Exchange Hack Soon (Nextgov) Microsoft has already attributed the broad-scale compromise of its on-premises mail servers to Chinese nation-state actors.

The Cybersecurity 202: Angus King says it’s time to get tougher on Russian hackers (Washington Post) The United States should get far more aggressive at punching back against cyber adversaries including ransomware gangs operating in Russia, Sen. Angus King (I-Maine) says.

Transcript: Securing Cyberspace with Sen. Angus King (I-Maine) and FireEye CEO Kevin Mandia (Washington Post) MS. NAKASHIMA: Good afternoon. I’m Ellen Nakashima, a national security reporter at The Washington Post.

Biden’s European Tour Put Cyber Threats Front and Center (World Politics Review) The “normal” that U.S. President Joe Biden exuded throughout his recent European trip felt like a relief after the past four years. For cyber-watchers, the tour marked the sector’s definitive transition into primetime, up there as a major international threat alongside climate change, nuclear proliferation and the pandemic.

White House Sees Electric Grid as Blueprint for Post-Colonial Pipeline Cyber Push (Wall Street Journal) Almost half of electric ‘priority entities’ have either installed or agreed to install sensors to detect intrusions, says Anne Neuberger, an administration cyber official.

Industry presses for more time on cyber EO’s software transparency initiative (Federal News Network) Industry is concerned about an initiative under President Biden’s executive order that could lead to requirements for a “software bill of materials.”

CrowdStrike co-founder says rise in ransomware attacks can be addressed without banning crypto (CNBC) Banning cryptocurrency is not the solution to ransomware attacks, CrowdStrike co-founder and former CTO Dmitri Alperovitch told CNBC on Tuesday. 

Prison Sentences Called for, and Organizations Should Say ‘No’ to Ransom Demands, Say Three Quarters of Respondents to Menlo Security Poll (BusinessWire) Organizations hit by ransomware should not pay the ransom according to 79 percent of respondents to an online poll run by Menlo Security, a leader in

White House weighs cracking down on secret ransomware payments, pursuing hackers (CyberScoop) Going on offense against attackers and penetrating the secrecy surrounding attacks are two ways the Biden administration is pondering to tackle ransomware, a top White House official said on Tuesday. Anne Neuberger, the deputy national security adviser, said that that a joint FBI, U.S. Cyber Command and private sector effort to cripple the Trickbot botnet, a hacking tool that U.S. officials had feared would disrupt 2020 election season, should be the kind of operation used to tackle ransomware gangs in the future.

House lawmakers propose major budget increase for key cyber agency (TheHill) The House Appropriations Committee on Tuesday included almost $400 million more than last year for the Cybersecurity and Infrastructure Security Agency (CISA) in its budget proposal for the upcoming year.

Federal agencies need stricter limits on facial recognition to protect privacy, says government watchdog (Washington Post) Black Lives Matter protesters, Jan. 6 rioters and regular travelers are among those targeted by agencies using the tech, including the IRS and the Postal Service

Bill to create federal rotational program for cyber experts passes to House floor (FedScoop) The Oversight Committee sent a bill that would create a federal rotational program for private-sector cybersecurity experts to the House floor Tuesday. An identical version of the Federal Rotational Cyber Workforce Program Act is working its way through the Senate after being reintroduced there and in the House in April and May respectively. If created, […]

‘The Future Is About Information Dominance:’ Gen. Nakasone (Breaking Defense) “We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.

California County Boosts Cybersecurity After Ransomware Hit (GovTech) The Yuba County, Calif., Board of Supervisors recently approved agreements with three different information technology companies to improve the county’s IT security after a ransomware incident in February.

Litigation, Investigation, and Law Enforcement

DoubleVPN servers, logs, and account info seized by law enforcement (BleepingComputer) ​Law enforcement has seized the servers and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities.

Colombia catches hacker wanted in the U.S. for ‘Gozi’ virus (Washington Post) Colombian officials say they have arrested a Romanian hacker who is wanted in the U.S. for distributing a virus that infected more than a million computers from 2007 to 2012.

NSA surveillance program still raises privacy concerns years after exposure, member of privacy watchdog says (Washington Post) An extensive surveillance program first revealed by former National Security Agency contractor Edward Snowden in 2013 continues to operate with no judicial and limited congressional oversight despite its potential to capture Americans’ communications, a member of a privacy watchdog agency said in a statement released Tuesday.

Privacy Watchdog Board’s Secret Report on N.S.A. System Fell Short, Member Says (New York Times) The Privacy and Civil Liberties Oversight Board spent more than six years scrutinizing the surveillance-related system, called XKeyscore. Its report is classified.

Tucker Carlson doubles down on NSA spy claim after agency denial (TheHill) Fox News host Tucker Carlson on Tuesday again insisted that he is being spied on by the federal government despite the nation’s leading intelligence agency refuting his claim earlier the same day.  

National Security Agency Dismisses Tucker Carlson Surveillance Claims (Variety) Tucker Carlson says the U.S. government is trying to take his Fox News Channel program off the air. But the nation’s top surveillance agency says it hasn’t been looking at the pundit or…

Katie Arrington placed on leave amid probe into suspected disclosure of classified information (FedScoop) Katie Arrington has been placed on leave in connection with a suspected unauthorized disclosure of classified information from a military intelligence agency. According to a memo seen by Bloomberg News, she was informed on May 11 that her security clearance for access to classified information had been suspended. A legal representative for Arrington confirmed the […]

Top Pentagon cyber official investigated over disclosure concerns (Stars and Stripes) The Pentagon official who has been overseeing its new cybersecurity initiative for defense contractors has been placed on leave in connection with a suspected unauthorized disclosure of classified information from a military intelligence agency, according to an official document.

Actually, the Antitrust Case Against Facebook Is Very Much Alive (Wired) A judge dealt the Federal Trade Commission a setback this week in its quest to break the company up—but also provided a roadmap for how to proceed.

Ruling on FTC’s Facebook suits slams brakes on tech’s legal foes (Axios) A judge’s dismissal of suits against Facebook shows how many hurdles would-be tech regulators face.

Boom Times for Lawyers as Washington Pursues Big Tech (New York Times) Not since the government sued to break up Microsoft in the late 1990s has there been greater demand for people who know the ins and outs of corporate competition law.

Exclusive: Microsoft to grow legal team amid global tech regulation (Axios) The legal team will grow 20 percent this year, company president Brad Smith told Axios.

GAO: HHS Needs to Improve Cybersecurity Info-Sharing Efforts (GovInfoSecurity) The Department of Health and Human Services needs to improve collaboration among several of its internal entities, as well as with external partners, in order to

Most Wanted Cybercriminals on U.S. Security Service’ s List Now in Plain Sight (Heimdal Security Blog) The U.S. Secret Service Agency has recently published a list of the 10 Most Wanted Cybercriminals in the financial sector.

GAO: HHS threat sharing efforts need improvement to support security (SC Media) While HHS threat sharing efforts are off to a sound start, GAO found key coordination areas that need improvement to better support security.

Volkswagen, Audi Face Consumer Lawsuit Over Car Data Breach (Bloomberg Law) Volkswagen AG‘s U.S. unit and its Audi brand face a potential consumer class action over a data breach that allegedly compromised personal information on 3.3 million people.

New charges filed against Capital One hacker, trial postponed to 2022 (The Record by Recorded Future) The US government has filed a superseding indictment against Paige A. Thompson, a former Amazon engineer accused of hacking Capital One and stealing the personal data of more than 100 million Americans.

Facebook sues four Vietnamese nationals for hijacking accounts (The Record by Recorded Future) Social networking giant Facebook has filed two lawsuits today against two suspected criminal groups that abused its advertising platform for their own gains.

Walmart To Pay $10M To Resolve Ill. Biometric Privacy Suit (Law360) Walmart Inc. has agreed to pay $10 million to resolve claims that it violated Illinois’ landmark biometric privacy law when it required workers to scan their handprints to access cash registers without obtaining informed consent, in a deal approved by a Chicago state court judge.



Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

51 − forty three =