Categories: South Africa

Russian info ops. Intercepts in the hybrid war. Hertzbleed. Spearphishing for espionage. Patch Tuesday. SBOM. | #daitngscams | #lovescams


Dateline

Ukraine at D+111: The war of attrition continues. (The CyberWire) Russia slowly advances into the rubble of Sieverodonetsk, as Ukraine waits for more ammunition. Russia consolidates its influence operations in occupied Ukrainian territory. Anit-Lukashenka hacktivists resurface in Belarus, and Ukraine’s SBU release intercepts of a Russian conversation about using prisoners to clear ordnance.

Russia-Ukraine war: List of key events, day 112 (Al Jazeera) As the Russia-Ukraine war enters its 112th day, we take a look at the main developments.

Russians control 80% of key Ukraine city, cut escape routes (AP NEWS) Russian troops control about 80% of the fiercely contested eastern city of Sievierodonetsk and have destroyed all three bridges leading out of it but Ukrainians were still trying to evacuate the wounded, a regional official said Tuesday.

Civilians stranded as Russia destroys every bridge out of Severodonetsk (The Telegraph) Kremlin troops urge Ukrainian fighters to surrender following their destruction of the eastern city’s major lifelines

Ukraine Latest: Zelenskiy Says War to Stagnate Without More Arms (Bloomberg) President Volodymyr Zelenskiy said the war may stagnate if deliveries of advanced weapons from Ukraine’s allies don’t accelerate, and that the fighting is “very fierce” in the east.

Ukraine battle intensifies as Western backers mull new military aid (Washington Post) Russia intensified its assault on a strategic Ukrainian city on Tuesday as NATO officials prepared to debate increased military support for Kyiv’s attempt to reverse Russian momentum in the country’s east.

‘A huge lag time’: DoD struggles to rush cutting-edge tech to Ukraine (POLITICO) “Successes occur by exception, not by rule,” one DoD official said.

Ukrainians are putting paid messages on artillery rounds fired at Russian soldiers (Task & Purpose) Through the messaging app Telegram, you can send your own message to be written on a shell, with the proceeds supporting the Ukrainian army

Putin still aims to conquer Ukraine despite early losses, Pentagon official says (Stars and Stripes) Russian President Vladimir Putin still desires to take over Ukraine completely as his armed forces make progress in the eastern part of the country, Undersecretary of Defense for Policy Colin Kahl said.

Putin is losing the war. Don’t be fooled by what happened in Severodonetsk (Newsweek) Recognizing how weak Russian forces are, Ukraine is not ceding anything. But it’s also a holding action while they hope arms will reach the front in time.

American veterans in Ukraine tell NATO how to end Russian “slugfest” (Newsweek) Members of the Mozart Group told Newsweek about the “dire” situation Ukrainians face in the east of the country.

For Ukrainian troops, a need arises: Javelin customer service (Washington Post) The powerful antitank weapons have come to symbolize U.S. involvement in Ukraine, but critics say the Pentagon’s support service is lacking

Russia Is Taking Over Ukraine’s Internet (Wired) In occupied Ukraine, people’s internet is being routed to Russia—and subjected to its powerful censorship and surveillance machine.

Intercepted call: Russian plan to send PoWs out into minefields (The Telegraph) Recording shared by Ukraine’s security agency suggests prisoners could be made to do de-mining work and otherwise ‘serve the motherland’

Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy (CyberScoop) The release seems designed to drive a wedge between Russia and its close ally Russia.

How Russian sanctions may be helping US cybersecurity (SearchSecurity) Government officials say Russian sanctions following the invasion of Ukraine are slowing down cyber attacks on the U.S.

Kaspersky: “Now we have to explain the polit… (BNamericas.com) Earlier this year, the US Federal Communications Commission blacklisted Kaspersky, adding its name to a list that includes Huawei and ZTE as companies deemed…

Russia bans 29 UK journalists, including Guardian correspondents (the Guardian) Military figures and MPs on list along with staff from most major British newspapers and broadcasters

Russia bans leading UK journalists from entering country (The Telegraph) Kremlin retaliates to Western sanctions by unveiling list of editors and reporters barred from working in Russia

Vladimir Putin’s biggest critic has suddenly gone missing (Newsweek) “We don’t know where Aleksey is now,” tweeted the opposition politician’s aide on Tuesday.

Russian opposition leader Navalny moved to high-security penal colony (Reuters) Alexei Navalny, Russia’s most prominent opposition leader, has been abruptly moved from the prison where he was serving an 11-1/2 year sentence to a high-security penal colony farther from Moscow.

Navalny reportedly moved to high-security prison infamous for abuse (Washington Post) The jailed opposition leader was recently sentenced to an additional nine years behind bars

The West must remove Putin from power (The Telegraph) Without regime change in Russia Europe will never be safe from Putin’s warmongering

A Strategy for the Fence Sitters (Foreign Affairs) Learning to live with countries that refuse to take sides on Ukraine.

Expedite arms deliveries to beleaguered democracies (Defense News) The United States should spend less time worrying about provoking authoritarian bullies and more time urgently helping threatened democracies before an invasion or attack begins.

The War in Ukraine Has Exposed a Critical American Vulnerability (The Atlantic) Shoring up the nation’s supply chain is the single greatest challenge to the national defense.

Russia’s invasion could return focus on armor and artillery, away from AI and robotics (Defense News) Russia’s invasion of Ukraine could force governments with technologically advanced militaries to reevaluate their investments in areas such as robotics and artificial intelligence, creating a renaissance for spending on armor and artillery, a panel of military leaders says.

The Army Risks Reasoning Backwards in Analyzing Ukraine (War on the Rocks) Would the U.S. Army be able to prevail in a war like the one in Ukraine, were it to realize its vision of multi-domain operations? The Army sent a team of

Corporate ‘Self-Sanctioning’ of Russia Has US Fearing Economic Blowback (Bloomberg) Officials seek to clarify guidance so there aren’t unintended impacts on inflation, supply chains

Bundesregierung stützt Gazprom Germania mit Milliardenbetrag (BR24) Die Bundesregierung will Gazprom Germania mit Milliarden stützen, um eine Pleite zu verhindern. Damit solle die Versorgungssicherheit in Deutschland gewährleistet werden, hieß es. Zuvor war von russischer Seite eine Gas-Drosselung angekündigt worden.

Weniger Gas aus Russland: Versorgungssicherheit beim Gas: Mit Milliarden gegen Sanktionen – und die Nervosität (Wirtschafts Woche) Nach der Ankündigung der russischen Gazprom, dass nun weniger Gas per Pipeline nach Deutschland kommt, reagierte die Bundesregierung mit einem Milliardenpaket für Gazprom Germania – und einer Umbenennung.

‘Justice’ for Ukraine overshadowed by cost of living concerns, polling shows (the Guardian) Survey across 10 European countries and UK shows respondents favouring an end to the conflict rather than holding Russia accountable

Attacks, Threats, and Vulnerabilities

Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials (Check Point Research) Introduction Check Point Research uncovers a recent Iranian-based spear-phishing operation aimed against former Israeli officials, high-ranking military personnel, research fellows in research institutions, think tanks, and against Israeli citizens. The attacks use a custom phishing infrastructure, as well as a wide array of fake email accounts to impersonate trusted parties. To establish deeper trust with… Click to Read More

U.S., Israeli Officials Targeted in Spear-Phishing Operation (Decipher) A targeted spear-phishing operation leveraged sophisticated social engineering tactics in order to collect personal information about high-ranking officials in the U.S. and Israel.

Iranian Hackers Broke Into Email Accounts of Senior Israeli Figures, Security Firm Says (Haaretz) Check Point attributes the attacks to a group of Iranian hackers known as Phosphorus APT, saying they targeted ex-foreign minister Tzipi Livni, an Israeli general, and other senior defense officials

Avast: New Linux Rootkit and Backdoor Align Perfectly (SecurityWeek) Avast researchers intercept a new rootkit and a backdoor that target Linux and appear designed to function in synergy with each other.

Zimbra Email – Stealing Clear-Text Credentials via Memcache injection (SonarSource) We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.

New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials (The Hacker News) A new, high-severity vulnerability has been discovered in the Zimbra email suite that allows unauthenticated attackers to steal plaintext passdwords.

Ransomware Group Debuts Searchable Victim Data (KrebsOnSecurity) Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group,…

Ransomware gang deploys BlackCat to attack hotel and creates searchable website of hacked data (Computing) Cyber-criminal groups have recently ramped up their use of Ransomware-as-a-Service (RaaS) BlackCat/ALPHA-V, first identified by security researchers in November 2021, and upped the ante by publishing the hacked data on a dedicated website.

A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys (Ars Technica) Hertzbleed attack targets power-conservation feature found on virtually all modern CPUs.

Hertzbleed vulnerability steals data from AMD and Intel CPUs (Digital Trends) A new vulnerability code-named Hertzbleed has been found to expose secret cryptographic keys. It most likely affects all Intel and AMD CPUs.

New Hertzbleed side-channel attack affects Intel, AMD CPUs (BleepingComputer) A new side-channel attack known as Hertzbleed allows remote attackers to steal full cryptographic keys by observing variations in CPU frequency enabled by dynamic voltage and frequency scaling (DVFS).

Chinese Threat Actor Employs Fake Removable Devices as Lures in Cyber-Espionage Campaign (Dark Reading) “Aoqin Dragon” has been operating since at least 2013, with targets including government and telecommunications companies in multiple countries.

Cybercriminals preying on travel surge with a host of different scams (Intel471) Intel 471 empowers cybersecurity teams worldwide to be proactive with its TITAN platform and comprehensive coverage into the criminal underground.

Cloudflare mitigates record-breaking HTTPS DDoS attack (BleepingComputer) Internet infrastructure firm Cloudflare said today that it mitigated a 26 million request per second distributed denial-of-service (DDoS) attack, the largest HTTPS DDoS attack detected to date.

CloudFlare says it stopped largest HTTPS DDoS attack on record last week (The Record by Recorded Future) Internet infrastructure company CloudFlare said that it caught and mitigated the largest HTTPS distributed denial of service (DDoS) attack ever recorded last week.

Malaysia-linked hacktivists make ongoing attacks on India (Register) Just what we needed: a threat to rival Anonymous

YouTube Videos Are Targeting Muslims, Women in India, Study Says (Bloomberg) Bitter, insulting language is gaining popularity on platform. India’s 450 million YouTube user base almost double of US.

Wave of Discord Hacks Is Making the Crypto Crash More Painful for Investors (Vice) Dozens of hacks have targeted NFT project Discords in recent weeks amid a crypto crash that’s only getting worse.

Hacker Advertises ‘Crappy’ Ransomware on Instagram (Vice) An unknown hacker who is likely to be from a “lower-tier” ransomware group used the social media app to entice potential customers.

LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang (CPO Magazine) The LockBit ransomware group, a persistent annoyance since it launched as “ABCD” in 2019, sent a shockwave through the cybersecurity world when it claimed that it had breached leading security firm Mandiant and was poised to leak over 350,000 files.

California’s Biggest Hospital System: Data Breach Hit 69,000 Patients (Gizmodo) Hackers love the healthcare industry, though the feeling isn’t mutual.

Yuma Regional Medical Center Reports Data Breach Impacting as Many as 700,000 Patients (JD Supra) In recent data breach news, Yuma Regional Medical Center (“YRMC”) posted notice of a data breach on its website, informing patients that the Center…

Large supermarket chain in southern Africa hit with ransomware (The Record by Recorded Future) One of the largest supermarket chains serving several countries across Africa has been hit with ransomware. 

SA’s seeing emails about ‘mandatory training’ for monkeypox prevention – it’s a scam (Businessinsider) The topic of monkeypox is being used to scam South Africans through emails encouraging “safety awareness training” in the workplace.

Children are targets for ID theft. Here’s what parents need to know. (Washington Post) Child ID theft usually goes unnoticed — until young adults find their credit scores tanked

CISA Adds One Known Exploited Vulnerability to Catalog (CISA) CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.    

Security Patches, Mitigations, and Software Updates

So long, Internet Explorer. The browser retires today (AP NEWS) Internet Explorer is finally headed out to pasture. As of Wednesday, Microsoft will no longer support the once-dominant browser that legions of web surfers loved to hate — and a few still claim to adore.

Mozilla claims Firefox now most secure browser – as Microsoft kills off the least secure (Computing) Firefox turns on cookie tracking protection by default, while the axe finally falls on IE

Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws (BleepingComputer) Today is Microsoft’s June 2022 Patch Tuesday, and with it comes fixes for 55 vulnerabilities, including fixes for the Windows MSDT ‘Follina’ zero-day vulnerability and new Intel MMIO flaws.

Microsoft Releases June 2022 Security Updates (CISA) Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review Microsoft’s June 2022 Security Update Summary and Deployment Information and apply the necessary updates.

Windows Updates Patch Actively Exploited ‘Follina’ Vulnerability (SecurityWeek) Microsoft has finally patched the Windows vulnerability known as Follina and CVE-2022-30190, two years after its root cause was disclosed and two weeks after exploitation came to light.

Microsoft fixes under-attack Windows 0-day Follina (Register) Plus: Intel, AMD react to Hertzbleed data-leaking holes in CPUs

Follina fixed in Microsoft Patch Tuesday update (Computing) 54 other vulnerabilities, three Critical, also patched in Microsoft’s June update

Follina gets fixed – but it’s not listed in the Patch Tuesday patches! (Naked Security) We tried it out to make sure, so you don’t have to.

Adobe Releases Security Updates for Multiple Products (CISA) Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.   CISA encourages users and administrators to review the following Adobe Security Bulletins and apply the necessary updates.  

Adobe Plugs 46 Security Flaws on Patch Tuesday (SecurityWeek) Adobe warned of “critical” code execution flaws that expose both Windows and macOS users to malicious hacker attacks.

Citrix Releases Security Updates for Application Delivery Management (CISA) Citrix has released security updates to address vulnerabilities in Application Delivery Management. An attacker could exploit these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review Citrix Security Update CTX460016 and apply the necessary updates.

SAP Releases June 2022 Security Updates (CISA) SAP has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review SAP Security Patch Day – June 2022 and apply the necessary updates.

Johnson Controls Metasys ADS ADX OAS Servers (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.7 ATTENTION: Low attack complexity/exploitable remotely Vendor: Johnson Controls, Inc. Equipment: Metasys ADS/ADX/OAS Servers Vulnerabilities: Unverified Password Change, Cross-site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow unauthorized users to compromise passwords and inject malicious code into web interfaces.

Meridian Cooperative Meridian (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Meridian Cooperative Equipment: Meridian Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could result in a disclosure of sensitive information.

Mitsubishi Electric MELSEC-Q/L and MELSEC iQ-R (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.1 ATTENTION: Exploitable remotely Vendor: Mitsubishi Electric Equipment: MELSEC-Q/L Series and iQ-R Series Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could result in a denial-of-service condition and/or enable remote code execution.

ICS Patch Tuesday: Siemens, Schneider Electric Address Over 80 Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Siemens and Schneider Electric have released a total of 22 advisories addressing more than 80 vulnerabilities affecting their products.

Cymulate survey reveals companies hit with cyber attacks likely to face repeated onslaughts (PR Newswire) Cymulate, the Extended Security Posture Management market leader, announced today the results of a survey, revealing that two-thirds of…

The Great Resignation has intensified insider security threats (iTnews) Make sure departing staff don’t take souvenirs.

Cloud adopters are the ‘weak link’ in security (GCN) Threats are shifting from cloud providers to developers and users, according to a new report.

Account Takeover in 2022 (Digital Shadows) Credential abuse is something that happens to other…

The unrelenting threat of ransomware is pushing cybersecurity workers to quit (News Azi) Image: Getty Images Security researchers have warned of “increasing and unsustainable stress levels” in the cybersecurity workforce resulting from persistent ransomware threats and looming, large-scale attacks, which are pushing security professionals towards abandoning the industry altogether. A report by cybersecurity company Deep Instinct found that 46% of senior and executive-level cybersecurity professionals have considered quitting […]

Five Takeaways From RSA Conference 2022 (My TechDecisions) Although smaller due to the COVID-19 pandemic, RSA Conference 2022 marked the most important year of the event yet.

Marketplace

Platform9 closes $26 Million Financing led by Celesta Capital (PRNewswire) Cota Capital and NGP Capital participate in financing. Executive appointments ready the company for the next phase of growth. Emilia A’Bell, former Oracle and Nokia revenue executive, joins as CRO. Ravi Jacob, former Intel Corporate Vice President and Treasurer, joins as CFO.

Microsoft acquires Miburo Solutions, specialist of identifying foreign cyber threats (CRN Australia) Joining Customer Security and Trust organisation.

Microsoft to acquire Miburo to boost threat intelligence research into new foreign cyber threats (The Official Microsoft Blog) Today, Microsoft is announcing that we have entered into an agreement to acquire Miburo, a cyber threat analysis and research company specializing in the detection of and response to foreign information operations. Microsoft detects and helps customers defend against cyber threats from nation-states as part of our commitment to keep customers safe online. These efforts…

Report: L3 Emerges as Suitor for Embattled NSO Group (SecurityWeek) Reports say L3 Technologies has emerged as a “leading candidate” to acquire Israeli exploit merchant NSO Group.

US defence contractor in talks to take over NSO Group’s hacking technology (the Guardian) Deal – which would require approval from US and Israel – would give L3Harris control over controversial Pegasus tool

White House has security concerns about any deal for NSO hacking tools (Washington Post) The Biden administration is warning that a potential deal between a major American defense firm and NSO Group, a blacklisted Israeli spyware company, to buy the Israeli firm’s hacking tools would raise “serious” counterintelligence and security concerns for the U.S. government.

NSO Group takeover could put Pegasus spyware in US hands (Tech Monitor) An NSO Group takeover could give the US and its allies control of the company’s controversial Pegasus spyware.

Saab Australia and BAE Systems Australia develop cyber framework for Defence work (APDR) Saab Australia, BAE Systems Australia, industry and government have developed the Cyber Framework for the Defence Industry (CFDI) to measure and increase the cyber resilience of SMEs wanting to work on Defence programs.

Huawei Technologies provides expertise in cybersecurity (ACE Times) To boost secure digital transformation in Egypt at Caisec’22

LookingGlass Cyber Expands Data Science Team to Drive AI and ML-Powered Products and Intelligence Analysis (GlobeNewswire News Room) New SVP, Data Operations and Chief Data Scientist will drive innovation and new capabilities to better identify and mitigate cyber threats…

ThreatX Names Phil Lawrence as Vice President of Engineering (Business Wire) ThreatX today announced the hiring of Phil Lawrence as Vice President of Engineering.

Vade Announces New VP of Marketing (PR Newswire) Vade, a global leader in threat detection and response with more than 1 billion protected mailboxes worldwide, today announced that Brian…

KnowBe4 Leader Lars Letonoff Joins DataDome’s Board of Directors (Yahoo) DataDome, a leading provider of AI-powered online fraud and bot management, today announced that Lars Letonoff, KnowBe4’s Co-President and Chief Revenue Officer, has joined its Board of Directors. Letonoff brings decades of experience in go-to-market strategy and global sales processes, having grown KnowBe4’s customer base from less than 100 to more than 50,000 client organizations around the globe.

Products, Services, and Solutions

Industry News: Coviant Software Releases Diplomat MFT v9.1 (Coviant Software) Coviant Software releases v9.1 of its award-winning Diplomat MFT secure, managed file transfer software.

Notion – The all-in-one workspace for your notes, tasks, wikis, and databases. (Notion) A new tool that blends your everyday work apps into one. It’s the all-in-one workspace for you and your team

Loquat Chooses Acuant to Automate and Fortify Anti-Money Laundering Compliance for its Banking-as-a-Service Platform (PR Newswire) Acuant, a GBG company and leading identity verification provider, today announced a partnership with Loquat, a Banking as a Service (BaaS)…

Feroot Launches Fully Automated CSP Management Solution Called DomainGuard to Expand Client-Side Security Platform (Feroot) Client-side security innovator now provides unmatched ability to generate, manage and monitor Content Security Policy violations

Splunk 9.0 release doubles down on security, observability (CRN Australia) Unveiled at .conf22 event in Las Vegas.

Centum Services deploys Rubrik recovery solutions to Royal Flying Doctors Service Queensland (CRN Australia) With Rubrik’s RTO, RPO recovery solutions.

SecurityBridge Protects 500 Systems For Sanofi With Their Advanced And Agile SAP Security Solution (Yahoo) SAP security provider SecurityBridge—now operating in the U.S.—today announced Sanofi, a global biopharmaceutical company focused on human health, has selected its SecurityBridge Security Platform & Compliance Monitor. The combination of these technologies provides Sanofi with a holistic approach that combines application security and analyzes the system’s security in a central location, as well as automates the SAP security process.

Nebulon ImmutableBoot | Solutions (Nebulon Inc) Meet Nebulon’s new ‘reboot to recover’ cyber-resilient solution, ImmutableBoot.

Verint Introduces Total Quality to Close the Engagement Capacity Gap (MarTech Cube) Engage 2022 — Verint® (Nasdaq: VRNT), The Customer Engagement Company™, today announced Verint Total Quality, a strategic, holistic approach to elevating quality across

Immersive Labs Launches Simulation Capability to Exercise and Measure Cyber Team Responses to Attacks (Immersive Labs) Hyper-realistic team exercises, a key component of Cyber Workforce Optimization, improve customer threat response capabilities

Immersive Labs, the company enabling organizations to continuously measure and optimize the cyber capabilities of their entire workforce, today announced the launch of technical multiplayer simulations, including scenarios for both offensive and defensive teams in complex environments. This capability offers security

Optiv MXDR Enhances Detection Coverage with Expanded Cloud Integration (Optiv) Enterprise security teams face unprecedented attack surface expansion as technology sprawl, employee fatigue and/or rushed cloud adoption and digital transformation initiatives strain resources.

Portnox Unveils First Cloud-Native TACACS+ Solution (Portnox) Portnox’s cloud-native TACACS+ empowers users to easily enforce network AAA services and policies for network devices.

Schneider Electric, Claroty Launch Cybersecurity Solution for Buildings (SecurityWeek) Schneider Electric and Claroty have announced the launch of a new cybersecurity solution for buildings.

WISeKey Launches its Trusted Identity Metaverse at Davos with a Human Centric Approach (Guru Focus) GuruFocus Article or News written by GuruFocusNews and the topic is about:

Alert Logic and TD SYNNEX join forces to improve security posture for their customers (Help Net Security) Alert Logic by HelpSystems announced a strategic partnership with TD SYNNEX to add MDR capabilities to their portfolio of solutions.

Technologies, Techniques, and Standards

Palantir, the all-seeing US data company keen to get into NHS health systems | Arwa Mahdawi (the Guardian) You might never have heard of tech billionaire Peter Thiel’s CIA-backed analytics company. But it could know all about you if it wins a contract to manage NHS data, writes Arwa Mahdawi

Why this ‘large man in a ghillie suit’ is the hero the military needs right now (Task & Purpose) A seven-foot tall man took ‘Incognito mode’ to a new level by wearing a ghillie suit to the military’s Cyber Shield 2022 exercise.

OSINT Becoming the ‘INT’ of First Resort as Intelligence Community Eyes an Overhaul (ClearanceJobs) Your source for Intelligence news and security-cleared job opportunities. Read “OSINT Becoming the ‘INT’ of First Resort as Intelligence Community Eyes an Overhaul “.

SBOM in Action: finding vulnerabilities with a Software Bill of Materials (Google Online Security Blog) Posted by Brandon Lum and Oliver Chang, Google Open Source Security Team The past year has seen an industry-wide effort to embrace Software …

National Guard Defends the Cyber Front (Air National Guard) The National Guard is the nation’s oldest military service, yet uniquely adaptable to a relatively new warfighting domain: cyberwarfare.“The cyber skills that many members of the

Design and Innovation

Intelligence artificielle : Google met en congé forcé un ingénieur pour avoir affirmé que le chatbot du groupe avait une intelligence propre. Mais pourquoi ? (Atlantico) La raison officielle invoquée est celle de la rupture de confidentialité. Mais Google a-t-il poussé son ingénieur sur la touche car cette thèse paraît absurde ou parce qu’elle serait trop vraie… et effrayante ?

Research and Development

National science agency offers know-how to SMEs (The Mandarin) The CSIRO is offering free 10-weeks of research & development training for SME staff who are responsible for providing new cybersecurity solutions.

Fortinet to Support Singapore’s Quest for Quantum-Safe Future (GlobeNewswire News Room) NUS signs MOU with Fortinet on quantum security technologies…

Academia

CISA-backed nonprofit announces ‘National Cybersecurity Education Month’ (EdScoop) Nonprofit Cyber.org expanded its cybersecurity education week to National Cybersecurity Education Month, in hopes of boosting collaboration.

Augusta University cybersecurity student named Undergraduate Student of the Year by national organization (Jagwire) “I hope that I inspire an incoming or current student in the Black community to consider pursuing a career in cyber,” said senior Kaleb Worku.

Academy offers intro to cybersecurity skills (University of North Georgia) Forty area high school students experienced a week of learning valuable skills at the GenCyber Warrior Academy (GCWA) from June 5-11 at the University of North Georgia’s (UNG) Dahlonega Campus. Five UNG faculty and staff served as instructors.

The Commonwealth Cyber Initiative hosts 2nd annual Cyber Camp (Virginia Tech) Students work on a series of challenges in such areas as cyber analytics, network traffic analysis, cryptography, and reverse engineering. In doing so, they learn new skills and hone existing ones to better prepare them for the workforce. The camp addresses more than technical skills. Students receive expert help in polishing their resumes and cover letters. Mock interviews help them level up their interview skills. Some students land internships, which then lead to jobs, as a direct result of attending the camp.

Legislation, Policy, and Regulation

Brazil’s data protection authority to gain independence from presidential office (ZDNet) This will enable the body to fully perform its functions, and it falls in line with other regulatory regimes around the world.

U.S., EU Plan Joint Foreign Aid for Cybersecurity to Counter China (Wall Street Journal) Russia’s invasion of Ukraine shows the importance of supporting infrastructure in countries vulnerable to nation-state cyberattacks, officials said.

China cyberspace regulator’s revised rules governing mobile apps to be effective in August (Reuters) China will put into effect revised rules governing mobile apps on Aug. 1, the cyberspace administration said on Tuesday.

New bill would allow Liberal government to implement ban on Huawei and ZTE (National Post) Huawei has sold slightly more than $700-million worth of equipment to telecom operators in Canada since 2018, mostly to Bell and Telus

New cybersecurity bill to require mandatory reporting of ransomware, other attacks (Global News) Attacks on companies, universities and even hospitals by cybercriminals who hold data hostage in return for a ransom have become alarmingly common.

Canada Plans to Force Companies to Report Cyber Attacks, Fortify Cyber Systems (Insurance Journal) Canadian businesses operating in critical infrastructure sectors would be required to report cyber attacks to the federal government and would have to

New federal bill would compel key industries to bolster cyber security — or pay a price (CBC News) The federal government has tabled a bill that would allow it to compel companies in the finance, telecommunications, energy and transportation sectors to either shore up their cyber systems against attacks or face expensive penalties.

Victory reimagined: Toward a more cohesive US cyber strategy (Atlantic Council) US policy is on two potentially divergent paths: one that prioritizes the protection of American infrastructure through the pursuit of US cyber superiority, and one that seeks an open, secure cyber ecosystem.

Online Privacy Bill Gains Momentum, but Hurdles Remain (Wall Street Journal) The tech industry wants revisions to bipartisan legislation to limit use of consumer data.

WSJ News Exclusive | Lawmakers Make Bipartisan Push for New Government Powers to Block U.S. Investments in China (Wall Street Journal) In an attempt to counter China, lawmakers in Congress have proposed a plan to screen U.S. investment in that country and others.

The Fight to End ‘Cyberflashing’ (New York Times) Payton Iheme, the head of public policy for Bumble in the Americas, is working to advance legislation that penalizes the act of sending unwanted sexual images.

Lawmakers propose ‘Technology Competitiveness Council’ to champion US innovation (Defense News) The council, chaired by Vice President Kamala Harris, would craft a National Technology Strategy that assesses U.S. competitiveness and recommends policy and funding measures to support innovation within the national security sector.

CISA launches Cyber Innovation Fellow initiative (Security Magazine) CISA is now accepting nominations for the new Cyber Innovation Fellows program, who will lend their expertise to CISA’s technical teams on threat hunting, incident response and vulnerability management.

Cyber Command to take take charge of advanced training with new authorities (FedScoop) U.S. Cyber Command will be focused on advanced training for cyber operators and analysts as it prepares to gain enhanced budget authority. Currently, the individual services are responsible for training their respective units that contribute to the joint cyber mission force against joint standards set forth by Cyber Command. But, in the future, the services […]

Litigation, Investigation, and Law Enforcement

Iran arrests suspect allegedly involved in Tehran hacking (Washington Post) Iranian authorities have arrested a suspect allegedly involved in a cyberattack on the Tehran municipality’s website, media reported Wednesday.

Operator of ‘DownThem’ DDoS Service Sentenced to 24 Months in Prison (SecurityWeek) The operator of an infamous service that allowed users to launch DDoS attacks has been sentenced to 24 months in prison.

Man gets two years in prison for selling 200,000 DDoS hits (Register) Over 2,000 customers with malice on their minds

Murder suspect admits she tracked cheating partner with hidden AirTag (Naked Security) O! What a tangled web we weave, when first we practise to deceive.

Ex-CIA Coder Rips Gov’t At WikiLeaks Espionage Retrial (Law360) A jailed computer expert told a Manhattan federal jury Tuesday that he has falsely been labeled a “traitor,” arguing on his own behalf and denying charges accusing him of stealing CIA hacking secrets while he worked at the spy agency as a programmer and feeding the data to WikiLeaks.

Accellion Could Pay $8.1M In Settlement Over Data Breach (Law360) A proposed class whose data was allegedly exposed by a hack on file-transfer software vendor Accellion filed for preliminary approval of a settlement with the company for $8.1 million on Monday, potentially resolving claims against Accellion but not its customers, which include BigLaw firms, corporations, banks and universities.



Click Here For The Original Source

. . . . . . .

admin

Share
Published by
admin

Recent Posts

Crypto Fraud on Rise Again, Here’s Why — TradingView News | #datingscams | #lovescams

Recently, SEC Chair Gary Gensler issued fresh warnings about cryptocurrencies amid Bitcoin's surge to a…

5 days ago

My aunt has fallen in love with a scammer | #ukscams | #datingscams | #european

Pay Dirt is Slate’s money advice column. Have a question? Send it to Athena here. (It’s anonymous!) Dear…

5 days ago

Hundreds rescued from love scam centre in the Philippines | #philippines | #philippinesscams | #lovescams

By Virma Simonette & Kelly Ngin Manila and Singapore14 March 2024Image source, Presidential Anti-Organized Crime…

6 days ago

Locals alerted of online dating scams | #daitngscams | #lovescams

Technology has disrupted many aspects of traditional life. When you are sitting at dinner and…

6 days ago

‘Ancestral spirits’ scam: Fake sangomas fleece victims of millions | #daitngscams | #lovescams

Reports of suicides, missing bodies, sexual kompromat and emptied bank accounts as fake sangomas con…

6 days ago

SA woman loses R1.6m to Ugandan lover | #daitngscams | #lovescams

A South African woman has been left with her head in her hands after she…

6 days ago