NPM compromises. ICS advisories. Free ransomware decryptors. Update on cyber phases of Russia's hybrid war. Disneyland hack. – The CyberWire

0
1449

Join us for a 20-minute walkthrough of the Axonius Cybersecurity Asset Management and SaaS Management solutions, hosted on a monthly basis.
This live tour will explore different use cases and help you:
Understand your assets. Make your asset inventory comprehensive and accurate.
Discover coverage gaps and risks. Easily identify security coverage gaps and misconfigurations with custom queries.
Enforce security policies. Don’t just find problems, but fix them as they’re identified.
Researchers at ReversingLabs detailed their discovery of a widespread supply chain attack against the NPM repository earlier this week, publishing an update on Wednesday. Though the exact scope of the attack wasn’t initially clear, researchers say the packages are potentially used by thousands of mobile and desktop applications and websites, and in one instance a malicious package had been downloaded over 17,000 times. ReversingLabs called the campaign “IconBurst.” Their conclusion is that IconBurst represents a major software supply chain attack “involving more than two dozen NPM modules used by thousands of downstream applications, as indicated by the package download counts.” Application developers should be particularly alert to the problem, which appears to represent an organized, cooperative criminal effort. “Analysis of the modules reveals evidence of coordination, with malicious modules traceable to a small number of NPM publishers, and consistent patterns in supporting infrastructure such as exfiltration domains.”
IconBurst “marks a significant escalation in software supply chain attacks,” ReversingLabs says. The firm communicated its findings to the NPM security team on July 1st, 2022: “Malicious code bundled within the NPM modules is running within an unknown number of mobile and desktop applications and web pages, harvesting untold amounts of user data. The NPM modules our team identified have been collectively downloaded more than 27,000 times. As very few development organizations have the ability to detect malicious code within open source libraries and modules, the attacks persisted for months before coming to our attention. While a few of the named packages have been removed from NPM, most are still available for download at the time of this report.” Developers, ReversingLabs says, should “assess their own exposure” to the threat, and the researchers have provided information that should assist them in doing so.
And there’s been another attack on the NPM supply chain, this one described by researchers at Checkmarx. “Checkmarx SCS team detected over 1200 npm packages released to the registry by over a thousand different user accounts,” the security firm says. “This was done using automation which includes the ability to pass NPM 2FA challenge.” The operators, whom the researchers call “CuteBoi,” are using what Checkmarx calls a “fake identity-as-a-service provider:” “Looking at the domains with which CuteBoi is creating NPM users, we can deduce that they are using mail.tm – a free service providing disposable email addresses with REST API, enabling programs to open disposable mailboxes and read the received emails sent to them with a simple API call. This way CuteBoi can and easily defeat NPM 2FA challenge when creating a user account.”
And so far the operation seems to represent an initial, experimental phase of a larger campaign. “This cluster of packages seems to be a part of an attacker experimenting at this point.” The researchers think that CuteBoi is preparing a largescale cryptojacking campaign using XMRig derivatives. Checkmarx has also released information to help users identify the malicious activity. They also warn that further exploitation of NPM can be expected. “CuteBoi is the second attack group seen this year using automation to launch large-scale attacks on NPM. We expect we will continue to see more of these attacks as the barrier to [launch] them is getting lower.”
CISA, the US Cybersecurity and Infrastructure Security Agency, released three Industrial Control Systems Advisories yesterday, for Rockwell Automation MicroLogix (“mitigations for an Improper Restriction of Rendered UI Layers or Frames vulnerability in the Rockwell Automation MicroLogix controllers”), Bently Nevada ADAPT 3701-4X Series and 60M100 (“mitigations for Use of Hard-coded Credentials and Missing Authentication for Critical Function vulnerabilities in the Bently Nevada ADAPT 3701-4X Series and 60M100 machinery monitors”), and Mitsubishi Electric MELSEC iQ-R Series C Controller Module (Update B) (a follow-up to ICSA-21-280-04 Mitsubishi Electric MELSEC iQ-R Series C Controller Module (Update A) published October 28, 2021, this “contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series C controller module products”).
Bravo, Emsisoft. The company has released, BleepingComputer reports, free decryptors for the AstraLocker and Yashma ransomware strains. Emsisoft tweeted, “The AstraLocker decryptor is for the Babuk-based one using .Astra or .babyk extension, and they released a total of 8 keys. The Yashma decryptor is for the Chaos-based one using .AstraLocker or a random .[a-z0-9]{4} extension, and they released a total of 3 keys.” BleepingComputer points out that AstraLocker, itself derived from Babuk Locker, has gained a reputation for being both buggy and effective. The operators of AstraLocker early this week released some decryptors as they announced they were exiting the ransomware business, saying that they had decided to turn to cryptomining. They were probably kidding about getting into coin-mining. Not only did they close their announcement with an “LOL,” but there’s also some reason to think they were feeling the approach of law enforcement.
With IBM researchers’ discovery that the Trickbot gang has been active against Ukrainian targets since Russia’s war began, and that it’s been acting directly in the Russian interest, Trickbot and similar gangs have been seen acting as privateers under state direction. Since Trickbot cut its criminal teeth on financial crime, especially banking Trojans, the financial sector ought to be on particular alert for any spillover from Russian privateering. SC Magazine speaks with various industry experts who advise financial institutions to keep their shields up (and to take another look at the US Cybersecurity and Infrastructure Security Agency’s Shields Up guidance).
The CyberWire’s continuing coverage of the unfolding crisis in Ukraine may be found here.
The Wall Street Journal reports that the Instagram account of Disneyland Resort was briefly hijacked yesterday morning by someone who identified himself as “David DO,” and proclaimed himself a “super hacker.” Mr. DO (probably a nom-de-hack) acted with apparently trivial motives. He had some sort of beef with someone called “Jerome,” according to the independent fan site the Disney Blog, and he wanted to air that through his hack. He was also disgruntled about some Disney employees, saying he was “here to bring revenge upon Disney land [sic].” Mr. DO posted a selfie (of himself) and said he was “tired of all these Disney employees mocking me.” The Journal says the posts were both profane and racist, and it quotes a Disney representative as saying, ““We worked quickly to remove the reprehensible content, secure our accounts, and our security teams are conducting an investigation.”
We received comments from Arctic Wolf’s VP of Strategy, Ian McShane, who thinks the incident shows that cybercriminals are often motivated by concerns that are neither monetary nor political. “Many [are] keen to just inflict reputation damage,” he wrote. High traffic-high follower accounts will always be a target for threat actors – both sophisticated and the occasional rogue, low-level amateur. It’s not yet known how David DO gained access to the accounts, but McShane noted that “compromises of this nature are almost certainly rooted in a phishing or credential stuffing incident.”
Today's issue includes events affecting Brazil, Canada, China, the European Union, Ireland, Israel, NATO/OTAN, Russia, Spain, Ukraine, the United Kingdom, and the United States.
Cyber insurance is a necessity these days. But with one in three applications being knocked back and premiums up 50% (or more) from last year… does it feel like it might be easier to deal with the hackers directly? Find out how it is possible to fast-track your cyber insurance application and receive up to a 30% discount on your premium through the SolCyber Insurance+ Program.
Ukraine at D+134: Preparing for an end to Russia's operational pause. (The CyberWire) Mr. Putin says no one should count on Ukrainian battlefield victory, because Russia's hardly gotten started.
Russia-Ukraine war: List of key events, day 135 (Al Jazeera) As the Russia-Ukraine war enters its 135th day, we take a look at the main developments.
Ukraine Says Western Weapons Begin to Help as It Raises Flag on Snake Island (Wall Street Journal) President Volodymyr Zelensky said that Western heavy weapons are starting to have an effect on the battlefield but urged speedier deliveries, particularly of antiaircraft systems, as Russia continued lobbing missiles into Ukrainian cities.
Zelensky says Ukraine will not give up territory for peace with Russia: 'This is our land' | CNN Politics (CNN) Ukrainian President Volodymyr Zelensky told CNN's Wolf Blitzer on Thursday that Ukraine is unwilling to cede any of its land to Russia, standing firm that a concession of Ukrainian territory won't be part of any diplomatic negotiations to end the war.
Russia-Ukraine war: Putin warns Moscow has 'barely started' its campaign (The Telegraph) Vladimir Putin has issued a defiant warning to the west claiming that Moscow has barely started its military campaign in Ukraine
Ukraine’s Implausible Theories of Victory (Foreign Affairs) The fantasy of Russian defeat and the case for diplomacy.
G-20 diplomats fail on unity over Ukraine, war's impact (AP NEWS) Deeply divided top diplomats from the world’s richest and largest developing nations failed to find common ground Friday over Russia’s war in Ukraine and how to deal with its global impacts, leaving prospects for future cooperation in the forum uncertain.
Germany refuses to ‘plunder its own military’ for the sake of Ukraine (The Telegraph) Pressure on Olaf Scholz to provide armoured vehicles, as German MPs prepare to set an example by limiting their own use of hot water
Army leaders convene with allies to review Ukraine war lessons (Stars and Stripes) The implications of drones and long-range artillery were among the Ukraine war topics discussed by U.S. Army leaders and other allied commanders Thursday, as they assessed the path forward for an alliance still adapting to Russia’s unprovoked invasion.
Russian Info Ops Ramp Up Effort to Divide West on Ukraine (Infosecurity Magazine) Recorded Future claims Kremlin is using multiple outlets to amplify disinfo
China's Tonto Team APT Ramps Up Spy Operations Against Russia (Dark Reading) In a significant spike of activity, the state-sponsored group is going after intelligence on Russian government agencies.
Hackers linked to the Chinese government increasingly target Russia, analysis suggests (CyberScoop) A recent phishing attempt targeting Russian entities involved long-established Chinese toolkits, experts said.
Russian Cybercrime Trickbot Group is systematically attacking Ukraine (Security Affairs) The operators behind the TrickBot malware are systematically targeting Ukraine since the beginning of the war in February 2022. IBM researchers collected evidence indicating that the Russia-based cybercriminal Trickbot group (aka Wizard Spider, DEV-0193, ITG23) has been systematically attacking Ukraine since the beginning of the Russian invasion of the country. Since February, the Conti ransomware […]
US finance sector encouraged to stay vigilant against retaliatory Russian cyberattacks (SC Magazine) As the Russia-Ukraine war closes in on its fifth month, now is not the time to drop the ball on cybersecurity, says a leading financial technology analyst.
Ukraine War Boosts Support for Added Defense Spending in Japan (Wall Street Journal) A national election appears set to give Japan’s government a mandate for a sharp increase in the military budget, thanks to the war in Ukraine.
Ukrainian diaspora urges Trudeau not to return turbine to Russia (the Guardian) Moscow says equipment, which was being repaired in Canada, was crucial to restore gas supplies to Germany
Ukraine grain farmers devastated by Russia’s Black Sea blockade (Washington Post) The morning Russian tanks and troops stormed across Ukraine’s borders, Volodymyr Onishchuk’s grain got stuck. He had delivered about $100,000 worth to a storage site at Ukraine’s Black Sea port in Mykolaiv on Feb. 23, but by Feb. 24 — when the ship with his harvest was to set sail — Russian troops were on the ground and warships lingered menacingly off the Ukrainian coast.
python-dateutils—A Cryptominer in Disguise Targeting Windows, Linux, macOS (Sonatype) We analyze a suspicious 'python-dateutils' PyPI package targeting Python developers to mine cryptocurrency after infecting their Windows, macOS or Linux systems.
From Follina to Rozena – Leveraging Discord to Distribute a Backdoor (Fortinet Blog) FortiGuard Labs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of the Rozena malware, capable of injecting a remote shell connection back to the attac…
Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival 'Brute Ratel' Pen Test Tool (Dark Reading) The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.
Threat actors exchange beacons for badgers to evade endpoint security (Help Net Security) Threat actors are using Brute Ratel C4 (BRc4), a tool similar to Cobalt Strike, to avoid detection by endpoint security solutions.
Over 1200 NPM Packages Found Involved in "CuteBoi" Cryptomining Campaign (The Hacker News) Researchers have uncovered a new large-scale cryptocurrency mining campaign involving over 1200 malicious NPM JavaScript packages.
Someone may be prepping an NPM crypto-mining spree (Register) 1,300 packages from 1,000 automated user accounts set the stage for something big
Twitter says it removes 1 million spam accounts a day (AP NEWS) Twitter said it removes 1 million spam accounts each day in a call with executives Thursday during a briefing that aimed to shed more light on the company's fake and bot accounts as it tussles with Elon Musk over “spam bots.”
Going Once, Going Twice, Sold: Real Time Bidding Data Privacy Breach (Ward and Smith, P.A.) The ongoing massive data breach in the world of advertising: real time bidding ("RTB"). You likely are, or have been, a target of RTB without your knowledge…
Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets (The Hacker News) Researchers detail a wide range of constantly evolving techniques used by LockBit ransomware uses to infect targets.
I sent my yoga studio a web form, and all I got was this lousy malware attack (Ars Technica) When thread hijacking from TA578 hits close to home.
The Top 4 Ways That Malware Spreads (Make Use Of) You should've heard about the devastating effects of malware, but how can it actually spread between devices?
Disneyland’s Instagram Account Hacked With a Series of Profane, Racist Posts (Wall Street Journal) Disneyland Resort’s Instagram account was taken over by a self-proclaimed “super hacker” Thursday morning who made a series of profane and racist posts that have since been taken down.
Disneyland investigating compromised Facebook and Instagram accounts (The Record by Recorded Future) Disneyland officials are investigating a Thursday morning hack of its Facebook and Instagram accounts.
Malware knocks IT services vendor SHI offline (Register) Major supplier to US government and enterprise only just getting back on its feet
An ISP Scam Targeted Low-Income People Seeking Government Aid (Wired) The US Federal Communications Commission says a man posing as a fake broadband service promised victims discounts on internet services and devices.
Lending Tree Data Breach, Sensitive Information Potentially Disclosed in Hack (LegalScoops) On June 29, 2022, Lending Tree, LLC, an online lending marketplace based in based in Charlotte, North Carolina, reported a data breach to the Montana
Cyberattack delays child support checks in Arizona (12news.com) State officials say about 800 child support and unemployment checks were delayed in getting sent out due to a recent cyberattack.
Paid Family Leave payments resume in DC after cyberattack | WTOP News (WTOP News) D.C. residents who receive weekly Paid Family Leave benefits will see money hit their bank accounts after a recent cyberattack interrupted the financial flow.
Town of Hingham Shares Information on potential COMSTAR Data Breach (Hingham Anchor) Love this? Share it!Facebook0Pinterest0TwitterLinkedinemail July 8, 2022 Submitted by the Town of Hingham The Town of Hingham wishes to inform residents of a potential data breach against an ambulance billing company that may impact some residents who have utilized ambulance services within the Town of Hingham. COMSTAR Ambulance Billing provides ambulance billing services to multiple … Read more
Cisco Releases Security Updates for Multiple Products (CISA) Cisco has released security updates to address vulnerabilities in multiple Cisco products. An attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page. CISA encourages users and administrators to review the following Cisco advisories and apply the necessary updates:
Microsoft U-turns on decision to block Office macros by default (Computing) The company said earlier that it would block VBA macros by default in a variety of Office apps, it has now mysteriously reversed this decision
CIOs agree: lack of staff security knowhow a critical problem (Computing) Staff reuse passwords, share devices and cannot tell the difference between fake and legitimate emails.
Cybersecurity firms laying off employees despite increased threats (Washington Examiner) In part, concerns over the global economy are driving these decisions.
Cybersecurity M&A Roundup: 45 Deals Announced in June 2022 (SecurityWeek) 45 cybersecurity-related merger and acquisition (M&A) deals were announced in June 2022.
Recorded Future Acquires Hatching to Extend Intelligence Cloud Coverage with Malware Analysis (Recorded Future) Intelligence leader adds high-performance, automated malware analysis capabilities to give defenders an intelligence advantage for combating malware.
Coalition Closes $250 Million in Series F Funding, Valuing The Cyber Insurance Provider At $5 Billion (GlobeNewswire News Room) Funding from Allianz X, Valor Equity Partners, Kinetic Partners, and existing investors will accelerate Coalition’s vision to provide security for all…
Swimlane Secures $70 Million Growth Round to Fuel Global Expansion of Next Generation Low-Code Security Automation Platform (AiThority) Swimlane, the low-code security automation company, announced a $70 million growth funding round led by Activate Capital.
IBM snaps up data observability specialist Databand.ai (IT PRO) The acquisition will help IBM address the “full spectrum” of observability, as well as capitalise on predicted market growth
Cybersecurity Consulting Firm Cerberus Sentinel Acquires CyberViking (Channel Futures) The acquisition is intended to expand the cybersecurity consulting firm’s incident response and application security talent.
Netskope IPO: Latest Updates From the CEO (Investment U) Investors are awaiting information about the Netskope IPO after the CEO hinted at plans to go public in the near future.
Comodo Security Solutions rebrands, launches new offering (ChannelLife Australia) Comodo Security Solutions has rebranded to Xcitium and launched its patented zero threat endpoint technology to fight increasing ransomware and other malware across industries.
How much can you make with an online master’s in cybersecurity? (Fortune) Cybersecurity professionals who earn a master's degree can earn a base salary of $200,000 in certain roles.
CyCognito hires Anne Marie Zettlemoyer as CSO (Help Net Security) CyCognito announced the appointment of security veteran Anne Marie Zettlemoyer as Chief Security Officer (CSO).
Netskope focuses on network transformation with ‘elite’ advisory group (ComputerWeekly.com) Network technologies provider announces formation of Network Visionaries group featuring former AWS, Crowdstrike execs to offer cloud, hyperscale, security and networking expertise.
Purple Knight Introduces Azure AD Security Indicators | Semperis (Semperis) Purple Knight introduces Azure AD security indicators, supports MITRE D3FEND. Learn more in "Purple Knight Introduces Azure AD Security Indicators".
Mercury’s advanced encryptor receives certification from National Security Agency (GlobeNewswire News Room) Powerful, miniature data-at-rest encryptor weighing less than a pound can be easily integrated into existing avionics systems, safeguarding sensitive data…
Field Effect and RosettiStarr partner to deliver full-spectrum cyber security services to businesses and law firms worldwide (PR Newswire) Field Effect, a global cyber security company specializing in intelligence-grade protection for small and medium organizations, today announced…
Protecto and Snowflake help customers identify data protection issues (Help Net Security) Protecto brings artificial intelligence and privacy engineering to Snowflake so that joint customers can identify data protection issues.
Splashtop partners with Acronis to improve security for service providers (Help Net Security) Splashtop and Acronis announced a partnership that integrates solutions for secure remote access and support with Acronis Cyber Protect Cloud.
Atera integrates with Malwarebytes to protect organizations against ransomware attacks (Help Net Security) Atera announced a new integration with Malwarebytes, a provider of real-time cyber protection, to combat malware.
Atera Launches New Integration with Malwarebytes (PR Newswire) Atera, a remote-first IT management company, today announced a new integration with Malwarebytes, a provider of real-time cyber protection….
Wiz offers CVE-like cloud vulnerability registry, but will it gain traction? (CSO Online) The cloud vulnerability database, dubbed cloudvulndb.org and based on a GitHub repository, is seen as a welcome development, but widespread industry support is needed for it to be successful, analysts say.
BeyondTrust to Offer Its Entire Line of Identity and Access Solutions in AWS Marketplace (Yahoo) Customers benefit from a simplified procurement process through AWS Marketplace with flexible payment terms, consolidated billing, enterprise discounts and moreProvides flexibility to optimize identity and access security procurement with BeyondTrust’s entire solution portfolio ATLANTA, July 07, 2022 (GLOBE NEWSWIRE) — BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the availability of all of BeyondTrust’s solutions for customer purchase in AWS Mar
Akamai Linode now offers Kali Linux instances (ZDNet) Kali Linux, the Linux of choice for hackers and security pros, is now available on the Linode cloud.
Board Members Can No Longer Ignore Cybersecurity  (Crunchbase News) Cybersecurity is no longer optional for board members. Today’s boardroom is a perfect target for hackers.
Free decryptor released for AstraLocker, Yashma ransomware victims (BleepingComputer) New Zealand-based cybersecurity firm Emsisoft has released a free decryption tool to help AstraLocker and Yashma ransomware victims recover their files without paying a ransom.
Netskope's Beau Hutto calls single sign-on "a great challenge" for agencies (CyberScoop) Single sign-on and doing elegantly is a challenge for agencies as they move to a more modern and centralized identity management system.
Red Team vs. Blue Team: How They Impact Your Cybersecurity Career (Dice Insights) When determining their cybersecurity readiness, many organizations employ and deploy Red team and Blue team engineers that test security.
The agent of successful cyber security defense (Register) A two-pronged approach that combines agent and agentless tools may offer the best protection
What Do All of Those Cloud Cybersecurity Acronyms Mean? (Dark Reading) Acronyms serve as a gatekeeper — if you don't sling the lingo, you don't belong. So here's a quick guide to the letter salad of cloud cybersecurity.
'Win before firing a shot:' Top Marine explains why the service is focused on information warfare (Breaking Defense) Gen. David Berger says the past four months of war in Ukraine has been a "fantastic case study" in information warfare.
Maryland National Guard cyber operators hone their skills during exercise (175th Wing) During a recent election, bad actors accessed the public facing website that was tracking Presidential election results and changed the results the public was seeing in real-time, which skewed in
Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry (Computerworld) The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.
Spyware companies are finally getting their comeuppance. This new Apple product adds to their woes (Fortune) The iPhone developer’s “Lockdown Mode” provides another layer of protection from hacking tools sold by unscrupulous private firms.
Amid NSO lawsuit, Apple expands spyware protections (ComputerWeekly.com) Apple previews a new feature called Lockdown Mode to protect iPhone and iPad users from ‘mercenary spyware’.
Samsung working closely with Google, Microsoft to build measures to best prevent Pegasus-like cyberattacks | Exclusive (Financial Express) 'We do recognise that there are a large number of state-level cyberattacks that are being launched.'
Educational institutions findings annex – Cyber Security Breaches Survey 2022 (GOV.UK) This annex includes findings from the samples of UK educational institutions included in this year’s Cyber Security Breaches Survey. The results primarily cover:
Cedar Rapids Suspends Summer Programs Amid Cyber Investigation (GovTech) In the wake of a cybersecurity breach over the weekend, an Iowa school district is putting programs on hold while investigators try to ascertain whether the incident was a ransomware attack or a data breach.
Chinese Premier stresses data security after breach affected 1bn residents (Business Standard) Rattled at the alleged data leak of nearly 1 billion residents, China premier Li Keqiang has stressed data security, calling on government bodies to 'defend information security', the media reported on Friday.
China's cyberspace regulator says data export review rules effective Sept. 1 (Reuters) China's cyberspace regulator on Thursday said that rules requiring data exports to undergo security reviews would be effective from Sept. 1, the first time it has given a start date for a new regulatory framework that will affect hundreds, if not thousands, of Chinese companies.
Tech platforms face UK ban on blocking news providers before appeal (the Guardian) Change to online safety bill will stop sites such as YouTube barring content instantly, following TalkRadio debacle
US Treasury Develops 'Framework' for International Crypto Regulation (CoinDesk) The document is the first publication from the department to stem from President Biden's executive order on digital assets.
Cybersecurity for Government Contractors (Bloomberg Government) Learn how the Biden administration cybersecurity CMMC requirements and other cybersecurity requirements for government contractors will change federal business.
Ethics Watchdog Bars US Government Employees From Writing Crypto Policy if Invested (CoinDesk) A new legal advisory from the Office of Government Ethics bars federal workers who own crypto from working on policies that could influence the value of their digital assets.
Election officials face security challenges before midterms (WPLG) Election officials have a long list of challenges as they prepare for the upcoming midterms.
Insider threats a growing concern for election security efforts (StateScoop) Recent breaches of election equipment represent insider threats "in ways we haven’t seen before," said CISA's top election-security official.
Lawmakers amplify calls for federal agencies to increase data privacy after Dobbs decision (Cybersecurity Dive) Seventy-two Democratic members of Congress want the FTC to use its full power to guard patients from data brokers collecting and selling data that could be used to prosecute pregnancy-related crimes.
Five accused of trying to silence China critics in US (Register) Alleged campaign involved stalking via GPS and hidden cameras, fake interviews, confidential government data
Spanish judge okays probe into Israeli NSO group over Catalan phone tapping (Times of Israel) Catalan separatist party claims more than 60 phones belonging to independence supporters bugged using Pegasus phone hacking software during independence bid in 2017
Irish Facebook Decision Adds Pressure to Reach Transatlantic Data Deal (Wall Street Journal) European Union privacy regulators are reviewing an order that would to block Facebook from sending European user data to the U.S.
Abuse survivor awarded £30,000 in damages for Ecclesiastical data breach (Church Times) THE Ecclesiastical Insurance Office (EIO) has apologised to an abuse survivor, Gilo, for breaching h…
Brazilian authorities crack down on piracy in the metaverse (OODA Loop) This week, Brazil's Ministry of Justice and Public Security announced that it conducted its first search within the metaverse with the goal of tackling digital piracy and other related crimes involving the theft of intellectual
ANALYSIS: DOJ Alleges Bid-Rigging Twist in Merger Challenge (Bloomberg Law) A recent Justice Department lawsuit seeking to bar Booz Allen Hamilton Holding Corp.'s pending purchase of rival EverWatch Corp. raises an interesting question: Can a merger agreement be anticompetitive even if the merger isn’t?
Data Breach Victims Press for Settlement Approval in Class Action Over Accellion Cyberattack – Tech (Law Street Media) A lawsuit against Accellion Inc. over data breaches occurring in late 2020 and early 2021 is edging closer to resolution. On Tuesday, a reply brief filed
Aon faces lawsuits over cyberattack (Business Insurance) Two putative class action lawsuits have been filed against Aon PLC alleging the brokerage was hacked between December 2020 and February 2022 but failed to alert affected individuals for more than three months.
Arrested Russian hacker Pavel Sitnikov looks to start a new chapter (The Record by Recorded Future) In December 2020, The Record published an interview between Recorded Future’s Dmitry Smilyanets and Russian hacker Pavel Sitnikov about ransomware, cybercrime, and his self-proclaimed connection with the notorious hacking group APT28, or Fancy Bear.
For a complete running list of events, please visit the Event Tracker.
The Value Proposition of a Cyber Secure Small Business (Virtual, Jul 11, 2022) Hosted by Global Cyber Alliance and New York Metro InfraGard, Cybersecurity for Small Business will discuss how a small business can use cybersecurity to protect their customers – while also increasing their revenue stream. This is the first in a two webinar series on small business cybersecurity. Speakers will include senior figures from the Global Cyber Alliance, New York Metro InfraGard, U.S. Small Business Administration, and Mastercard.
Insider Threat Program Development – Management Training Course (Sterling, Virginia, USA, Aug 22 – 23, 2022) This affordable, comprehensive and extremely resourceful 2 day training course will ensure the Insider Threat Program (ITP) Manager, Facilities Security Officer, Insider Threat Analyst, and others who support the ITP (CSO, CIO, CISO, IT, Network Security, Human Resources, Etc.), have the Core Knowledge, Blueprint, Resources needed for developing, managing or enhancing an ITP / Working Group. Our student satisfaction levels are in the exceptional range. Over 875+ individuals have attended this training course and received ITP Manager Certificates. The class has 2 additional instructors who are the former ITP Managers for CIA and NSA.
Digital safety snacks: Protect yourself from online abuse with short videos and workshops (Virtual, Jun 13 – Jul 28, 2022) PEN America, the Online News Association, and the International Women’s Media Foundation have teamed up to create step-by-step videos and hands-on workshops to help you defend yourself against online abuse. We’ll explain how to protect your most sensitive accounts from hackers and how to dox yourself before someone else does. We want to empower you to feel safer and more secure while maintaining the public profile you need to do your job. This series will include eight short video episodes and four virtual workshops, when you can follow along to complete your digital wellness check, ask questions, and get help if you get stuck. You can join one, two or all four sessions.
The Value Proposition of a Cyber Secure Small Business (Virtual, Jul 11, 2022) Hosted by Global Cyber Alliance and New York Metro InfraGard, Cybersecurity for Small Business will discuss how a small business can use cybersecurity to protect their customers – while also increasing their revenue stream. This is the first in a two webinar series on small business cybersecurity. Speakers will include senior figures from the Global Cyber Alliance, New York Metro InfraGard, U.S. Small Business Administration, and Mastercard.
Impact 2022 (Boston and Virtual, Massachusetts, USA, Jul 12 – 14, 2022) Presented by CyberArk, Impact is the leading cybersecurity conference for forward-thinking professionals. Gain insights on privileged access management (PAM) and Identity Security to help secure your digital business from the next generation of attackers
Economics of Cyber & Risk Management (Columbia, Maryland, USA, Jul 13, 2022) Businesses, government agencies, educational institutions, healthcare entities, and nonprofits alike are all grappling with IT (Information Technology) infrastructure challenges, and the pressures will not subside anytime soon. Teleworking, telehealth, virtual learning, and e-commerce are just a few daily practices being influenced by data security, access, and management. Simultaneously, labor shortages continue to challenge technology firms in their ability to combat digital adversaries. Future business profits undoubtedly will be linked to the cyber and risk management practices business entities put in place and the ongoing training their employees receive as they protect their data assets and intellectual property.
The Diana Initiative Virtual Conference (Virtual, Jul 16, 2022) Back for the 6th year,​ The Diana Initiative​ is hosting a two-day diversity-driven conference committed to helping all underrepresented genders, sexualities, races and cultures in Information Security. The Diana Initiative features multiple speaker tracks, fully expanded villages with hands-on workshops, and a women-led Capture the Flag event.

source