Ukraine at D+337: More DDoS, more scattershot missile strikes. (CyberWire) Russia responds to NATO members’ decision to supply tanks to Ukraine with DDoS, scattershop missile strikes. and a reframing of its war as a defense against NATO aggression.

Russia-Ukraine war: List of key events, day 338 (Al Jazeera) As the Russia-Ukraine war enters its 338th day, we take a look at the main developments.

New barrage of Russian strikes in Ukraine kills at least 11 (AP NEWS) Russia fired more missiles and self-exploding drones at nearly a dozen Ukrainian provinces early Thursday, causing the first war-related death in Kyiv this year and killing at least 11 people overall, according to Ukrainian authorities.

Russia-Ukraine war live: Ukraine claims to have killed 109 Russians in eastern Donetsk battle; Poland to send 60 additional tanks (the Guardian) Ukraine claims to have wounded further 188 during fighting around village of Vuhledar; Polish prime minister pledges increased military support

‘The big battle is coming’: Ukrainian forces prepare for the war’s most intense phase (the Guardian) Russia and Kyiv both need a breakthrough but a major offensive will be loaded with risk whoever strikes first

Ukraine Under New Missile Barrage as Russia Warns West About Tank Pledges (Wall Street Journal) Explosions rocked Kyiv, while officials in Moscow said the latest promises of Western military aid would escalate the conflict.

Ukraine-Russia war latest: Putin’s Arctic bombers launch wave of missiles at Ukraine (The Telegraph) Vladimir Putin ordered his bombers to take off from bases in Russia’s arctic far north to launch a cruise missile attack on Ukraine, the Ukrainian military has said.

Russia-Ukraine war latest: Poland to send 74 battle tanks to Kyiv (The Telegraph) Poland will send 74 main battle tanks to Ukraine in a bid to further bolster the defences of Ukraine ahead of an expected Russian offensive, writes Joe Barnes.

British Challenger II tanks to reach Ukraine in time for Russian spring offensive (The Telegraph) Defence minister says the vehicles should arrive ‘at the end of March’, joining German-made Leopards being sent within weeks

The ‘Free the Leopards’ Campaign Paid Off for the West and Ukraine (World Politics Review) While all tanks will be helpful, Germany’s Leopard tanks will be particularly vital for Ukraine’s war effort against Russia.

What Western tanks will mean for Ukraine (Atlantic Council) With Leopard 2 tanks on the way to Ukraine, our experts rumble in with their takes on what the move signals about Germany’s approach to the war effort.

Experts react: The West finally sends in the tanks. What will they mean for Ukraine’s fight? (Atlantic Council) Is this a turning point for Germany’s participation in arming Ukraine? Our experts lay out what’s next.

Tanks are vital but Ukraine will need much more to defeat Putin’s Russia (Atlantic Council) The decision by Germany and the United States to supply Ukraine with main battle tanks is an important landmark in international efforts to counter Putin’s invasion but much more is required to defeat Russia.

Ukraine faces logistics hurdles ahead of tank deliveries (Washington Post) Nearly a year into the war in Ukraine, Western allies finally agreed to send Kyiv the battle tanks it says it so desperately needs.

Scholz tank drama casts unflattering light on Germany’s Russia problem (Atlantic Council) After months of debates and delays, Germany finally succumbed to international pressure on January 25 and announced that it would be delivering German-made Leopard tanks to Ukraine and allowing others to do so.

US to send Abrams tanks to Ukraine – minus secret uranium armour (The Telegraph) US concerned that Russia would attempt to reverse engineer the tank’s lethal armour mix if captured on battlefield

Why the US Flipped on Sending Tanks to Ukraine ( For months, U.S. officials balked at sending M1 Abrams tanks to Ukraine, insisting they were too complicated and too hard to maintain and repair.

US to buy new Abrams tanks for Ukraine because military has no spares, Pentagon says (Stars and Stripes) Defense Secretary Lloyd Austin recommended to President Joe Biden to obtain the tanks through the Ukraine Security Assistance Initiative — a funding program that procures military equipment from industry rather than from existing Defense Department stocks.

France could meet Ukraine’s demand for fighter jets (The Telegraph) ‘Apart from nuclear weapons, there is nothing left that we will not get’, an advisor to Kyiv’s defence minister has vowed

Cyberattacks Target Websites of German Airports, Admin (SecurityWeek) Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Putin is losing the war in Ukraine, but winning the battle at home (Newsweek) When Vladimir Putin ordered his armies into Ukraine on February 24, 2022, it was to avoid the fate of Belarusian President Alexander Lukashenko.

Russia’s Crime and Punishment (Foreign Affairs) How to prosecute the illegal war in Ukraine.

Kennan’s Warning on Ukraine (Foreign Affairs) Ambition, insecurity, and the perils of independence

Treasury Sanctions Russian Proxy Wagner Group as a Transnational Criminal Organization (U.S. Department of the Treasury) Sanctions Target Wagner’s Global Support Network, Russia’s Military Complex, Putin Cronies

Countering the Wagner Group and Degrading Russia’s War Efforts in Ukraine (United States Department of State) The United States is sanctioning individuals and entities linked to Russia’s para-military Wagner Group and its head, Yevgeniy Prigozhin – including its key infrastructure and associated front companies, its battlefield operations in Ukraine, producers of Russia’s weapons, and those administering Russia-occupied areas of Ukraine.  This action supports our goal to degrade Moscow’s capacity to wage […]

Wagner Group Designated by U.S. as Transnational Criminal Group (Wall Street Journal) The U.S. has imposed sanctions against the military infrastructure it says is supporting Russia’s battlefield operations in Ukraine, ramping up pressure on the Kremlin as the war enters its next phase. 

US Expands Sanctions on Russia’s ‘Brutal’ Wagner Group ( The announcements re-designate the Wagner Group, a private Russian military group owned as a “significant transnational criminal organization.”

WSJ News Exclusive | U.S. Leans on Turkey to End Russian Flights With American-Made Planes (Wall Street Journal) U.S. officials are leaning on Turkey to stop Russian airlines from flying American-made airplanes to and from the country, said officials familiar with the talks.

A Russian graveyard reveals Wagner’s prisoner army (Reuters) A rapidly expanding cemetery in a southern Russian village offers insight into who is fighting – and dying – for the notoriously secretive mercenary army Wagner.

Hitmen, murderers and alcoholics killed fighting for Wagner Group (The Telegraph) Graves discovered in southern Russia show extent of mercenary group’s recruitment for war in Ukraine

High-ranking Russian officials are defecting. This man is aiding them (CNN) Vladimir Osechkin has become the champion of a growing number of high-level Russian officials defecting to the West, emboldened and disgruntled by the Kremlin’s war in Ukraine. He now lives under police protection.

Ukrainian children saved from the Russian ‘vacation’ trap (ABC News) “At that moment, I regretted so very much what I did.”

Second arrest in Russian spy scandal at German intelligence agency (POLITICO) The man is suspected of complicity in treason for bringing information to Russia.

Roman Abramovich’s Long-Shot Effort to Save Ukraine, His Reputation and His Fortune (Wall Street Journal) The Russian oligarch has thrown himself into a quest to help stop the war and salvage his reputation in the West. Now his chances to be a middleman for peace are falling, while the pressure on his assets is increasing.

Attacks, Threats, and Vulnerabilities

Threat actors impersonate Canadian gas retailer to deliver malicious OneNote phishing campaign, Bitdefender Labs warns (Hot for Security) Threat actors have been abusing OneNote documents to move the AsyncRat credential-stealing Trojan in a new malicious phishing campaign, according to Bitdefender Labs researchers.

Chinese PlugX Malware Hidden in Your USB Devices? (Unit 42) PlugX remains an active threat. A newly discovered variant infects USB devices and a similar variant makes copies of PDF and Microsoft Word files.

Polygraph: ‘Clickjacking’ Is Making A Comeback As A Click Fraud Technique (GlobeNewswire News Room) Clickjacking click fraud tricks website visitors into clicking on pay-per-click adverts without their knowledge or consent…

Royal mail resumes more services after cyber incident (Reuters) British postal firm Royal Mail is restarting some of its international export services, the company said on Thursday, two weeks after its operations were disrupted by what it called a “cyber incident.”

B.C. college says info of students, employees at risk following cyber attack (IT World Canada) A British Columbia community college says personal information of some students and employees may have been copied by a cyber attacker earlier this month. Okanagan College, which has 17,000 students and 1,100 employees across several campuses in southern B.C., said an “unauthorized entity gained access to certain Okanagan College technology systems” around Jan. 9. As

Alexander City falls victim to cyber attack (KPVI) The Alexander City City Council called an emergency public meeting Tuesday to discuss the city’s response to a ransomware attack.

Security Patches, Mitigations, and Software Updates

Delta Electronics CNCSoft ScreenEditor (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity  Vendor: Delta Electronics  Equipment: CNCSoft   Vulnerability: Stack-based Buffer Overflow  2. RISK EVALUATION Successful exploitation of this vulnerability could cause a buffer overflow condition, which could allow remote code execution. 

Econolite EOS (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Econolite  Equipment: EOS  Vulnerability: Improper Access Control, Use of Weak Hash  2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in a remote unauthenticated attacker gaining full control over traffic control functions performed by Econolite hardware. 

Snap One Wattbox WB-300-IP-3 (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity   Vendor: Snap One  Equipment: Wattbox WB-300-IP -3   Vulnerabilities: Improper Restriction of Excessive Authentication Attempts, Heap-based Buffer Overflow, Plaintext Storage of a Password, Insufficient Verification of Data Authenticity  2.

Sierra Wireless AirLink Router with ALEOS Software (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Sierra Wireless  Equipment: AirLink Router with ALEOS Software  Vulnerabilities: Improper Neutralization of Argument Delimiters in a Command, Exposure of Sensitive Information to an Unauthorized Actor  2.

Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Mitsubishi Electric Corporation  Equipment: MELFA SD/SQ series and F-series Robot Controllers  Vulnerability: Active Debug Code  2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to a robot controller. 

Rockwell Automation products using GoAhead Web Server (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Rockwell Automation  Equipment: Products using GoAhead Web Server  Vulnerabilities: Infinite Loop, Use after Free  2. RISK EVALUATION Successful exploitation of these vulnerabilities could have a high impact on the confidentiality, integrity, and availability of the vulnerable devices. 

Landis+Gyr E850 (CISA) 1. EXECUTIVE SUMMARY CVSS v3 3.9 ATTENTION: Low attack complexity  Vendor: Landis+Gyr  Equipment: E850 (ZMQ200)  Vulnerability: Reliance on Cookies without Validation and Integrity  2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service condition for the end user that the cookie was modified for. 

Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.9 ATTENTION: Exploitable remotely  Vendor: Mitsubishi Electric  Equipment: MELSEC iQ-F and iQ-R Series products  Vulnerability: Predictable Seed in Pseudo-Random Number Generator (PRNG)  2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to access the WEB server function by guessing the random numbers used for authentication. 

Kroll Cyber Data Breach Outlook – 2023 (Kroll) Kroll’s Data Breach Outlook ranks the most-breached industries of the year. In 2022, health care overtook finance as the most-breached industry, accounting for 22% of the breaches handled by Kroll, compared to 16% in 2021; a 38% increase year over year (YoY). Finance dropped to second place with 19% of the cases in 2022, a 3% drop from 2021 where it accounted for 22% of breach cases.

Dark web market listings for counterfeit banknotes up 91% last year (Cybersixgill News) Over the past year, there has been an approximately 91% increase in posts advertising counterfeit banknotes to underground cybercrime markets.


OneSpan to Acquire Blockchain Technology Provider ProvenDB to Bring Secure Vaulting to the Future of Digital Transactions (Business Wire) OneSpan Inc. (NASDAQ: OSPN), the digital agreements security company, today announced that it has agreed to acquire ProvenDB, an Australia-based start

HUB Cyber Security Announces Expected SPAC Merger and Nasdaq Listing Date (PR Newswire) HUB Cyber Security Ltd (TASE: HUB), a developer of Confidential Computing cybersecurity solutions and services (“HUB” or the “Company”),…

Tenable Launches $25 Million Early-Stage Venture Fund (SecurityWeek) Tenable has launched a $25 million venture fund to place bets on early-stage startups in the attack surface and exposure management space.

UNITED STATES : Pentagon expert Two Six Technologies acquires cyber offensive capacities (Intelligence Online) Two Six Technologies, the crafter of the Pentagon’s cyber warfare platforms, has taken steps to build its offensive capacities by hiring a small team of vulnerability researchers.

The mother of invention: why cyber ILS is needed now (Intelligent Insurer) With not one but two cyber ILS deals being launched in January, a panel of experts debate why this new well of capacity for cyber risks is needed and very welcome for a complex yet fast-growing line of business.

Dozens of Cybersecurity Companies Announced Layoffs in Past Year (SecurityWeek) Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce

WSJ News Exclusive | Head of Israeli Cyber Firm NSO Group Reaffirms Company Commitment to Spyware (Wall Street Journal) Yaron Shohat acknowledges past mistakes, but says the technology is vital for law-enforcement and intelligence agencies.

Pegasus spyware defended by NSO’s CEO, as researcher compares it to a nuclear weapon (9to5Mac) Pegasus spyware – a zero-click way of remotely hacking an iPhone, and gaining access to all the personal data stored on it – has been defended by the company’s CEO. NSO chief exec said that the company had made “mistakes” in selling it to repressive governments, but claimed that it now sells Pegasus only to […]

What Went Wrong at Wyre, the Crypto Payments Startup That Went From $1.5 Billion Deal to Last-Ditch Rescue (The Information) In early May, crypto startup Wyre rented out three houses in Arizona for an offsite for its product and engineering teams. Executives arranged a tour of the Grand Canyon nearby and rented all-terrain vehicles to ride around the area, one person who attended told The Information. There was good …

SecureAuth Closes 2022 with Exciting Momentum as Customer Adoption Soars for Passwordless Continuous Authentication (SecureAuth) SecureAuth Closes 2022 with Exciting Momentum as Customer Adoption Soars for Passwordless Continuous Authentication

Kion Gains Further Market Momentum Through Product and Company Expansion (Business Wire) Kion details monumental company growth achieved in 2022 and plans for product enhancements in 2023.

Next DLP Accelerates Business Momentum with Record-Breaking Revenue Growth (Business Wire) Next DLP (“Next”), a leader in data loss prevention (DLP), announced today the company’s unprecedented 2022 growth reaching a dramatic 200 percent inc

Cobalt Achieved Record Pentests, Expanded PtaaS Adoption (Cobalt) Cobalt, the leading pentest as a service (PtaaS) provider achieved a record number of penetration tests in 2022.

Dig Security Welcomes Yotam Ben Ezra as Chief Product Officer (PR Newswire) Dig, the cloud data security leader, today announced the appointment of Yotam Ben Ezra as Chief Product Officer (CPO). Ben Ezra’s appointment…

Mimecast promotes compliance chief to general counsel (The Global Legal Post) Chris Dollase succeeds Robert Nault following email security giant’s $5.8bn acquisition by Permira last year

Prove Identity Appoints Amanda Fennell as New CISO (Business Wire) Prove today announced the appointment of Amanda Fennell as Chief Information Security Officer (CISO) and Chief Information Officer (CIO).

Products, Services, and Solutions

Senhasegura Wins 2022 CyberSecured Award for Best Privileged Access Management (PAM) Solution (Business Wire) Senhasegura Wins 2022 CyberSecured Award for Best Privileged Access Management (PAM) Solution

KnowBe4 Integrates with Revelstoke Security Orchestration, Automation, and Response Platform To Thwart Email Attacks (KnowBe4) KnowBe4 Integrates with Revelstoke Security Orchestration, Automation, and Response Platform To Thwart Email Attacks

Livanta Earns Capability Maturity Model Integration Development Version 2.0 (CMMI-DEV V2.0) Certification (GlobeNewswire News Room) Livanta LLC (“Livanta”) has announced that it has successfully achieved Capability Maturity…

Varonis Launches Automated Posture Management to Effortlessly Fix Cloud Security Risks (GlobeNewswire News Room) One-click remediation of cloud misconfigurations is a game-changer for data security posture management (DSPM)…

GitLab Continues Expanding Its Security Certification and Report Portfolio (GlobeNewswire News Room) GitLab strengthens security assurance at the highest international standard…

Varonis Launches Automated Posture Management to Effortlessly Fix Cloud Security Risks (Varonis) One-click remediation of cloud misconfigurations is a game-changer for data security posture management (DSPM).

Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click (Varonis) Varonis launches Automated Posture Management to effortlessly fix cloud Security risks with a simple click of a button

Arrow Electronics Signs with QuSecure to Become First Large Technology Provider to Broadly Distribute Post-Quantum Cybersecurity (Business Wire) QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today announced it has signed a software distribution agreement with Arrow Electronics,

Mark43 continues to put security and reliability first, achieving premier StateRAMP “In Process” Service Provider designation (Business Wire) Mark43, the leading cloud-native public safety software company, today announced that it has achieved State Risk and Authorization Management Program

Meity, Kyndryl To Float Cybersecurity Training Initiative (BW Education) BW Education – , Professional Education-Cyber Rakshak programme will empower more than 100,000 women in rural and remote areas

Technologies, Techniques, and Standards

NIST Risk Management Framework Aims to Improve Trustworthiness of Artificial Intelligence (NIST) New guidance seeks to cultivate trust in AI technologies and promote AI innovation while mitigating risk.

Data Analytics for Small Businesses: How to Manage Privacy Risks (NIST) Perhaps you’ve been hearing about data analytics, which is being promoted as a way for even small businesses to analyze communications with customers, enhanc

JCDC Announces 2023 Planning Agenda (CISA) Today, the Joint Cyber Defense Collaborative (JCDC) announced its 2023 Planning Agenda. This release marks a major milestone in the continued evolution and maturation of the collaborative’s planning efforts. JCDC’s Planning Agenda brings together government and private sector partners to develop and execute cyber defense plans that achieve specific risk reduction goals focused on systemic risk, collective cyber response, and high-risk communities.

JCDC Focused on Persistent Collaboration and Staying Ahead of Cyber Risk in 2023 (CISA) In 2021, CISA and our partners across government and the private sector created a new kind of partnership organization — the Joint Cyber Defense Collaborative (JCDC). While our model is still evolving, we collectively demonstrated how persistent collaboration and frictionless engagement can yield benefits in addressing exigent risks like the Log4Shell vulnerability and potential cyber activity resulting from Russia’s full-scale invasion of Ukraine.

Identifying and securing your business’s dark data assets in the cloud (AT&T Cybersecurity) The world runs on data. That has always been true, but the power of data has perhaps never been greater than it is today. We live in the great age of information — where a seemingly infinite repository of knowledge lies at our fingertips.

Design and Innovation

A watermark for chatbots can expose text written by an AI (MIT Technology Review) The tool could let teachers spot plagiarism or help social media platforms fight disinformation bots.

Introducing Island GPT Assistant – How AI and The Enterprise Browser combine to make work impossibly simple ( Island GPT Assistant is the industry’s first integration of ChatGPT’s technology into a browser, and goes beyond simply placing generative AI inside the browser

WSJ News Exclusive | BuzzFeed to Use ChatGPT Creator OpenAI to Help Create Quizzes and Other Content (Wall Street Journal) CEO Jonah Peretti said the publisher would use the technology to make more comprehensive quizzes and interactive content.

Legislation, Policy, and Regulation

Don’t use TikTok, Dutch officials are told (POLITICO) The Netherlands wants the Chinese app to clean up its act on data protection before government services could use it

GEN Nakasone, NSA General Counsel Engage in FISA Section 702 Forum (National Security Agency/Central Security Service) As part of a virtual roundtable discussion with the Privacy and Civil Liberties Oversight Board (PCLOB), GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS, recently provided

Classified records pose conundrum stretching back to Carter (AP NEWS) At least three presidents. A vice president, a secretary of state, an attorney general. The mishandling of classified documents is not a problem unique to President Joe Biden and former President Donald Trump.

DoD Releases Small Business Strategy (U.S. Department of Defense) The Department of Defense released its 2022 Small Business Strategy.

Legislators Renew Efforts to Protect Consumers from an Eavesdropping Fridge ( The reintroduced bill asks the Federal Trade Commission to establish disclosure guidelines for smart devices and appliances that consumers would not expect to be recording them.

Britain’s cyber intel agency GCHQ to start search for new director as Fleming signals departure (The Record from Recorded Future News) GCHQ, Britain’s cyber intelligence agency, is searching for a new director, following the announcement that Sir Jeremy Fleming will depart.

Litigation, Investigation, and Law Enforcement

Cybercriminals stung as HIVE infrastructure shut down (Europol) In the last year, HIVE ransomware has been identified as a major threat as it has been used to compromise and encrypt the data and computer systems of large IT and oil multinationals in the EU and the USA. Since June 2021, over 1 500 companies from over 80 countries worldwide have fallen victim to HIVE associates and lost almost…

POL-RT: Erneuter Schlag gegen die organisierte Cyberkriminalität – Baden-Württembergische Ermittler wieder erfolgreich ( Reutlingen (ots) – Kriminelles Netzwerk im Rahmen der internationalen Operation “Dawnbreaker” zerschlagen – Mehrere Unternehmen aus Baden-Württemberg betroffen Gemeinsame…

U.S. Department of Justice Disrupts Hive Ransomware Variant (U.S. Department of Justice) The Justice Department announced today its months-long disruption campaign against the Hive ransomware group that has targeted more than 1,500 victims in over 80 countries around the world, including hospitals, school districts, financial firms, and critical infrastructure.

Director Christopher Wray’s Remarks at Press Conference Announcing the Disruption of the Hive Ransomware Group (Federal Bureau of Investigation) FBI Director Christopher Wray made the following remarks at a press conference announcing the disruption of the Hive ransomware group.

US hacks back against Hive ransomware crew (BBC News) The US Department of Justice says its operation against the cyber gang was a 21st Century stakeout.

U.S. says it ‘hacked the hackers’ to bring down ransomware gang, helping 300 victims (Reuters) The FBI revealed it had disrupted a prolific ransomware gang called Hive, a maneuver that allowed the bureau to thwart the group from collecting more than $130 million in demands.

What the FBI’s Hive takedown means for the ransomware economy  (VentureBeat) The FBI’s coordinated operation against the Hive ransomware gang highlights that the ransomware economy is under serious strain in 2023.

FBI Disrupts ‘Hive’ Ransomware Group (Wall Street Journal) U.S. authorities seized the servers of the notorious ransomware group and captured keys to decrypt its software. “We hacked the hackers,” the Justice Department said.

FBI shuts down ransomware gang that targeted schools and hospitals (Washington Post) Attorney General Merrick Garland said the group, called Hive, extorted hundreds of organizations before getting hacked itself

Hive ransomware disrupted after FBI hacks gang’s systems (BleepingComputer) Today, the Hive ransomware Tor payment and data leak sites were seized as part of an international law enforcement operation involving the US Department of Justice, FBI, Secret Service, Europol, and Germany’s BKA and Polizei.

Hive Ransomware Operation Shut Down by Law Enforcement (SecurityWeek) The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’ (SecurityWeek) The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

US announces it seized Hive ransomware gang’s leak sites and decryption keys (TechCrunch) The infrastructure behind Hive, one of the most prolific ransomware operations, has been seized by law enforcement agencies in the United States and Europe.

FBI seizes website used by notorious ransomware gang (CNN) The FBI has seized the computer infrastructure used by a notorious ransomware gang which has extorted more than $100 million from hospitals, schools and other victims around the world, US officials announced Thursday.

Why DOJ’s Damaging Evidence Against Google May Not Be Enough to Break Up the Company (The Information) Justice Department lawyers on Tuesday revealed embarrassing details about Google’s conduct in the online ad industry as part of a new antitrust lawsuit. Despite evidence and allegations that Google rigged advertising auctions and effectively stole money from website publishers that rely on the …

IBCAP credits industry-leading automation tools for its 2022 success in removing pirated content worldwide (GlobeNewswire News Room) More than doubling the number of pirate streams detected and taken down, permanently removing popular STB services, and securing wide-reaching injunctions…

How Barr’s Quest to Find Flaws in the Russia Inquiry Unraveled (New York Times) The review by John Durham at one point veered into a criminal investigation related to Donald Trump himself, even as it failed to find wrongdoing in the origins of the Russia inquiry.

Home Depot Canada found sharing customer personal data with Meta – privacy regulator (Reuters) Home Depot Inc’s Canadian arm was found to be sharing details from e-receipts related to in-store purchases with Facebook owner Meta Platforms Inc without the knowledge or consent of its customers, according to Canada’s privacy regulator.

Italy Starts Seizing Large-Scale Fake E-Commerce Websites (Bloomberg) Cybersecurity firm Yarix unearths 13,000 fake web shops. Network consists of phony sites that steal buyers’ data.

Exclusive: Inside the extramarital affair and cash-fueled double life of Charles McGonigal, the FBI spy hunter charged with taking Russian money (Business Insider) “Charlie McGonigal knew everybody in the national security and law enforcement world,” his ex-lover told Insider. “He fooled them all.”

Former Army reservist spied for Chinese government (Military Times) The soldier enlisted in 2016 through a program to recruit foreigners.

Dutch man arrested for stealing data on nearly every Austrian citizen (Computing) Authorities in the Netherlands have arrested a man for collecting and attempting to sell personal information on practically every Austrian citizen.


By admin

Leave a Reply

Your email address will not be published. Required fields are marked *