Sponsored Combatting emerging-malware aimed at industrial control systems New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems. Apr 28, 2022 By CyberScoop Staff
Fiber optic cables, including these, were cut in several locations in France in April, prompting a criminal investigation of the apparent sabotage. (PHOTO: Free network via Twitter) How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities The apparent act of sabotage is being investigated as a criminal matter, including by the French internal intelligence service. Apr 28, 2022 By Suzanne Smalley
Tulips in blossom on Independence Square on April 27, 2022 in Kyiv, Ukraine. Following Russia’s retreat from areas around the Ukrainian capital, signs of normal life have returned to Kyiv. (Photo by Alexey Furman/Getty Images) Microsoft ties January Ukraine attack to notorious Sandworm group Expect to see more attacks, Microsoft says. Apr 27, 2022 By Tonya Riley
Ukrainian servicemen stand next to the monument in Chernobyl on April 26, 2022 to pay tribute to the firefighters who died during the 1986 Chernobyl disaster. The NotPetya attack knocked Chernobyl’s radiation system offline. (Photo by SERGEI SUPINSKY/AFP via Getty Images) State Department announces $10M bounty for Russian intelligence hackers behind NotPetya The State Department is offering $10 million for the location of six Russian intelligence officers in the Sandworm unit. Apr 27, 2022 By Suzanne Smalley
An aerial view of Blagoveshchensk, located on Amur river, opposited to Chinese city of Heihe (seen at background), May 22, 2014. (Photo by Sasha Mordovets/Getty Images) Research points to a Chinese hacking effort targeting a Russian border unit The findings add detail to other suspected Chinese hacking campaigns in Europe related to the Russian invasion of Ukraine. Apr 27, 2022
Elon Musk’s Twitter account is displayed on the screen of an iPhone, April 26, 2022. (Photo illustration by Chesnot/Getty Images) Musk’s plans to make Twitter’s algorithms public raises disinformation conundrum Opening up the algorithms might not lead to hacks, but cyber mischief could still follow. Apr 26, 2022 By Tonya Riley
Negotiations to forge a cybercrime treaty begin next month at U.N. headquarters in New York City, pictured here on March 23, 2022. (Photo by Michael M. Santiago/Getty Images) UN to begin new phase of negotiations on cybercrime treaty, alarming human rights activists A U.N. cybercrime treaty could give global governments new — and what many human rights defenders call worrisome — powers to prosecute cybercrimes. Apr 26, 2022 By Suzanne Smalley
(Photo by Neville Elder/Corbis via Getty Images) Group behind Emotet botnet malware testing new methods to get around Microsoft security Recent changes to Microsoft automation capabilities may be forcing cybercrime operators to adapt. Apr 26, 2022
Bob Lord pictured at TechCrunch’s Disrupt 17 conference. (Flickr / CC-BY-2.0 TechCrunch) Former DNC security officer Bob Lord joins CISA Lord cleaned up the Democratic Party's cybersecurity practices in the aftermath of the 2016 hacks. Apr 25, 2022 By Tonya Riley
The U.S. Department of Homeland Security seal. (Photo by Mark Makela/Getty Images) Hackers find 122 vulnerabilities — 27 deemed critical — during first round of DHS bug bounty program The findings, first reported by CyberScoop, come in the first of three phases for the DHS bug bounty program. Apr 22, 2022