The Full Story of the Stunning RSA Hack Can Finally Be Told

Amid all the sleepless hours that Todd Leetham spent hunting ghosts inside his company's network in early 2011, the experience that sticks with him most vividly all these years later is the moment he caught up with them. Or almost did.

Wired

SolarWinds and Beyond: Improving the Cybersecurity of Software Supply Chains | House Committee on Science, Space and Technology

Mr. Matthew Scholl, Chief, Computer Security Division of the Information Technology Laboratory, National Institute of Standards and Technology (NIST) Dr. Trey Herr, Director, Cyber Statecraft Initiative, Atlantic Council Ms. Katie Moussouris, Founder and CEO, Luta Security Mr. Vijay D'Souza, Director, Information Technology and Cybersecurity, Government Accountability Office (GAO)

House

US towns are buying Chinese surveillance tech tied to Uighur abuses

Hikvision and Dahua supplied Beijing with technology it used to surveil ethnic groups At least a hundred U.S. counties, towns, and cities have bought China-made surveillance systems that the U.S. government has linked to human rights abuses, according to contract data seen by TechCrunch.

TechCrunch

The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms

On January 11, antivirus company Bitdefender said it was "happy to announce" a startling breakthrough. It had found a flaw in the ransomware that a gang known as DarkSide was using to freeze computer networks of dozens of businesses in the US and Europe. Companies facing demands from DarkSide could download a free tool from...

MIT Technology Review

Operational technology is the new low-hanging fruit for hackers

Industrial systems with operational technology are being exposed on the internet in growing numbers, and many are vulnerable to basic entry-level intrusion techniques. That's according to researchers at FireEye, who said in a research post Tuesday that operational technology (OT) networks are being compromised at their highest clip in years, and as a result vital industries including electricity, mining, and water management are being put at risk of catastrophic attack.

SearchSecurity

FSB asset introduced LinkedIn hacker, future Group-IB executive in 2012, U.S. alleges - CyberScoop

Written by Jeff Stone Mar 13, 2020 | CYBERSCOOP Attorneys are using the trial of a man who allegedly stole more than 100 million usernames and passwords from U.S. social media companies to hint at the murky, long-rumored relationships between Russian cybercriminals and the Kremlin's intelligence agencies. Yevgeniy Nikulin, a 32-year-old St.

CyberScoop

U.S. has almost 500,000 job openings in cybersecurity

Help wanted: thousands and thousands of people interested in a career in cybersecurity. There are about 465,000 open positions in cybersecurity nationwide as of May 2021, according to Cyber Seek - a tech job-tracking database from the U.S. Commerce Department - and the trade group CompTIA.

Cbsnews

The only thing paying a ransom guarantees is more ransomware attacks

It is tempting to see this week's cyber security crisis in Irish healthcare as inevitable. Most economically-advanced countries have experienced some sort of major cyber incident. Indeed, the event bears some resemblance to the most testing moment of my six years running cyber security in the UK; almost exactly four years ago the NHS experienced serious digital disruption.

The Irish Times

WSJ News Exclusive | Colonial Pipeline CEO Tells Why He Paid Hackers a $4.4 Million Ransom

The operator of the Colonial Pipeline learned it was in trouble at daybreak on May 7, when an employee found a ransom note from hackers on a control-room computer. By that night, the company's chief executive came to a difficult conclusion: He had to pay.

WSJ

UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat

Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being available and deploying sophisticated malware previously reported by other vendors as SOMBRAT. Mandiant has linked the use of SOMBRAT to the deployment of ransomware, which has not been previously reported publicly.

FireEye