Documents reveal depth of anxiety over possible Russian cyberattacks on U.S. grid
A trove of emails from top Homeland Security officials expose how the U.S. government scrambled to ensure the defenses of American utilities after Russia brought down parts of Ukraine’s power grid in 2015.
Bracing for cyberattacks as Russia readies for war
Welcome to Changelog for 2/13/22, published by Synack! I’m your host, Blake. From some pretty serious Apple patches to a disheartening update on the Log4j vulnerability’s long tail, last week’s threat level was tomato.
One hacker vs. the Hermit Kingdom
Blake here, reporting from Washington. It’s been another jam-packed week for cybersecurity news, with a massive crypto heist, a first-of-its-kind NSA interview and some gloomy numbers for a Pentagon supply chain security program.
Thousands of Pentagon contractors could buckle under cybersecurity push
The Biden administration is forging ahead with a scaled-back plan to regulate cybersecurity in the vast and complicated defense industry marketplace. But the halting rollout of the Cybersecurity Maturity Model Certification, or CMMC, program illustrates the perils and pitfalls of rewriting supply chain cyber rules for the defense industrial base.
How I hacked my way to the top of DARPA’s hardware bug bounty
Go inside one of the most technically challenging bug bounties ever with the researcher who subverted secure hardware designed by MIT and the University of Cambridge.
DARPA’s quest for the (almost) unhackable
Welcome to Changelog by README! I’m your host, Blake Sobczak. Every Sunday, I’ll deliver cybersecurity news and analysis to your inbox, provided the internet hasn’t gone down in flames.
Researchers show how platforms can scrub COVID conspiracies, election lies and other misinformation
A team of North American researchers is developing a statistics-based technique to weed out falsehoods from social media platforms, with implications for election integrity, cybersecurity and COVID-19.
Destructive malware is back in Ukraine. Will it usher in cyberconflict?
The WhisperGate malware masquerades as ransomware but really breaks computer files beyond repair.
Hackers square off to close gaps in satellite cybersecurity
The second annual Hack-A-Sat competition pits security researchers against real satellite equipment as the U.S. military rushes to address space cybersecurity risks.