<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bello Archives - Los Gatos News And Events</title>
	<atom:link href="https://losgatosnewsandevents.com/tag/bello/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>ALL ABOUT LOS GATOS NEWS AND EVENTS</description>
	<lastBuildDate>Wed, 08 Jun 2022 20:09:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://losgatosnewsandevents.com/wp-content/uploads/2021/03/cropped-DAILY-SAN-FRANCISCO-BAY-NEWS-e1614935219978-32x32.png</url>
	<title>bello Archives - Los Gatos News And Events</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>US sees excessive menace of Russian cyberattack. Cyberwar and jus in bello. Broadcast hijacking. China&#8217;s cyberespionage &#8220;plumbing.&#8221;</title>
		<link>https://losgatosnewsandevents.com/us-sees-excessive-menace-of-russian-cyberattack-cyberwar-and-jus-in-bello-broadcast-hijacking-chinas-cyberespionage-plumbing/</link>
					<comments>https://losgatosnewsandevents.com/us-sees-excessive-menace-of-russian-cyberattack-cyberwar-and-jus-in-bello-broadcast-hijacking-chinas-cyberespionage-plumbing/#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 08 Jun 2022 20:09:45 +0000</pubDate>
				<category><![CDATA[Plumbing]]></category>
		<category><![CDATA[bello]]></category>
		<category><![CDATA[Broadcast]]></category>
		<category><![CDATA[Chinas]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberespionage]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[high]]></category>
		<category><![CDATA[hijacking]]></category>
		<category><![CDATA[jus]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[sees]]></category>
		<category><![CDATA[Threat]]></category>
		<guid isPermaLink="false">https://losgatosnewsandevents.com/?p=22121</guid>

					<description><![CDATA[<p>Dateline Ukraine at D+104: Cybercrime as a force multiplier. (The CyberWire) Russia and Ukraine treat the Donbas as a decisive theater. Cyber gangs serve as a Russian &#8220;force multiplier.&#8221; And US officials warn that the cyber threat from Russia remains as high as ever (and Russia says tu quoque). Russia-Ukraine war: List of key events, &#8230;</p>
<p>The post <a href="https://losgatosnewsandevents.com/us-sees-excessive-menace-of-russian-cyberattack-cyberwar-and-jus-in-bello-broadcast-hijacking-chinas-cyberespionage-plumbing/">US sees excessive menace of Russian cyberattack. Cyberwar and jus in bello. Broadcast hijacking. China&#8217;s cyberespionage &#8220;plumbing.&#8221;</a> appeared first on <a href="https://losgatosnewsandevents.com">Los Gatos News And Events</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p>
<h2 id="dateline">Dateline</h2>
<p class="inline-text-card">Ukraine at D+104: Cybercrime as a force multiplier.<span class="location"> (The CyberWire) </span><span class="description">Russia and Ukraine treat the Donbas as a decisive theater. Cyber gangs serve as a Russian &#8220;force multiplier.&#8221; And US officials warn that the cyber threat from Russia remains as high as ever (and Russia says tu quoque).</span></p>
<p class="inline-text-card">Russia-Ukraine war: List of key events, day 105<span class="location"> (Al Jazeera) </span><span class="description">As the Russia-Ukraine war enters its 105th day, we take a look at the main developments.</span></p>
<p class="inline-text-card">Ukrainian forces could pull back from embattled eastern city<span class="location"> (AP NEWS) </span><span class="description">Ukrainian forces battling Russian troops in a key eastern city appeared on the cusp of retreat Wednesday, though the regional governor insisted they are still fighting “for every centimeter” of the city.</span></p>
<p class="inline-text-card">In Russia’s Battle for East Ukraine, Both Sides Have Higher Stakes at Play<span class="location"> (Wall Street Journal) </span><span class="description">Moscow aims to prove it can gain and retain territory, while Ukraine wants to show some wary Western allies that it has a chance of prevailing against bigger Russian forces.</span></p>
<p class="inline-text-card">What to know about Severodonetsk, the Ukrainian city Russia wants to capture<span class="location"> (Washington Post) </span><span class="description">The eastern Ukrainian city of Severodonetsk has emerged as a focal point of Russia’s war in Ukraine in recent weeks. Fierce fighting continues to rage there as Ukrainian troops seek to prevent Russia from seizing the entire city.</span></p>
<p class="inline-text-card">Russian MPs vote to quit European Court of Human Rights<span class="location"> (Al Jazeera) </span><span class="description">The move formalised the broken ties between Russia and the Council of Europe, of which the ECHR is a part.</span></p>
<p class="inline-text-card">No Peace at Any Price in Ukraine<span class="location"> (Foreign Affairs) </span><span class="description">It’s too soon for a lasting diplomatic settlement.</span></p>
<p class="inline-text-card">Kyiv asks for more rocket systems as Kremlin warns of potential strikes in Russia<span class="location"> (Washington Post) </span><span class="description">Ukraine says it needs 60 multiple-launch rocket systems to have a chance at defeating Russia, suggesting the number pledged by the West so far may be inadequate, along with access to sophisticated air defenses to help protect vulnerable citizens from relentless shelling.</span></p>
<p class="inline-text-card">Norway donates 22 howitzers to Ukraine<span class="location"> (Reuters) </span><span class="description">Norway donated 22 self-propelled howitzers to Ukraine, including spare parts, ammunition and other gear, the Norwegian defence ministry said on Wednesday.</span></p>
<p class="inline-text-card">Norway donates 22 M109 howitzers to Ukraine<span class="location"> (Ukrinform) </span><span class="description">The Norwegian government has donated 22 M109 155mm tracked self-propelled howitzers to Ukraine to help the country repel Russian attacks. — Ukrinform.</span></p>
<p class="inline-text-card">Russian troops try fake marriage as an escape route from Ukraine<span class="location"> (The Telegraph) </span><span class="description">Kyiv’s intelligence agency releases wiretapped conversation between invading soldiers discussing unsuccessful efforts to avoid front line</span></p>
<p class="inline-text-card">U.S. Lacks a Clear Picture of Ukraine’s War Strategy, Officials Say<span class="location"> (New York Times) </span><span class="description">Intelligence agencies know far more about Russia’s military, even as the United States ships billions of dollars in weapons to the Ukrainians.</span></p>
<p class="inline-text-card">Russian Cyber Threat Remains High, U.S. Officials Say<span class="location"> (Wall Street Journal) </span><span class="description">Senior U.S. cyber officials urged companies to remain on high alert for cyberattacks as a consequence of Russia’s war in Ukraine, saying the warnings are based on intelligence assessments of potential strikes. </span></p>
<p class="inline-text-card">Russian Government, Cybercriminal Cooperation a &#8216;Force Multiplier&#8217;<span class="location"> (Decipher) </span><span class="description">The Russian government’s tolerance and sometime cooperation with the cybercriime groups in the country makes the threat from both factions even more serious, US officials say.</span></p>
<p class="inline-text-card">Opinion  The U.S.-Russia conflict is heating up — in cyberspace<span class="location"> (Washington Post) </span><span class="description">As the war in Ukraine rages, a long-standing battle between Russia and the United States over cyberspace is also heating up, with a top Russian diplomat warning of “catastrophic” consequences if the United States or its allies “provoke” Russia with a cyberattack.</span></p>
<p class="inline-text-card">‘Assume you can be jammed’ — What US troops are learning about electronic warfare in Ukraine<span class="location"> (Task &#038; Purpose) </span><span class="description">&#8220;We are really not prepared for that level of electronic warfare&#8221;</span></p>
<p class="inline-text-card">Russian Cyberattack Hits Wales-Ukraine Football Broadcast<span class="location"> (Gov Info Security) </span><span class="description">The broadcast of the Football World Cup 2022 qualifier game between Wales and Ukraine on Sunday was interrupted in Ukraine by a cyberattack that targeted OLL.TV, a</span></p>
<p class="inline-text-card">Smartphones Blur the Line Between Civilian and Combatant<span class="location"> (Wired) </span><span class="description">In Ukraine, civilians are valiantly assisting the army via apps—and challenging a tenet of international law in the process.</span></p>
<p class="inline-text-card">Denver area tech companies play key roles in Ukraine battle against Russia<span class="location"> (Axios) </span><span class="description">Palantir Technologies&#8217; CEO Alex Karp met with President Volodymyr Zelensky in Ukraine last week, the company said.</span></p>
<p class="inline-text-card">Sanctions Take Toll on Laundering Tools Used by Ransomware Gangs<span class="location"> (Wall Street Journal) </span><span class="description">U.S. sanctions in recent months have hammered a handful of cryptocurrency services used by ransomware groups, suggesting Washington can effectively target some tools hackers use to convert digital ransom payments into cash.</span></p>
<p class="inline-text-card">We are giving Ukraine more military aid than Britain, suggests Germany<span class="location"> (The Telegraph) </span><span class="description">Olaf Scholz claims that Berlin has provided more support than Westminster, adding that only the US has done more</span></p>
<p class="inline-text-card">Merkel defends Ukraine policy, does not regret engaging Russia<span class="location"> (Washington Post) </span><span class="description">The former German chancellor&#8217;s past efforts to broker peace, as well her opposition to Ukraine joining NATO, have come under scrutiny since the war.</span></p>
<p class="inline-text-card">Vladimir Putin has won round the French elite, not just Macron<span class="location"> (The Telegraph) </span><span class="description">The President’s appeasement of Russia is alarmingly representative of establishment opinion</span></p>
<p class="inline-text-card">Sweden’s NATO Bid Gets Tangled Up in a Domestic Political Dispute<span class="location"> (New York Times) </span><span class="description">A move by right-wing lawmakers to remove Sweden’s justice minister has been dragged into a battle over the country’s efforts to join the military alliance.</span></p>
<p class="inline-text-card">Sweden’s NATO Bid Is in Trouble<span class="location"> (Defense One) </span><span class="description">Domestic politics have elevated a Kurdish parliamentarian, and that worsens Stockholm’s Turkey woes.</span></p>
<p class="inline-text-card">NATO Is Out of Shape and Out of Date<span class="location"> (Foreign Policy) </span><span class="description">With the bloc’s unity over Ukraine showing cracks, NATO needs an overhaul.</span></p>
<p class="inline-text-card">The U.K.’s Bold Bosnia Policy Slaps Down Russian-Backed Separatists<span class="location"> (Foreign Policy) </span><span class="description">Sarajevo’s hopes of NATO accession are growing as London steps in.</span></p>
<p class="inline-text-card">What happens in Ukraine doesn’t stay in Ukraine: Austin adds clarity on Taiwan<span class="location"> (The Hill) </span><span class="description">In recent weeks, Defense Secretary Lloyd Austin has made some important policy statements — on the continuing war in Ukraine, on the threatening conflict over Taiwan, and on the possible linkage be…</span></p>
<p class="inline-text-card">Vladimir Putin paints rosy picture of Russia&#8217;s crumbling economy<span class="location"> (Newsweek) </span><span class="description">The Russian president told ministers that unemployment was low and inflation had stabilized.</span></p>
<p class="inline-text-card">Russia-Ukraine latest news: Russia &#8216;steals 600,000 tonnes of grain&#8217; from occupied Ukraine <span class="location"> (The Telegraph) </span><span class="description">Russia has stolen around 600,000 tonnes of grain from occupied Ukrainian territory and exported some of it, the deputy head of Ukraine&rsquo;s agricultural producers&rsquo; union said on Wednesday.</span></p>
<p class="inline-text-card">Belgian security experts alerts against use of Russian software Kaspersky<span class="location"> (Publicist 24) </span><span class="description">Security experts have alerted against Belgium&#8217;s continuous use of Russia-developed antivirus software Kaspersky, over fears that the software may contain vulnerabilities that may be exploited by the Russian Government.</span></p>
<p class="inline-text-card">IBM begins laying off its entire Russian workforce<span class="location"> (Engadget) </span><span class="description">The company suspended operations back in March but kept employees on the payroll..</span></p>
<p class="inline-text-card">Russia’s War Is the End of Climate Policy as We Know It<span class="location"> (Foreign Policy) </span><span class="description">Ironically, geopolitical strife and energy scarcity will do more for the climate than decades of ardent policies.</span></p>
<h2 id="threats">Attacks, Threats, and Vulnerabilities</h2>
<p class="inline-text-card">People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices<span class="location"> (CISA) </span><span class="description">Best Practices • Apply patches as soon as possible • Disable unnecessary ports and protocols • Replace end-of-life infrastructure • Implement a centralized patch management system</span></p>
<p class="inline-text-card">US agencies detail the digital ‘plumbing’ used by Chinese state-sponsored hackers<span class="location"> (The Record by Recorded Future) </span><span class="description">U.S. agencies on Tuesday offered new details about how Chinese state-sponsored hackers have used publicly known vulnerabilities to target internet service providers and major telecommunications firms around the globe over the last two years.</span></p>
<p class="inline-text-card">Australian Chinese News Site Hit by Cyber Attack, Media Reports<span class="location"> (Bloomberg) </span><span class="description">One of Australia’s largest Chinese-language media platforms came under cyber attack early in the hours of June 4, potentially putting users’ information at risk, The Australian newspaper reported Wednesday.</span></p>
<p class="inline-text-card">Jersey computers used in international cyber-attacks<span class="location"> (Jersey Evening Post) </span><span class="description">HIJACKED computers in Jersey were recently used to launch cyber-attacks against organisations in other countries – amid a daily rise in digital crime that could ‘happen to anybody’.Matt Palmer, of the government’s Cyber Emergency Response Tea&#8230;</span></p>
<p class="inline-text-card">Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices<span class="location"> (Dark Reading) </span><span class="description">The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.</span></p>
<p class="inline-text-card">Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions<span class="location"> (The Hacker News) </span><span class="description">Cybercrime group Evil Corp shifts to LockBit Ransomware in an attempt to get around sanctions imposed by the U.S. Treasury in December 2019.</span></p>
<p class="inline-text-card">LockBit claims Mandiant hack in apparent bid to distance itself from Evil Corp<span class="location"> (Tech Monitor) </span><span class="description">LockBit is apparently keen to play down associations with the notorious cybercriminals Evil Corp after a Mandiant report linked the groups.</span></p>
<p class="inline-text-card">Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices<span class="location"> (Dark Reading) </span><span class="description">The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.</span></p>
<p class="inline-text-card">Linux version of Black Basta ransomware targets VMware ESXi servers<span class="location"> (BleepingComputer) </span><span class="description">Black Basta is the latest ransomware gang to add support for encrypting VMware ESXi virtual machines running on enterprise Linux servers.</span></p>
<p class="inline-text-card">It Takes 2 Seconds of Silence to Skim a Credit Card<span class="location"> (Sucuri Blog) </span><span class="description">This seemingly benign audio snippet conceals malicious JavaScript which creates a fake payment form, harvests sensitive credit card information, and encrypts it to circumnavigate network monitoring. </span></p>
<p class="inline-text-card">Notice of Data Security Incident &#8211; Shields Health Care Group<span class="location"> (Shields Health Care Group) </span><span class="description">Shields Health Care Group, Inc. (“Shields”) recently became aware of suspicious activity on its network.  Shields provides management and imaging services on behalf of the health care facilities (“Facility Partners”) listed below.  With the assistance of third-party forensic specialists, we took immediate steps to contain the incident and to investigate the nature and scope of … Continued</span></p>
<p class="inline-text-card">Personal data of 2 million leaked in cyberattack on Massachusetts healthcare group<span class="location"> (The Record by Recorded Future) </span><span class="description">The sensitive information of two million people was accessed during a cyberattack on Shields Health Care Group in Massachusetts. </span></p>
<p class="inline-text-card">Prothena Corporation, PLC Confirms Recent Data Breach Following Compromised Employee Email Account<span class="location"> (JD Supra) </span><span class="description">Recently, Prothena Corporation, PLC confirmed that certain sensitive consumer information was exposed after an unauthorized party gained access to an&#8230;</span></p>
<p class="inline-text-card">Palermo Municipality Cyberattack Still Affecting Citizens<span class="location"> (Gov Info Security) </span><span class="description">A cyberattack on the municipality of Palermo, which began on Thursday, reportedly continues to cripple the southern Italian city on Monday. The attack caused the</span></p>
<h2 id="patches">Security Patches, Mitigations, and Software Updates</h2>
<p class="inline-text-card">Apple Announces New Security Update Feature in iOS 16, macOS Ventura<span class="location"> (SecurityWeek) </span><span class="description">iOS 16 and macOS Ventura will get security updates faster via a new feature called Rapid Security Response.</span></p>
<p class="inline-text-card">Safari update brings new collaboration and security features in iOS 16<span class="location"> (9to5Mac) </span><span class="description">Safari is receiving a fresh update with iOS 16 this fall, as announced during WWDC 2022‘s opening keynote. The refresh also comes to devices compatible with iPadOS 16 and macOS Ventura at the same time. There are lots of new features and updates coming to Apple devices this year. Let’s take a deep dive on […]</span></p>
<p class="inline-text-card">Microsoft Suggests Work-Around For &#8216;Serious&#8217; Follina Zero-Day<span class="location"> (Security Boulevard) </span><span class="description">While malicious email attachments are nothing new, there’s reason to be particularly cautious when it comes to the new zero-day vulnerability, dubbed</span></p>
<p class="inline-text-card">Technical Details Released for Recently Patched Zyxel Firewall Vulnerabilities<span class="location"> (SecurityWeek) </span><span class="description">Security researchers with HN Security have published technical details on two vulnerabilities affecting many Zyxel products.</span></p>
<p class="inline-text-card">Owl Labs Releases Security Updates for Meeting Owl Pro and Whiteboard Owl<span class="location"> (CISA) </span><span class="description">Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro and Whiteboard Owl. An attacker could exploit this vulnerability to obtain sensitive information.  CISA encourages users and administrators to review the Owl Labs security advisories for Meeting Owl Pro and Whiteboard Owl and update to Version 5.4.1.4. </span></p>
<p class="inline-text-card">Mitsubishi Electric MELSEC and MELIPC Series (Update B)<span class="location"> (CISA) </span><span class="description">1. EXECUTIVE SUMMARY<br />
CVSS v3 7.5<br />
ATTENTION: Exploitable remotely/low attack complexity<br />
Vendor: Mitsubishi Electric<br />
Equipment: MELSEC and MELIPC Series<br />
Vulnerabilities: Uncontrolled Resource Consumption, Improper Handling of Length Parameter Inconsistency, Improper Input Validation</span></p>
<p class="inline-text-card">New ‘DogWalk’ Windows zero-day bug gets free unofficial patches<span class="location"> (BleepingComputer) </span><span class="description">Free unofficial patches for a new Windows zero-day vulnerability in the Microsoft Support Diagnostic Tool (MSDT) have been released today through the 0patch platform. </span></p>
<h2 id="trends">Trends</h2>
<p class="inline-text-card">Hacking Scenarios: How Hackers Choose Their Victims<span class="location"> (The Hacker News) </span><span class="description">Enforcing the &#8220;double-extortion&#8221; technique aka pay-now-or-get-breached emerged as a head-turner last year. </span></p>
<p class="inline-text-card">The Godfathers of Cybercrime: The 2022 Verizon Report<span class="location"> (Above the Law) </span><span class="description">Lawyers are still clicking where they shouldn’t.</span></p>
<p class="inline-text-card">Cyber-Attack Surface “Spiralling Out of Control”<span class="location"> (Infosecurity Magazine) </span><span class="description">Infosec pros still struggling to define and manage cyber-risk</span></p>
<p class="inline-text-card">The challenge of managing cyber risk: A Trend Micro Research Paper<br />
<span class="location"> (Trend Micro) </span><span class="description">Digital transformation during the pandemic pushed many organisations over a technology &#8216;tipping point&#8217; from which they will never return. In short, the future of business is digital.</span></p>
<p class="inline-text-card">Smishing and Vishing Attempts Surged in 2021<span class="location"> (Infosecurity Magazine) </span><span class="description">Proofpoint records 100,000 phone-based attacks each day</span></p>
<p class="inline-text-card">Cyber-attacks ‘could become fully automated’<span class="location"> (Law Society Gazette) </span><span class="description">More opportunities for criminals, SRA outlook warns</span></p>
<p class="inline-text-card">Healthcare has 650% increase in ransomware attacks &#8211; report<span class="location"> (SecurityBrief New Zealand) </span><span class="description">Zscaler&#8217;s annual ThreatLabz Ransomware Report reveals the healthcare and restaurant and food service industries had the biggest jumps in ransomware attacks.</span></p>
<p class="inline-text-card">RSA Conference 2022 &#8211; Announcements Summary (Day 1)<span class="location"> (SecurityWeek) </span><span class="description">SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022.</span></p>
<h2 id="marketplace">Marketplace</h2>
<p class="inline-text-card">Cyber Innovation Fellows Initiative<span class="location"> (CISA) </span><span class="description">CISA launched the CISA Cyber Innovation Fellows initiative bring private sector experts into the agency on a short term, part-time basis to lend their expertise to specific areas of CISA’s mission space.</span></p>
<p class="inline-text-card">Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response<span class="location"> (Forescout) </span><span class="description">Acquisition will leverage Forescout’s automated cybersecurity with Cysiv’s cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response SAN JOSE, Calif., June 6, 2022 – Forescout Technologies, Inc., the global leader in automated cybersecurity, today announced that it has signed a definitive agreement to acquire Cysiv, a cybersecurity innovator that uses its cloud […]</span></p>
<p class="inline-text-card">Cyren Announces Divestment to Enable Focus on Strategic Growth Opportunities<span class="location"> (Yahoo) </span><span class="description">Cyren (NASDAQ:CYRN), a provider of inbox security and threat intelligence solutions, today announced that it has entered into a definitive agreement to divest its legacy Secure Email Gateway business to Content Services Group GmbH for €10,000,000 in cash. The purchase price is subject to certain adjustments and the transaction is expected to close prior to August 31, 2022, with customary closing conditions.</span></p>
<p class="inline-text-card">Cyren stock surges aftermarket on €10M sale of secure email gateway unit<span class="location"> (SeekingAlpha) </span><span class="description">Cyren (CYRN) said Tuesday it will divest its legacy secure email gateway business to Content Services Group for €10M in cash.CYRN will use the proceeds to expand go-to-market&#8230;</span></p>
<p class="inline-text-card">IBM bolsters cyber security offerings with Randori acquisition<span class="location"> (IT PRO) </span><span class="description">It plans to use the company’s attack surface management and offensive security offerings to strengthen its cloud and AI capabilities</span></p>
<p class="inline-text-card">Airbus boosts cybersecurity protection with new organisation<span class="location"> (Corporate Jet Investor) </span><span class="description">CJI Summary *Airbus is boosting its cybersecurity protection to reflect the rapid rise in cyber threats and the growing digitisation and connectivity of its products and systems. *The OEM is investing in measures to strengthen its cybersecurity capabilities and expertise, to ensure “the best possible protection for the company, its ecosystem, and its customers”. *Airbus … Continue reading &#8220;Airbus boosts cybersecurity protection with new organisation&#8221;</span></p>
<p class="inline-text-card">Operational Technology Cybersecurity Coalition Adds Four New Members <span class="location"> (OT Cyber Coalition) </span><span class="description">Washington, DC – Today, the Operational Technology Cybersecurity Coalition (OT Cyber Coalition) announced that four new members – ABS Group, Network Perception, Waterfall Security Solutions, and 1898 &#038; Co. – will be joining the Coalition in its first membership expansion since launching in April. “The addition of these companies to the Coalition shows the ever-increasing importance of securing operational technology and the need for organizations to contribute meaningful solutions and capabiliti</span></p>
<p class="inline-text-card">Laminar Joins the Cloud Security Alliance<span class="location"> (Laminar) </span><span class="description">Laminar Brings Its Expertise Securing Data Across Multi-Cloud Environments to the Alliance</span></p>
<p class="inline-text-card">Synack launches paid mentorship program to boost skills, increase diversity in cybersecurity<span class="location"> (PR Newswire) </span><span class="description">Synack, the premier on-demand security platform for continuous penetration testing and vulnerability management, today is launching an&#8230;</span></p>
<p class="inline-text-card">American Cybersecurity Company Red Trident Opens A New Office At The HSD Campus In The Hague<span class="location"> (Invest in Rotterdam &#8211; The Hague area) </span><span class="description">During the RSA Conference taking place from 6-9 June 2022 in San Francisco, American OT cybersecurity company Red Trident announced the opening of its new</span></p>
<p class="inline-text-card">Bridgehead IT Announces Relocation and Expansion of San Antonio-Based Corporate Headquarters<span class="location"> (Newswire) </span><span class="description">Bridgehead IT Inc., a privately held San Antonio-based information technology firm specializing in custom technology solutions for businesses, mo &#8230;</span></p>
<p class="inline-text-card">Governor Hochul Announces 24th Annual Cybersecurity Conference at Empire State Plaza In Albany<span class="location"> (Governor Kathy Hochul) </span><span class="description">Governor Hochul announced that the 24th annual Cybersecurity Conference, New York&#8217;s premier cybersecurity event, begins today, June 7, at the Empire State Plaza in Albany. </span></p>
<p class="inline-text-card">Fortinet establishes a Public Sector Advisory Council on cybersecurity leadership.<span class="location"> (Fortinet) </span><span class="description">As a trusted partner to the public sector and private industry, Fortinet establishes the Public Sector Advisory Council (PSAC).Advisory Council. The council members will contribute strategic counsel and leadership on some of the world’s most critical cybersecurity challenges.</span></p>
<p class="inline-text-card">Illumio Appoints Gary Barlet as Federal Field Chief Technology Officer<span class="location"> (GlobeNewswire News Room) </span><span class="description">Former Federal Chief Information Officer and Air Force Cyber Operations Officer to Help Government Agencies Innovate with Zero Trust Segmentation to Stop&#8230;</span></p>
<h2 id="products">Products, Services, and Solutions</h2>
<p class="inline-text-card">Open Systems Recognized as a Microsoft Security Excellence Awards Winner for Security MSSP of The Year<span class="location"> (Business Wire) </span><span class="description">Open Systems, the only cybersecurity services provider with Mission Control, today announced it has won the Security MSSP of the Year award at the Microsoft Security Excellence Awards 2022.</span></p>
<p class="inline-text-card">SecZetta Featured in Aite-Novarica Group Inaugural Risk Insights and Advisory Fintech Spotlight<span class="location"> (Business Wire) </span><span class="description">SecZetta, the leading provider of third-party identity risk solutions, is pleased to share it is featured in a new financial services technology spotlight report by the Aite-Novarica Group, an advisory firm providing mission-critical insights on technology, regulations, markets, and operations to banks, payments providers, insurers, and securities firms.</span></p>
<p class="inline-text-card">Grand Globee® Award Winners Announced in 2022 Information Technology World Awards®<span class="location"> (StreetInsider.com) </span><span class="description">The Globee Awards have announced the winners of Grand Globee Awards in the 17th Annual 2022 Information Technology World Awards, recognized as the world&#8217;s top honors for achievements in the information&#8230;</span></p>
<p class="inline-text-card">Talon Cyber Security Named &#8220;Most Innovative Startup&#8221; at RSA Conference Innovation Sandbox Contest 2022<span class="location"> (Yahoo) </span><span class="description">RSA Conference, the world&#8217;s leading information security conferences and expositions, today announced that Talon Cyber Security has won the annual RSAC Innovation Sandbox Contest. Named the &#8220;Most Innovative Startup,&#8221; Talon was selected by a panel of esteemed judges for creating a secure enterprise browser, which empowers organizations to simplify their security programs while providing a secure and improved hybrid work experience.</span></p>
<p class="inline-text-card">Nubeva Announces Decryption Success In Two Ransomware Attacks<span class="location"> (El Paso Inc.) </span><span class="description">Nubeva Technologies(TSX-V: NBVA, OTC: NBVAF) announces success in two live ransomware attacks by Conti and a new version of REvil .</span></p>
<p class="inline-text-card">NetWitness Launches Comprehensive XDR Offerings for Next Generation Security<span class="location"> (Business Wire) </span><span class="description">NetWitness, a globally trusted provider of cybersecurity technologies and incident response, today announced NetWitness XDR, a family of products and </span></p>
<p class="inline-text-card">Secret Server Enhances Disaster Recovery and More<span class="location"> (Delinea) </span><span class="description">Delinea continues to invest in innovation to empower security for its customers with enhancements to Secret Server privileged access management solution.</span></p>
<p class="inline-text-card">Checkmarx Unveils Context-aware Checkmarx Fusion with Industry&#8217;s First Holistic View and Cross-component Prioritization of Application Vulnerabilities<span class="location"> (PR Newswire) </span><span class="description">Developers and application security (AppSec) teams today have long needed a single, integrated view into the interaction, functions and&#8230;</span></p>
<p class="inline-text-card">ConnectWise Shares Business Strategies to Bolster Security at IT Nation Secure<span class="location"> (Industry Analysts, Inc.) </span><span class="description">Company also details new cybersecurity product integrations and updates   ORLANDO, Fla. (June 7, 2022) – ConnectWise, the world’s leading software company dedicated to the success of IT solution providers, shared a slew of information in its</span></p>
<p class="inline-text-card">Onapsis Continues Product Innovation, Offering Customers Enhanced and Add-on Capabilities to Strengthen Business Application Security<span class="location"> (Business Wire) </span><span class="description">Onapsis today announced enhanced information security solutions for its Assess and Defend products.</span></p>
<p class="inline-text-card">German Commission for the Protection of Minors in the Media Approves Incode Technologies as an Age Verification System (AVS)<span class="location"> (Business Wire) </span><span class="description">German Commission for the Protection of Minors in the Media  Approves Incode Technologies as an Age Verification System (AVS)</span></p>
<p class="inline-text-card">New Version of Netwrix Auditor Simplifies Access Reviews and Locks Down Data in Microsoft Teams<span class="location"> (Netwrix) </span><span class="description">Netwrix Auditor 10.5 streamlines regular access attestation, mitigates the risk of data leakage via Microsoft Teams, and secures data in Qumulo and Synology.</span></p>
<p class="inline-text-card">Sumo Logic Introduces Threat Labs Unit for Advanced Detection and Expanded Security Community Contribution<span class="location"> (GlobeNewswire News Room) </span><span class="description">Establishes Sumo Logic Threat Labs Unit to deliver accelerated detection for modern threats at cloud scale&#8230;</span></p>
<p class="inline-text-card">Mandiant Announces New Cyber Alliance Program<span class="location"> (Business Wire) </span><span class="description">Vendor-independent technology partner program delivers a customer-first and mission centric approach to cyber security partnership strategy</span></p>
<p class="inline-text-card">SimSpace platform enhancements help security teams validate their incident response operations<span class="location"> (Help Net Security) </span><span class="description">SimSpace unveiled new updates to its cyber range, delivering an open platform for cybersecurity training and optimization.</span></p>
<p class="inline-text-card">UL Launches New SafeCyber<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Solution and Platform Features to Address Mounting Security Threats<span class="location"> (PR Newswire) </span><span class="description">UL, a global safety science leader, today announced the latest enhancements to its product security and compliance life cycle management&#8230;</span></p>
<p class="inline-text-card">Verteks Consulting Achieves Platinum Partner Status in WatchGuard Technologies&#8217; WatchGuardONE Partner Program<span class="location"> (Newswire) </span><span class="description">Leading MSP recognized by cybersecurity vendor for their continued commitment to the growth of the WatchGuard brand</span></p>
<p class="inline-text-card">AI-Driven ImmuniWeb Neuron Brings Intelligent Automation to Web Security Scanning Market<span class="location"> (ImmuniWeb) </span><span class="description">ImmuniWeb® Neuron to be the first AI-automated solution for web and API security scanning with a contractual zero false positives SLA for on-premise or cloud-native apps.</span></p>
<p class="inline-text-card">Offensive Security Announces “OffSec Live: PEN-200” – Interactive, Instructor-led, Streaming Preparation for the OSCP<span class="location"> (Business Wire) </span><span class="description">Free Streaming Series Provides Security Professionals Enhanced Learning and Preparedness for the OSCP Certification Exam</span></p>
<p class="inline-text-card">OffSec Live<span class="location"> (Offensive Security) </span><span class="description">We’ve spent the last few years optimizing and improving our traditional model. The results of this work have been coming out periodically, giving our students items like exclusive access to multi-system attack chains, the introduction of Topic Exercises, the OffSec Training Library, and so on. And, more refinement is coming over the year.</span></p>
<p class="inline-text-card">Hexnode Integrates with Keeper Security to Help Businesses Strengthen Their First Line of Defense<span class="location"> (Quality Digest) </span><span class="description">Partnership bolsters defense against growing cybersecurity risks</span></p>
<p class="inline-text-card">New Collaboration Between Kovrr and Microsoft Enables Clients to Transform Their Internal Cyber Security Data Into Financially Quantified Cyber Risk Management Decisions<span class="location"> (Business Wre) </span><span class="description">The offering is a product of Kovrr being selected by “Microsoft for Startups” for its Financial Cyber Risk Quantification Solution</span></p>
<p class="inline-text-card">Juniper Networks and Dragos Announce Official Joint Partnership to Secure Critical Infrastructure<span class="location"> (Business Wire) </span><span class="description">IT and OT networks can realize a converged industrial network through the integration of Juniper Security Director Cloud and the Dragos Platform</span></p>
<p class="inline-text-card">Akamai Launches New Malware Protection for Uploaded Files<span class="location"> (Dark Reading) </span><span class="description">Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.</span></p>
<p class="inline-text-card">Snowflake Launches New Cybersecurity Workload to Detect and Respond to Threats with the Data Cloud<span class="location"> (Snowflake) </span><span class="description">Snowflake’s new Cybersecurity workload provides a unified, secure, and scalable data platform for helping security teams eliminate blind spots and respond</span></p>
<p class="inline-text-card">Advantech and Actility launch an Edge Solution-Ready Package to deploy Enterprise IoT LoRaWAN Networks<span class="location"> (Actility) </span><span class="description">Advantech and Actility launch a solution allowing to deploy and manage private LoRaWAN® networks on customer premises</span></p>
<p class="inline-text-card">Exabeam Partners with Google Cloud to Create Hyperscale Cloud-native SIEM and Cybersecurity Analytics Offerings<span class="location"> (Exabeam) </span><span class="description">Cybersecurity innovator invests further in leading cloud data provider to make security operations teams more efficient.</span></p>
<p class="inline-text-card">Mandiant Opens Managed Defense Beta Program to CrowdStrike and SentinelOne Customers<span class="location"> (Mandiant) </span><span class="description">As part of this customer-first initiative, participants will have access to advanced managed detection and response capabilities, while informing future service innovation</span></p>
<h2 id="technologies">Technologies, Techniques, and Standards</h2>
<p class="inline-text-card">CISA Provides Criteria and Process for Updates to the KEV Catalog<span class="location"> (CISA) </span><span class="description">CISA has updated the Known Exploited Vulnerabilities (KEV) catalog webpage as well as the FAQs for Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities, which established the KEV catalog. The updates provide information on the criteria and process used to add known exploited vulnerabilities to the KEV catalog. CISA encourages users and administrators to review the new information.</span></p>
<p class="inline-text-card">Reducing the Significant Risk of Known Exploited Vulnerabilities<span class="location"> (CISA) </span><span class="description">CISA issued Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities to evolve our approach to vulnerability management and keep pace with threat activity. The directive establishes a CISA managed catalog of known exploited vulnerabilities and requires federal civilian agencies to identify and remediate these vulnerabilities on their information systems.</span></p>
<p class="inline-text-card">New Dragos OT-CERT Provides Free Industrial Cybersecurity Resources<span class="location"> (SecurityWeek) </span><span class="description">Dragos has launched OT-CERT, a new initiative to provide free industrial cybersecurity resources.</span></p>
<p class="inline-text-card">Virtru launches open-source project OpenTDF<span class="location"> (CSO Online) </span><span class="description">The company hopes OpenTDF will establish a standard for safe, private data sharing.</span></p>
<p class="inline-text-card">Palo Alto Networks calls on cybersecurity industry to adopt ZTNA 2.0:  Zero trust with zero exceptions<span class="location"> (Manila Standard) </span><span class="description">Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access</span></p>
<p class="inline-text-card">Microsoft flags common pitfalls for cyber insurance<span class="location"> (SearchSecurity) </span><span class="description">Microsoft executive Cynthia James spoke at RSA Conference 2022 on issues in the cyber insurance market and how best to navigate them.</span></p>
<p class="inline-text-card">Why HR plays an important role in preventing cyber attacks<span class="location"> (SearchHRSoftware) </span><span class="description">HR&#8217;s employee information is some of the company&#8217;s most important data. Learn why HR has an important role to play in preventing cyber attacks.</span></p>
<p class="inline-text-card">Phishing Made Easy(ish)<span class="location"> (Black Hills Information Security) </span><span class="description">Hannah Cartier // Social engineering, especially phishing, is becoming increasingly prevalent in red team engagements as well as real-world attacks. As security awareness improves and systems become more locked down, it is unsurprising that the human element of security is becoming a more appealing attack vector. In addition, phishing campaigns can be used to test […]</span></p>
<h2 id="design">Design and Innovation</h2>
<p class="inline-text-card">A Long-Awaited Defense Against Data Leaks May Have Just Arrived<span class="location"> (Wired) </span><span class="description">MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.</span></p>
<p class="inline-text-card">Palo Alto Networks Founder: Machines Should Run SOCs, Not Humans<span class="location"> (SDxCentral) </span><span class="description">Palo Alto Networks founder Nir Zuk expects more vendors will follow the vendor’s lead to offer an autonomous security operation center.</span></p>
<h2 id="research">Research and Development</h2>
<p class="inline-text-card">If you thought encryption was complicated now, wait ’til quantum computing | Federal News Network<span class="location"> (Federal News Network) </span><span class="description">The big fear in the data encryption community is the advent of quantum computing, i.e. computers are so powerful they can crack any algorithm.</span></p>
<h2 id="academia">Academia</h2>
<p class="inline-text-card">Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap<span class="location"> (PR Newswire) </span><span class="description">NightDragon, an investment and advisory firm focused on the cybersecurity, safety, security, and privacy industries, and NextGen Cyber Talent,&#8230;</span></p>
<p class="inline-text-card">Southern University partners with Filtari to help students &#8216;clean up&#8217; social media before applying for jobs<span class="location"> (PR Newswire) </span><span class="description">The Office of Career Services at Southern University and A&#038;M College recently partnered with social media screening service, Filtari, to assist&#8230;</span></p>
<h2 id="legislation">Legislation, Policy, and Regulation</h2>
<p class="inline-text-card">USB-C will be mandatory for phones sold in the EU ‘by autumn 2024’<span class="location"> (The Verge) </span><span class="description">Along with tablets, cameras, and more.</span></p>
<p class="inline-text-card">Eye to eye in AI: Developing artificial intelligence for national security and defense<span class="location"> (Atlantic Council) </span><span class="description">As artificial intelligence transforms national security and defense, it is imperative for the Department of Defense, Congress, and the private sector to closely collaborate in order to advance major AI development priorities. However, key barriers remain. As China and Russia develop their own capabilities, the stakes of the military AI competition are high, and time is short.</span></p>
<p class="inline-text-card">Senators Propose Industry-Friendly Cryptocurrency Bill<span class="location"> (Wall Street Journal) </span><span class="description">The regulatory framework would spare much of the crypto market from Securities and Exchange Commission oversight and create favorable tax treatment. </span></p>
<p class="inline-text-card">Crypto industry scores a big win under long-anticipated Senate bill<span class="location"> (Washington Post) </span><span class="description">The proposal would hand crypto oversight to the CFTC, which the sector views as friendlier than the SEC</span></p>
<p class="inline-text-card">Senate Crypto Bill Eyes Bigger Role For CFTC<span class="location"> (Law360) </span><span class="description">U.S. Senate legislation introduced Tuesday would assign most oversight of cryptocurrencies to the U.S. Commodity Futures Trading Commission, a smaller regulator that can be seen as friendly toward digital assets, although lawyers said the proposal would not end jurisdictional disputes among federal agencies.</span></p>
<p class="inline-text-card">Witnesses Stress Need for Harmonization, Standardization in Cyber Incident Reporting Requirements<span class="location"> (MeriTalk) </span><span class="description">As the Federal government works through the rulemaking process for the recently signed Incident Reporting legislation that originated in the Senate Homeland Security and Governmental Affairs Committee, witnesses for that same committee today stressed the need for unity among both reporting avenues and standardization of data to help operationalize the data.</span></p>
<p class="inline-text-card">Google Issues Warning About Security Risks Of Big Tech Bill<span class="location"> (Law360) </span><span class="description">Google on Tuesday continued to criticize proposed legislation aimed at reining in the power of large technology platforms by preventing them from giving their own services an unfair advantage, contending that the bill would undermine the company&#8217;s ability to keep people safe.</span></p>
<p class="inline-text-card">CISA chief: Cyber defense program building trust between government, industry<span class="location"> (The Record by Recorded Future) </span><span class="description">A months-old initiative by the Cybersecurity and Infrastructure Security Agency to revamp how the federal government works with the private sector to address digital threats has begun to foster a new level of faith between the two sides, the agency’s chief said Tuesday.</span></p>
<p class="inline-text-card">Private Sector Stakeholders release Joint Statement Calling for Increased Public Private Collaboration<span class="location"> (StreetInsider.com) </span><span class="description">A group of leading private sector organizations and cyber advocacy groups; Business Executives for National Security; the Coalition for&#8230;</span></p>
<p class="inline-text-card">Work Remains in Fight Against Ransomware <span class="location"> (Wall Street Journal) </span><span class="description">The authors of an influential report on ransomware said the government response one year on in implementing its recommendations has been admirable, but more should be done in key areas. </span></p>
<p class="inline-text-card">U.S. National Guard’s Cyber Training Emphasizes Social Media, Supply Chain Protection<span class="location"> (Nextgov.com) </span><span class="description">Ahead of the annual Cyber Shield exercise, military leaders will train National Guard and other military members to fight disinformation and protect critical infrastructure.</span></p>
<p class="inline-text-card">Pennsylvania lawmakers consider requiring government data breach notifications<span class="location"> (ABC27) </span><span class="description">Pennsylvania Senator Kristin Phillips, who chairs the technology committee, held a hearing on June 7 about a proposal to require prompt disclosure whenever there is a data breach wit…</span></p>
<p class="inline-text-card">New N.Y. Law Aimed at Getting Social Media Platforms to Restrict &#8220;Hateful&#8221; Speech<span class="location"> (Reason.com) </span><span class="description">Its operative provisions just require social media platforms to create a mechanism for taking complaints about such &#8220;hateful&#8221; speech; but the title is &#8220;hateful conduct prohibited,&#8221; and it&#8217;s clear the legislature is trying to get social media platforms to restrict such speech more.</span></p>
<h2 id="litigation">Litigation, Investigation, and Law Enforcement</h2>
<p class="inline-text-card">DOJ, FBI shut down marketplace for stolen Social Security numbers<span class="location"> (The Record by Recorded Future) </span><span class="description">US law enforcement agencies seized and shut down a popular marketplace where cybercriminals buy stolen social security numbers and other personal information.</span></p>
<p class="inline-text-card">SSNDOB Marketplace, A Series Of Websites That Listed More Than 20 Million Social Security Numbers For Sale, Seized And Dismantled In International Operation<span class="location"> (US Department of Justice) </span><span class="description">United States Attorney Roger B. Handberg, along with Special Agent in Charge Darrell Waldon for the IRS &#8211; Criminal Investigation Washington D.C. Field Office, and Special Agent in Charge David Walker for the FBI &#8211; Tampa Division, today announced the seizure of the SSNDOB Marketplace, a series of websites that operated for years and were used to sell personal information, including the names, dates of birth, and Social Security numbers belonging to individuals in the United States. The SSNDOB Marketplace has listed the personal information for approximately 24 million individuals in the United States, generating more than $19 million USD in sales revenue.</span></p>
<p class="inline-text-card">EXCLUSIVE: U.S. Government Ordered Travel Companies To Spy On Russian Hacker For Years And Report His Whereabouts Every Week<span class="location"> (Forbes) </span><span class="description">Critics say the government isn’t doing enough to inform the public about such secretive surveillance.</span></p>
<p class="inline-text-card">Digital fingerprints of a million child abuse images made<span class="location"> (BBC News) </span><span class="description">A new system for classifying images will help stop them being shared online, a UK charity says.</span></p>
<p class="inline-text-card">Spanish Judge to Seek Testimony From NSO on Pegasus Spyware<span class="location"> (SecurityWeek) </span><span class="description">Spanish judge José Luis Calama will travel to Israel to take testimony from Shalev Hulio, CEO of the Tel Aviv-based NSO Group, maker of the controversial Pegasus spyware</span></p>
<p class="inline-text-card">&#8216;Culture of corruption&#8217;: Former DWP cybersecurity chief gets 4 years in prison <span class="location"> (Los Angeles Times) </span><span class="description">David Alexander, a former executive overseeing cybersecurity at the DWP, was sentenced for his role in a sprawling corruption scheme.</span></p>
<p class="inline-text-card">DC Judge Blesses $63M Deal Over 2015 OPM Hack<span class="location"> (Law360) </span><span class="description">A D.C. federal judge gave an early blessing on Tuesday to a $63 million settlement that would allow government workers affected by the 2015 cyberattack on the U.S. Office of Personnel Management to recoup up to $10,000 apiece.</span></p>
<p class="inline-text-card">Fed. Circ. Wary Of Atty&#8217;s &#8216;Buzzwords&#8217; In Location IP Suit<span class="location"> (Law360) </span><span class="description">A Federal Circuit judge did not seem compelled by inventor Sholem Weisner&#8217;s bid to revive his location-tracking patent infringement suit against Google, saying the four patents-at-issue are invalid under Alice and that Wesiner&#8217;s counsel is using &#8220;buzzwords&#8221; from judicial precedent without providing any specificity.</span></p>
<p>The post <a href="https://losgatosnewsandevents.com/us-sees-excessive-menace-of-russian-cyberattack-cyberwar-and-jus-in-bello-broadcast-hijacking-chinas-cyberespionage-plumbing/">US sees excessive menace of Russian cyberattack. Cyberwar and jus in bello. Broadcast hijacking. China&#8217;s cyberespionage &#8220;plumbing.&#8221;</a> appeared first on <a href="https://losgatosnewsandevents.com">Los Gatos News And Events</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://losgatosnewsandevents.com/us-sees-excessive-menace-of-russian-cyberattack-cyberwar-and-jus-in-bello-broadcast-hijacking-chinas-cyberespionage-plumbing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://thecyberwire.com/images/social-media/2022/06/cw-briefing-060822.jpg" medium="image"></media:content>
            	</item>
	</channel>
</rss>
