Hacked files obtained from the Shanghai Police reveal some of the workings of China’s surveillance apparatus, ABC reports. (Among other things, the database obtained includes personal details on some one-hundred-sixty-one citizens of Australia.)
Google’s Threat Analysis Group yesterday published an update on a North Korean campaign that’s targeting security researchers. The researchers observed the campaign’s beginning back in January, but within the last two weeks have seen it evolve. On March 17th the campaign established fake accounts for fictitious personae represented as working for an equally bogus company, “SecuriElite.”
The US Department of Homeland Security has announced a series of sixty-day security sprints, the Record reports. The announcement was made in conjunction with the Secretary’s enunciation of a cybersecurity strategy that places a high priority on protecting critical infrastructure and defending against ransomware. The sprints anticipate a forthcoming Executive Order that will, according to Bloomberg, mandate breach disclosure and software standards for Federal contractors and a variety of security enhancements for Government systems.
KSNT News reports that a Kansas man has been charged in connection with an attempt to meddle with a water utility. Wyatt A. Travnichek is accused of illegally accessing the Ellsworth County Rural Water District’s computer system on March 27, 2019, and seeking to shut down the utility’s cleaning and disinfecting processes. The Federal charges of tampering with a public water system and reckless damage to a protected computer during unauthorized access carry a potential penalty of twenty years in prison and fines of up to $250,000.