Ukraine at D+145: SVR exploits shared drives. (The CyberWire) Russia aspires to a counterfire program, but is achieving a counter-farming program. The SVR’s Cozy Bear is observed conducting cyberespionage against a range of diplomatic targets, but without an obvious clear connection to Russia’s war. Ukraine’s shake-up of its intelligence service continues.

Russia-Ukraine war: List of key events, day 146 (Al Jazeeera) As the Russia-Ukraine war enters its 146th day, we take a look at the main developments.

Russia-Ukraine war latest: Putin and Erdoğan to discuss grain deliveries; EU set to add Sberbank to sanctions list (the Guardian) Putin to discuss Ukrainian grain exports with Turkish officials in Tehran; EU reportedly preparing to impose sanctions on Russia’s biggest bank

What If the War in Ukraine Spins Out of Control? (Foreign Affairs) How to prepare for unintended escalation.

Opinion | Putin Thinks He’s Winning (New York Times) And his plans go far beyond Ukraine.

Russia Orders Troops to Target Ukraine’s Western-Supplied Long-Range Weapons (Wall Street Journal) A recent shipment of advanced Western weapons has reinforced Ukraine’s efforts to fend off Russia’s invasion, but whether they will enable Kyiv to turn the tide remains unclear.

Ukraine’s farmers become the latest target of Russian missiles (Washington Post) “The fields are burning,” the farmer yelled in a panic.

Putin’s Private Army Lowers Recruiting Standards After Heavy Losses: U.K. (Newsweek) A notorious Russian mercenary group is now hiring convicts and formerly blacklisted individuals, the U.K.’s defense ministry said.

Putin in Tehran for talks with leaders of Iran, Turkey (AP NEWS) Russian President Vladimir Putin arrived Tuesday in Iran for a visit intended to deepen ties with regional heavyweights as part of Moscow’s challenge to the United States and Europe amid its grinding campaign in Ukraine.

Ukraine’s spy problem runs deeper than Volodymyr Zelensky’s childhood friend (The Telegraph) The Ukrainian president’s recent swathe of sackings reveals a government blighted by treachery, collaboration and internal rivalries

U.S. Admits To Providing Intel on Russian Assets to Ukraine (Reason) The last thing the U.S. should be doing is poking a nuclear bear.

EU agrees another 500 million euros for Ukrainian arms (Reuters) European Union foreign ministers agreed on Monday another 500 million euros ($504 million) of EU funding to supply arms to Ukraine, taking the bloc’s security support to 2.5 billion euros since Russia invaded Ukraine on Feb. 24.

EU members’ wish lists are due for new Ukraine replenishment fund (Defense News) Officials in Brussels are working against the clock, as member states grow frustrated with bloc bureaucracy as they weigh buying from abroad and on their own instead.

Navy exercise in Black Sea proceeds at a distance as Ukraine fights along its own shores (Stars and Stripes) Navy P-8A Poseidon patrol and reconnaissance planes from Task Force 67 based at Naval Air Station Sigonella in Sicily and expeditionary units from Task Force 68 based at Naval Station Rota in Spain are slated to participate in Breeze 2022.

NATO’s New Air Commander Prepares for New Phase of Vigilance Along Eastern Front (Air Force Magazine) Gen. James B. Hecker, the new commander of NATO Allied Air Command, spoke with other nations’ air chiefs about concerns over Russia.

The Dynamics of Russian Cyberwar (YouTube) In this keynote presentation recorded on May 23rd, I explore how Russia has used cyber warfare against Ukraine. This talk clarifies some confusion about the …

Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive (Unit 42) Cloaked Ursa (aka APT29, Nobelium or Cozy Bear) has recently used trusted online storage services to deliver Cobalt Strike.

Russian hacking unit Cozy Bear adds Google Drive to its arsenal, researchers say (CyberScoop) APT29, one of the SVR’s most active and successful hacking groups, has been using the cloud service to help deliver malware, the researchers said.

Russian SVR hackers use Google Drive, Dropbox to evade detection (BleepingComputer) State-backed hackers part of Russia’s Federation Foreign Intelligence Service (SVR) have switched, for the first time, to using legitimate cloud storage services such as Google Drive to evade detection.

Russia fines Google $358 million for not removing banned info (BleepingComputer) A court in Moscow has imposed a fine of $358 million (21 billion rubles) on Google LLC for failing to restrict access to information considered prohibited in the country.

Russia sending teachers to Ukraine to control what students learn (Washington Post) The Kremlin is promising teachers big money to ‘prepare schools’ in Ukrainian regions its forces now occupy

North Korean labour could be sent to rebuild Donbas, Russian ambassador says (the Guardian) Alexander Matsegora tells Russian newspaper there are ‘a lot of opportunities’ for economic cooperation, despite UN sanctions

Russian Sanctions Are Working but Slowly (Foreign Policy) Moscow’s military capabilities are being ground down, piece by piece.

Costs of Ukraine war pose tests for European leaders – and things may get worse (the Guardian) Analysis: Vladimir Putin claims time is on his side, but he will have only one shot at making a gas cutoff count

Putin visits Iran on first trip outside former Soviet Union since Ukraine war (Reuters) Russian President Vladimir Putin visited Tehran on Tuesday for talks with Iranian Supreme Leader Ayatollah Ali Khamenei, the Kremlin leader’s first trip outside the former Soviet Union since Moscow’s Feb. 24 invasion of Ukraine.

Olena Zelenska, Ukraine first lady, on high-profile US trip (AP NEWS) Ukraine’s first lady, Olena Zelenska, met with Secretary of State Antony Blinken on Monday as she began a series of high-profile appearances in Washington that will include a session with U.S.

Attacks, Threats, and Vulnerabilities

Albanian government websites go dark after cyberattack (Register) Citizen services only moved online in May. What could possibly go wrong?

CISA Updates Advisory on Cyber Actors Continued Exploitation of Log4Shell in VMware Horizon Systems (CISA) CISA has updated the joint CISA-United States Coast Guard Cyber Command (CGCYBER) Cybersecurity Advisory AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon, originally released June 23, 2022. The advisory now includes IOCs provided in Malware Analysis Report (MAR)-10382580-2.

Cyber Criminals Create Fraudulent Cryptocurrency Investment Applications to Defraud US Investors (US Federal Bureau of Investigation) The FBI is warning financial institutions and investors about cyber criminals creating fraudulent cryptocurrency investment applications (apps) to defraud cryptocurrency investors. The FBI has observed cyber criminals contacting US investors, fraudulently claiming to offer legitimate cryptocurrency investment services, and convincing investors to download fraudulent mobile apps, which the cyber criminals have used with increasing success over time to defraud the investors of their cryptocurrency.

FBI warns of fake cryptocurrency apps used to defraud investors (BleepingComputer) The FBI warned that cybercriminals are creating and using fraudulent cryptocurrency investment applications to steal funds from US cryptocurrency investors.

Bogus cryptocurrency apps swindle users out of millions, FBI warns (CyberScoop) The FBI is cautioning investors to take a second look before sending funds to new investment apps.

FBI: Fake Cryptocurrency Apps Defrauded Hundreds of U.S. Investors (Decipher) U.S. investors have been scammed out of millions by cybercriminals impersonating legitimate cryptocurrency investment apps.

FBI warns about fake cryptocurrency investment apps used to steal millions (The Record by Recorded Future) Warning comes after cryptocurrency crash and a fresh report on “pig-butchering” fraud.

Microsoft Azure Arc Jumpstart Information Disclosure (Tenable®) An information disclosure issue exists in the Azure Arc Jumpstart environment. The script used to provision clients in this environment logs service principal credentials, database credentials, and other potentially sensitive information in plaintext to a log file that is readable by any user on the system. These logs can be found in the following directory in a default deployment: “C:\Packages\Plugins\Microsoft.Compute.CustomScriptExtension\1.10.12\Status\”

New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals (The Hacker News) Researchers demonstrated a new Air-Gap attack, dubbed SATAn, in which attackers can use SATA cable as a wireless antenna to transmit radio signals.

Air-gapped systems leak data via SATA cable WiFi antennas (BleepingComputer) An Israeli security researcher has demonstrated a novel attack against air-gapped systems by leveraging the SATA cables inside computers as a wireless antenna to emanate data via radio signals.

Experts Uncover New CloudMensis Spyware Targeting Apple macOS Users (The Hacker News) Researchers uncover a new macOS spyware, dubbed “CloudMensis” that uses cloud storage as a C&C channel to exfiltrate documents, keystrokes, and screen

New CloudMensis malware backdoors Macs to steal victims’ data (BleepingComputer) Unknown threat actors are using previously undetected malware to backdoor macOS devices and exfiltrate information in a highly targeted series of attacks.

Industrial control system password cracker may be bad, actually (SC Magazine) Dragos reports one group offering password cracking is using password recovery software to install the Sality botnet. Sality is used for distributed criminal tasks, including cryptomining.

Trellix Finds Business Services Top Target of Ransomware Attacks (Business Wire) Trellix’s latest Threat Report showcases the evolution of Russian cybercrime, threats to critical infrastructure and developments in email security.

On Google Play, Joker, Facestealer, & Coper Banking Malware (Zscaler) Joker, Facestealers and Banker swarming Google Play store

Google Boots Multiple Malware-laced Android Apps from Marketplace (Threatpost) Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.

Servers running Digium Phones VoiP software are getting backdoored (Ars Technica) More than 500,000 malicious samples seen in campaign that installs web shells.

Eight malware-infested apps were able to garner 3 million downloads from the Play Store (Android Police) It preyed on victims through Facebook ads

Hacker Posts Internal Roblox Employee Documents Online (Vice) The documents appear to relate to some of the bigge games and creators on the massively popul

Internal Roblox documents posted online after employee phishing scam (PCGamesN) A hacker reportedly targeted a Roblox employee in an extortion attempt using “personalized scare tactics” to obtain 4GB worth of internal documents

Cyberattacks causing kinetic damage are neither new nor uncommon (Control Global) July 11, 2022, the BBC published an article, “Predatory Sparrow: Who are the hackers who say they started a fire in Iran?”

Authomize Uncovers Clear Text Password Risk Exposing Okta Customers to Exploitation (PR Newswire) Authomize, the first Cloud Identity and Access Security platform, announced today its discovery of significant inherent security risks in Okta,…

Nigerian Healthcare Agency Exposed Thousands of Applicants’ Personal Data (Website Planet) A Nigerian government healthcare agency’s unsecured buckets exposed thousands of applicants’ personal data

Company name and location:

Irish Cybersecurity company warns of latest scam to hit Ireland! (techbuzzireland) Irish Cybersecurity company warns of latest scam to hit Ireland!

Indian flight booking site Cleartrip announces data breach (The Record by Recorded Future) Popular Indian flight booking site Cleartrip announced a data breach on Monday involving the information of an unknown number of victims.

Rhode Island sewer-system operator hit by cyber attack (The Providence Journal) There was no disruption to sewage treatment, according to the Narragansett Bay Commission, but it’s unclear if customer data was taken.

Colorado police investigating ransomware attack on small town (The Record by Recorded Future) The police department of Frederick, Colorado said it is investigating claims that the town government was hit with a ransomware attack.

Not your average side hustle: the women making thousands from ‘pay pigs’ who enjoy being financially dominated (Business Insider) Some women are using social media to make money from men who enjoy being insulted and financially exploited. Insider spoke with three of them.

Thurso man claims he’s been given confidential information about other patients THREE times (Press and Journal) A Thurso man claims he’s been sent personal details of other NHS Highland patients… for the third time this year. After requesting access to his medical

Hacker hijacks NFT artist DeeKay’s Twitter account, steals $150,000 worth of NFTs from fans (Hot for Security) NFT artist DeeKay Kwon had his Twitter account hacked at the end of last week by
scammers who managed to steal NFTs valued at $150,000 from his followers.

Security Patches, Mitigations, and Software Updates

Juniper Networks Patches Over 200 Third-Party Component Vulnerabilities (SecurityWeek) Juniper Networks patches hundreds of vulnerabilities affecting its products, a vast majority found in third-party components.

Microsoft’s latest security patch troubles Windows 11 users (Register) The curse of Patch Tuesday strikes again as error codes wreak minor havoc

The State of Security: Malware in 2022 (The State of Security) The 2021 Malware Report provides a compendium of insights into the latest trends, key challenges and solutions to malware and ransomware.

The growing costs of cybercrime – a data breach can impact a business for many years to come (Engineering News) Modern enterprises face an onslaught of cyberattacks from many quarters and must not only be prepared to contend with the direct costs of potential breaches, but also with spiralling indirect costs, such as compliance fines and reputational damage. As the threat landscape continues to evolve, so do the frequency and sophistication of attacks, with companies facing anything from denial of service attacks and phishing attempts to payment card skimming, identity theft and account takeover threats.


Google-Mandiant deal closer as US Justice Department ends antitrust inquiry (CRN Australia) Merger expected to complete at the end of 2022.

Huntress Acquires Curricula for $22M to Disrupt Security Training Market, Elevate Cyber Readiness for SMB Employees (GlobeNewswire News Room) The Curricula platform uses behavioral science with a simplified approach to train and educate users—and marks another impactful step forward in Huntress’…

ePlus Expands Cybersecurity Reach With Future Com Acquisition (CRN) ePlus, which already gets over a third of its revenue from security and related services, wants to expand its capabilities and its Texas footprint.

SecurityWeek Analysis: Over 230 Cybersecurity M&A Deals Announced in First Half of 2022 (SecurityWeek) An analysis conducted by SecurityWeek shows that more than 230 cybersecurity-related mergers and acquisitions were announced in the first half of 2022.

Accenture Ranks No. 1 in Cybersecurity Service Providers by HFS Research (Eagle-Tribune) Accenture (NYSE: ACN) has been recognized as the No. 1 cybersecurity service provider overall in a new report from industry analyst firm HFS Research.

Twitter Has Entered the Elon Musk Twilight Zone (Wired) In the tortured deal’s alternate reality, it makes sense for the company’s leaders to try to force Musk to take over—but things will get tricky if they succeed.

GDIT receives $908M contract (Virginia Business) Falls Church-based federal contractor General Dynamics Information Technology Inc. has been awarded a $908 million contract to support IT and network systems operated by the U.S. Air Forces in Europe.

IBM shares slide after company trims cash forecast (CNBC) The hardware, software and consulting provider trimmed its 2022 free cash flow forecast.

Apple to Slow Hiring and Spending for Some Teams Next Year (Bloomberg) Company won’t backfill roles or add new staff in certain cases. Apple’s tech rivals take similar steps as recession looms.

6 security analyst job description red flags that make hiring harder (CSO Online) With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.

Secureframe Adds Top Tech, Marketing and Legal Talent to Seize Massive (PRWeb) Secureframe, the leading all-in-one platform for continuous security compliance, announced it has expanded its executive team, adding top tech, marketing and l

Products, Services, and Solutions

Deloitte Expands Managed Extended Detection and Response Platform With Four New Modules and Enhanced Intelligence (PR Newswire) Deloitte, a leader in global security services and incident response services, has expanded its Managed Extended Detection and Response (MXDR)…

Brookdale Community College Selects the IronNet Collective Defense Platform to Protect Against Cyber Attacks (Business Wire) IronNet partnered with Brookdale Community College and will deploy its Collective Defense platform to help defend against increased cyber threats.

Darktrace launches new family of security AI tools  (VentureBeat) Darktrace announces the launch of a new family of security AI tools that use AI that can “think like an attacker.”

Safe-T Group Expands Consumer Privacy Solution Portfolio with New Application for Android Users (GlobeNewswire News Room)  Company’s Privacy Solutions Now Available for Leading Portable Mobile Devices and Desktops Including Android, Apple iOS and Windows Personal Computers …

HiddenLayer Launches Security Solution for AI-Powered Products (Hidden Layer) HiddenLayer has launched the first security solution that protects AI-powered products and machine learning algorithms. Learn more.

Johnson Controls Aims to Better Secure Smart Buildings (Security Boulevard) Johnson Controls has acquired Tempered Networks as part of an effort to better secure its OpenBlue platform for collecting smart building and facilities

RAH Infotech Partners with Checkmarx to Deliver AppSec Platform Checkmarx One ( RAH Infotech’s customers will benefit from Checkmarx One, which helps companies ensure security for applications RAH Infotech today announced

Fingerprints surpasses 1.5 billion-sensor milestone as biometric adoption in new areas accelerates (Fingerprints) Fingerprints has shipped over 1.5 billion sensors, bringing greater convenience and security to PC, mobile, access control and payment use cases

Celebrus Solves Gap in Connecting Data Across Domains (MarTech Series) Celebrus announces the launch of Celebrus 9.6, an upgrade to the robust technology suite, including patented technology

QuSecure’s Industry-Leading Post-Quantum Cybersecurity Solution Wins Army’s xTechSearch 6 Competition for Innovative Technology (Business Wire) QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today announced that QuProtect™, the industry’s first end-to-end PQC software-based sol

Versa SASE Earns Zero Trust Security Excellence Award (Business Wire) Versa Networks, the recognized secure access service edge (SASE) leader, today announced that its industry-leading Versa SASE has won the Zero Trust S

Enso Security Leads Industry Mission to Bring Control to Chaos with Community-driven AppSec Map (Enso Security) Builds personalization, posture scoring and enhanced market intelligence into interactive map of the application security ecosystem

Datadobi added to the IT Enterprise Solutions – Software 2 (ITES-SW2) Contract for U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS) (Business Wire) Datadobi, the global leader in vendor-neutral unstructured data management, today announced that it has been added as a manufacturer on Iron Bow Techn

Fortinet Announces Free Training Offering for Schools at White House Cyber Workforce and Education Summit (Fortinet) Free Training Service for more than 8 Million Staff and Faculty Across U.S. School Districts will Advance Fortinet’s Mission to Close the Cyber Skills Gap

Clearwater Helps Hospitals and Health Systems Scale Cyber Risk Management and Compliance through Managed Services Program, ClearConfidence™ (Benzinga) Program Solves Staffing Challenge By Combining a Dedicated Team of Experts with Purpose-Built Software Tools to Identify, Prioritize, and Manage Cyber Risk Across the Enterprise on a Continuing Basis

Technologies, Techniques, and Standards

DHS CISA Expands the Continuous Diagnostics and Mitigation Approved Product List to Secure Firmware Supply Chain, A First for the Agency (Business Wire) Eclypsium has been added to Cybersecurity and Infrastructure Security Agency’s (CISA) Continuous Diagnostics and Mitigation Approved Products List.

CISA’s ‘Shields Up’ Campaign Proving Value, Built for the Long Haul (MeriTalk) The Cybersecurity and Infrastructure Security Agency’s (CISA) “Shields Up” cybersecurity campaign launched in February to warn critical infrastructure operators and other U.S.-based organizations of cybersecurity threats spilling over from Russia’s invasion of Ukraine is proving its worth over the first four months of operation.

WHO Rushed In New Security Steps After 2020 Cyberattack (Wall Street Journal) During the early months of the Covid-19 pandemic, the World Health Organization’s cybersecurity team was caught off guard by a huge increase in attempts to hack its systems.

Security Obscurity Versus Ethical Hackers: Who’s Right? (Security Intelligence) No one wants to expose their weaknesses, but ethical hackers can close vulnerabilities. See how to navigate the business tensions of ethical hacking.

All about SBOMs: the latest moves to secure the software supply chain (Computing) Following Biden’s Executive Order on cybersecurity, uptake of software bills of materials is taking off in the US. We need to follow suit

Building a business case for zero-trust, multicloud security (VentureBeat) Building a business case for securing multicloud configurations needs to surpass the costs and benefits, while recognizing that public clouds lack advanced zero-trust features and unified reporting.

#HowTo: Overcome Burnout in Cybersecurity Teams (Infosecurity Magazine) Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk

Design and Innovation

Security teams are skeptical of AI. Attack prevention products could change that. (Protocol) If new technology for AI-driven attack prediction and prevention lives up to its promise, it could enable major improvements for cyber defense. Darktrace just released new products that will test the theory.

Niche cryptographic technique could transform privacy in web3 (TechCrunch) Fully homomorphic encryption can make blockchains more private and scalable, but it’s still niche, Sunscreen CEO Ravital Solomon said

Research and Development

ODNI S&T releases 2022-26 investment landscape RFI (Intelligence Community News) On July 18, the Office of the Director of National Intelligence (ODNI) updated the ODNI S&T FY2022-26 investment landscape request for information (RFI). This RFI is intended to obtain U.S. industry’s views on those technologies and techniques which may address IC needs to guide IC S&T investment opportunities through FY26 and beyond. Responses are due by 4:00 p.m. Eastern on July 18, 2023.


Cyber Companies and Universities Are Building ‘Cyber Talent Hub’ (Wall Street Journal) Cybersecurity firms will make practical training on their technology available to students in an attempt to address a skills shortage. The effort comes as fears mount that global competitors like China are outpacing the West on talent.

Legislation, Policy, and Regulation

New data bill criticised as ‘bonfire of data rights’ (Computing) British businesses will be “sweating” as they navigate regulatory changes.

Securing the energy transition against cyber threats (Atlantic Council) This report recommends a suite of key actions that government can take to shore up the US energy sector against future cybersecurity threats.

Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate (SecurityWeek) Katie Moussouris is calling on the U.S. government to resist the urge to match China’s reported mandates around early vulnerability disclosure directly to the government.

Announcement of White House National Cyber Workforce and Education Summit | The White House (The White House) On Tuesday, July 19, 2022, National Cyber Director Chris Inglis will convene a National Cyber Workforce and Education Summit at the White House with

White House to hold summit on addressing the thousands of unfilled cybersecurity jobs (SC Magazine) The Biden administration has already hosted summits on ransomware and open-source software security. Now it’s taking a similar approach to tackle problems in the cybersecurity workforce.

Chip designers warm to U.S. bill despite big benefits to Intel (Reuters) Major U.S. chip firms on Monday were coming around to support a package of chip industry subsidies despite earlier concerns that legislation awaiting a vote in the Senate disproportionately benefits manufacturers like Intel Corp .

Tech Bill Aims to Block U.S. Aid for Companies That Build Advanced Chips in China (Wall Street Journal) Draft legislation headed for a Senate vote would provide roughly $52 billion to boost U.S. semiconductor manufacturing.

Homeland Security advisers say ‘no need’ for disinformation board (Washington Post) Department of Homeland Security advisers urged the agency Monday to scrap the Disinformation Governance Board the Biden administration created this year only to watch it implode amid confusion and partisan quarreling over its role.

Cyber, Misinfo at Forefront of Washington Secretary of State Race (GovTech) Candidates running for Secretary of State in Washington state have said that they’re most concerned about cybersecurity threats posed by other countries, online misinformation and election audits.

Litigation, Investigation, and Law Enforcement

Justice Department seizes $500K from North Korean hackers who targeted US medical organizations (CNN) The US Justice Department seized approximately half a million dollars that North Korean government-backed hackers had either extorted from US health care organizations or used to launder ransom payments, deputy Attorney General Lisa Monaco said Tuesday as she touted an aggressive US strategy to claw back money for victims of ransomware attacks.

Internet Crime Report 2021 (US Federal Bureau of Investigation) In 2021, America experienced an unprecedented increase in cyber attacks and malicious cyber activity. These cyber attacks compromised businesses in an extensive array of business sectors as well as the American public. As the cyber threat evolves and becomes increasingly intertwined with traditional foreign intelligence threats and emerging technologies, the FBI continues to leverage our unique authorities and partnerships to impose risks and consequences on our nation’s cyber adversaries.

WSJ News Exclusive | Alibaba Executives Called In by China Authorities as It Investigates Historic Data Heist (Wall Street Journal) Following the theft of sensitive Shanghai police data, authorities call in Alibaba executives as the company investigates how one of history’s largest data heists was allowed to happen.

Advocates want Cyber Ninjas, which led Ariz. ballot review, barred from federal work (Washington Post) The Arizona Senate hired the firm to do a partisan review of the 2020 presidential election results in a key county

Homeland Security records show ‘shocking’ use of phone data, ACLU says (POLITICO) The civil liberties group released documents showing new details about how agencies had purchased information on people’s movements throughout North America.

‘Invisible dragnet’ exposed: US ICE becomes surveillance agency to abuse own citizens’ private data (Global Times) An invisible “dragnet” that has shrouded the Americans for years has been uncovered in a recent research report which shows that the US Immigration and Customs Enforcement (ICE) has become a domestic surveillance agency by establishing an efficient monitoring network to collect its residents’ private data, far beyond the scope of authorization of immigration law enforcement.

Amazon Sues Facebook Group Administrators Over Fake Reviews (Wall Street Journal) Unnamed individuals used more than 10,000 Facebook groups to coordinate misleading reviews in exchange for free products or money, Amazon alleges.

WSJ News Exclusive | Chinese Regulator to Fine Didi More Than $1 Billion Over Data-Security Breaches (Wall Street Journal) Once the penalty is unveiled, the Chinese government plans to ease a restriction banning Didi from adding new users to its platform, and to allow the company’s mobile apps to be restored to domestic app stores.