Dateline Moscow and Kyiv: Continued local fighting; no significant changes.
Ukraine at D+342: Lessons for cyberwar. (CyberWire) Attentive observers will notice a suggestive similarity between the Wagner Group’s recruiting of convicts and Russia’s intelligence services’ mobilization of cybercriminals as hacktivist auxiliaries.
Russia-Ukraine war: List of key events, day 343 (Al Jazeera) As the Russia-Ukraine war enters its 343rd day, we take a look at the main developments.
Russia-Ukraine war live: supplying fighter jets to Kyiv probably a step too far for west, says Germany (the Guardian) Vice-chancellor speaks out against suggestion of supplying Kyiv with jets
War’s longest battle exacts high price in ‘heart of Ukraine’ (AP NEWS) It used to be that visitors would browse through Bakhmut’s late 19th century buildings, enjoy walks in its rose-lined lakeside park and revel in the sparkling wines produced in historic underground caves.
A whisper away from the Russian border, Ukrainian troops wait for another assault on Sumy (the Guardian) Facing a random blizzard of shelling, soldiers on the frontline wonder if Russia is going to have a second crack at taking the north-eastern region
WSJ News Exclusive | U.S. Says Russia Has Violated Nuclear-Arms Treaty by Blocking Inspections (Wall Street Journal) Tensions over Russia’s invasion of Ukraine risk endangering cooperation on arms control and negotiating a successor to the New START treaty.
US Accuses Russia of Endangering Nuclear Arms Control Treaty (Military.com) The Biden administration is faulting Russia for failing to allow on-the-ground nuclear inspections, accusing Moscow of endangering arms control efforts.
HRW urges Ukraine to probe its military’s use of banned mines (Al Jazeera) HRW says Ukrainian forces ‘extensively’ scattered antipersonnel mines in Izyum, causing civilian casualties.
Russia says it will fast-track testing of tank-killing robot in Ukraine (Task & Purpose) As Ukraine receives western-built tanks, Russia has announced it is sending robots designed to destroy them.
Ukraine-Russia war: Rishi Sunak rules out sending fighter jets to Ukraine (The Telegraph) Rishi Sunak has ruled out sending fighter jets to Ukraine on the grounds that it is "not practical".
France, Australia to jointly send new ammunition to Ukraine (Defense News) The two nations are finding new areas of cooperation following the AUKUS kerfuffle in 2021.
U.S. readies $2 billion-plus Ukraine aid package with longer-range weapons (Reuters) The United States is readying more than $2 billion worth of military aid for Ukraine that is expected to include longer-range rockets for the first time as well as other munitions and weapons, two U.S. officials briefed on the matter told Reuters on Tuesday.
Ukrainian Defenders Under Concentrated Attacks In East As Kyiv Lobbies For Warplanes (RadioFreeEurope/RadioLiberty) Russia has thrown fresh contingents of troops at Ukrainian positions in the east but failed to make notable advances, the Ukrainian military said on February 1, as Kyiv stepped up its efforts to convince its Western allies to give it fighter jets.
After Tank Pledges, Ukraine Seeks Western Fighter Jets (Military.com) Ukraine is pushing its Western allies to provide it with fighter jets, a week after winning pledges of sophisticated modern tanks to help it beat back Russia’s invasion force after almost a year of fighting.
US Army goes virtual to help Ukraine maintain weapons (Defense News) The Army is realizing the value of remote maintenance, now used to help Ukraine, for future sustainment in highly contested environments.
Biden’s ‘no’ on F-16s for Ukraine met with skepticism in Pentagon (Washington Post) The administration has exhibited a pattern of rejecting similar pleas from the government in Kyiv only to relent later
Can Biden Keep Sending Ukraine Weapons Without Provoking Russia? (Military.com) The Biden administration announced last week that the U.S. will provide 31 Abrams M-1 tanks to Ukraine, and Germany said it will send 14 of its Leopard tanks to Kyiv.
Russia might not have invaded Ukraine without Brexit, says Guy Verhofstadt (The Telegraph) European Parliament’s former Brexit boss claims Vladimir Putin may never have launched offensive if UK had remained in bloc
Ukraine intel chief predicted Russia’s war. He says Crimea will be retaken. (Washington Post) Hours before all of his warnings about a Russian invasion were proved spot-on, Maj. Gen. Kyrylo Budanov, Ukraine’s military intelligence boss, moved his wife into his office, fearing that the worst would not indeed happen.
As with Hitler, we should have seen Putin coming (The Telegraph) This paper was one of the few to early and consistently warn of the Nazi threat
How Russians Learned to Stop Worrying and Love the War (Foreign Affairs) The pliant majority sustaining Putin’s rule.
ESET APT Activity Report T3 2022 (WeLiveSecurity) ESET APT Activity Report T3 2022 reviews the activities of selected APT groups as observed and analyzed by ESET from September to December 2022.
Russian hackers targeted a Ukrainian energy co. with new malware strain last fall (Axios) The October attack coincided with Russian armed forces launching missiles on Ukraine’s energy infrastructure.
Sandworm’s expanded wiper arsenal targets energy sector (Cyber News) Russian state-sponsored hacker collective Sandworm added new wiper malware to its arsenal. The target is, unsurprisingly, Ukraine.
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector (The Hacker News) A new research report has revealed details about the NikoWiper wiper malware responsible for cyberattacks on Ukraine’s energy sector.
Pro-Russian DDoS attacks raise alarm in Denmark, U.S. (The Record from Recorded Future News) DDoS attacks by pro-Russian hacking groups are causing alarm in the U.S. and Denmark after several attacks targeted hospitals and more.
ChristianaCare’s website restored after attack; pro-Russia ‘hacktivist’ group takes credit (Delaware News Journal) The main ChristianaCare website went down Tuesday evening as the hospital system experienced a “distributed denial-of-service (DDoS) attack,” according to a statement from the health care system.
Univ. of Iowa Hospitals website possibly hit by cyberattack (KCRG) UIHC has acknowledged its website is down Tuesday afternoon and its IT staff is investigating the cause but could not confirm whether it was the result of a cyber attack.
Cyber attack causes problems with UM Health websites (The Detroit News) A cyber attack on a third-party vendor used by the University of Michigan Health system caused \
IT Army of Ukraine hacked Gazprom’s archive (Cyber News) IT Army of Ukraine claims to have accessed a 1.5 GB archive of files belonging to the Russian state-controlled energy giant, Gazprom.
IT Army of Ukraine gained access to a 1.5GB archive from Gazprom (Security Affairs) IT Army of Ukraine claims to have breached the infrastructure of the Russian energy giant Gazprom and had access to a 1.5 GB archive. The collective IT Army of Ukraine announced it has gained access to a 1.5 GB archive belonging to the Russian energy giant Gazprom. The group of hacktivists announced the hack on […]
How the war in Ukraine has strengthened the Kremlin’s ties with cybercriminals (The Record from Recorded Future News) Russian intelligence, military, and law enforcement have tapped into relationships with hacking groups since its invasion of Ukraine.
Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine (Recored Future) Insikt Group examines cybercrime used in Russian “next-generation warfare”, a form of hybrid warfare vital to its military strategy in the War in Ukraine.
Russia’s cyberwar against Ukraine offers vital lessons for the West (Atlantic Council) Ukraine’s experience in countering Russian cyber warfare can provide valuable lessons while offering a glimpse into a future where wars will be waged both by conventional means and increasingly in the borderless realm of cyberspace.
U.S. Official Asserts Sanctions Cutting Off Russian War Machine (RadioFreeEurope/RadioLiberty) Western sanctions against Russia have been “very effective” in cutting off Russia’s war machine, a U.S. official asserted, amid growing questions about Moscow’s ability to circumvent the measures.
Experts Seek Investigation of Wagner Group, Mali Forces (Military.com) Diplomats, analysts and human rights groups say indiscriminate violence against civilians has grown since the mercenaries arrived in Mali.
Attacks, Threats, and Vulnerabilities
Google informs Fi subscribers that they’ve been caught up in the recent T-Mobile data breach (Chrome Unboxed) As a Google Fi user who’s been subscribed since the very beginning of the service’s life, it hits me hard to hear news like I have to deliver today. Fi has pretty much always done right by me, been reliable, and has been the easiest one to use amongst its competitor’s thanks to the simple…
T-Mobile’s data breach also hit Google Fi customers (Android Police) The far-reaching effects of T-Mobile’s repeated data breaches
Google Fi says hackers accessed customers’ information (TechCrunch) The virtual cell service said customers’ data was exposed following “suspicious activity” relating to its primary network provider.
Microsoft: Over 100 threat actors deploy ransomware in attacks (BleepingComputer) Microsoft revealed today that its security teams are tracking more than 100 threat actors deploying ransomware during attacks.
SocGholish: A Tale of FakeUpdates (Reliaquest) The “SocGholish” (aka FakeUpdates) malware distribution framework has presented a gripping tale of intrigue and suspense for ReliaQuest this year.
Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code (Dark Reading) Security vulnerabilities in VMware’s vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.
Microsoft disables verified partner accounts used for OAuth phishing (BleepingComputer) Microsoft has disabled multiple fraudulent, verified Microsoft Partner Network accounts for creating malicious OAuth applications that breached organizations’ cloud environments to steal email.
Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges (CSO Online) Proofpoint discovers threat actors targeting verified status in the Microsoft environment to abuse OAuth privileges and lure users into authorizing malicious apps.
New Sh1mmer ChromeBook exploit unenrolls managed devices (BleepingComputer) A new exploit called ‘Sh1mmer’ allows users to unenroll an enterprise-managed Chromebook, enabling them to install any apps they wish and bypass device restrictions.
BEC Group Uses Secondary Personas & Lookalike Domains in Third-Party… (Abnormal Intelligence) Discover how Firebrick Ostrich uses open-source intelligence to run their BEC scams in these supply chain compromise examples.
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store (HackRead) Several fake ChatGPT clone apps have surfaced on the official iOS and Play Stores, collecting user data and sending it to remote servers.
Nagpur unit making military weapons hit by hackers, says cybersecurity firm — ‘data up for sale’ (ThePrint) Nagpur-based Solar Industries India Limited yet to confirm the attack. Hacker group BlackCat has taken responsibility and also reportedly invited bids for firm’s info.
Pro-Palestine hackers threaten Israeli chemical companies (Security Affairs) Threat actors are targeting Israeli chemical companies operating in the occupied territories, security experts warn. Threat actors have launched a massive hacking campaign aimed at Israeli chemical companies operating in the occupied territories. A group, named Electronic Quds Force, is threatening companies’ engineers and workers and are inviting them to resign from their positions. The […]
GitHub Revokes Code Signing Certificates Following Cyberattack (SecurityWeek) GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.
Was this Brazilian major app bypassing Apple’s location privacy on iOS? (Notes) One of the biggest Brazilian apps/startups, iFood, was peeking at iOS users location when it should&rsquo;ve not.
Six weeks after being hacked, why is The Guardian still broken? (The Telegraph) Last year’s ransomware attack on the newspaper left offices closed and staff worried about their data – and tough questions to be answered
LockBit takes credit for November ransomware attack on Sacramento PBS station (The Record from Recorded Future News) The LockBit ransomware group took credit this week for a November ransomware attack on PBS KVIE – the local outlet for Sacramento.
Ransomware closes schools on Nantucket Island (StateScoop) Public schools on the Massachusetts island closed early after it endured the latest ransomware attack against the K-12 sector.
Cybersecurity incident shuts down TUSD internet, network services (Arizona Daily Star) A “cybersecurity incident” on Tucson Unified School District’s technology network shut down the district’s internet and network services, the district said Monday.
Hundreds of parents on alert as hackers target Melbourne school (7NEWS) Parents are being warned their credit card information may have been stolen over the school holidays.
Planet Ice hacked! 240,000 skating fans’ details stolen (Hot for Security) Planet Ice, which operates 14 ice rinks up and down the UK, has revealed that criminal hackers managed to break into its systems and steal the personal details of over 240,000 customers.
Vulnerability Summary for the Week of January 23, 2023 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Security Patches, Mitigations, and Software Updates
Delta Electronics DOPSoft (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: DOPSoft Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow for remote code execution.
Bitdefender Threat Debrief | January 2023 (Bitdefender) This month our experts analyze typosquatting, top ransomware offenders and the homograph phishing report. Find out lessons learned from 2022 and what lies ahead.
Key Insights to Fuel Business Growth in 2023 | Plume IQ (Plume) Data-driven intelligence and customer-focused insights to help you fuel business growth and capture market share in 2023.
Auvik 2023 Network IT Management Report Reveals IT and Security Challenges are Hindering End User Experience in the Hybrid Workforce (Auvik Networks Inc.) 86% of IT professionals support remote workers, but only half monitor SaaS and Cloud or manage Wi-Fi – critical components of today’s enterprise network
January’s M&A News Roundup (Infosecurity Magazine) Cybersecurity buyers and sellers remained cagey regarding January’s deals
Tesserent buys ALC Group in $5.8m deal (CRN Australia) To build profitable cybersecurity business in Australasia.
LinQuest Completes Acquisition of Hellebore Consulting Group (Business Wire) LinQuest Corporation, a leader in technology solutions for U.S. defense and intelligence communities, announced the acquisition of Hellebore Consultin
Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the Cloud (PR Newswire) Sentra, a cloud data security company, today announced the completion of a $30 million Series A funding round led by Standard Investments with…
Saviynt raises $205M and affirms that IAM must be cloud-friendly (VentureBeat) Saviynt raises $205 million in funding for its cloud IAM solution, highlighting that identity management must be cloud-friendly.
UK cybersecurity firm Darktrace’s shares dive as short sellers circle (the Guardian) Company co-founded by Mike Lynch hit by wave of criticism of its sales, marketing and accounting practices
ASEAN startup fundraising slumped in 2022 but still up from 2019 (Nikkei Asia) Investors turn to early-stage deals amid dimmer IPO prospects for tech ventures
OpenAI Is Making Headlines. It’s Also Seeding Talent Across Silicon Valley (The Information) OpenAI has just 375 full-time employees, but its buzzy chatbot, ChatGPT, is shaking up Silicon Valley. The company’s influence extends even further, through former employees who are now in top positions at other artificial intelligence firms or have founded startups of their own. Even as layoffs …
Druva Peer-Recognized as a Customers’ Choice in the 2023 Gartner ® Peer Insights™ Voice of the Customer for Enterprise Backup and Recovery Software Solutions Report (Business Wire) Druva Peer-Recognized as a Customers’ Choice in the 2023 Gartner Peer Insights Voice of the Customer for Enterprise Backup & Recovery Solutions Report
Jumio Announces New Sales Leadership to Usher Company into New Era (Jumio: End-to-End ID, Identity Verification and AML Solutions) Experian, Trulioo veteran joins as SVP of worldwide sales, partnering with new VP of global account management to drive Jumio’s success at critical time in company’s next stage of growth
Javier Ortega Joins Veriff as Chief Revenue Officer (PR Newswire) Veriff, a global identity verification provider, today announced that Javier Ortega has joined the company as Chief Revenue Officer. As the…
AppOmni Names Tina Hawk Chief People Officer (Business Wire) AppOmni, the leading provider of SaaS Security, has expanded its leadership team and added Tina Hawk as the company’s first chief people officer. With
Onboard Data Company Shift5 Adds to C-Suite, Appoints Inaugural General Counsel (Shift5) New Federal Marketing Leaders Join as Company Matures Within Federal and Commercial Markets
Products, Services, and Solutions
SafeBreach Announces New Threat Intelligence Collective (SafeBreach) SafeBreach launched the Threat Intelligence Collective, a collaboration between SafeBreach and leading threat intelligence providers.
OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings (SecurityWeek) New OpenVEX specification helps software vendors and maintainers communicate precise metadata about the vulnerability status of products.
Rezilion Enhances Software Supply Chain Platform to Expand Detection, Prioritization and Remediation Capabilities, Bypassing Traditional Software Composition Analysis (SCA) Tools (PR Newswire) Rezilion announced today a series of new features that that will significantly enhance the company’s offering, with expanded capabilities…
Trulioo launches end-to-end identity platform (CSO Online) The new Trulioo platform will combine all existing Trulioo products into a single platform, allowing the ID verification firm to target global enterprise customers.
As Malicious Open Source Packages Proliferate, Checkmarx Announces Supply Chain Threat Intelligence for Faster, Easier Identification of Potential Threats (PR Newswire) Checkmarx, the global leader in developer-centric application security solutions, announced today the immediate availability of Supply Chain…
Zscaler Introduces Industry’s First Cloud Resilience Capabilities for SSE to Ensure Nonstop Cloud Security Operations (GlobeNewswire News Room) Zscaler Resilience Extends the Flexibility of Zscaler’s Cloud Platform and Preserves Interconnections to Any App for Rapid Recovery from Unforeseen Events…
Protegrity Data Protection Platform Now Available on Google Cloud Marketplace (Protegrity) Google Cloud Platform Customers now have access to Protegrity’s industry-leading data security and privacy platform
Contrast Security Launches New Alliance Program to Revolutionize the Way Customers Scale Their Security Solutions (Contrast Security) The Security Innovation Alliance (SIA) empowers customers to create holistic security programs by leveraging robust end-to-end integration partnerships.
Sonatype Launches Industry’s First ‘Run Anywhere’ Platform for Software Supply Chain Management (Sonatype) Sonatype’s new cloud deployment options make it the most versatile software composition analysis and application security testing solution available.
1E Launches Patch Insights for Real-Time Visibility into Patching Landscape (Business Wire) 1E, a leader in Digital Employee Experience (DEX), today announced the launch of 1E Patch Insights, a breakthrough solution that provides IT administr
Aware Unveils Context API to Unify CIOs’ Digital Transformation Initiatives for Unlocking Innovation and Top-line Growth (PR Newswire) Aware, the leader in contextual intelligence, today unveiled the industry’s first Context API providing developers with access to the…
Technologies, Techniques, and Standards
3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts (Help Net Security) In many parts of the world, utility infrastructure needs modernization, as it is increasingly susceptible to cybersecurity threats.
The need for correct, authenticated pressure measurements for reliability, safety, and cyber security (Control Global) Joe Weiss responds to Abhishek Sharma’s “The wisdom of correct pressure measurements”
Defending America’s Critical Infrastructure – America’s Electric Cooperatives (America’s Electric Cooperatives) Robust early warning system for the broader critical infrastructure community
How Can Disrupting DNS Communications Thwart a Malware Attack? (Dark Reading) Malware eventually has to exfiltrate the data it accessed. By watching DNS traffic for suspicious activity, organizations can halt the damage.
Federal Agencies Can Learn from the FDA’s Cybersecurity Modernization Action Plan (FedTech) The FDA looks to establish a zero-trust model, leverage AI and machine learning, and promote software assurance best practices.
Are Your Employees Thinking Critically About Their Online Behaviors? (Dark Reading) Three mindset shifts will help employees build a habit of vigilance and make better security decisions. Move past security theater to reframe thinking so employees understand data’s value, act with intention, and follow data best practices.
Countering The Threat From Quantum Computers (Semiconductor Engineering) Approach for future security based on TPMs.
ZetX | Scientific Standards (ZetX) Watch a video tutorial on the evolution of CDR mapping since the 1990’s. Learn Best CDR Mapping Practices that meet scientific challenges. Download free reference materials like the SWGDE document explaining the science behind RF tower mapping for investigative purposes.
Design and Innovation
ConnectWise Invites Companies to Submit Innovation Solution Ideas for 2023 PitchIT Competition (GlobeNewswire News Room) Final three contestants given opportunity to present on stage at IT Nation Connect 2023; chance at $70,000 grant…
Cyber experts work to write code in safer languages (Washington Post) There’s momentum to address a kind of computer code that creates major cyber vulnerabilities
Cybertrust Japan Integrates Quantum-Computing-Hardened Private Keys from Quantinuum into New IoT Authentication Platform (PR Newswire APAC) Cybertrust Japan Integrates Quantum-Computing-Hardened Private Keys from Quantinuum into New IoT Authentication Platform
San Diego State University launches online Cyber Tech Academy (SDNews.com) San Diego State University (SDSU) has launched a suite of online cyber security certificates and a new academy, the SDSU
Cheaters beware: ChatGPT maker releases AI detection tool (AP NEWS) The maker of ChatGPT is trying to curb its reputation as a freewheeling cheating machine with a new tool that can help teachers detect if a student or artificial intelligence wrote that homework.
ChatGPT maker OpenAI releases ‘not fully reliable’ tool to detect AI generated content (the Guardian) OpenAI is calling on educators to give their feedback on how the tool is used, amid rising concerns around AI-assisted cheating at universities
Legislation, Policy, and Regulation
Stop Passing the Buck on Cybersecurity (Foreign Affairs) Why companies must build safety into tech products.
EU Council moves to adjust product lifecycle, reporting in new cybersecurity law (Euractiv) EU countries are considering adjusting the definition of product lifecycle to the specificity of the product and moving the reporting of vulnerabilities at the national level in a new compromise on the Cyber Resilience Act.
India and US partner for strategic technology, including AI and Quantum Computing (Candid.Technology) The NSA’s of India and the United States led the inaugural meeting of US-India initiative on Critical and Emerging Technology (iCET).
U.S. and India launch high-level defense and tech initiative (Washington Post) Geopolitical concerns about China and Russia form backdrop of partnership
TikTok flip-flop: Government department bans, then unbans, social media app over spy fears (The Age) A Victorian government department banned TikTok, which is owned by a Chinese company and is banned in other departments, but backflipped within hours of receiving questions from The Age.
A U.S. Crackdown on Huawei Would Pressure Qualcomm and Intel’s China Businesses (Barron’s) The Biden administration is considering cutting off Huawei from American suppliers over national security concerns, according to reports.
China attacks ‘unscrupulous’ US after reports of further crackdown on Huawei (the Guardian) Beijing reacts angrily to reports that Washington has moved to restrict American exports to hi-tech company
Newest Software Cybersecurity Rule Draws Jeers from Agencies (Bloomberg Government) A cybersecurity rule coming later this year on federal software purchases has elicited objections from agency contracting offices and vendors.
Over-Classification Undermines Democracy, US Intelligence Director Says (Defense One) The investigations into handling of sensitive documents by former presidents and vice presidents have brought problems with the classification system back into the spotlight.
Litigation, Investigation, and Law Enforcement
How the Supreme Court could soon change free speech on the internet (CNBC) In 2023, the U.S. justice system, including the Supreme Court, will take on cases that will help determine the bounds of free expression on the internet.
How the Supreme Court ruling on Section 230 could end Reddit as we know it (MIT Technology Review) As tech companies scramble in anticipation of a major ruling, some experts say community moderation online could be on the chopping block.
New US ransomware strategy prioritizes victims but could make it harder to catch cybercriminals (CNN) US and European law enforcement’s disruption last week of a $100-million ransomware gang is the clearest public example yet of a new high-stakes strategy from the Biden administration to prioritize protecting victims of cybercrime — even if it means tipping off suspects and potentially make it harder to arrest them.
FBI is trying to encourage more ransomware victims to call them for help (Axios) Officials have been trying to assuage victims’ concerns about calling law enforcement.
British government minister told council to keep quiet after ransomware attack (The Record from Recorded Future News) An unnamed British government minister told the leader of Redcar and Cleveland Borough Council to keep quiet about the impact of a “catastrophic” ransomware attack two years ago, a parliamentary committee was told on Monday.
NFT company gets restraining order to freeze hacker’s online wallet (The Record from Recorded Future News) NFT Investments, a British company, worked through legal U.S. legal channels to freeze the digital assets wallet.
Celebrities Who Endorsed Crypto, NFTs Land in Legal Crosshairs After Investor Losses (Wall Street Journal) Prominent endorsers are named as defendants in class-action lawsuits by investors, while agents warn clients away from future deals.
Pictured: Woman who ‘killed Instagram lookalike’ to fake her own death (The Telegraph) Police say ‘extraordinary case’ of Shahraban K, 24, dubbed the ‘doppelganger murder’ by German media, was ‘brutal in the extreme’
Woman suspected of killing doppelganger to fake her own death (Washington Post) Two parents were searching for their missing 23-year-old daughter in Germany when they came across a grisly discovery — her parked car with a dead woman in the back seat.
Joe Biden’s Delaware beach house searched by FBI (The Telegraph) White House previously said no classified documents had been found at property in Rehoboth Beach