cis

NLRB Decision Addresses Interaction between Confidentiality and Nondisparagement Provisions in Severance Agreements and Section 7 Rights

  • In McLaren Macomb, the NLRB overturned two decisions that had permitted employers to include confidentiality and nondisparagement provisions in severance agreements.
  • “Mere proffer” of a severance agreement that conditions receipt of benefits on the “forfeiture of statutory rights” violates the NLRA.
  • This Insight includes key takeaways from the Board’s decision and answers to common employer questions.




cis

Littler Continues Run on Lateral Market with Kaiser Permanente Attorney in San Francisco

Melissa Cee and Erin Webber discuss hiring the sixth shareholder at Littler – Noah Garber – since July as part of Littler’s new talent strategy that the firm began developing last year. 

The Recorder

View (Subscription required.)




cis

San Francisco Mandates Paid Military Leave

Sebastian Chilco and Wendy Buckingham discuss a new San Francisco law that aims to increase income and employment security for private-sector employees when they perform military service.

SHRM Online

View (Subscription required.)




cis

Pro Bono Week Podcast – Law Firm Antiracism Alliance: Police Brutality

Nicole LeFave, Vinay Patel and Garrick Chan share their experience with Jenny Schwendemann of working on a collaborative effort through the Law Firm Antiracism Alliance.

Littler attorneys provide pro bono services in a variety of areas, depending on the interests of individual attorneys. The firm values and encourages the community-minded and pro bono efforts of our lawyers and staff.
  




cis

Alumnus leads bar association, combats racism

William Ng shares how he plans to use his president-elect status of the Asian American Bar Association of New York (AABANY) to help Asian Americans advance in the legal profession while combating racism. 

Binghamton University Alumni Connect

View Article 




cis

San Francisco Benefits Summit




cis

USCIS Announces Increase of Filing Fees

On January 30, 2024, U.S. Citizenship and Immigration Services (USCIS) announced an increase to its filing fees across the board. The last such increase was in 2016. This change will be effective April 1, 2024. In some cases, increases are minor, but several are substantive.




cis

USCIS Announces Upcoming H-1B Cap Lottery Dates and New Beneficiary-Centric Selection Process

USCIS has officially announced the dates for the fiscal year (FY) 2025 H-1B cap lottery, which will open on Wednesday, March 6, 2024 at noon ET and end on Friday, March 22, 2024, at noon ET. This annual lottery is meant to select new H-1B candidates, who will be eligible to file an H-1B petition and, if approved, begin H-1B employment on October 1, 2024 (the first day of FY 2025).




cis

USCIS to Implement Varying Filing Fees by Visa Category

In just two weeks, on April 1, 2024, U.S. Citizenship and Immigration Services (USCIS) will implement its new filing fee structure. The new fees will vary by visa type with exceptions for small employers and non-profit entities. A new Asylum Program Fee will also be added to certain petitions.

As an example of the upcoming changes, the following chart covers a comparison of the most common visa types:

VISA CATEGORY




cis

Summary of Upcoming Changes to USCIS Filing Requirements in April 2024

April 1, 2024, will mark the beginning of new changes to USCIS form editions, filing fees, and direct filing addresses for many common immigration applications and petitions.

Of particular note are the upcoming changes to the filing requirements for the Form I-129 and Form I-140. With the H-1B lottery filing window set to open on April 1 for those selected in the FY 2025 H-1B lottery, it is imperative for visa petitioners to be mindful of the upcoming changes to avoid any unnecessary rejections of their potentially time-sensitive filings.

Filing Fees




cis

USCIS Extends Work Permits Under TPS Designations for Certain Countries

On June 20, 2024, USCIS extended the validity of certain work permits issued to Temporary Protected Status (TPS) beneficiaries under the TPS designations for El Salvador, Honduras, Nepal, Nicaragua, and Sudan. All impacted beneficiaries will receive Form I-797, Notice of Action, notifying them of the extension of their Employment Authorization Documents (EADs or “work permits”) through March 9, 2025.




cis

High Court's SEC Decision Has Limited NLRB Impact, For Now

Alexander MacDonald says Jarkesy's biggest effect on the NLRB might come not from what the court ruled, but from what it decided not to rule on.

Law360 Employment Authority

View (Subscription required.)




cis

Agencies’ Influence over Employers May Erode After Supreme Court Decision

Alexander MacDonald says agencies may have to “regulate more modestly and litigate more often” after the U.S. Supreme Court overruled Chevron.

SHRM Online

View (Subscription required.)




cis

Recent Injunction Decisions Muddy Labor Board's Future

Alex MacDonald says the NLRB's judges aren’t necessarily the sort of officers whom the president has the power to remove under Jarkesy and Supreme Court precedents.

Law360 Employment Authority

View (Subscription required.)




cis

A Regression to Politics? Recent Court Decisions Could Give Partisanship Even More Influence at the NLRB

Alex MacDonald discusses recent court decisions that criticized the way the NLRB operates and that could transform American labor law.

Washington Legal Foundation

View




cis

Senior living industry celebrates decision overruling FTC’s noncompete ban

Melissa McDonagh said employers should continue to be thoughtful with their approach to noncompete agreements, ensuring compliance with existing state laws and monitoring the status of the FTC noncompete rule as it winds its way through the appellate process.

McKnights Senior Living

View




cis

San Francisco-Based Employees? Health Care Expenditures May Be Required

  • The San Francisco Health Care Security Ordinance (HCSO) requires employers to make certain health care expenditures on behalf of their San Francisco-based employees, even if the employer is not located in the City.
  • Given the complexity of the HCSO, it is advisable to consult with experienced legal counsel to ensure full compliance with all aspects of the law.




cis

San Francisco-Based Employees: Health Care Expenditures May Be Required

Anne C. Sanchez and Briana M. Swift explain what employers need to know about the San Francisco Health Care Security Ordinance (HCSO), a local ordinance that requires employers to make certain healthcare expenditures on behalf of their San Francisco-based employees.

SHRM

View (Subscription required)




cis

Azeem Rafiq racism case a ‘classic example of failure’

Natasha Adom weighs in on racism experienced by former cricket player Azeem Rafiq.

Personnel Today

View (Subscription required.)




cis

What Does the Supreme Court’s Decision Not to Review the Standard for Attorney-Client Privilege Mean for Employers?

As workplace issues have become more complex, human resource professionals and managers often turn to employment lawyers for advice in sorting out matters involving the interaction between business requirements and the requirements of employment laws and regulations. When is such advice protected from disclosure under the attorney-client privilege?




cis

USCIS Has Introduced E-Verify+ — What Is It?

  • E-Verify+ is a new voluntary employee verification process that allows employees to complete their Forms I-9 through E-Verify.
  • The process has benefits and detriments, so employers invited to participate in the program should discuss E-Verify+ with their immigration counsel to determine whether it is right for their organization.




cis

Two Developments Could Impact California’s Proposed Regulations Governing AI and Automated Decision-making

Two noteworthy developments have occurred since the California Fair Employment & Housing Council released draft revisions to the state’s employment non-discrimination laws on March 15, 2022 that relate to the nascent law surrounding the use of artificial intelligence, machine learning, and other data-driven statistical processes to automate decision-making in the employment context.  




cis

New York Legislature Bans Consideration of Most Older Convictions in Employment Decisions

UPDATE: Governor Hochul signed this bill on November 16, 2023, which will take effect one year from signing.

*  *  *




cis

New York Bans Consideration of Sealed Convictions in Employment Decisions

Michael Paglialonga and Stephen Fuchs discuss New York’s new Clean Slate Act, which will prohibit employers from inquiring about sealed records or discriminating against applicants or employees based on sealed records.

SHRM Online

View (Subscription required.)




cis

California Appellate Court Decision Limits Power of Arbitrators to Cure Late Arbitration Payments

On June 28, 2023, the California Second District Court of Appeal issued a decision interpreting the scope of California Code of Civil Procedure section 1281.98(a)(1), a recently amended California statute that requires employers to pay all arbitration costs and fees within 30 days of the due date, or risk being in material breach of the arbitration agreement.  In Cvejic v. Skyview Capital, the court held that an arbitrator cannot cure a missed or late arbitration fee payment.




cis

USCIS Changes Policy Guidance Regarding Special Student Relief

The U.S. Citizenship and Immigration Services recently announced that it is clarifying the validity period of off-campus employment authorization for international students pursuant to the Special Student Relief (SSR) package.




cis

USCIS Updates Policy Guidance for International Students

The U.S. Citizenship and Immigration Services (USCIS) recently updated guidance in its policy manual regarding international students within F and M student classifications. This new guidance consolidates and provides greater clarity on existing policy for international students.




cis

USCIS Updates Guidance for F-1 Students on OPT and STEM OPT Eligibility

The F-1 nonimmigrant visa status allows noncitizens to study in the United States at U.S. colleges and universities. F-1 students may be eligible for off-campus employment under the following programs: Curricular Practical Training; Optional Practical Training (OPT); and Science, Technology, Engineering, and Mathematics Optional Practical Training Extension (STEM OPT). General eligibility requirements for off-campus F-1 employment include that the training be related to the student’s area of study and be authorized by the Designated School Official and U.S.




cis

More Workers Seek Mental Health Accommodations, Creating Vexing Legal, HR Decisions for Firms

Devjani Mishra discusses findings from Littler’s 2024 Annual Employer Survey Report that show an increase in workplace requests for leaves of absence or other accommodations for mental health.

Corporate Counsel

View (Subscription required.)




cis

SCOTUS decision may have ramifications for OSHA and MSHA

Alka Ramchandani-Raj says the Supreme Court’s Jarkesy decision could mean at least one type of OSHA case could see a change in venue in the future. 

Safety+Health

View




cis

What do recent Supreme Court decisions mean for OSHA and other safety agencies?

Commenting on a SCOTUS decision, Alka Ramchandani-Raj said a type of OSHA matter that could see a future change in venue may be those involving certain General Duty Clause citations. 

Safety+Health

View 




cis

Ontario, Canada Court Affirms City Lacked Control of Workplace and Exercised Due Diligence, Upholding Acquittal of OHSA Charges

In R. v. Greater Sudbury (City), 2024 ONSC 3959, the Ontario Superior Court of Justice (OSCJ) dismissed an appeal of the trial judge’s decision in which she acquitted the City of Sudbury (City) of various charges under the Occupational Health and Safety Act (OHSA).




cis

Understanding the NLRB’s Healthcare Rule in Light of Recent Union Organizing Trends and Board Decisions




cis

Once Bitten, Twice Shy: COBRA Excise Tax Audits May Add to COBRA's Bite

The advent of Health Care Reform has not lessened the importance of complying with existing Employee Retirement Income Security Act (ERISA) and Internal Revenue Code requirements for employer-provided group health plans, such as COBRA, which requires covered health plans to provide certain notices and the opportunity to elect continued coverage to covered persons (qualified beneficiaries) who would otherwise lose coverage because of certain "qualifying events" such as termination of employment, loss of dependent status, and others.

IRS Updated COBRA Audit Guidelines




cis

California Restricts Employer’s Ability to Make Decisions Based on an Individual’s Criminal History




cis

Court finds employers' discretion in awarding bonuses must be exercised fairly

Rhonda B. Levy and George Vassos discuss an Ontario Court of Appeal decision that puts employers on notice that their discretion in awarding bonuses is not unconstrained and must be exercised fairly and reasonably.

Human Resources Director Canada

View (Subscription required.) 




cis

Canada: SCC Decision Offers Potential Insight into Privacy Rights for Private-Sector Employees

In a significant decision focused on public employers, the Supreme Court of Canada (SCC) recently held that Ontario public school boards are “government” and, as such, they are subject to the provisions of the Canadian Charter of Rights and Freedoms (Charter), and their teachers are protected from unreasonable search and seizure in their places of employment. In York Region District School Board v.




cis

Texas Court to Weigh Overtime Rule With Trump Rescission Looming

While the state of Texas and businesses tries to convince a federal district court that the US DOL went beyond its authority with a rule expanding overtime protections, Jim Paretti says that if employers in Texas continue operating business as usual, they will be doing so at their own risk.

Bloomberg Law

View (Subscription required)




cis

ETSI welcomes the strengthened role for NSOs in the decision-making process of European standards

ETSI welcomes the strengthened role for NSOs in the decision-making process of European standards

Sophia Antipolis, 19 October 2022

The EU member states' ambassadors today endorsed the final compromise text of the Amendment to regulation 1025/2012 with regard to the decisions of European standardization organizations concerning European standards and European standardization deliverables.

Read More...




cis

San Francisco Bay Area Holiday Party - Don't Miss the Fun!

Starts: Sun, 08 Dec 2024 18:30:00 -0500
12/08/2024 04:30:00PM
Location: San Mateo, U. S. A.




cis

FY 2024 State and Local Cybersecurity Grant Program Adds CISA KEV as a Performance Measure

The CISA Known Exploited Vulnerabilities (KEV) catalog and enhanced logging guidelines are among the new measurement tools added for the 2024 State and Local Cybersecurity Grant Program.

Last month, the Department of Homeland Security announced the availability of $279.9 million in grant funding for the Fiscal Year (FY) 2024 State and Local Cybersecurity Grant Program (SLCGP). Now in its third year, the four-year, $1 billion program provides funding for State, Local and Territorial (SLT) governments to implement cybersecurity solutions that address the growing threats and risks to their information systems. Applications must be submitted by December 3, 2024.

While there are no significant modifications to the program for FY 2024, the Federal Emergency Management Agency (FEMA), which administers SLCGP in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), identified key changes, some of which we highlight below:

The FY 2024 NOFO adds CISA’s KEV catalog as a new performance measure and recommended resource

The FY 2024 notice of funding opportunity (NOFO) adds the CISA Known Exploited Vulnerabilities (KEV) catalog as a recommended resource to encourage governments to regularly view information related to cybersecurity vulnerabilities confirmed by CISA, prioritizing those exploited in the wild. In addition, CISA has added “Addressing CISA-identified cybersecurity vulnerabilities” to the list of performance measures it will collect through the duration of the program.

Tenable offers fastest, broadest coverage of CISA’s KEV catalog

At Tenable, our goal is to help organizations identify their cyber exposure gaps as accurately and quickly as possible. To achieve this goal, we have research teams around the globe working to provide precise and prompt coverage for new threats as they are discovered. Tenable monitors and tracks additions to the CISA KEV catalog on a daily basis and prioritizes developing new detections where they do not already exist.

Tenable updates the KEV coverage of its vulnerability management products — Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management — allowing organizations to use KEV catalog data as an additional prioritization metric when figuring out what to fix first. The ready availability of this data in Tenable products can help agencies meet the SLCGP performance measures. This blog offers additional information on Tenable’s coverage of CISA’s KEV catalog.

FY 2024 NOFO adds “Adopting Enhanced Logging” as a new performance measure

The FY 2024 NOFO also adds “Adopting Enhanced Logging” to the list of performance measures CISA will collect throughout the program duration.

How Tenable’s library of compliance audits can help with Enhanced Logging

Tenable's library of Compliance Audits, including Center for Internet Security (CIS) and Defense Information Systems Agency (DISA), allows organizations to assess systems for compliance, including ensuring Enhanced Logging is enabled. Tenable's vulnerability management tools enable customers to easily schedule compliance scans. Users can choose from a continuously updated library of built-in audits or upload custom audits. By conducting these scans regularly, organizations can ensure their systems are secure and maintain compliance with required frameworks.

FY 2024 NOFO continues to require applicants to address program objectives in their applications

As with previous years, the FY 2024 NOFO sets four program objectives. Applicants must address at least one of the following in their applications:

  • Objective 1: Develop and establish appropriate governance structures, including by developing, implementing, or revising Cybersecurity Plans, to improve capabilities to respond to cybersecurity incidents, and ensure operations.
  • Objective 2: Understand their current cybersecurity posture and areas for improvement based on continuous testing, evaluation, and structured assessments.
  • Objective 3: Implement security protections commensurate with risk.
  • Objective 4: Ensure organization personnel are appropriately trained in cybersecurity, commensurate with responsibility.

How Tenable can help agencies meet Objective 2 of the program

Tenable is uniquely positioned to help SLTs meet Objective 2 through the Tenable One Exposure Management Platform. In addition to analyzing traditional IT environments, Tenable One analyzes cloud instances, web applications, critical infrastructure environments, identity access and privilege solutions such as Active Directory and more — including highly dynamic assets like mobile devices, virtual machines and containers. Once the complete attack surface is understood, the Tenable One platform applies a proactive risk-based approach to managing exposure, allowing SLT agencies to successfully meet each of the sub-objectives outlined in Objective 2 (see table below).

Sub-objectiveHow Tenable helps
2.1.1: Establish and regularly update asset inventoryTenable One deploys purpose-built sensors across on-premises and cloud environments to update inventories of human and machine assets, including cloud, IT, OT, IoT, mobile, applications, virtual machines, containers and identities
2.3.2. Effectively manage vulnerabilities by prioritizing mitigation of high-impact vulnerabilities and those most likely to be exploited.

Tenable One provides an accurate picture of both internal and external exposure by detecting and prioritizing a broad range of vulnerabilities, misconfiguration and excessive permissions across the attack surface.

Threat intelligence and data science from Tenable Research are then applied to give agencies easy-to-understand risk scores. For example, Tenable One provides advanced prioritization metrics and capabilities, asset exposure scores which combine total asset risk and asset criticality, cyber exposure scoring which calculates overall exposure for the organization, peer benchmarking for comparable organizations, as well as the ability to track SLAs and risk patterns over time.

Further, Tenable One provides rich critical technical context in the form of attack path analysis that maps asset, identity and risk relationships which can be exploited by attackers. It also provides business context by giving users an understanding of the potential impact on the things that matter most to an agency, such as business critical apps, services, processes and functions. These contextual views greatly improve the ability of security teams to prioritize and focus action where they can best reduce the potential for material impact. These advanced prioritization capabilities, along with mitigation guidance, ensure high-risk vulnerabilities can be addressed quickly.

2.4.1 SLT agencies are able to analyze network traffic and activity transiting or traveling to or from information systems, applications, and user accounts to understand baseline activity and identify potential threats.

Tenable provides purpose-built sensors, including a passive sensor, which can determine risk based on network traffic. After being placed on a Switched Port Analyzer (SPAN) port or network tap, the passive sensor will be able to discover new devices on a network as soon as they begin to send traffic, as well as discover vulnerabilities based on, but not limited to:

  • Services
  • User-agents
  • Application traffic
2.5.1 SLT agencies are able to respond to identified events and incidents, document root cause, and share information with partners.

Tenable One can help SLT agencies respond to identified events and incidents and document root cause more quickly. SOC analysts managing events and incidents and vulnerability analysts focused on remediation of vulnerabilities have access to deep technical content in the form of attack paths, with risk and and configuration details to verify viability, as well as business context to understand the potential impact to their agency.

This information is valuable not only to validate why IT teams should prioritize mitigation of issues before breach, but to prove that a successful attack has occurred. Further, agencies can deliver dashboards, reports and scorecards to help share important security data in meaningful ways across teams and with partners. Agencies are able to customize these to show the data that matters most and add details specific to their requirements. 

Source: Tenable, October 2024

Tenable One deployment options offer flexibility for SLT agencies

Tenable offers SLT agencies flexibility in their implementation models to help them best meet the requirements and objectives outlined as part of the SLCGP. Deployment models include:

  • Centralized risk-based vulnerability program managed by a state Department of Information Technology (DoIT)
  • Multi-entity projects
  • Decentralized deployments of Tenable One managed by individual municipalities,
  • Managed Security Service Provider (MSSP) models that allow agencies to rapidly adopt solutions by utilizing Tenable’s Technology Partner network.

Whole-of-state approach enables state-wide collaboration and cooperation

A “whole-of-state” approach — which enables state-wide collaboration to improve the cybersecurity posture of all stakeholders — allows state governments to share resources to support cybersecurity programs for local government entities, educational institutions and other organizations. Shared resources increase the level of defense for SLTs both individually and as a community and reduce duplication of work and effort. States get real-time visibility into all threats and deploy a standard strategy and toolset to improve cyber hygiene, accelerate incident response and reduce statewide risk. For more information, read Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach.

FY 2024 NOFO advises SLT agencies to adopt key cybersecurity best practices

As in previous years, the FY 2024 NOFO again recommends SLT agencies adopt key cybersecurity best practices. To do this, they are required to consult the CISA Cross-Sector Cybersecurity Performance Goals (CPGs) throughout their development of plans and projects within the program. This is also a statutory requirement for receiving grant funding.

How Tenable One can help agencies meet the CISA CPGs

The CISA CPGs are a prioritized subset of cybersecurity practices aimed at meaningfully reducing risk to critical infrastructure operations and the American people. They provide a common set of IT and operational technology (OT) fundamental cybersecurity best practices to help SLT agencies address some of the most common and impactful cyber risks. Learn more about how Tenable One can help agencies meet the CISA CPGs here.

Learn more




cis

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.

Dive into six things that are top of mind for the week ending Nov. 8.

1 - CISA: Beware of nasty spear-phishing campaign

Proactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.

Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.

“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads.
 


Other CISA recommendations include:

  • Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFA
  • Educate users on how to spot suspicious emails
  • Hunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and procedures

Although CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.

To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.

For more information about securing RDP tools:

2 - OWASP issues AI security resources

How should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?

These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project

The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.



These are the new resources:

  • The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:
    • preparation
    • detection and analysis
    • containment eradication and recovery
    • post-incident activity
  • The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:
    • Generative AI security policies
    • Risk assessment and management processes
    • Training and awareness
    • Research and development
  • The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.

To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”

For more information about protecting your organization against deepfakes:

3 - Fake update variants dominate list of top malware in Q3

Hackers are doubling down on fake software-update attacks.

That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.

Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.


(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)

In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.

Here’s the full list, in descending order:

  • SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates 
  • LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updates
  • ClearFake, another JavaScript downloader used for fake browser-update attacks
  • ZPHP, another JavaScript downloader used for fake software-update attacks
  • Agent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshots
  • CoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)
  • Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functions
  • Mirai, a malware botnet that compromises IoT devices to launch DDoS attacks
  • NanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheet
  • Lumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking information

To get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.

For details on fake update attacks:


VIDEO

Fake Chrome Update Malware (The PC Security Channel)

4 - CISA’s first international plan unveiled

CISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.

Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.

The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:

  • Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructure
  • Boost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreats
  • Unify the coordination of international activities to strengthen cyberdefenses collectively

The plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.

5 - Interpol hits phishers, ransomware gangs, info stealers

Interpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.

The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.


“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.

In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.

For more information about global cybercrime trends:

6 - IST: Ransomware attacks surged in 2023

Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).

The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. 

“Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.

Global Ransomware Incidents in 2023

Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. 

The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.

The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.

To learn more about ransomware trends:




cis

OSC study finds ESG ratings greatly influence investor decisions but are difficult to understand

TORONTO – The Ontario Securities Commission (OSC) today released the results of a study examining the influence of environmental, social and governance (ESG) factors on retail investor decision making.




cis

How can African agriculture adapt to climate change: Impacts of considering climate variability on investment decisions in Ethiopia [in Amharic]

Numerous studies indicate that agricultural production is sensitive to climate variability, and lack of infrastructure in developing countries increases vulnerability to extreme climate events. In Ethiopia, the historical climate record indicates frequent droughts and floods, which can devastate agricultural production and existing infrastructure. Too much precipitation can flood crops, rot or suffocate roots, and wash out roads, creating similar economic conditions to those resulting from drought.




cis

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work»

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work» Del 5...




cis

Ncis: Los Angeles Season 12 disc 4

The twelth season finds Callen and Sam continuing to take on dangerous, vital cases with international ties while working to find balance as they each try to maintain new and blossoming relationships. Also, Hetty finds a cryptic way to lure Nell back to NCIS, and Deeks and Kensi will take the big step of looking to purchase their first home as they continue to try to have a baby, which may need to take a backseat when Deeks finds himself sidelined from his job, and a case from Kensi’s past will put her life in jeopardy.




cis

Ncis: Los Angeles Season 12 disc 5

The twelth season finds Callen and Sam continuing to take on dangerous, vital cases with international ties while working to find balance as they each try to maintain new and blossoming relationships. Also, Hetty finds a cryptic way to lure Nell back to NCIS, and Deeks and Kensi will take the big step of looking to purchase their first home as they continue to try to have a baby, which may need to take a backseat when Deeks finds himself sidelined from his job, and a case from Kensi’s past will put her life in jeopardy.




cis

Ncis: New Orleans Final Season disc 2

The seventh season finds Pride and the team fighting for justice in their beloved city as New Orleans grapples with the effects of COVID-19. Pride, seeing how the pandemic has overwhelmed the system, finds creative ways to help his neighbors with the assistance of Rita Devereaux, and is asked by the Mayor to be a part of a special task force assigned to help make actual change in their city. Also, Wade is overwhelmed by the high volume in the morgue due to COVID-19, Hannah shoulders being separated from her daughter, and Tammy and Carter investigate a suspicious death aboard a humanitarian ship offshore, where they learn that some crew members are infected with the deadly virus.




cis

Ncis: New Orleans Final Season disc 3

The seventh season finds Pride and the team fighting for justice in their beloved city as New Orleans grapples with the effects of COVID-19. Pride, seeing how the pandemic has overwhelmed the system, finds creative ways to help his neighbors with the assistance of Rita Devereaux, and is asked by the Mayor to be a part of a special task force assigned to help make actual change in their city. Also, Wade is overwhelmed by the high volume in the morgue due to COVID-19, Hannah shoulders being separated from her daughter, and Tammy and Carter investigate a suspicious death aboard a humanitarian ship offshore, where they learn that some crew members are infected with the deadly virus.




cis

Ncis: New Orleans Final Season disc 4

The seventh season finds Pride and the team fighting for justice in their beloved city as New Orleans grapples with the effects of COVID-19. Pride, seeing how the pandemic has overwhelmed the system, finds creative ways to help his neighbors with the assistance of Rita Devereaux, and is asked by the Mayor to be a part of a special task force assigned to help make actual change in their city. Also, Wade is overwhelmed by the high volume in the morgue due to COVID-19, Hannah shoulders being separated from her daughter, and Tammy and Carter investigate a suspicious death aboard a humanitarian ship offshore, where they learn that some crew members are infected with the deadly virus.