Tag Archive for: phase

Fremont County, Colo., in ‘Recovery Phase’ After Cyber Attack


(TNS) — Now going into the seventh week of mitigation and restoration, Fremont County government is now in a recovery phase from the Aug. 17 BlackCat ransomware cyber attack.

An extension of a declaration of a local disaster due to the cybersecurity attack expired Tuesday, and the Fremont County Board of Commissioners has no plans to renew it.

Many departments are back up and fully functional, but others are still in the works. Every computer has had to be shipped out to be scrubbed and then have software re-downloaded.


County Manager Sunny Bryant gave a heartfelt thanks to the county’s IT team who has worked tirelessly since Aug. 17 to restore these systems.

“They have worked long days, through weekends, and gone above and beyond to bring county services back up,” she said. “The last six weeks have been emotional, mentally exhausting and physically exhausting.”

But the IT team showed up day after day, she said, with positive attitudes and dedication.

“All county services were affected by the attack,” Bryant said. “I appreciate the public’s support as we work through this and the patience as services were and continue to be restored.”

Board Chair Debbie Bell said the IT staff put in a lot of blood, sweat and tears over the last six weeks.

“Everyone took this attack very, very personally,” she said. “There is truly nothing personal about it, but it felt personal, even to us.”

She also recognized all of the county staff, department heads, elected officials and Emergency Management for their work during the mitigation process and for continuing to conduct business the best they could without computers.

“Thank you to all of our residents for being graceful and gracious and for being patient with us,” Bell said. “This was not an easy thing for any of us, but we are recovering.”

Fremont County Clerk and Recorder Justin Grantham said Election Department is fully functional and ballots will go out in the mail Oct. 10 for the Nov. 8 election.

The Department of Motor Vehicle also is up and running and Grantham hopes to have the Recording Division’s online database up and running soon. Also still in the process of fully being…

Source…

‘Hack DHS’ Bug Bounty Program to Begin Second Phase with New Contract Request


The Department of Homeland Security has issued a solicitation for companies to provide crowdsourced vulnerability assessment services—including for competitions and live events—for phase two of the agency’s “Hack DHS” bug bounty program. 

The request for proposals says that the contract “will be used to conduct crowdsourced vulnerability discovery and disclosure activities across the full range of networks, systems and information, including web applications, software, source code, software-embedded devices and other technologies as solicited across the whole Department of Homeland Security, or other assets as deemed appropriate by the program office.”

DHS established the “Hack DHS” bug bounty program following passage of the Strengthening and Enhancing Cyber-capabilities by Utilizing Risk Exposure Technology Act, or the SECURE Technology Act, in 2018. Under the law, DHS is required to establish a multi-year bug bounty program allowing eligible individuals, organizations and companies to receive compensation for identifying and reporting vulnerabilities in the agency’s systems. 

The agency announced in April that it has completed the first phase of its bug bounty program, in which 450 vetted security researchers identified 122 vulnerabilities in “select external DHS systems.” 27 of these vulnerabilities were considered “critical” by DHS. Researchers and ethical hackers who participated in the first phase of the program had the opportunity to receive up to $5,000 for identifying verified vulnerabilities, and DHS reported that it awarded a total of $125,600 to participants. 

Under the second phase of the program, researchers and ethical hackers will participate in live hacking events, while the third and final phase will allow DHS to identify and review the lessons learned from the program, as well as plan for additional bug bounty initiatives. 

The RFP calls for six time-boxed challenges and two continuous challenges during the first year of the contract, and then up to 12 time-boxed and five continuous challenges in the optional contract years. The contractors are also expected to conduct live, U.S.-based events with between 15 to 50 researchers, as…

Source…

Dominate the Electromagnetic Spectrum: Lockheed Martin cyber/electronic warfare system moves into next phase of development – Aerotech News

Dominate the Electromagnetic Spectrum: Lockheed Martin cyber/electronic warfare system moves into next phase of development  Aerotech News
“cyber warfare news” – read more