Cyber Connections News Roundup: October 19

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

October 19

Do Public-Private Cybersecurity Partnerships Really Work?

As University of Maryland Global Campus continues to recognize Cybersecurity Awareness Month, Bruce deGrazia, JD, CISSP, collegiate professor of cybersecurity management and policy at UMGC, examines the effectiveness of public-private partnerships to combat cybersecurity challenges. “A public-private partnership takes various forms, from the sharing of costs and profits, as occurs with a toll road, to the sharing of information between the private sector and the government without the fear of liability for antitrust,” said deGrazia. The question remains: Can these partnerships work in a competitive marketplace where cooperation is difficult, a trade secret might be revealed, or if a company might lose a strategic advantage? Read more.

Law Enforcement Community Warns of Cyber Attacks on Water Facilities

According to a recent article on and based on U.S. intelligence and law enforcement reports, ransomware attackers are targeting water and wastewater facilities. A cybersecurity advisory published on Oct. 14 from the FBI, the Cybersecurity Infrastructure and Security Agency, the Environmental Protection Agency and the National Security Agency noted incidents in five states between March of 2019 and August 2021, where systems were targeted by either ransomware attacks or other hacks.  The report noted that water facilities could be vulnerable to common tactics such as spear phishing, exploitation of outdated or unsupported operating systems and software, and the exploitation of control system devices with vulnerable firmware versions. Read more.

Biden Signs K-12 Cybersecurity Act, Bolsters Safeguards for Schools

On Oct. 8, President Biden signed into law the K-12 Cybersecurity Act, legislation that requires the Cybersecurity and Infrastructure Security Agency (CISA) to create cybersecurity recommendations and tools for schools to use to defend themselves against hackers. According to a recent article on, the bipartisan bill lays the groundwork for better cybersecurity policies in our K-12 schools and stronger coordination between them and the experts at CISA. Read more.

TSA to Impose Cybersecurity Mandates for Rail Transit Systems

The federal government, through the Transportation Security Administration (TSA), will impose cybersecurity mandates on “higher-risk’’ railroad and rail transit systems this year, according to a recent article on The move reflects a determination by the Biden administration to compel critical industries to improve their cybersecurity in the wake of damaging cyberattacks. The new mandates will apply to passenger rail companies such as Amtrak as well as large subway systems including New York’s and Washington’s. Read more.

Deep Fake Technology Results in $35 Million Bank Heist

A recent story on chronicles the power and criminal potential of deep fake technology. In early 2020, cybercriminals cloned the voice of a company director in the United Arab Emirates (UAE) to steal as much as $35 million. The article describes how a bank manager in the UAE received a call from someone he recognized who was about to make some acquisitions and needed the bank to authorize transfers totaling $35 million. The bank manager made the transfers not realizing that deep voice technology had been used to clone the director’s speech. The UAE serves as a warning about the use of AI to create so-called deep fake images and voices  in cybercrime. Read more.

UMGC Cyber Experts Predict Rise in Attacks on Software, Cloud and Critical Infrastructure in the Year Ahead

In this end-of-the-year post we offer a reprint of our annual predictions and trends to watch out for in 2021, featured on the University of Maryland Global Campus Global Media Center back in November.  

UMGC Cyber Experts Predict Rise in Attacks on Software, Cloud and Critical Infrastructure in the Year Ahead

What a year 2020 has been. The Covid-19 pandemic has had an impact on our lives in so many ways—how we work, conduct business, socialize, learn and simply go about our daily routines. It also has affected the security of the workplace and individuals. We have seen a rise in phishing, ransomware and other types of malicious attacks due, in large part, to the dramatic increase in remote work and learning.

Meanwhile, the lead-up to the November 3 election exposed both the real—and imagined—vulnerabilities in the nation’s disparate voting systems. A citizenry that was already anxious about voting during a pandemic also had to sort through a tsunami of news stories questioning the legitimacy of election results and the accuracy and security of our voting process.

Will the cybersecurity concerns of 2020 carry over into the new year?

Here are the top six trends and predictions to watch for in 2021, according to University of Maryland Global Campus cybersecurity faculty experts Valorie King, program director for UMGC Cybersecurity Management and Policy; Bruce DeGrazia, collegiate professor, Cybersecurity Management and Policy; and James Robertson, program director for Cyber DevOps.

From Valorie King, program director, UMGC Cybersecurity Management and Policy

  • Attacks on Remote Workers: Phishing attacks, ransomware, and other types of malicious software-based attacks will create more havoc in the coming year as perpetrators shift their attack vectors and methods to focus on remote workers. Organizations will need to update their incident response plans and procedures to account for attacks against a dispersed workforce that is using an increasing variety of remotely connected and potentially vulnerable devices.
  • Demand for IT Support: In order to protect geographically dispersed IT assets and information as they defend against threats and attacks, organizations with remote workers will need to hire and train more IT technicians and IT help desk personnel who have advanced cybersecurity skills and knowledge. This trend will be fueled by the need to patch and maintain increasing numbers of laptops and other digital devices, the need to remotely install and maintain more software, and the need to set up and then deploy new computers, tablets, phones and other equipment to a remote workforce.

From Bruce DeGrazia, collegiate professor, Cybersecurity Management and Policy

  • State-Sponsored Cyberattacks: The Russians, Chinese, North Koreans and Iranians have already seen how effectively they can create chaos both through cyberattacks and disinformation campaigns. Expect to see further attempts at disruption as these countries test the incoming Biden administration.
  • Attacks on the Utility Infrastructure: We will see a rise in critical infrastructure attacks, particularly to the electrical grid, but also against alternative energy-generating industries as we continue to shift away from fossil fuels. These attacks will soon target alternative energy-generation facilities as they become more prevalent.

From James Robertson, program director for Cyber DevOps

  • Threats to Cloud Security: As more organizations move to the cloud, security issues resulting from poor or expedited implementations will result. Understanding the shared responsibility model—the responsibility for security is shared between the provider and the customer—is key in mitigating these issues.
  • AI Vulnerabilities: Increases in artificial intelligence/machine learning applications will cause an increase in vulnerabilities and weaknesses, including the ability to contaminate training pools, modify validation sets, and create AI systems that learn from previous successful attacks to expedite attacks on other hosts.