Terror Suspect Released in Detroit CaseA federal judge has released from prison an immigrant whose conviction in the Detroit terrorims case was thrown out. According to a report in The New York Times, Karim Koubriti, a 26-year-old Moroccan, has been moved to a halfway house. Koubriti was one of four Arab immigrants that the government though had formed a terrorism cell based in Detroit. He and another defendant were convicted last year on charges of material support of terrorism and document fraud. Another was convicted of document fraud and a fourth was acquitted. Last month, however, Judge Gerald A. Rosen threw out the convictions at the government’s request.For more details, read the full article in The New York Times.Microsoft Releases New Patches Microsoft has released patches designed to fix 21 known vulnerabilities in its Windows operating system. According to a story in the Washington Post, seven of the flaws are critical and could allow attackers to hijack affected PCs by simply convincing users to visit certain websites. “I’ve never seen Microsoft release this many patches at one time,” said Darwin Herdman, chief technology officer at Red Siren, a Pittsburgh based Internet security company. “The install base for these flaws is enormous.”For more details, read the full article in the Washington Post. DHS to Raise Profile of CybersecurityUnder pressure from technology executives and experts, Homeland Defense Secretary Tom Ridge said Wednesday that cybersecurity should have a higher profile within DHS. According to a Washington Post report, Ridge told a White House advisory group that the agency was creating a new position of assistant secretary in charge of cyber security and telecom security. Later a spokesperson for DHS said that Ridge misspoke and the job will instead be at the deputy assistant secretary level.For more details, read the full article in teh Washington Post. Related content feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem. By Maria Korolov Nov 29, 2023 9 mins Security Practices Vulnerabilities Security news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Cloud Security news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe