ISIS opponents (including some rivals from al Qaeda) push back with information operations.
The Putinist hackers who disrupted Ukrainian sites during the recent election sought to pass off old Russian atrocities in Chechnya as fresh Ukrainian murders of ethnic Russians in Donbas. FireEye (with appropriate lawyerly reservations) attributes the APT28 cyber espionage campaign to Russian security services. FireEye notes APT28's careful, sophisticated stealth, but the attribution rests on more than a priori probability.
A wide range of apparently unrelated targets (Uyghur activists, a US think tank, a Japanese industrial site, and the Korean hospitality industry — all, however, surely of some interest to China) suggests that several groups are using the ScanBox keylogger framework.
The Novetta-led industry group that's been investigating a long-running cyber espionage campaign has reported. They call the campaign "Operation SMN," and attribute it to the "Axiom Threat Actor Group" (said to be a Chinese government unit).
CrowdStrike reviews its research into Chinese and Iranian threats.
Intel researchers promise to show how they can forge RSA certificates by exploiting the Mozilla Network Security Services cryptographic library.
Industry observers cry up the importance of risk analysis (and suggest you do some before you buy cyber insurance). Some make it sound simple, flogging the familiar risk equation, but of course the devil's in the details (that is, in the values you assign those variables.)
Banks are increasingly taking stakes in cyber start-ups.
The US releases its cyber operations manual.
The FBI thinks it may have found the NSA's "second leaker."
Today's issue includes events affecting Australia, Canada, China, Egypt, Estonia, France, Iraq, Iran, Israel, Japan, Jordan, Republic of Korea, Kuwait, Lebanon, Qatar, Russia, Saudi Arabia, Syria, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States, and Vietnam.
Islamic State video shows hostage John Cantlie apparently inside Kobani(Los Angeles Times) Islamic State militants on Monday released a video showing a British hostage in what appears to be the besieged Syrian city of Kobani, delivering a mock-up news report declaring that American-led airstrikes meant to to drive off the extremist Sunni Muslim attackers were failing
US official urges allies to combat IS ideology(AP) The United States is pressing Arab nations and other allies to do more to counter the Islamic State group's slick propaganda campaign, with a top American envoy on Monday describing efforts to combat the extremist messages as a vital pillar in the fight to defeat the group
APT28: A Window into Russia's Cyber Espionage Operations?(FireEye) Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. This perception is due in part to the Russian government's alleged involvement in the cyber attacks accompanying its invasion of Georgia in 2008, as well as the rampant speculation that Moscow was behind a major U.S. Department of Defense network compromise, also in 2008. These rumored activities, combined with a dearth of hard evidence, have made Russia into something of a phantom in cyberspace
Researchers identify sophisticated Chinese cyberespionage group(Washington Post) A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China
Operation SMN: Axiom Threat Actor Group Report(Novetta) Axiom is responsible for directing highly sophisticated cyber espionage operations against
numerous Fortune 500 companies, journalists, environmental groups, pro-democracy groups,
software companies, academic institutions, and government agencies worldwide for at least the
last six years. In our coordinated effort, we performed the first ever-private sponsored
interdiction against a sophisticated state sponsored advanced threat group. Our efforts detected
and cleaned 43,000 separate installations of Axiom tools, including 180 of their top tier implants.
This report will expand upon the following key findings
Intel bods to detail RSA birko crypto man-in-the-middle diddle(Register) A pair of Intel security researchers will tomorrow delve into a class of dangerous vulnerabilities they found last month that allowed forged RSA certificates to be created by abusing the Mozilla Network Security Services (NSS) cryptographic library
Could the city of Mobile have prevented a cyber attack?(Fox10 TV) The city of Mobile's email was down for six days before the city's Information Technologies team could get a new server up and running. They had been battling a hacking bug called Shellshock for at least two weeks prior
Cyber Attacks on U.S. Companies in 2014(Heritage Foundation) The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector's information security
Modern Day Dillinger Gangs(Trend Micro: Simply Security) John Dillinger became infamous in the depression era for robbing two dozen banks
The DEF CON 22 Social-Engineer Capture The Flag Report(The Social Engineer) Social-Engineer.org hosted the Social Engineer Capture the Flag (SECTF) contest at DEF CON 22 in Las Vegas, Nevada for the fifth year in a row in August of 2014. This year's competition had the added complexity of requiring contestants to work in teams of 2, necessitating pretexts that allowed for the caller to be handed off without raising suspicion
The Evolution of the CISO Role and Organizational Readiness(CIO) If we look at the headlines surrounding recent data breaches, we might conclude that the role of the chief information security officer (CISO) has never been more critical to the success and sustained well-being of an organization
Everyone wants to sell privacy in the post-Snowden world. But who can you trust?(Washington Post) In the post-Snowden world, privacy is a highly marketable commodity. Big tech companies, perhaps hoping to distance themselves from involvement in National Security Agency, have ramped up their efforts to encrypt user data and new apps, services, and hardware all invoking terms like privacy, anonymous, and, of course, "NSA proof" are a dime a dozen
Mobile Security's Budget Shortfall(eSecurity Planet) Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices
Cyberattacks Most Imminent Threat to U.S. Economy(Threatpost) In a panel discussion Monday morning, a crowded table of top-level security experts from industry, military and government agreed that the threat posed by cyberattacks targeting U.S. critical infrastructure and private industry now outweighs any other national security threat
Cyber security's "Doomsday Warning"(Microscope) Earlier this month, President Obama spoke of a devastating wave of cyber attacks that could soon strike the US in what Washington insiders are calling a "Doomsday Warning"
Highlights from the 2014 ICS Cyber Security Conference(Control Global) The 14th ICS Cyber Security Conference was held from October 20-23 at the Georgia Tech Hotel and Conference Center in Atlanta. The Conference started in 2002 with this year's version being the first under the banner of SecurityWeek. Attendees from multiple industries and countries in North America, South America, Europe, Asia, and the Middle East participated in the 2014 ICS Cyber Security Conference
VA CIO Reveals Biggest Security Concern(HealthcareInfoSecurity) What cybersecurity issue keeps Steph Warren, CIO of the Department of Veterans Affairs, up at night? He tells me it's the potential long-term harm that data breaches and other incidents can have on public faith in e-commerce
Data commute does not compute!(Mozy Blog) Look around any office today and you're likely to see a wheeled laptop bag parked beside many of the desks. Why the wheels? Well, we're all carrying more than just a laptop
DISA Seeks Industry Feedback on Secure Mobile Device Gateways(GovConWire) The Defense Information Systems Agency is seeking information from industry to outline ideas for the Secure Mobile Device Gateways program, which aims to secure mobile gateways in locations within and outside contiguous United States
Army seeks intel trainer(C4ISR & Networks) The Army is preparing to acquire an intelligence and electronic warfare trainer
Fully Hosted Identity / Account Management Service(FedBizOpps) The Department of Homeland Security (DHS), The Office of the Chief Information Officer (OCIO), Director of the Enterprise Systems Development Office (ESDO), requires operation and maintenance (O&M) support and integration services in support of the Citizenship and Immigration Services (USCIS) E-Verify Program is seeking information on how an interested contractor with the capabilities necessary to provide
Bkav to launch global network security contest(VietNamNet Bridge) Bkav network security company plans to host a global WhiteHat Grand Prix Competition in 2015 with the aim of attracting the participation of both domestic and international hackers
APWG launches global cybercrime reporting program(Help Net Security) The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime machine-event data to anti-virus vendors, security companies, investigators and responders
IBM Unveils New Security Offering For Travel & Transportation Industry(Travel Pulse) IBM today introduced a new analytics software and services offering aimed to help companies in the travel & transportation industry mitigate IT security risks and address a growing volume of advanced threats and data compromising incidents faced by the industry. Utilizing counter fraud and security technologies and services, IBM will help hotel chains, airlines, car rental agencies, commercial freight and other industry companies not only assess their current security posture but resolve any potential threats or incoming vulnerability
Using cyber sports to boost security preparedness(GSN) From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players' strategic and tactical prowess on the gridiron
NSA Infiltration into Encryption Systems Shows the Need for Bitcoin and Cryptography(Crypto Coins News) People around the world have to trust the encryption companies for their privacy and security of their computer, phone, credit card, the banking system and more. While there are hacks that exploit holes in those systems, there is a trust that they are not left on purpose. Unfortunately, the NSA had been working and paying to have back doors and holes left in so they can access any data they want
Indiana University investing $7 million for new network complexity institute(FierceBigData) Indiana University (IU) has invested $7 million on its new Network Science Institute, or IUNI. The initiative will "bring together many of the university's top minds to explore and embrace the challenge of understanding complex networks that underlie large-scale systems, including the environment, economics, technology and human health," say university officials
Department of Homeland Security Renews CyberPatriot Support as Cyber Diamond Sponsor(PRNewswire) The Air Force Association today announced that the Department of Homeland Security (DHS) renewed their support for CyberPatriot, the National Youth Cyber Education Program, as a Cyber Diamond sponsor. For the second consecutive year, DHS has sponsored CyberPatriot in its mission to stimulate youth interest in STEM and educate students on the importance of cyber security
A Hacking Contest to Promote Digital Literacy(Trend Micro: Internet Safety for Kids and Families) This year, we are proud to sponsor a great competition designed to promote online safety and digital literacy among our nation's youth
Legislation, Policy, and Regulation
Joint Publication 3-12 (R) Cyberspace Operations(US Department of Defense) This publication provides joint doctrine for the planning, preparation, execution, and assessment of joint cyberspace operations across the range of military operations
New cyber doctrine shows more offense, transparency(FCW) The Pentagon this week published a doctrine that was unusually candid about offensive scenarios in cyberspace, a transparency that experts say could lead to an open and perhaps overdue policy debate
Offensive Cyber Operations in US Military Doctrine(Federation of American Scientists) A newly disclosed Department of Defense doctrinal publication acknowledges the reality of offensive cyberspace operations, and provides a military perspective on their utility and their hazards
UK government cracks down on nuisance calls and texts(ComputerWeekly) The Department for Culture, Media and Sport (DCMS) has announced plans to make it easier for the Information Commissioner's Office (ICO) to fine companies that spam people with nuisance calls and texts
Human Services works to address cybersecurity concerns(ZDNet) Australian Department of Human Services CIO Gary Sterrenberg has said that the agency is moving towards reducing the threat of attack on its systems, following an Australian National Audit Office (ANAO) report that called for the agency to improve its security
Say No to Stalled Cybersecurity Information Sharing Act, Yes to More Information Sharing(Wired) The cybercrime problem is expanding and those perpetrating the crimes are only growing bolder. This year, major companies like Home Depot, eBay, Akamai Technologies and Domino's have all been attacked. Intimate celebrity photos stored on iCloud were leaked in September, and in one of the largest password hacks to date, Russian hackers recently stole more than a billion passwords
Big Brother's Liberal Friends(The National Interest) Sean Wilentz, George Packer and Michael Kinsley are a dismal advertisement for the current state of mainstream liberal thought in America. They have systematically misrepresented and misunderstood Edward Snowden and the NSA
Ex-CBS reporter: Government agency bugged my computer(New York Post) A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a "government-related entity" that planted classified documents on her computer
NSA surveillance limits: The focus turns to courts(NorthJersey.com) While Congress mulls how to curtail the NSA's collection of Americans' telephone records, impatient civil liberties groups are looking to legal challenges already underway in the courts to limit government surveillance powers
NY Senator Calls for Renewed Crackdown on Dark Web Drug Sales(Wired) Three years ago, New York Senator Chuck Schumer held a press conference to pressure federal law enforcement to crack down on the Silk Road, the anonymous online drug market that had only just come to light. Now, over a year since that contraband bazaar was seized by the FBI, Schumer seems to have discovered that the dark web drug trade didn't simply end with Silk Road's demise
Seattle Times Furious With FBI Over Allegations That the Agency Impersonated the Newspaper(The Stranger) Seven years ago, the FBI used a kind of spyware known as a CIPAV to track down and arrest a 15-year-old hacker who was sending bomb threats to a high school near Olympia. Old news for privacy watchdogs. But today, ACLU analyst Christopher Soghoian trawled through an arcane set of the bureau's records and came across something startling: in order to get the suspect's computer infected with the spyware, the documents suggest that the FBI sent a message to him that masqueraded as an e-mail from The Seattle Times
RBS WorldPay hack ringleader finally sentenced(Help Net Security) Nearly five years after the day he was indicted, Sergei Nicolaevich Tsurikov has finally been sentenced for conspiracy to commit wire fraud and computer intrusion for his involvement in an elaborate scheme which stole over $9.4 million from a credit card processor
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Cybergamut Tech Tuesday: Software-Defined Networking Security(Columbia, Maryland, USA, October 28, 2014) Security-Defined Routing combines cyber analytics and SDN to protect the network: SDR technology assists organizations in scaling the delivery of network traffic to analytic security applications. When...
Securing the Social Space(Baltimore, Maryland, USA, October 28, 2014) New technologies enabling greater connectivity bring with them new frontiers for cyber security. This Tech Talk program will offer a new twist on the cyber security conversation. We'll begin by exploring...
USDA Cyber Security Symposium and Expo 2014(Washington, DC, USA, October 28 - 29, 2014) The Summit will provide participants with information and resources on today's vulnerabilities, incidents, security lifecycle, risks and mitigations; it will also identify ways to work together and build...
Cyber Security and IT Day at Fort Carson(Colorado Springs, Colorado, USA, October 28, 2014) The Information Systems Security Association (ISSA) Colorado Springs Chapter ill once again host the 5th Annual Cyber Security & Information Technology Days set to take place at Fort Carson on Tuesday,...
Cyber Security and IT Days at Peterson AFB(Colorado Springs, Colorado, USA, October 29, 2014) The Information Systems Security Association (ISSA) Colorado Springs Chapter will once again host the 5th Annual Cyber Security & Information Technology Days. Government and Industry experts will be on...
Dallas SecureWorld(Dallas, Texas, USA, October 29 - 30, 2014) Offering two days of cyber security education. Earn 12-16 CPE credits, network with industry peers, and take advantage of more than sixty educational events. Over the past decade SecureWorld has emerged...
Cyber Job Fair(Baltimore, Maryland, USA, October 29, 2014) ClearedJobs.Net is partnering with CyberMaryland to present the Cyber Job Fair at the CyberMaryland 2014 conference. The Cyber Job Fair is a hiring event for cleared and non-cleared cybersecurity professionals...
CyberMaryland 2014(Baltimore, Maryland, USA, October 29 - 30, 2014) Entrepreneurs, investors, academia and government will convene in Maryland — the nation's epicenter for cybersecurity for the fourth annual CyberMaryland Conference.
ekoparty Security Conference 10th edition(Buenos Aires, Argentina, October 29 - 31, 2014) ekoparty — Electronic Knock Out Party — Security Conference, is a one of a kind event in South America; an annual security conference held in Buenos Aires, where security specialists from all over Latin...
Cyber Risk Summit(Washington, DC, USA, May 22, 2014) This one-day leadership conference will provide a discussion forum for business executives, insurance companies and policymakers on more effective private and public responses to cyber risk management.
Senior Executive Cyber Security Conference(Baltimore, Maryland, USA, October 30 - November 1, 2014) North Star Group, LLC and the Johns Hopkins University's Whiting School of Engineering and Information Security Institute sponsor this senior executive focused cyber security conference.This event is designed...
FS-ISAC EU Summit 2014(London, England, UK, November 3 - 5, 2014) The Financial Services Information Sharing and Analysis Center (FS-ISAC), is a non-profit association comprised of financial institution members, that is dedicated to protecting the global financial services...
POC2014(Seoul, Republic of Korea, November 4 - 7, 2014) POC (Power of Community) started in 2006 and has been organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC doesn't pursue money. POC concentrates...
Open Source Digital Forensics Conference 2014(Herndon, Virginia, USA, November 5, 2014) This conference focuses on tools and techniques that are open source and (typically) free to use. It is a one day event with short talks packed with information. There are both tool developers and users...
Bay Area SecureWorld(Santa Clara, California, November 5, 2014) A day of cyber security education. Earn 6-8 CPE credits, network with industry peers, and take advantage of more than thirty educational events. Over the past decade SecureWorld has emerged as one of North...
Managing BYOD & Enterprise Mobility USA 2014(San Francisco, California, USA, November 5 - 6, 2014) The Managing BYOD & Mobility USA 2014 conference will provide a unique networking platform, bringing together top executives from USA and beyond. They come together not only to address mobility challenges...
RiseCON 2014(Rosario, Santa Fe, Argentina, November 6 - 7, 2014) Rosario Information Security Conference: es el primer y mayor evento de seguridad informática y hacking realizado en la ciudad de Rosario, con nivel y trascendencia internacional
Israel HLS 2014(Tel Aviv, Israel, November 9 - 12, 2014) The third International Conference on Homeland Security will bring together government officials, public authorities, and HLS industry leaders from around the world to share their knowledge and experience.
i-Society 2014(London, England, UK, November 10 - 12, 2014) i-Society 2014 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society,...
Seattle SecureWorld(Seattle, Washington, USA, November 12 - 13, 2014) Offering two days of cyber security education. Earn 12-16 CPE credits, network with industry peers, and take advantage of more than sixty educational events. Over the past decade SecureWorld has emerged...
AVAR 2014(, January 1, 1970) The 17th Association of anti-Virus Asia Researchers International Conference: Security Down Under. Topics will include case studies of targeted attacks, real-life attack demonstrations, web-inject attacks/code...
ZeroNights 2014(Moscow, Russia, November 13 - 14, 2014) ZeroNights is an international conference dedicated to the practical side of information security. It will show new attack methods and threats, showcase new possibilities of attack and defense, and suggest...
Cyber Security Awareness Week Conference(New York, New York, USA, November 13 - 15, 2014) Get ready for CSAW: the largest student-run cyber security event in the nation, with a research conference that attracts some of the biggest names in the industry, and a career fair with an impressive...
Ground Zero Summit, India(New Dehli, India, November 13 - 16, 2014) Ground Zero Summit (GOS) 2014 in its second year promises to be Asia's largest Information Security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in...
Deepsec 2014(Vienna, Austria, November 18 - 21, 2014) DeepSec is an annual European two-day in-depth conference on computer, network, and application security. This is a non-product, non-vendor-biased conference event. Our aim is to present the best research...
BugCON(Mexico City, Mexico, November 19, 2014) BugCON Security Conference is hardcore technical conference focused on the technical side of the security. Running since 2008 BugCON is the oldest forum where researchers, students and professionals shows...
Navy Now Forum: Admiral Rogers(Washington, DC, USA, November 19, 2014) Leaders from the Navy will present new initiatives in-depth, providing the audience with a thorough knowledge of the Navy's future plans. During the luncheon, military personnel and industry leadership...
International Cyber Warfare and Security Conference(Ankara, Turkey, November 19 - 20, 2014) In-depth discussions will cover: new emerging threats and challenges on cyber warfare, the policy of leading cyber nations in cyber warfare and security, legal aspects of cyber warfare, industrial perspective...
EDSC 2014(Seattle, Washington, USA, November 20 - 21, 2014) EDSC is a security conference focusing on embedded systems, hardware, and anything behind the silicon curtain. Embedded testing is a rapidly expanding area of the security industry staying current is important...
Cyber Security World Conference 2014(New York, New York, USA, November 21, 2014) Welcome to Cyber Security World Conference 2014 where renowned information security authorities and innovative service providers will bring their latest thinking to hundreds of senior executives focused...
Ethiopia Banking and ICT Summit(Addis Ababa, Ethiopia, November 21, 2014) he one day summit is designed to highlight the key Investment opportunities especially in the Banking & ICT Sectors. As an emerging economic capital for the region, Ethiopia is leading the way in industrial...
BSidesVienna(Vienna, Austria, November 22, 2014) BSidesVienna will open it's doors again in 2014. Be part of it and stay tuned
DefCamp5(Bucharest, Romania, November 25 - 29, 2014) DefCamp is the most important conference on Hacking & Information Security in Central Eastern Europe. The goal is bringing hands-on talks about latest research and practices from the INFOSEC field, gathering...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.