A cyber gang calling itself the "Armada Collective" is attempting to extort a big ransom (payable in Bitcoin) from Greece's banks. If the banks pay up by Thursday, they'll be spared what the criminals describe as a crippling denial-of-service attack.
Anonymous displays either ability to multitask or inability to focus as it shifts attention from ISIS to a United Nations climate change site. (Earlier this week the target was Icelandic whaling.)
Damballa takes a look at the recently revived Darkode criminal forum and finds, basically, good news: it's not particularly well put-together or administered.
Checkpoint's list of top malware families currently hitting businesses is interesting, especially because of the familiarity of the names on it. Conficker leads, with Sality, Cutwail, Neutrino EK, and Gamarue rounding out the top five.
Researchers say that Telegram, recently in the news as ISIS's allegedly favorite messaging app, seems relatively easy to crack. "Too easy to work out who's talking to whom."
SEC Consult adds to worries about the security of the Internet-of-things: it reports finding millions of things secured by the same supposedly private (but actually not-so-private) keys.
Researchers at Perfect Privacy report that many VPNs capable of port forwarding are leaking IP addresses.
Toymaker VTech (called "scroogelike" by Dark Reading) whose Internet-connected toys encouraged children to share pictures and chats, then exposed the same, remains under scrutiny, some of it now prosecutorial.
Businesses continue to grapple with security return-on-investment and cyber value-at-risk.
Some suggest Israeli practice might usefully inform the US encryption debate.
Today's issue includes events affecting Argentina, Brazil, China, Greece, Iraq, Israel, Japan, Republic of Korea, Kosovo, Libya, Luxembourg, Malaysia, Pakistan, Syria, United Kingdom, United States.
We're covering today's inaugural IoT Security Foundation Conference in London. Watch for a full account of the proceedings in tomorrow's issue.
Malvertising — When will we learn?(Check & Secure) We have spoken previously about the responsibility of advertisers to keep their networks clean and to ensure that even if the messages they display are annoying, uncalled for and bandwidth sapping, they are at least safe and free from Malvertising
EY: Cybersecurity threats major concern for global corporate sector(Deal Street Asia) At least a third of global organisations (global: 36 per cent, Singapore: 30 per cent) still lack confidence in their ability to detect sophisticated cyberspace attacks, according to the annual EY's Global Information Security Survey (GISS) 2015, Creating trust in the digital world
Cyber Security Risk a Factor in Hospital Credit Ratings(HealthLeadersMedia) The not-for-profit healthcare sector is not immune to cyber security threats, particularly as they relate to patient records and the disruption of medical technology, Moody's Investors Service says. And larger healthcare systems are more vulnerable than stand-alone hospitals
How CISOs Can Change The Game of Cybersecurity(Dark Reading) In the modern enterprise, chief information security officers need a broad mandate over security and risk management across all operational silos, not just the datacenter
6 Experts on How to Win at Managed Security(Channel Partners) Enterprises that work with security solution providers or MSSPs rather than managing security in-house enjoy a lot of benefits, including lower costs and access to staff and skills they may not be able to find — or afford to hire, even if the talent were available
MISP taxonomies and classification as machine tags(CIRCL) Taxonomies that can be used in MISP (2.4) and other information sharing tool and expressed in Machine Tags (Triple Tags). A machine tag is composed of a namespace (MUST), a predicate (MUST) and an (OPTIONAL) value. Machine tags are often called triple tag due to their format
NIST at work on new data safety guide(FierceGovernmentIT) As the year nears its close, the data breaches that came to light in the past 12 months remain top of mind. To help combat that cyber threat, the National Institute of Standards and Technology is seeking comments on a new project that would help organizations prepare for and recover from data attacks
Shop Safely During Black Friday and Cyber Monday(Lifars) It's that time of the year again. Consumerism reaches a frenzied state during the holiday season and Black Friday with the subsequent Cyber Monday deals are widely seen as some of the best bargains available all year around
China, Japan, South Korea Talk Cyber Issues(Dark Matters) In mid-October, China, Japan, and South Korea convened for the second time in order to discuss potential cooperation on cyber issues such as international rules governing cyberspace, and cooperation against cybercrime and terrorism
Time to Retaliate Against China's Cyber Espionage(World Affairs) "To my Chinese counterparts, I would remind them, increasingly you are as vulnerable as any other major industrialized nation state," said Admiral Mike Rogers, director of the National Security Agency and the chief of US Cyber Command, on November 21st at the Halifax Security Forum. "The idea you can somehow exist outside the broader global cyber challenges I don't think is workable"
How Does Israel Regulate Encryption?(Lawfare) Recent terrorist attacks and resulting questions about the limits of surveillance have rekindled debate about how governments should deal with the challenges of powerful, commercially available encryption. With active debate in the United States and Western Europe surrounding this issue, it is instructive to note that Israel has been regulating encryption for decades
CTO Insights: Encryption Works — Don't Break It!(Trend Micro) Every now and then, an ill-informed politician will stand before a microphone and say something along the lines of: encryption is helping bad guys (either terrorists, child pornographers, or other similarly acceptable target), because law enforcement can't see what the bad guys are doing because they're using sophisticated tools that use encryption. Said politician will urge tech companies to "work with us" to help catch these bad guys
Google Denies Online Censorship Deal with Israel(Hack Read) Google has denied all the accusations that were put forward regarding monitoring or censoring of those YouTube videos that are made for inciting attacks on Israel — Google claims their recent meetings were routine and had no such agreements
DHS Giving Firms Free Penetration Tests(KrebsOnSecurity) The U.S. Department of Homeland Security (DHS) has been quietly launching stealthy cyber attacks against a range of private U.S. companies — mostly banks and energy firms
OMB tells GSA, agencies to draw up rapid contracting plans for cyber breaches(Federal News Radio) The Office of Management and Budget is directing federal agencies and the General Services Administration to come up with a single mechanism to rapidly hire outside expertise the next time a civilian agency's systems are breached in a cyber attack, reasoning that time will be of the essence and that virtually no agency will have the resources needed to mount an adequate response with in-house staff
OMB's Cybersecurity Implementation Plan Should Measure Agency Resilience(SIGNAL) Following the distressing headlines that cataloged repeated cyber breaches of U.S. federal computer networks — some that compromised the personal data of millions of people — government officials have implemented a patchwork of safeguards to shore up vulnerabilities, including the identification of high value assets
Senator Labels OPM Breach a 'Federal Fumble' of 2015(Nextgov) The massive data breach at the Office of Personnel Management, in which hackers stole personal information on nearly 22 million federal employees, retirees and contractors has already been called one of the largest cybercrimes ever carried out against the U.S. government
U.S. states probe VTech hack, experts warn of more attacks(Reuters via Business Insurance) U.S. states said they will investigate a massive breach at digital toy maker VTech Holdings Ltd. as security experts warned that hackers are likely to target similar companies that handle customer data
The Ferizi Arrest — Helping Narrow the Aperture of Cyber Terrorism(Dark Matters) In October 2015, Malaysian authorities arrested Ardit Ferizi, a Kosovo hacker known as "Th3Dir3ctorY." Ferizi, suspected of being the leader of the hacker group "Kosova Hacker Security," is accused of hacking into a firm and stealing a substantial amount of personal identifiable information (PII) for more than a thousand federal employees and service members
Decision to force out Marine who sent warning ahead of insider attack upheld(Washington Post) A senior Navy Department official decided Monday to force a Marine Corps officer out of the service for his handling of classified information, three years after he was first investigated after sending a warning to deployed colleagues about an Afghan police chief whose servant later killed three Marines
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
CyberTech 2016(Tel Aviv, Israel, January 26 - 27, 2016) Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States. Cybertech provided attendees with a unique and special opportunity to get acquainted with...
RSA Conference 2016(San Francisco, California, USA, February 29 - March 4, 2016) Celebrating its 25th anniversary, RSA Conference continues to drive the information security agenda forward. Connect with industry leaders at RSA Conference 2016
Energy Tech 2015(Cleveland, Ohio, USA, November 30 - December 2, 2015) Now in its 5th year, EnergyTech 2015 seeks the convergence of the best minds in policy, systems engineering and applied technology to address some of the critical issues of our time. In addition to its...
IoT Security Foundation Conference(London, England, UK, December 1, 2015) The is the first official conference of IoTSF. It follows on from the IoT Security Summit earlier in the year, maintaining the momentum of the theme. Delegates can expect a similar level of quality of...
Public Sector Cybersecurity Summit 2015(Reston, Virginia, USA, December 1 - 2, 2015) The Raytheon|Websense 6th Annual Public Sector Cybersecurity Summit is a unique opportunity to learn about the state of cybersecurity and how to prepare for future threats from many thought provoking government...
Enterprise Security and Risk Management(London, England, UK, December 2, 2015) Whitehall Media's 4th ESRM conference will bring together hundreds of leading InfoSec, cyber security and risk management professionals to discuss the latest industry developments and identify the most...
Cargo Logistics America(San Diego, California, USA, December 2 - 3, 2015) Cargo Logistics America (CLA) connects freight owners with freight movers, fostering multimodal synergy between diverse stakeholders in import, export and domestic supply chains. This year's conference...
NG Security Summit US(Austin, Texas, USA, December 2 - 4, 2015) The NG Security Summit US will bring together 65 senior decision makers and business leaders from across the region. The event aims to solve key business challenges. In particular, the ability to network...
Program on Cyber Security Studies (PCSS)(Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...
Cloud Security Alliance Summit Los Angeles 2015(Los Angeles, California, USA, December 3, 2015) The full day Cloud Security Alliance LA Summit is a standalone event in the greater Los Angeles area. Hosted by the CSA LA/SoCal chapter, some 200 well-qualified attendees are expected. The theme is "Enterprise...
Cyber Security Breakdown: Washington DC(Washington, DC, USA, December 3, 2015) This half day session will provide you with the critical information you need to start formulating an effective response in the eventuality of a cyber security event. Rather than try and handle the breach...
Cyber Security Exchange(Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...
2015 Cyber Security Exchange(Orlando, Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.