skip navigation

More signal. Less noise.

Daily briefing.

Observers on both sides of the Atlantic take note of how inadequate both British and American information operations seem when compared to those of ISIS, whose online recruiting a lawyer in the UK calls "the ultimate marketing success."

The US Joint Staff took an unclassified email network offline over the weekend after detecting unspecified "suspicious activity."

Malvertising continues to distribute the Angler exploit kit. Flash attacks spread PoisonIvy.

Trend Micro describes an Android vulnerability that could "silence" devices.

The Darkode forum may be returning: recently dismantled by a multinational law enforcement operation, one of the criminal network's last administrators may be at large and planning a comeback.

The Hammertoss espionage tool is linked to the Miniduke gang.

Vulnerability demonstrations and proof-of-concept exploits will surround Black Hat and Defcon. Two are noted today: an RFID access tool and a method of stealing door badge credentials.

A vulnerability in BIND is patched; users are urged to update.

Several trend reports appear: Flash exploits, online piracy, and point-of-sale issues. Some observers think big security firms are serving up "stale" antivirus offerings.

Industry and government receive glumly familiar news of coming cyber security labor shortages.

UK insurers believe reinsurance is the key to a healthy cyber risk-transfer market.

Lockheed Martin's CEO indicates the company will keep its government cyber business.

Cylance and Darktrace secure more funding.

Researchers look at behavioral biometrics.

The US Congress looks into car hacking as cyber legislation advances in the Senate.

Snowden will receive no pardon, says the White House.

Notes.

Today's issue includes events affecting China, European Union, Indonesia, Russia, Saudi Arabia, Taiwan, United Arab Emirates, United Kingdom, United States.

The CyberWire will be covering CyberMontgomery 2015 tomorrow in Rockville, Maryland. We'll be live-tweeting the proceedings and publishing a special issue on Friday devoted to the conference.

Cyber Attacks, Threats, and Vulnerabilities

China-Tied Hackers That Hit U.S. Said to Breach United Airlines (Bloomberg) The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines

Cyber Trends

Bromium Threat Report Identifies Security Risks of Popular Websites and Software ( Street Insider) News and entertainment websites unknowingly host more than 50 percent of malvertisements; Flash exploits increase 60 percent and ransomware increases 80 percent since 2014

Marketplace

Leidos, Cerner win 'DHMSM', DoD's $11B electronic health record contract (FierceGovHealthIT) Contract will replace legacy health IT at DoD and advance interoperability with VA's health record

Products, Services, and Solutions

Share files simply and securely in the cloud — Partner offering from Covata and T-Systems (Deutsche Telekom) Lists of customers, contract details, price calculations – employees need secure and quick access to this kind of sensitive data. T-Systems and Australian data security specialist Covata are now offering a solution to this problem, from the cloud. The service is as simple to use as other file sharing offerings, but is based on enterprise grade security architecture and runs in a high-security data center operated by T-Systems in Germany. The Australian government, including the Australian Taxation Office, uses Covata to securely share information

TeleSign SDK streamlines verification on mobiles (Betanews) Many of the latest cyber attacks focus on mobile platforms as they're often seen as inherently less secure, particularly when handling account logins and important transactions

Technologies, Techniques, and Standards

Travel Security: It’s a Tough World in the Competitive Trenches (IBM Security Intelligence) You are ultimately responsible for your travel security, be it physical or technical. But this is a tall order. You are most vulnerable when you move and travel because you operate outside of your daily pattern of life, including connecting to the Internet via a third-party service provider with which you may not be familiar

Legislation, Policy, and Regulation

Senators push bill to authorize EINSTEIN 3A, shore up 'insufficient cybersecurity practices' governmentwide (FierceGovernmentIT) Leaders of the Senate Homeland Security and Governmental Affairs Committee introduced Monday a bipartisan bill that would grant federal agencies clear legal authority in utilizing EINSTEIN, the Homeland Security Department's continuous diagnostics and monitoring system

Experts say tech industry has duty to counter extremism, but against imposing legal onus (FierceGovernmentIT) Former Homeland Security Secretary Michael Chertoff said social media companies may have a social obligation to suppress videos of beheadings by terrorist groups and report information to law enforcement that a user might commit a violent act, but he said he was "nervous" about imposing any legal duty or regulatory mechanism on companies to take such actions

Litigation, Investigation, and Law Enforcement

Five Suspects Reportedly Connected to the JPMorgan Chase Breach (Legaltech News) Reports said two of the men’s names were somehow mentioned in connection with an inquiry into the JPMorgan Chase breach

Investigation Follows Claims of Hacking at Planned Parenthood (Legaltech News) The cyber-attack comes soon after controversy erupted over Planned Parenthood statements recorded in edited undercover videos by The Center for Medical Progress

Why do email policies of local governments seem so sketchy? (FierceContentManagement) A new policy in St. Paul, Minnesota allows city employees to "delete [email messages] as soon as their purpose is served" or within six months. Messages moved to trash or junk folders will evaporate in a mere two weeks. In a not-at-all-shocking turn of events, public watchdog groups are voicing their concern

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Cyber Risk Wednesday: Rethinking Commercial Espionage (Atlantic Council: Brent Scowcroft Center on International Security, July 29, 2015) Join the Atlantic Council's Cyber Statecraft Initiative on July 29 from 4:00 p.m. to 5:30 p.m. for a discussion on new ideas on commercial cyber espionage and intellectual property theft

CyberMontgomery 2015 (Rockville, Maryland, USA, July 30, 2015) Montgomery County, Maryland, is home to the National Institute of Standards and Technology (NIST), the National Cybersecurity Center of Excellence (NCCoE), the FDA, NIH, NOAA, NRC and more than a dozen...

Career Discovery in Cyber Security: A Women's Symposium (New York, New York, USA, July 30, 2015) Our annual conference brings together some of the best minds in the industry, with the goal of guiding women with a talent and interest in cyber security into top-flight careers

PragueCrunch IV: The Enpraguening (Prague, Czech Republic, July 31, 2015) Here it comes, Central Europe: PragueCrunch IV! This annual celebration of all things startup is coming to your town on Friday, July 31, 2015 from 7:00 PM to 11:00 PM (CEST). We'll be holding the event...

Black Hat USA (Las Vegas, Nevada, USA, August 1 - 6, 2015) Black Hat — built by and for the global InfoSec community — returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners...

ISSA CISO Forum: Third Party Oversight (Las Vegas, Nevada, USA, August 2 - 3, 2015) The CISO Executive Forum is a peer-to-peer event. The unique strength of this event is that members can feel free to share concerns, successes, and feedback in a peer only environment. Membership is by...

BSides Las Vegas (Las Vegas, Nevada, USA, August 4 - 5, 2015) BSides Las Vegas is an Information/Security conference that's different. We're a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free. There is...

Defcon 23 (Las Vegas, Nevada, USA, August 4 - 7, 2015) DEF CON has been a part of the hacker community for over two decades. See the organization's website for more information

3rd Annual Psyber Behavioral Analysis Symposium (Fort Meade, Maryland, USA, August 11, 2015) The 3rd Annual Psyber Behavioral Analysis Symposium is hosted by the NSA/CSS Threat Operations Center and the FBI Behavioral Analysis Unit-2/Cyber Behavioral Analysis Center. The goal of the Symposium...

USENIX Security (Washington, D.C., USA, August 12 - 14, 2015) The USENIX Security Symposium reunites researchers, practitioners, system administrators, system programmers, and others specialists interested in the latest advances in the security and privacy of computer...

5th Annual Cyber Security Training & Technology Forum (CSTTF) (Colorado Springs, Colorado, USA, August 19 - 20, 2015) The Information Systems Security Association (ISSA) Colorado Springs Chapter and FBC, Inc. will once again co-host the 5th Annual Cyber Security Training & Technology Forum (CSTTF). CSTTF 2015 will bring...

Decepticon 2015 (Cambridge, England, UK, August 24 - 26, 2015) Decepticon brings together researchers and practitioners in the detection and prevention of deception. Previously, deception research has been fragmented across conferences in many different disciplines,...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.