Al Qaeda and Daesh escalate virtual swipes at one another, but without so far upping the ante beyond insults.
FireEye points out that data lost in the US OPM breach have yet to turn up in the black market, which seems to confirm that the threat actor was, as generally believed, a state intelligence service, not a criminal gang. Signs still of course indicate China. (US DNI Clapper, asked if the CIA pulled its officers from Beijing, answers tersely, "No.")
More notes appear on Russian cable-cutting capabilities, and the range of possible US Navy responses.
Zerodium announced yesterday that it's going to pay some researchers $1million for an iOS 9 exploit, which Zerodium characterizes as a "jailbreak." Zerodium will share the vulnerability with its customers ("major corporations in defense, technology, and finance," who are presumably looking for protection, and "government organizations in need of specific and tailored cybersecurity capabilities," widely assumed to be looking for offensive capabilities).
Criminals are tailoring ad-blockers to accomplish drive-by attacks: Irish advertising analytics company PageFair appears to be target zero (and claims to have quickly contained the attack).
Good news, bad news for Microsoft ESET: it gets very high reviews in tests of security products; on the other hand it can apparently be bypassed using Microsoft compatibility tools.
"KeeFarce" hacking tool is said to be able to compromise KeePass password manager.
Data stolen from TalkTalk has turned up for sale in the black market.
UK surveillance legislation advances: a "license to operate" (not to kill).
Today's issue includes events affecting Australia, Bahrain, China, Germany, India, Iraq, Ireland, Japan, Republic of Korea, Kuwait, Oman, Qatar, Russia, Saudi Arabia, Syria, United Arab Emirates, United Kingdom, United States.
We'll be Washington this afternoon and tomorrow to cover the SINET Showcase 2015. Full reports will appear Wednesday and Thursday.
Cyber Attacks, Threats, and Vulnerabilities
The dispute between al-Qaeda and the Islamic State has devolved to name-calling(Washington Post) In a new 26-minute-long video statement, al-Qaeda in the Arabian Peninsula (AQAP) and al-Qaeda in the Islamic Maghreb (AQIM) said the Islamic caliphate declared by the Islamic State was illegitimate, dismissively referring to that militant organization as "Baghdadi's group," a reference to its leader, Abu Bakr al-Baghdadi
Latest EMET Bypass Targets WOW64 Windows Subsystem(Threatpost) Backwards compatibility, a necessary evil for Microsoft in its need to support so many legacy applications on Windows, may be its undoing as researchers have found a way to exploit this layer in the operating system to bypass existing mitigations against memory-based exploits
A Tangled Web: Exploring the World of the Dark Web(Cyveillance) Compromised personal data, criminal services, drug and weapons markets, and illegal pornography are all part of the network of hidden sites now commonly referred to as the "Dark Web," also known as the "Dark Net" (or "Darknet")
The Changing Cyber Threat Landscape — Securonix Chats with Chris Inglis(Securonix) In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy. How is the threat landscape changing?
The Role of The Government — Securonix Chats with Chris Inglis(Securonix) "Individuals, organizations and societies are adopting new technologies at a breathtaking pace, without understanding the vulnerabilities inherent to them." Says Inglis, "The threats in this space only continue to exceed our expectations. As the scope and scale of attacks become increasingly alarming, it's only natural that we wonder if government should intervene, as if there is a singular point of accountability for cyber security"
The value in vulnerability management platforms(Help Net Security) A study conducted by Forrester Consulting assessed IT decision makers' satisfaction with their current vulnerability management platforms and the challenges companies face in securing their cloud environments against exposure
Most consumers believe cloud-based apps can be hacked(Help Net Security) Consumers often don't realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, according to Radware
The Australian Cyber Security Centre Threat Report 2015(Australian Cyber Security Center) The cyber threat to Australian organisations is undeniable, unrelenting and continues to grow. If an organisation is connected to the internet, it is vulnerable. The incidents in the public eye are just the tip of the iceberg
DISA splitting big data cyber program into two contracts(C4ISR & Networks) The Defense Information Systems Agency is getting ready to release two requests for proposals for big data capabilities to help the Department of Defense maintain a better understanding of its networks' security postures
Secretive cyber warfare firm NSO Group explores sale: sources(Reuters) NSO Group Ltd, a company that helps governments spy on mobile phones and is so secretive that it regularly changes its name, is exploring a sale that could value it at close to $1 billion, including debt, according to people familiar with the matter
FireEye Drags Qualys, CyberArk Up Ahead Of Earnings(Investor's Business Daily) ireEye (NASDAQ:FEYE) stock climbed Monday on Wall Street ahead of its late Wednesday Q3 earnings report, pulling up shares of online security firms CyberArk Software (NASDAQ:CYBR), Qualys (NASDAQ:QLYS) and Symantec (NASDAQ:SYMC) with it
Resurgence of innovation driving glut of new security tools(CSO Australia) Security vendors are showing new confidence against malware attackers as they launch new classes of products designed to take the fight back to malware authors that have recently been overwhelming many companies' traditional defences
Facebook finally changes real-name policy(Naked Security) Facebook on Friday finally changed the real-name policy that has made using the service difficult for drag queens, the LGBTQ community, Native Americans, those who use pseudonyms, and persecuted groups
Signal, the Snowden-Approved Crypto App, Comes to Android(Wired) Since it first appeared in Apple's App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended — and apparently used daily — by no less than Edward Snowden himself
150 ideas for better cybersecurity in government(FCW) As the government gears up for a second "cybersecurity sprint" and begins to absorb the Office of Management and Budget's just-released strategy, a group of industry and agency leaders has been canvassing the federal IT community for ideas on how to do cybersecurity better
Disruptive by Design: How to Evolve Federal Cloud Security(SIGNAL) In 2011, then-U.S. Chief Information Officer Vivek Kundra set the stage for federal agencies to take full advantage of cloud computing benefits through the Cloud First initiative, which mandates that agencies evaluate cloud options before making any new information technology investments
How to earn the trust of millennials concerned with security(CIO via CSO) Millennials are growing increasingly weary of data and security when it comes to their favorite brands. And that means it's vital that companies include a strong cybersecurity message in their marketing plan to help rebuild trust
How IARPA predicts the unpredictable(Federal Times) The Intelligence Advanced Research Projects Activity is where the intelligence community turns to solve some of its toughest programs — it's billed as the IC's high-risk, high-payoff science lab
IUP ranks high in cyber defense education(The Penn) Out of 102 national universities eligible to be named a Center for Academic Excellence in Cyber Defense, Indiana University of Pennsylvania became one of just six state colleges to earn the designation
A new licence for spies and police?(BBC) Despite the recent release of the latest James Bond film, what really worries Britain's spies at the moment is not the cinematic licence to kill but what they call their "licence to operate"
Tight budgets, cyber threats driving DISA's path forward(C4ISR & Networks) The one-two punch of a tense budgetary climate and a proliferation of cyber threats is changing how the federal government does business, particularly at the agency charged with much of the Defense Department's IT service
Opinion: Why the Supreme Court should side with data brokers(Christian Science Monitor Passcode) The Supreme Court hears arguments Monday in Spokeo v. Robins, a case in which a Virginia man claims he was wronged because an Internet data broker portrayed him incorrectly. If the court sides with the alleged victim, any tech company that collects and aggregates personal data could be subjected to devastating lawsuits
Where Does Volkswagen’s Road of Deceit End?(Supply Chain 24/7) Volkswagen used devices to cheat air pollution tests in diesel luxury vehicles in model years 2014 through 2016, U.S. and California environmental regulators said on Monday, widening their investigation into the carmaker's emissions scandal
The Mt. Gox Bitcoin Debacle: An Update(IEEE Spectrum) More than 18 months after the MtGox bitcoin exchange filed for bankruptcy in February 2014, little is still known about what happened to the 850,000 missing bitcoins
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Inside Data Science 2015(Monterey, California, USA, November 3 - 4, 2015) At the Inside Data Science 2015 Conference (IDS2015) our focus is not on the storage or volume of data, but rather the importance of what you do with it. To synchronize the processing, exploitation and...
NICE 2015 Conference and Expo(San Diego, California, USA, November 3 - 4, 2015) Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing,...
SINET Showcase 2015: "Highlighting and Advancing Innovation"(Washington, DC, USA, November 3 - 4, 2015) SINET Showcase provides a platform to identify and highlight "best-of-class" security companies that are addressing industry and government's most pressing needs and requirements. The chosen SINET 16 Innovators...
4th International Internet-of-Things Expo(Santa Clara, California, USA, November 3 - 5, 2015) With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Santa Clara. Learn what is going on, contribute to the discussions, and...
RSA Conference 2015 Abu Dhabi(Abu Dhabi, United Arab Emirates, November 4 - 5, 2015) Join your fellow information security professionals at RSA Conference 2015 Abu Dhabi, where we'll be discussing security issues from a global perspective
ICMC (the International Cryptographic Module Conference)(Washington, D.C., USA, November 4 - 6, 2015) ICMC core focus includes cryptographic modules, FIPS 140-2, ISO/IEC 19790 and cryptographic algorithms. Specialists from all over the world gather in Washington to discuss about commercial cryptography...
2nd Annual Journal of Law and Cyber Warfare Conference(New York, New York, USA, November 5, 2015) The 2015 symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from experts on cybersecurity and cyber...
Start with Security(Austin, Texas, USA, November 5, 2015) This one-day conference will continue the FTC's work to provide companies with practical tips and strategies for implementing effective data security. Aimed at start-ups and developers, this event will...
After the Shift: Securing Tomorrow's Payment Technology(Washington, DC, USA, November 5, 2015) From encryption to tokenization, what does the future hold for keeping consumer data safe? Policymakers, industry leaders, and technology experts will explore the cutting edge of cyber technology and discuss...
University of Phoenix® Technology Conference(Arlington, Virginia, USA, November 7, 2015) At the University of Phoenix® Technology Conference 2015, a free event hosted by the University of Phoenix College of Information Systems and Technology, you will be introduced to cyber security,...
Cyber³ Conference: Crafting Security in a less Secure World(Nago City, Okinawa, Japan, November 7 - 8, 2015) An international conference on cyber security hosted by the Government of Japan with the support of the World Economic Forum. At this conference, multi-stakeholders, including policymakers, business leaders,...
FedCyber 2015(Tyson's Corner, Virginia, USA, November 10, 2015) This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The FedCyber.com Threat Expo will bring together thought leaders who...
First International Conference on Anti-Cybercrime (ICACC-2015)(Riyadh, Saudi Arabia, November 10 - 12, 2015) Al Imam Mohammad Ibn Saud Islamic University is organizing this international conference to establish a forum where discussions on vital issues related to anti-cybercrime can occur. This conference will...
Black Hat Europe(Amsterdam, the Netherlands, November 10 - 13, 2015) Black Hat prides itself with being "the most technical and relevant global information security event series in the world." For the past 16 years, the Black Hat events have given their attendees the opportunity...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.