Policymakers and analysts in Washington and elsewhere call for development of international rules of cyber conflict ("e-Neva," riffing on "Geneva," as in the Conventions, some infelicitously call it). The Wall Street Journal advises those interested in the coming shape of cyber warfare to look at Ukraine, and how Russia's slow-motion imperial re-engorgement of that country has used cyber operations as a combat multiplier.
The ISIS-inspired "Cyber Caliphate" is back with Twitter hacks in a renewed campaign to avenge its fallen Internet star.
European authorities take down the Iranian Revolutionary Guard's "Rocket Kitten" cyber espionage campaign. Check Point Software, Europol's principal industry partner in the action, offers a long list of Rocket Kitten's targets (which include regional rivals like Saudi Arabia and the UAE, human rights groups, Iranian dissidents, Israel — particularly that country's nuclear R&D, the United States, and even commercial interests in friendly Venezuela).
ProtonMail comes online again, expressing regret for having paid ransom to get the "Armada Collective" DDoS extortionists off its back. Other services the DDoS gang recently hit are said to include Zoho and banks in Switzerland and Thailand.
Extortion is the classic way of monetizing DDoS attacks. It's also the route taken by ransomware operators, who continue to up their game. Some good news, though: Linux.Encoder.1 ransomware turns out, finds Bitdefender, to be relatively easy to break.
In industry news, KEYW stock plummets after the company reports disappointing results. Tenable and Cybric each close new funding rounds.
GCHQ's head says the market is failing cyber security.
Today's issue includes events affecting Afghanistan, Belgium, European Union, Georgia, Germany, India, Iran, Iraq, Ireland, Israel, Netherlands, Russia, Saudi Arabia, Switzerland, Syria, Thailand, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States, and Venezuela.
As we observe Veterans Day tomorrow, the CyberWire will take a day off. We'll resume normal publication Thursday.
Iran cyber spy group hit in coordinated European raids(Reuters via Business Insurance) European authorities have taken action to shut down a cyber espionage operation linked to Iran's powerful Revolutionary Guard in the first operation of its kind since Tehran signed a nuclear treaty, according to security researchers who located computers used to launch attacks
'Unwieldy' DDoS attacks growing, lasting longer(MISCO) A new study by security firm Kaspersky has revealed some interesting findings on distributed denial of service (DDoS) attacks, including the fact that most of them target the same ten countries — and even cyber criminals take holidays
Final TalkTalk breach tally: 4% of customers affected(Help Net Security) TalkTalk continues with its practice of updating the public with information regarding the recent data breach on Fridays, and according to the latest update, the total number of customers whose personal details were accessed is 156,959
Quick Heal: IoT and iOS the new targets of malware(ZDNet) Security firm Quick Heal has highlighted devices running Apple's mobile operating system as well as wearables in the Internet of Things space as the next to be hit by historically Android-based hackers
Beware of Apple-themed phishing emails threatening to limit your account(Help Net Security) A new email phishing campaign is targeting businesses and consumers who have Apple IDs, trying to get them to enter their Apple login credentials, personal and credit card information into a site that mimics that of the popular tech company, the Comodo Antispam Labs team warns
88 Percent of Networks Susceptible to Privileged Account Hacks(Threatpost) IT professionals have long grappled with the inherent risks associated with privileged accounts. Whenever credentials that allow other employees to login to servers, routers, and so forth, are compromised, it can have a dire outcome on the rest of the network
Critical Java Bug Extends to Oracle, IBM Middleware(Threatpost) For close to 10 months, a critical vulnerability in a library found in most Java rollouts has been twisting in the wind, unpatched, and until this week without proof-of-concept exploits that people paid attention to
7 ways hackers can use Wi-Fi against you(CSO) Wi-Fi — oh so convenient, yet oh so dangerous. Here are seven ways you could be giving away your identity through a Wi-Fi connection and what to do instead
10 riskiest applications that have passed their expiration dates(CSO) Applications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates. However, many users forget to remove these applications from their machines, or do not realize that they pose a danger
Security Patches, Mitigations, and Software Updates
Symantec Endpoint Protection Elevation of Privilege Issues(Security Advisories Relating to Symantec Products) The management console for Symantec Endpoint Protection Manager (SEPM) is susceptible to OS command execution, Java code execution elevation of privilege. SEP clients are susceptible to a binary planting vulnerability that could result in arbitrary code running with system privileges on a client due to only partially addressing this issue in previous releases
GCHQ chief to say free market failing on cyber security(Financial Times) The free market is failing when it comes to cyber security, Britain's electronic spy chief is to warn on Tuesday, in a rare public intervention that could pave the way for tougher regulation as the threat of attack becomes "exponential"
Privacy will hit tipping point in 2016(CNBC) Concerns about online privacy will reach a tipping point in 2016, prompting regulators to crack down on companies, and consumers to demand greater protection, a new study by Forrester Research predicts
Dealing With Emerging Threats(CXO Today) Technology has a major impact on the gathering, storage, retrieval and dissemination of information. However, its main ethical impact relates to accessibility/inaccessibility and the manipulation of information
Prepare before you head into the breach on cyber cover(Business Insurance) Risk of cyber attacks is only going to increase, and there is little to prevent it, as hackers seem to stay a step ahead of the technology. Bill Cosgrove, managing principal and practice leader for EPIC Insurance Brokers & Consultants' Financial Institution Practice, says preparation, diligence and a good insurance policy can ease the pain for targeted companies
AVG Technologies Announces 1.6 Million Share Repurchase Program(PRNewswire) AVG® Technologies N.V. (NYSE: AVG), the online security company™ for more than 200 million monthly active users, announced today that it has adopted a share repurchase program under which AVG intends to repurchase up to 1,666,667 of its ordinary shares (the shares) to cover its obligations to deliver shares under its employee stock options incentive and restricted share units plans
Qualcomm and KT to build LTE-based IoT security solution(ZDNet) Following their agreement in January to jointly develop equipment with secure gateways to the Internet of Things, the companies' recently announced business project aims to make ATMs easier to install and cheaper to maintain
Former NYPD Commissioner Ray Kelly Joins K2 Intelligence(K2 Intelligence) K2 Intelligence, an industry-leading investigative, compliance and cyber defense services firm founded by Jules B. Kroll and Jeremy M. Kroll announced the appointment of former New York Police Department (NYPD) Commissioner Raymond W. Kelly as Vice Chairman of the firm
A Security Collaboration Model for IoT(Tripwire: the State of Security) Fifteen years ago, I retired from law enforcement and joined the private sector like many other ex-officers with some expertise in digital forensics investigations
Closer Look at CISA's Cybersecurity Information-Sharing Provisions(National Law Review) As we reported on October 27, the U.S. Senate passed the Cybersecurity Information Sharing Act ("CISA," S. 754). If enacted into law, CISA would, among other things, establish a voluntary framework for the sharing of cybersecurity threat information between and among the federal government and private entities
The rise of the citizen cyber-soldier(Federal Times) It's no secret that the United States faces advanced, persistent threats to the security of the networks and data that drive our daily lives — from state, state-sponsored, and non-state actors, to criminal organizations, hacktivists, and 'lone wolf' cyber terrorists, even insiders who work amongst us
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
FedCyber 2015(Tyson's Corner, Virginia, USA, November 10, 2015) This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The FedCyber.com Threat Expo will bring together thought leaders who...
First International Conference on Anti-Cybercrime (ICACC-2015)(Riyadh, Saudi Arabia, November 10 - 12, 2015) Al Imam Mohammad Ibn Saud Islamic University is organizing this international conference to establish a forum where discussions on vital issues related to anti-cybercrime can occur. This conference will...
Black Hat Europe(Amsterdam, the Netherlands, November 10 - 13, 2015) Black Hat prides itself with being "the most technical and relevant global information security event series in the world." For the past 16 years, the Black Hat events have given their attendees the opportunity...
2015 U.S. Cyber Crime Conference(National Harbor, Maryland, USA, November 14, 2015) The 2015 U.S. Cyber Crime Conference (Formerly the DoD Cyber Crime Conference) has brought world-class forensics and incident response training combined with outstanding community networking for over 15...
Pen Test Hackfest Summit & Training(Alexandria, Virgina, USA, November 16 - 23, 2015) SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment.
CyberCon 2015(Pentagon City, Virginia, USA, November 18, 2015) CyberCon 2015 is the forum for dialogue on strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data
Cybersecurity, the SEC and Compliance(New York, New York, USA, November 18, 2015) The recent SEC CyberSecurity Examination Initiative focuses on information safeguards for financial services organizations. Are you prepared? Please join us for a panel discussion on what cybersecurity...
Internt-of-Things World Forum 2015(London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions
Internet-of-Things World Forum 2015(London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions
CyberPoint 2nd Annual Women in Cyber Security Reception(Baltimore, Maryland, USA, November 19, 2015) CyberPoint International announces its 2nd Annual Women in Cyber Security Reception to be held on November 19, 2015. Bringing together women from across the region and all different points on the career...
DefCamp6(Bucharest, Romania, November 19 - 20, 2015) Why DefCamp? Because it's the most important conference on Hacking & Information Security in Central Eastern Europe, bringing hands-on talks about the latest research and practices from the INFOSEC field,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.