Twitter continues attempting to block the Islamic State from its platform, and ISIS adherents continue to keep pace by creating new accounts. ISIS returned this week to information operations prominence. Its familiar inspirational trope—death to apostates and crusaders—disturbingly begins to name names, targeting Muslim leaders in non-Muslim countries who advocate toleration and peaceful coexistence.
Ransomware isn't gone by any means, but some old-school device-locking malware is making the rounds: it's cheap, easy, and works often enough to make it worth the skid-criminal's shot. In the UK, some ransomware-bearing email has begun to display specific and accurate information about victims' addresses.
Some Samsung Galaxies are said to be exploitable even when locked. Exposed USB modems provide the attack surface.
Cisco Unified Computing System (UCS) Central Software has been patched. So has Chrome.
In industry news, Tenable, unicorn though it may be, doesn't want an IPO yet. On the other hand, Optiv is rumored to be getting ready to go public this year.
Privacy Shield remains controversial in Europe.
Those curious about what Mossack Fonseca, the law firm at the center of the Panama Papers uproar, might say on the incident may now consult the firm's comprehensive "Statement Regarding Media Coverage." They're concerned especially to dispel "supposition and stereotypes," educating the public on the nature of their business.
That business prompts some interesting reflection from an attorney on the DoJ side of the Apple-FBI encryption dispute. Apple, he suggests, is acting more like an offshore bank than a disinterested civil-libertarian.
Today's issue includes events affecting Australia, Austria, China, European Union, Germany, India, Iran, Iraq, Republic of Korea, Panama, Russia, Syria, Ukraine, United Kingdom, United States.
ON THE PODCAST
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we welcome our newest research partner, Level 3, who introduce themselves and their areas of interest.
Statement Regarding Recent Media Coverage(Mossack Fonseca) Recent media reports have portrayed an inaccurate view of the services that we provide and, despite our efforts to correct the record, misrepresented the nature of our work and its role in global financial markets. These reports rely on supposition and stereotypes, and play on the public’s lack of familiarity with the work of firms like ours
Why ICS network attacks pose unique security challenges(Help Net Security) ICS network attacksAttacks on industrial control systems (ICSs) are increasing in frequency – and have become a reality we can no longer ignore. Securing these networks poses unique challenges, primarily because ICS networks are unlike traditional IT networks. They use different technologies and perform discrete functions. In order to protect them we first need to understand how they operate
Staff fall victim to cyber criminals hacking into pay(The Australian Business Review) The pay of hundreds of thousands of Australians is at risk of being siphoned off by cyber criminals because of weak security, according to the Australian Federal Police, which says such crimes have risen dramatically in recent years
6,013 breaches reported in the US since 2005(Help Net Security) In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 percent increase in data exposure incidents across financial services, business, education, government and healthcare sectors
VA Investigates 'Active Shooter' False Alarm to 23K Staffers(AP via ABC News) The U.S. Department of Veterans Affairs is investigating after a false alarm about an active shooter was sent to VA hospitals nationwide. Daniel Henry is a spokesman for the Hampton VA Medical Center in Virginia. He says the alert was sent inadvertently from Hampton on Tuesday during training on a new emergency notification system, and reached about 23,000 employees at hospitals nationwide
Security Patches, Mitigations, and Software Updates
Cisco Unified Computing System Central Software Arbitrary Command Execution Vulnerability(Cisco Security Advisory) A vulnerability in the web framework of Cisco Unified Computing System (UCS) Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on a targeted system. The vulnerability is due to improper input validation by the affected software. An attacker could exploit this vulnerability by sending a malicious HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system
Stable Channel Update(Chrome Releases) The Chrome team is delighted to announce the promotion of Chrome 50 to the stable channel for Windows, Mac and Linux. Chrome 50.0.2661.75 contains a number of fixes and improvements -- a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 50
Hawk up to 3.1.2/4.1.0 CPU Exhaustion Denial Of Service(VulDB) A vulnerability classified as problematic was found in Hawk up to 3.1.2/4.1.0. This vulnerability affects an unknown function. The manipulation with an unknown input leads to a denial of service vulnerability (cpu exhaustion). As an impact it is known to affect availability
CBS Sports App Transmitted Data Unencrypted(Threatpost) CBS recently fixed a vulnerability in its popular Sports application that could have exposed users to man-in-the-middle attacks and inadvertently leaked personal data
Optiv Security pursues IPO: source(Reuters) Cyber security company Optiv Security Inc is working with Goldman Sachs Group Inc and Morgan Stanley on an initial public offering that could come as soon as the second half of 2016, a source familiar with the matter said on Wednesday
Why This Cybersecurity Unicorn Doesn't Want an IPO(DC Inno) Much has been made about the clear lack of technology sector IPOs in 2016. But many expect the drought to soon come to an end as Dell Inc's cybersecurity unit, Atlanta, Ga.-based SecureWorks Corp which is valued at $1.42 billion, plans to join the NASDAQ. While a cyber company has emerged to break the ice, it doesn't necessarily mean others in the space are eager to dive into public waters though
Tripwire Business Momentum Accelerates in 2015(BusinessWire) Tripwire, Inc., a leading global provider of endpoint detection and response, security, compliance and IT operations solutions, today announced record revenues and profits in 2015 led by strong sales of Tripwire® IP360™, a vulnerability management solution; Tripwire® Enterprise, a security configuration management and policy compliance solution; and Tripwire NERC Solution Suite, a security and compliance solution designed to meet the unique compliance and cyber security requirements of energy organizations
Check Point CEO outlook reflects demands of cyber war(USA Today) Check Point Software Technologies CEO Gil Shwed put a bullish spin on Wall Street's 2016 revenue expectations for the maker of firewall software, suggesting annual growth in its segment of the security market remains at or near double digits
AhnLab shares up on founder’s election victory(Korea Herald) Shares in AhnLab, a security software provider, rallied on the Seoul bourse on Thursday morning, buoyed by a boost in political fortunes of its founder Ahn Cheol-soo in Wednesday’s elections
BT begins drive to hire 900 cyber security pros(V3) BT is looking to hire 900 staff over the next 12 months to work in its security business, in what the company said is a drive to protect consumers, businesses and governments from the growing threat of cyber crime
Panama Papers: A data security disaster(Help Net Security) The Panama Papers security breach is a juicy, made-for-the-Internet scandal. It has all the elements – secret off-shore accounts; involvement by international politicians, criminals, celebrities and sports stars; 11.5 million files cyber-filched from a law firm’s files and then leaked to the media
Security tips and tricks for businesses and consumers(Help Net Security) In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical role they play in lucrative targeted attacks, according to Symantec’s Internet Security Threat Report
Special Operators Seek New Social Media Tools(National Defense) As terrorist organizations such as the Islamic State embrace social media, government entities are seeking to exploit open-source information to improve their own operational tactics
DARPA Selects Vencore for DDoS Defense Program Research(ExecutiveBiz) A business unit of Chantilly, Virginia-based defense contractor Vencore has received an estimated $7.7 million contract from the Defense Advanced Research Projects Agency for research on a computer network defense program
Chinese hacking of US companies declines(Financial Times) Chinese cyber spying on American companies has decreased since a September agreement between presidents Barack Obama and Xi Jinping, according to government and private sector experts, but officials are undecided about the significance of the shift
What Apple vs. FBI Means for the Global 5000(Venafi) Cryptographic keys and digital certificates are powerful. As a result, they have become the target of nation states and bad guys because they protect the foundation of cybersecurity
Feud Opened by Apple-FBI Case Years From Fix, FireEye Chief Says(Bloomberg Technology) Apple versus the FBI was just the beginning: The debate between privacy and cybersecurity will drag on for years as the government vies with powerful corporations while new forms of hacking attacks arise, according to David DeWalt, chief executive officer of FireEye Inc
The Cybersecurity Act of 2015 Is a Necessary Stake in the Ground(RSA Conference Blog) The Cybersecurity Act of 2015 is approaching its three-month birthday, but you can be excused if you’re oblivious to that. After all, many people probably don’t know it even exists. Very quietly, the law—the first major piece of Congressional cybersecurity legislation, one designed to address the explosive growth of successful cyberattacks—was signed into law in mid-December 2015 by President Obama
US CIO Tony Scott on fixing cybersecurity's talent gap (+video)(Christian Science Monitor Passcode) At a Passcode event Tuesday, the US chief information officer said the federal government wants candidates who know languages, biology, and anthropology to fill cybersecurity roles – and one of its most important hires, the new chief information security officer, will be announced within 30 days
Obama redefines secrets in Clinton defense(Washington Times) President Obama this week redefined the definition of classified information in comments made Sunday in defending Hillary Clinton’s placement of secrets on a private email server while she was secretary of state
Is Apple Trying to Act Like an Offshore Tax Haven in its Fight with the FBI?(War on the Rocks) The war of words arising out of the FBI–Apple controversy is sure to continue, even after the FBI managed to find a “tool” to unlock the San Bernardino cell phone without Apple’s help. There are already more criminals with smart phones that law enforcement wants to get into. The battle lines are drawn. Each side, it seems, is overlooking an important historical analogy arising out of a different industry: American banks
Did NSA underestimate the insider threat?(CSO) In this edition of the Irari Report, Ira Winkler and Araceli Treu Gomes continue their interview of Chris Inglis, former Deputy Director of NSA. In this segment, they focus on how an organization that is so aware of the insider threat can be compromised by a person like Edward Snowden
Medical data breach leads to a record cash settlement(We Live Security) When one of the former patients at a hospital managed by St. Joseph Health System ran a routine Google search of her name four years ago, she found that her medical records from this hospital were available online
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Assured Communications 2016(Crystal City, Virginia, USA, April 27, 2016) A basic tenet of building an expeditionary fighting force that can respond to hot spots around the world is the ability to surge. That applies to satellite bandwidth as much as it does to personnel and...
QuBit Conference(Prague, the Czech Republic, April 12 - 14, 2016) QuBit offers you a unique chance to attend 2 selected Mandiant training courses, taught by some of the most experienced cyber security professionals in the business
Cloud Security Expo 2016(London, England, UK, April 12 - 14, 2016) Cloud Security Expo is a cloud security event with over 80 dedicated cloud security exhibitors, seven streams of content, over 150 security speakers, and 40 real cloud security and compliance case studies.
ACSC Conference 2016(Canberra, Australia, April 12 - 14, 2016) The ACSC Conference 2016 will bring together experts from Australia and abroad to discuss trends, mitigations and advances in cyber security. CEOs, CIOs, CISOs, CTOs, ICT Managers, ITSAs, ITSPs, IRAP Assessors,...
CISO Dallas(Dallas, Texas, USA, April 14, 2016) With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility...
Security through Innovation Summit(Pentagon City, Virginia, USA, April 14, 2016) The Security Through Innovation Summit will bring together top thought leaders and innovators from the Gov IT community to discuss the latest trends in public sector cybersecurity, including cloud deployments,...
CSO 50 Conference and Awards(Litchfield Park, Arizona, USA, April 18 - 20, 2016) We at CSO, the award-winning media brand, will bring you speakers from up to 50 organizations with outstanding security prowess. Over 2 ½ days, these distinguished executives and technologists will share...
2016 Cybersecurity Symposium( Coeur d’Alene, Idaho, USA, April 18 - 20, 2016) The Cybersecurity Symposium: Your Security, Your Future is an opportunity for academic researchers and software and system developers from industry and government to meet and discuss state of the art processes...
Amsterdam 2016 FIRST Technical Colloquium(Amsterdam, the Netherlands, April 19 - 20, 2016) FIRST Technical Colloquia & Symposia provide a discussion forum for FIRST member teams and invited guests to share information about vulnerabilities, incidents, tools and all other issues that affect the...
Security & Counter Terror Expo 2016(London, England, UK, April 19 - 20, 2016) Security & Counter Terror Expo (formerly Counter Terror Expo) is the event for any professional tasked with protecting assets, business, people and nations from terrorism. It brings over 9000 attendees...
SINET IT Security Entrepreneurs Forum (ITSEF) 2016(Mountain View, California, USA, April 19 - 20, 2016) IT Security Entrepreneurs Forum (ITSEF) — SINET's flagship event — is designed to bridge the gap between the Federal Government and private industry. ITSEF provides a venue where entrepreneurs can meet...
SecureWorld Philadelphia(King of Prussia, Pennsylvania, USA, April 20 - 21, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.