The 2015 breaches of Bundestag systems in Berlin are looking more like a Russian operation. An anonymous source within the German security services tells journalists the attacks were "clearly attributable to a Russian military intelligence service." Some observers in Germany think the deep game is destabilization of the European Union, with a playbook taken from hybrid operations against Ukraine.
SentinelOne continues to warn against BlackEnergy3, which at least accompanied, if it didn't actually accomplish, the recent hacks of Ukraine's grid.
BlackEnergy is currently spreading through malicious Microsoft Office files. Another familiar kit, Kasidet, a.k.a. Neutrino, enjoys an unwelcome resurgence, transmitted by compromised Office macros.
The US Congress begins investigating whether the now-patched encryption issues in Juniper products have their source in an NSA-developed algorithm. The US Government is a big Juniper customer, and the gear it bought and uses apparently suffered the same weaknesses as anything sold to other customers.
DDoS attacks may have become the single most common cyber assault on financial services enterprises. Not only banks are affected: the Elder Scrolls online game reported a DDoS episode yesterday.
TalkTalk thinks the breach it sustained in October cost it up to £60 million and more than 100 thousand customers.
In industry news, FireEye acquires Invotas. Bell Aerospace enters the cyber security market with its purchase of Wavefront. Quick Heal prepares for next week's IPO, and Alert Logic gets ready for a 2017 IPO. Norse is still down-and-out.
And a study shows that cyber crime doesn't pay (all that well).
Today's issue includes events affecting Australia, Colombia, European Union, Germany, Iran, Iraq, Ireland, Kosovo, Malaysia, Russia, Syria, Ukraine, United Kingdom, United States.
UK activists dumps 2.5 GB of data stolen from US police union(Help Net Security) Last Thursday, UK-based researcher and activist Thomas White has made available for download 2.5 GB of data stolen in a recent hack of the computer systems of the Fraternal Order of Police (FOP), the biggest police union in the United States
Self-Driving Car Technology Poses High Hacking Risk: Study(Gadgets 360°) While major auto companies are working on introducing the futuristic self-driving technology in cars soon, this threatens to open new security problems for them as hackers have sensed an opportunity here, a researcher has predicted
Sensitive information obtained in 88% of visual hacking trails: Study(Networks Asia) In nearly nine out of ten instances, security experts were able to visually hack corporate information, according to research published by Ponemon Institute. Titled "The 3M Visual Hacking Experiment," the study was conducted on behalf of the Visual Privacy Advisory Council and 3M Company
Tails 2.0 fixes many security issues(Help Net Security) Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity
Goodbye and good riddance: Oracle finally ditches Java browser plug-in(Naked Security) After two decades of awful memories and zero-day vulnerabilities, Oracle is killing off the notoriously insecure Java browser plug-in. When Oracle releases version 9 of the Java Development Kit (currently anticipated for 23 March 2017), it'll be deprecated and gone
Australian companies 'open to cyber crime'(The Age) Australian companies could risk becoming "low-hanging fruit" for cyber criminals due to a lack of education and an unwillingness to properly deal with threats
Some notes on the Norse collapse(Errata Security) Recently, cybersec company "Norse Security" imploded. Their leaders and most the employees were fired, and their website is no longer available. I thought I'd write up some notes on this
Liar, Liar, KPMG Capital's Investment Into Norse Corp. On Fire(Forbes) Brian Krebs, previously a Reporter for The Washington Post where he wrote blog posts for the popular 'Security Fix blog' plus hundreds of stories for the print and online versions of the newspaper, authored an investigative report over this past weekend titled "Sources: Security Firm Norse Corp. Imploding"
Cybersecurity Gap Blocks Pentagon From a Lockheed F-35 Database(Bloomberg Business) The Pentagon hasn't had updated information on maintenance of the F-35 jet since May because a Lockheed Martin Corp. database doesn't meet new government cybersecurity requirements, according to the Defense Department's testing office
How to protect security product investments(CSO) Simply buying additional expensive security products and configuring them no more completely or precisely than you did the last slew of protection tools you purchased is a road map to recurring breaches
What a CISO Breakfast Confirmed About Mobile Security Threats and Strategies(IBM Security Intelligence) As mobile grows, so do security threats. I recently had the opportunity to attend a breakfast with several chief information security officers (CISOs) and hear them talk about their mobile security concerns and strategies. It quickly became apparent that everyone had their own unique company cultures and primary concerns they were trying to address
Opinion: The undoing of Germany's privacy dogma(Christian Science Monitor Passcode) In the wake of European terror attacks and the ongoing refugee crisis, many Germans are backing away from staunch opposition to their country's close cooperation with US spy agencies. Now, Germans are willing to accept a more reasonable balance between security and privacy
Homeland Security secretary: Cybersecurity tool Einstein is good and getting better(Federal Times) Homeland Security Secretary Jeh Johnson has said cybersecurity is a top priority for the department — right alongside counterterrorism. So, after news outlets reported on a recent critical review from the Government Accountability Office, Johnson released a statement defending the department's premiere cybersecurity tool: Einstein
Official: Withheld Clinton emails contain 'operational' intel, put lives at risk(Fox News) Highly classified Hillary Clinton emails that the intelligence community and State Department recently deemed too damaging to national security to release contain "operational intelligence" — and their presence on the unsecure, personal email system jeopardized "sources, methods and lives," a U.S. government official who has reviewed the documents told Fox News
Corrupt Silk Road Investigator Re-Arrested for Allegedly Trying to Flee the US(Wired) Just when the Silk Road's saga of dirty money and double-dealing seemed to be winding down, one of the federal agents who investigated the site has added an audacious footnote: What looks like a brazen attempt to flee the United States after he was convicted and sentenced to prison for corruption in his handling of the case
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
ESA 2016 Leadership Summit(Chandler, Arizona, USA, January 31 - February 3, 2016) The electronic security industry is rapidly changing and continuously evolving. It's not enough to just survive. Businesses looking to thrive need to adapt to ensure their people, products, services and...
SANS Cyber Threat Intelligence Summit & Training 2016(Alexandria, Virginia, USA, February 3 - 10, 2016) This Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and...
BSides Tampa 2016(MV Royal Caribbean Brilliance of the Seas, Tampa to Mexico, February 4 - 8, 2016) BSides Tampa is an annual IT security/hacking conference featuring hands on training classes and lectures from some of the greatest minds in the industry and academia
The Law and Policy of Cybersecurity Symposium(Rockville, Maryland, USA, February 5, 2016) This one-day symposium will cover the critical legal and policy issues, challenges, and developments in cybersecurity. Legal professionals, professionals who develop cybersecurity strategies and policies,...
Insider Threat Program Development Training — California(Carlsbad, California, USA, February 8 - 10, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...
OPSWAT Cyber Security Seminar(Washington, DC, February 9, 2016) OPSWAT, along with our Washington DC partners, InQuest and Punch Cyber, will be hosting a half-day seminar to cover several threat detection and research technologies
Secure Rail(Orlando, Florida, USA, February 9 - 10, 2016) The first conference to address physical and cyber rail security in North America
Cyber Security Breakdown: Dallas(Dallas, Texas, USA, February 10, 2016) This half day session will provide you with the critical information you need to start formulating an effective response in the eventuality of a cyber security event. Rather than try and handle the breach...
SecureWorld Charlotte(Charlotte, North Carolina, USA, February 11, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...
Suits and Spooks(Washington, DC, USA, February 4 - 5, 2015) Suits and Spooks DC (Feb 4-5, 2015) is moving to the Ritz Carlton hotel in Pentagon City! We're expanding our attendee capacity to 200 and for the first time will be including space for exhibitors. We...
Department of the Navy (DON) IT Conference, West Coast 2016(San Deigo, California, USA, February 17 - 19, 2016) The purpose of the DON IT conference is to: (1) Explain the new and invigorated DUSN (M), DON/AA, and DON CIO organization and its business and IT transformation priorities. (2) Share information that...
ICISSP 2016(Rome, Italy, February 19 - 21, 2016) The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information...
Interconnect2016(Las Vegas, Nevada, USA, February 21 - 25, 2016) IBM InterConnect 2016 is for those who are building new business models, transforming industries, and creating better outcomes. Whether you're a C-suite executive, IT leader, developer, designer, architect,...
CISO Canada Summit(Montréal, Québec, Canada, February 21 - 23, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges...
Insider Threat Program Development Training Course — Maryland(Annapolis, Maryland, USA, February 23 - 25, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...
CISO New York Summit(New York, New York, USA, February 25, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...
BSides San Francisco(San Francisco, California, USA, February 28 - 29, 2016) BSides San Francisco is an Information / Security conference that's different. We're a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free. There...
CISO Summit Europe(London, England, UK, February 28 - March 1, 2016) With the media covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility to...
RSA Conference 2016(San Francisco, California, USA, February 29 - March 4, 2016) Celebrating its 25th anniversary, RSA Conference continues to drive the information security agenda forward. Connect with industry leaders at RSA Conference 2016
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.