Palo Alto Networks updates us on Operation Lotus Blossom and its Emissary Trojan. Mostly used in espionage directed against targets in Taiwan and Hong Kong, Emissary is morphing at a faster clip these days, which suggests its controllers are working to stay ahead of tracking by threat intelligence services.
Sucuri detects an uptick in Nuclear infections among WordPress sites. The attack code redirects traffic to domains that seem to host ads, then, after this misdirection, to the Nuclear kit itself.
Comodo is working on a fix for problems in its Chromodo browser, with an update expected next week.
Skybox Security and eSentire both raise significant amounts of new funding. Cisco is buying IoT shop Jasper Technologies for a reported $1.4 billion. Apple hires LegbaCore researchers who found the OS X Thunderstrike vulnerability last year. Recently departed Norse CEO Sam Glines writes to CSO's Salted Hash blog, defending Norse's integrity and disputing recent implications of misconduct.
Crowdstrike's Global Threat Report is out. It sees an increase in nation-state cyber conflict, more criminal resort to extortion in its various forms, and an increase in hacktivism matched by greater censorship.
Russia intends to increase spending on cyber offensive capabilities (and boasts that it's got the best hackers).
Analysts think Chinese cyber espionage will soon turn to agriculture and alternative energy.
Google considers displaying anti-radicalization and counter-terrorism messages beside search results whose terms suggest sympathy for ISIS.
The EU says businesses should realize that full details of Privacy Shield won't be final until April.
Today's issue includes events affecting Algeria, Benin, Cameroon, Chad, China, Germany, Israel, Niger, Nigeria, Saudi Arabia, Taiwan, United Kingdom, United States.
Safeway Self-Checkout Skimmer Close Up(KrebsOnSecurity) In Dec. 2015, KrebsOnSecurity warned that security experts had discovered skimming devices attached to credit and debit card terminals at self-checkout lanes at Safeway stores in Colorado and possibly other states. Safeway hasn't disclosed what those skimmers looked like, but images from a recent skimming attack allegedly launched against self-checkout shoppers at a Safeway in Maryland offers a closer look at once such device
Hackers Steal Account Details of 20.6 Mln Taobao Users(Marbridge Consulting) Police in Zhejiang province recently convened a press conference to announce that a group of hackers obtained information pertaining to approximately 99 mln accounts on Alibaba Group's (NYSE: BABA) C2C e-commerce site Taobao
Lights Out: Not So Fast(Dark Reading) Author and famed broadcast journalist Ted Koppel's new bestseller warns of a 'likely' nationwide and devastating blackout of the US grid at the hands of hackers, but some government and utility industry officials disagree
Internet of Things Will Never Be Safe Enough(Sputnik) The Internet of Things — a geek's paradise where interconnected devices such as your speakers, doorbell, car, iWatch, house lights and even your fridge exist for the sole purpose of making your life all that more simple… Unless they get hacked
Cisco to pay $1.4 billion for Internet of Things firm Jasper(Reuters) Cisco Systems Inc said on Wednesday it was buying Jasper Technologies Inc, a startup that connects devices like cars and medical devices to the Internet, for $1.4 billion in cash and equity awards, its largest acquisition since 2013
Apple Beefs Up Its Security Team By Hiring Zero-Day Exploit Team(TechCrunch) Remember Thunderstrike 2? Last summer, Xeno Kovah and Trammell Hudson unveiled a serious zero-day vulnerability in OS X letting malware creators completely brick your Mac without any way to reset it to its factory status. And it looks like Apple didn't just fix the vulnerability — it has also hired the team behind this exploit to work on security
Flash is dead. Long live Flash.(SC Magazine) Like a character in a zombie flick, Adobe Flash (formerly called Macromedia Flash and Shockwave Flash) is a software platform used for creating graphics, animation and rich internet applications that refuses to die. Despite a plethora of well-publicized security issues, it's simply too useful and too much a part of current tech culture to go away
Technologies, Techniques, and Standards
Threat Intelligence: Putting the Horse Before the Cart(SecurityWeek) Threat intelligence has received a lot of attention from the industry, ranging from vendors expanding their product portfolios and venture capitalists funding new start-ups to end user organizations looking for insights into advanced cyber-attacks that aren?t available from traditional perimeter defense tools
How to improve bank fraud detection with data analytics(IBM BIg Data Hub) Financial institutions need comprehensive analytics to build a strong bank fraud detection strategy. Advanced analytics software provides the tools necessary for banks to recognize and act on suspicious patterns, quickly notify customers of fraud incidents and position themselves for faster settlements
How to Build a Remote Security Team(Tripwire: the State of Security) This will not come as a surprise to many of you, but there's a current shortage of cyber security experts out in the field, which is causing job vacancies all over the country
DISA test-driving smartphone encryption(Federal Times) Top leaders at the Defense Information Systems Agency know they're chasing a moving target: Mobile technology is moving quickly, and constant connectivity is expected by any young recruit and most people today
NSA Says it "Must Act Now" Against the Quantum Computing Threat(Technology Review) he National Security Agency did a surprising thing last August — it suddenly declared that the algorithms it had spent a decade telling the world were the best way to lock up secret data weren't safe anymore. The reason? The danger of quantum computers
3 Fundamental Traits of an Infosec Aficionado(Tripwire: the State of Security) I've had a lot of conversations with high school students and students in their initial years of university who don't particularly know what they want to be when they grow up. Heck, I'm still trying to figure that out!
Can EU-US data pact survive without surveillance reform?(Christian Science Monitor Passcode) While American and European negotiators reached a deal to replace the invalidated Safe Harbor data transfer agreement, the agreement may not be strong enough to satisfy European privacy advocates concerns about US spy agency snooping
Opinion: Why Privacy Shield isn't impenetrable(Christian Science Monitor Passcode) The new arrangement between European and US negotiators to replace Safe Harbor and ensure that data continues flowing across the Atlantic may not be strong enough to withstand likely legal challenges from privacy watchdogs
Saudi: Body to track accounts inciting terrorism, sectarianism(Al Arabiya) Major General Mansour Turki, the spokesman for the Interior Ministry, said that a committee composed of three government bodies represented by the Interior Ministry, the Bureau of Investigation and Public Prosecution and the Communications and Information Technology Commission work on monitoring the accounts that incite terrorism and combating cybercrimes, which also include the accounts that call for sowing sedition and sectarianism
Top Israeli General Calls IS 'Our Enemy'(ABC News) A top Israeli general said Wednesday that the Islamic State group is "our enemy" and that Israel is sharing intelligence with allies battling the extremists despite remaining on the sidelines of Syria's civil war
They are deadly serious about crypto backdoors(Errata Security) Julian Sanchez (@normative) has an article questioning whether the FBI is serious about pushing crypto backdoors, or whether this is all a ploy pressuring companies like Apple to give them access. I think they are serious — deadly serious
Chinese National Pleads Guilty to Conspiring to Steal Trade Secrets(US Department of Justice) Mo Hailong, aka Robert Mo, 46, pleaded guilty today to conspiracy to steal trade secrets before U.S. District Judge Stephanie M. Rose of the Southern District of Iowa, announced Assistant Attorney General for National Security John P. Carlin and Acting U.S. Attorney Kevin E. VanderSchel of the Southern District of Iowa
Germany Conducts Raids Over Suspected Attack Plans(ABC News) German police conducted raids and arrested two suspects on Thursday in an investigation of four Algerian men who are suspected of planning attacks in Germany and having ties to the Islamic State group
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
SANS Cyber Threat Intelligence Summit & Training 2016(Alexandria, Virginia, USA, February 3 - 10, 2016) This Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and...
BSides Tampa 2016(MV Royal Caribbean Brilliance of the Seas, Tampa to Mexico, February 4 - 8, 2016) BSides Tampa is an annual IT security/hacking conference featuring hands on training classes and lectures from some of the greatest minds in the industry and academia
The Law and Policy of Cybersecurity Symposium(Rockville, Maryland, USA, February 5, 2016) This one-day symposium will cover the critical legal and policy issues, challenges, and developments in cybersecurity. Legal professionals, professionals who develop cybersecurity strategies and policies,...
Insider Threat Program Development Training — California(Carlsbad, California, USA, February 8 - 10, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...
OPSWAT Cyber Security Seminar(Washington, DC, February 9, 2016) OPSWAT, along with our Washington DC partners, InQuest and Punch Cyber, will be hosting a half-day seminar to cover several threat detection and research technologies
Secure Rail(Orlando, Florida, USA, February 9 - 10, 2016) The first conference to address physical and cyber rail security in North America
Cyber Security Breakdown: Dallas(Dallas, Texas, USA, February 10, 2016) This half day session will provide you with the critical information you need to start formulating an effective response in the eventuality of a cyber security event. Rather than try and handle the breach...
SecureWorld Charlotte(Charlotte, North Carolina, USA, February 11, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...
Suits and Spooks(Washington, DC, USA, February 4 - 5, 2015) Suits and Spooks DC (Feb 4-5, 2015) is moving to the Ritz Carlton hotel in Pentagon City! We're expanding our attendee capacity to 200 and for the first time will be including space for exhibitors. We...
Department of the Navy (DON) IT Conference, West Coast 2016(San Deigo, California, USA, February 17 - 19, 2016) The purpose of the DON IT conference is to: (1) Explain the new and invigorated DUSN (M), DON/AA, and DON CIO organization and its business and IT transformation priorities. (2) Share information that...
ICISSP 2016(Rome, Italy, February 19 - 21, 2016) The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information...
Interconnect2016(Las Vegas, Nevada, USA, February 21 - 25, 2016) IBM InterConnect 2016 is for those who are building new business models, transforming industries, and creating better outcomes. Whether you're a C-suite executive, IT leader, developer, designer, architect,...
CISO Canada Summit(Montréal, Québec, Canada, February 21 - 23, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges...
Insider Threat Program Development Training Course — Maryland(Annapolis, Maryland, USA, February 23 - 25, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...
CISO New York Summit(New York, New York, USA, February 25, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...
BSides San Francisco(San Francisco, California, USA, February 28 - 29, 2016) BSides San Francisco is an Information / Security conference that's different. We're a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free. There...
CISO Summit Europe(London, England, UK, February 28 - March 1, 2016) With the media covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility to...
RSA Conference 2016(San Francisco, California, USA, February 29 - March 4, 2016) Celebrating its 25th anniversary, RSA Conference continues to drive the information security agenda forward. Connect with industry leaders at RSA Conference 2016
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.