skip navigation

More signal. Less noise.

Cylance

​Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.​ Learn more at cylance.com

Daily briefing.

Saturday’s massacre at a gay nightclub in Orlando, Florida, is being claimed by ISIS. The shooter had apparently called 911 to identify himself and pledge fealty to ISIS shortly before opening fire. What ISIS inspiration contributed to the attack remains unclear, but the shooter’s casual jihadi contacts online had twice brought him to the FBI’s attention.

ISIS, al Qaeda, and the Taliban continue to post grisly inspiration to jihad. Anonymous has countered with low-grade defacements of jihadist Twitter accounts.

India, alarmed Chinese APT groups, brings itself to a higher level of cyber alert. Closer cooperation with the US in cyberspace is seen as a response to the perceived threat from China.

The Republic of Korea charges the Democratic Peoples Republic of Korea with battlespace preparation for a major cyber campaign. Such preparation dates, Seoul claims, to 2014; Pyongyang protests its innocence. Analysts revisit the Sony hack and suggest that its messy complexity (“a dog pile,” says one) makes attributing it solely to North Korea problematic.

Major social media platforms continue to remediate their credential issues. (Microsoft, undeterred by security worries, bought LinkedIn over the weekend for a reported $26.2 billion.) Among Twitter accounts recently compromised was one belonging to the US National Football League (NFL). The NFL Players Association hires K2 Intelligence to help with social media security.

Takedowns and new criminal techniques shift ransomware’s landscape. (Paying ransom didn’t work for the University of Calgary—it hasn’t got its files back, yet.)

Symantec will buy Blue Coat for $4.7 billion.

Notes.

Today's issue includes events affecting Australia, Bangladesh, China, France, India, Indonesia, Iraq, Ireland, Democratic Peoples Republic of Korea, Republic of Korea, Nepal, Pakistan, South Africa, Syria, United Kingdom, United States, and Vietnam.

Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll hear from our partners at Quintessence Labs, as John Leiseboer discusses the importance of key management in cryptography. (And we welcome iTunes reviews.)

Cyber Security Summit (Washington, DC, USA, June 30, 2016) ​Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from the NSA, FBI and more. Register with promo code cyberwire50 for half off your admission (Regular price $250)

Cyber Attacks, Threats, and Vulnerabilities

Defence forces on alert after Chinese cyber attack (New Indian Express) A cyber attack on government and commercial organisations in India by Chinese military’s western headquarters, which oversees India, has raised alarm bells in the corridors of South Block. An alert has been issued to the Indian Army, Navy and Air Force that a Chinese Advanced Persistent Threat (APT) group called Suckfly, based in Chengdu region, is targeting Indian organisations. India’s defence establishment is its prime target

Red alert issued on cyber threats from China (Times of India) Suckfly is an "advanced persistent threat" group which has stepped-up cyber espionage attempts against Indian security and commercial establishments. It has stolen certificated from South Korean software firms and is using these as a cover. India is yet to get a tri-Service Cyber Command, which deals with these threats in a unified manner

Red astroturf: Chinese government makes millions of fake social media posts (Ars Technica) "50-cent" posters aim to distract from dissent rather than confront it

North Korea mounts long-running hack of South Korea computers, says Seoul (Reuters) North Korea hacked into more than 140,000 computers at 160 South Korean firms and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber attack against its rival, police in the South said on Monday

Wake up to North Korea’s cyber-threats (NK Pro) Frequently discussed in South Korea, Pyongyang's cyber attacks only started to get attention elsewhere after Sony

A hacker explains why you shouldn't believe North Korea was behind the massive Sony hack (Tech Insider) It's been nearly two years since a massive cyberattack hit Sony Entertainment, resulting in the leaks of thousands of private emails, social security numbers, unreleased films, and a complete data wipe of half of the company's network

Bank security in danger as hackers attack accounts (VietNamNet Bridge) A series of attacks by hackers on banks occurred recently, showing that banks’ investments in security solutions are insufficient

When the Caliphate Crumbles: the Future of the Islamic State's Affiliates (War on the Rocks) Panic over which future Islamic State affiliate should be of chief concern rises each day as the Islamic State loses turf in Iraq and Syria and foreign fighters flee. This panic should be muted, though, as all Islamic State affiliates are not created equal. A scary jihad map from al Qaeda last decade looks remarkably similar to a scary Islamic State map today. The names change but the places largely remain the same

Afghanistan’s Taliban Push Into New Media (Wall Street Journal) Militants develop smartphone app, slick videos to promote insurgency

A young man is skinned alive. A sign of new Taliban brutality? (Washington Post) In a remote area of Afghanistan, where thousands of years of hardscrabble tribal culture increasingly mixes with a resurgent Taliban militancy, this is how Fazl Ahmad allegedly died

Al-Qaeda Leader Zawahri Pledges Allegiance to New Taliban Chief (VICE News and Reuters) Al-Qaeda leader Ayman al-Zwahari, in an online audio message, pledged allegiance to the new head of the Afghan Taliban, who was appointed last month after his predecessor was killed in a US drone strike

Anonymous Deface ISIS Twitter Accounts with Pornographic Content (HackRead) Reportedly, the Twitter handles of ISIS supporters have been receiving a massive number of pornographic posts. The reason? A hacker who seems to be associated with the world-famous hacktivist collective Anonymous has managed to take over Twitter accounts of ISIS supporters and extremists who propagate about the jihadist ideology of the terrorist organization using these accounts

Jailed Colombian hacker aiming at Islamic terrorists (CCTV-America) Colombian hacker Andres Sepulveda claims he rigged elections across Latin America for more than a decade. In a sit-down prison interview with CCTV America’s Michelle Begue, Sepulveda says who his next target will be-from behind bars

Twitter locks out users after nearly 33 million logins put up for sale (Naked Security) A hacker who reportedly has ties to the recent MySpace, LinkedIn and Tumblr data breaches is claiming to have another huge set of scalped logins: this time, for Twitter accounts

An Interview With the Hacker Probably Selling Your Password Right Now (Wired) For the last two weeks, the tech world’s security teams have been practically under siege. On an almost daily basis, new collections of data from hundreds of millions of stolen accounts have appeared on the dark web, ripped from major web firms and sold for as little as a few hundred dollars each worth of bitcoins. And behind each of those clearance sales has been one pseudonym: “Peace_of_mind"

DIY store’s poisoned search engine returns nasty results (Naked Security) Good luck searching for a nail on the website of Castorama, the French do-it-yourself retailer: as of Wednesday, the top search result concerned Christ’s cross and watching the burning of Satan’s ungodly glory. Or something like that

Thousands of websites exploited for illegal SEO tactics (Help Net Security) Imperva researchers discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase SEO results for illicit websites

@Deray’s Twitter Hack Reminds Us Even Two-Factor Isn’t Enough (Wired) This has been the week of Twitter hacks, from Mark Zuckerberg to a trove of millions of passwords dumped online to, most recently, Black Lives Matter activist DeRay McKesson

Zuckerberg, NFL Twitter Breaches Highlight Bad Password Hygiene (Investors Business Daily) Facebook (FB) CEO Mark Zuckerberg’s repetitive “dadada” LinkedIn (LNKD) password was his hacking downfall, KnowBe4.com CEO Stu Sjouwerman said Wednesday, a couple of days after Zuckerberg’s Twitter (TWTR) and Pinterest accounts were breached

$90K Windows Zero Day Gets a Price Cut (Threatpost) A Windows zero-day for sale on the black market for $90,000 just received a price drop. The flaw that allegedly leaves all versions of Windows users exposed to a local privilege escalation (LPE) vulnerability can now be snatched up for $85,000

All Clues Point to the Death of the Angler Exploit Kit (Softpedia) Angler EK spotted online for the last time on June 7

Goodbye #Dridex, good riddance #Locky (Bryan Campbell) We will no doubt shortly see some official word on the 'takedown' of Dridex and/or Locky, it has been widely reported that the lack of daily spam campaigns indicates its disappearance is linked to the FSB operation. Its widely known that the FSB only get involved in cyber criminal activity when there is significant international pressure to investigate

Ransomware targets Android smart TVs (Help Net Security) If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both Android-powered mobile devices and smart TVs

Meet the 'number one prevalent' new ransomware: Crysis (Healthcare IT News) The virus is able to access administrative features, allowing it to not only encrypt files, but send data to a command server

Ransomware Now Comes With Live Chat Support (Dark Reading) Victims of a new version of Jigsaw now have access to live chat operators to help them through the ransom payment process, Trend Micro says

Jigsaw ransomware uses live chat to relay payment instructions (Graham Cluley) Got a question? Ask a ransomware author!

Ransomware is malicious tech, but it’s also a business model (Globe and Mail) This week, the University of Calgary paid $20,000 to restore its e-mail services and other files after a ransomware attack. The ransom, paid to prevent the potential loss of valuable research, not only highlighted the vulnerability of Canadian communication and information technologies, but also showcased the latest trend in cybercrime: a new “business model” that leaves individuals and businesses fending for themselves or footing the bill

University of Calgary Systems Still Down After Paying Ransomware Fee (Bitcoins) The University of Calgary is the most recent victim of ransomware attacks, and the school paid CND$20,000 in Bitcoin to get rid of the malware

Let’s Encrypt CA inadvertently leaks users’ email addresses (Help Net Security) Let’s Encrypt, the non-profit Certificate Authority (CA) that helps website administrators switch from HTTP to HTTPS quickly and effortlessly, has accidentally leaked 7,618 email addresses of its users

Snowden Emails Reveal the NSA Used Notoriously Insecure Microsoft Word Macros (Motherboard) At the heart of the NSA’s intelligence reporting process are—or at least were, in 2012—some templates using Microsoft Word macros. That’s one of the unbelievable details revealed in a series of Edward Snowden’s emails to NSA’s SIGINT Oversight and Compliance Division released to VICE News in response to a FOIA request. The revelation comes amid renewed focus in the security community on hackers’ uses of Microsoft macros as a vector to launch malware

DDoS Attacks: When Servers Won’t Serve (Yaksas) DDoS stands for Distributed Denial of Service. DDoS is a type of attack in which multiple computers (for example a botnet) are used, to flood a single computer or a network with non-legitimate service requests to overload its resources. It is rare that a week goes by without news of some organization being impacted by a DDoS attack

Mitsubishi Outlander Just The Latest 'Smart' Car That's Trivial To Hack And Control (Tech Dirt) Yet another vehicle heavily advertised as being "smart" has proven to be notably less secure than its older, dumber counterparts. This week, researchers discovered that flaws in the Mitsubishi Outlander leave the vehicle's on-board network vulnerable to all manner of hacker attack, allowing an intruder to disable the alarm system, drain the car's battery, control multiple vehicle functions, and worse

Hackers threaten to hit the brakes on Prabhu express (New Indian Express) Railways Minister Suresh Prabhu is a worried man. Recent attempts by hackers to break into the Railways’ online system involving train operations and the reservation system is giving him sleepless nights. The organisation, which sees half of its total tickets booked online, has held meetings with National Technical Research Organisation (NTRO), a cyber security agency under the National Security Advisor, to come up with systems that will ensure its sites are not hacked

Preventing a Blackout by Taking the Power Grid Offline (Foreign Policy) What can stop hackers from turning off America’s lights? Old-school equipment that’s not connected to the web

Terrorists Are Close To Bringing Down Entire Cities With Cyber Attacks, Warns Top UK Spy (Daily Caller) Terrorist groups like al-Qaida and Islamic State are inching closer to having the cyber capability to electronically shut down entire cities

Wendy's lower after more restaurants linked to cyber attack (Seeking Alpha) Shares of Wendy's (NASDAQ:WEN) are lower in early trading after the company disclosed it found more malicious malware in its point-of-sales systems.The number of Wendy's locations that have been affected is now well over 300.WEN -1.84% premarket to $10.12. In the past, many retail stocks have recovered quickly from a breach report selloff

SABC restored after cyber attack (Times Live) The SABC’s websites were still down after 4pm on Sunday after the hacktivist group that launched a massive cyber attack on the national broadcaster‚ Anonymous Africa‚ said it had halted the attack‚ prompting it to tweet: “SABC are still offline. I think someone broke something trying to fix what was happening”

Cyber attack slows IIT servers on result day (Times of India) The over one lakh aspirants for sought-after Indian Institute of Technology (IIT) seats were not prepared for a cyber attack on the JEE (Advanced) results on Sunday

Security Patches, Mitigations, and Software Updates

Netgear Router Update Removes Hardcoded Crypto Keys (Threatpost) Netgear on Friday released firmware updates for two of its router products lines, patching vulnerabilities that were reported six months ago

Verizon Starts Rolling Out June Android Security Patch To Samsung Galaxy S7, S7 Edge (TechTimes) If you are on the U.S. network operator Verizon Wireless and own the latest flagship Samsung Galaxy S7 or Galaxy S7 edge smartphones, then you will be pleased to learn that the carrier is pushing out the June patch for the two handsets

Google to Remove Weak "Crypto" Provider in Android N (Softpedia) Developers should migrate to other Java encryption providers

Cyber Trends

The Explosion of Apps: 27% are Risky (CloudLock) New Shadow IT risk vectors are coming into play in the form of connected third-party apps. These apps are authorized using corporate credentials, demand extensive permission sets, and communicate with corporate SaaS platforms via OAuth connections. In this report, we take a deep dive into the risks associated with these apps

States seek solutions to deal with cyber threat (Straits Times) Singapore's impending move to delink civil service computers from the Internet has drawn flak, but is in fact a trend-setting move, as other governments mull over going back to typewriters and analogue systems to protect highly sensitive information

Why the NSA and other spies will love the Internet of Things (Recode) Hackers already love them, which means spies will, too

‘Nepal is Apac’s fourth malware-prone nation’ (Kathmandu Post) Nepal is the fourth most malware infection prone country in Asia Pacific region, according to a recent index compiled by Microsoft. Pakistan tops the list followed by Indonesia and Bangladesh

Marketplace

Online Fraud Detection Spend to Hit $9.2bn by 2020 as Fraudsters Target Mobile Transactions (Juniper Research) Biometric authentication key to increased payment security

Chief Security Officer May Be The Job Of The Future That No One Wants (Fast Company) The gold rush for top security leadership is anything but stable

NFL hires cybersecurity firm to teach players how to use social media (Digital Trends) The NFL has a social media problem that can only be fixed by professionals. Following a string of high-profile online mishaps and hacks, the National Football League Players Association (NFLPA) is reaching out to cybersecurity firm K2 Intelligence for help

The Chinese Hackers in the Back Office (New York Times) Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses

A Computer Security Start-Up Turns the Tables on Hackers (New York Times) Standing before a crowded room of entrepreneurs and investors at a conference in San Francisco last summer, former Vice President Al Gore described how climate change could be contained, possibly even reversed

Symantec to buy Blue Coat for $4.7 billion to boost enterprise unit (Reuters) Technology security firm Symantec Corp said it would buy privately held cyber security company Blue Coat for $4.65 billion in a cash deal that will ramp up Symantec's enterprise security business

Microsoft will acquire LinkedIn for $26.2B (Ars Technica) All-cash deal will see LinkedIn retain its distinct brand, independence, and CEO

Cybersecurity firm Interset lands 'strategic investment' from U.S.-based VC (Ottawa Business Journal) Just over a year after landing $10 million in venture capital funding, local cybersecurity firm Interset announced Thursday it has received a “strategic investment” from a venture capital firm that targets technology to support missions of the Central Intelligence Agency and the Federal Bureau of Investigation in the United States

This VC Is Investing in a Startup That Spies on Your Computer Use (Fortune) In-Q-Tel, the venture capital firm backed by the CIA and other stealthy “three-letter agencies” is investing in Interset, a specialist in user behavior analytics. That puts Interset into some pretty interesting company. In-Q-Tel has invested in Palantir, Mesosphere, Cliqr, and some 250 tech companies

Why Shares of Palo Alto Networks Inc Tumbled 13.5% in May (Motley Fool) Growing GAAP losses and so-so guidance sent the high-flying stock lower

Palo Alto: Negative Earnings, Strong Free Cash Flow Generation? (Seeking Alpha) Palo Alto Networks is one of the fastest-growing cyber-security companies. The firm's reach and potential upselling opportunities are tremendous. Estimates peg the cyber security market to surpass $150 billion by 2019 from under $100 billion in 2015. Palo Alto will have its hands in this large and growing pie. Unlike many of its emerging cyber-security rivals, Palo Alto is significantly free cash flow positive, and we think this makes the firm a much more palatable investment idea. Let's take a look at the firm's investment highlights as we walk through the valuation process and derive a fair value estimate for shares

The five-minute CIO: Greg Day, Palo Alto Networks (Silicon Republic) “The biggest challenge today is people. There are just not enough skilled IT security practitioners out there,” says Greg Day, VP and regional chief security officer (CSO) EMEA at Palo Alto Networks

A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet (New York Times) A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab’s Moscow headquarters, where a small television screen displays cyberthreats occurring in real time around the world — a blinking, spinning, color-coded globe brimming with suspicious emails, malware and evil botnets that could be infecting a computer near you

Why CyberArk Software Stock Jumped 11% in May (Motley Fool) The cybersecurity leader's surging share price may be a sign of even greater gains ahead

Dell to offload $3.25 billion in junk bonds to further fund EMC buyout (Computer Business Review) The offering is expected to close on or around 22 June 2016

Avast expands beyond security with new storage-optimizing app called Photo Space (TechCrunch) Avast is a company best known for its security software, but the days where everyone’s first download to their Windows PC is an anti-virus program are fading into the past

Exabeam Selected as a 2016 Red Herring Top 100 North America Winner (Marketwired) Exabeam, the leader in user and entity behavior analytics (UEBA) for security, has been named a winner of the Red Herring Top 100 North America Award -- a prestigious list honoring the year's most promising private technology ventures from the North American business region

Security startup confessions: Let’s talk about channel management (Help Net Security) My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices startups make when security matters. I will share experiences from my own startups (my first was in 1994), and things I have learned by watching and advising numerous other startups around the world

Dimension Data CEO Resigns, Succeeded By Operations Chief (CRN) The CEO of solution provider giant Data Dimension has stepped down after 12 years at the helm, the company said Friday

Products, Services, and Solutions

IRS Re-Enables ‘Get Transcript’ Feature (KrebsOnSecurity) The Internal Revenue Service has re-enabled a service on its Web site that allows taxpayers to get a copy of their previous year’s tax transcript. The renewed effort to beef up taxpayer authentication methods at irs.gov comes more than a year after the agency disabled the transcript service because tax refund fraudsters were using it to steal sensitive data on consumers

Northrop Grumman and NEC enter into cybersecurity collaboration agreement (Military Embedded Systems) NEC Corp. and Northrop Grumman have entered into a collaboration agreement to deliver the Japan-Cyber Operations Research, Training, and Experimentation (J-CORTEX) system, a cloud-based cyber range that emulates customer's environments for training and testing purpose

ESET a lightweight among internet security products (ChannelLife) ESET’s Smart Security 9 has received the highest score in AV-Comparatives’ latest independent performance test, which measure the impact of the product on a system

CipherCloud Honored as Best Cloud Computing Security Solution at SC Awards Europe 2016 (PRNewswire) CipherCloud, the leader in cloud visibility and data protection, today announced that its Cloud Access Security Broker (CASB) platform has been honored as the Best Cloud Computing Security Solution at the 2016 SC Awards gala on June 7 hosted in conjunction with InfoSecurity Europe 2016

EZShield Rated Best Identity Protection Leader for Third Year (Virtual Strategy) For the third time, EZShield receives top honors from Javelin Strategy & Research as the “2016 Javelin Best Overall Identity Protection Leader.” As part of Javelin’s annual scorecard, which “examines the health of the identity protection industry,” EZShield also placed first in the categories of prevention, detection and resolution

Google Denies Accusations It Manipulated Searches for Hillary Clinton (Wall Street Journal) News website alleges autocomplete service is biased in favor of Democratic presidential nominee

Developing Hashcat, a tool for advanced password recovery (Help Net Security) As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to understand the technology. He was on the lookout for a piece of software that could make use of high performance computing, something that will be helpful to many users

Technologies, Techniques, and Standards

7 Data Classification Tips (Dark Reading) Make data classification a part of your total security program

Centrify survey: Public believe government can handle cybersecurity issues (Public Technology) Most of the UK public say they trust that government would handle data security issues well, as CESG releases guidance on data protection for the public sector

Harnessing integrated security analytics (Help Net Security) Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a break-neck pace. Like all innovation, it solves an immediate need — but it’s difficult to see the new issues it will cause

Design and Innovation

How Apple Could Make Your iPhone and Mac Even More Secure (Wired) “At Apple, with every new release of hardware and software, we advance the safety, security, and data protection features in our products.” That’s Apple’s top lawyer Bruce Sewell, testifying before Congress in April, at the height of the company’s showdown with the FBI. With a new software release coming at WWDC on Monday, it’s time to take a look at what the future of Apple security might entail

IoT Security: Onus On Developers, Security Researchers (Dark Reading) Security teams and DevOps need to team up on 'lean security' processes that make safety a top priority before a product reaches the market

Microsegmentation: A new security paradigm? (GCN) Whether it’s protecting legacy systems, building new solutions or simply making sure sensitive data doesn’t fall into the wrong hands, billions of dollars have been spent on security in the last few years

Is a password-free future around the corner? Here’s all you need to know (Financial Express) From ear impressions to measuring a user’s gait for authentication, a password-free future is just around the corner

Are passwords passe? Facebook CEO Mark Zukerberg hack spotlights vulnerability (Financial Express) In a world where passwords are ubiquitous, can we dare to proclaim that they can be passé? Because the world is increasingly moving towards an era that has no place for passwords like ‘Dadada’, used by Mark Zuckerberg for his vulnerable social media

Academia

Texas A&M Cybersecurity Center receives recognition from NSA, Homeland Security (Eagle) The Texas A&M Cybersecurity Center has become the latest of the university system’s programs to receive national attention, earning a dual designation as a National Center for Academic Excellence from the National Security Agency and the Department of Homeland Security in education and research

Scholarships available for Ky. high school teachers to attend cyber security conference (Lane Report) Up to 20 scholarships available

Unique camp gives local students jump start on emerging technology (WJBF) As Augusta prepares to become the nation’s Cyber Command center, students from across the area got a sneak peek at the future at a unique camp hosted by Augusta University on Friday

Legislation, Policy, and Regulation

Australia knows it has a cyber security problem, but not the scale (ComputerWeekly) The Australian government is aware it has a cyber security challenge, but might not understand the size of the issue, according to experts

U.S.-India cyber agreement puts more pressure on China (FedScoop) The wide-ranging pact deepens the partnership on global cyber and tech issues

Govt Moves Quickly to Quell Diplomatic Spat with US Over Terror Alert (EWN) Yesterday Dirco & State Security accused the US of trying to interfere with SA’s efforts to combat terrorism.

Meet the Navy SEAL Leading the Fight Against ISIS Messaging (Defense One) Michael Lumpkin, who joined the State Department after serving as DoD's special-ops leader, believes he’s got a model for future efforts to counter extremism online in real time

Cyber Attack On Satellite Could Be Act Of War: HPSCI Ranking (Breaking Defense) In a rare public event, the No. 2 member of the House Permanent Select Intelligence Committee (HPSCI), Rep. Adam, said a cyber attack on a US satellite could be considered an act of war

Cyberterrorism and the role of Silicon Valley (TechCrunch) For the moment, at least, cyberterrorists have not harnessed the technology they would need to destroy Western civilization from a basement lab in some remote corner of the world

Cyber Deterrence “At Scale” (Lawfare) This week, Senator Sheldon Whitehouse called for the creation of a cybersecurity “militia” to strengthen US defense. He suggested reexamining a “militia model that lets ordinary citizens come to their country's aid". Whitehouse’s remarks represent a growing focus on exploring mechanisms to incorporate civilian involvement and “active defense” into traditional government activities. For example, at a recent Georgetown Cyber Policy Conference, nearly every panel turned to the conversation of “Cyber Letters of Marque” and active defense

House GOP security plan offers vague cyber strategy (FedScoop) House Speaker Paul Ryan proposed an outline framework for U.S. security posture in a post-Obama era

White House threatens to veto Senate NDAA (FCW) The White House has threatened to veto the Senate version of the annual defense policy bill, citing opposition to key provisions on acquisition and cybersecurity policy, among a litany of other objections

Carter Names Three to Innovation Board (Defense News) Secretary of Defense Ash Carter has announced three new members of his Defense Innovation Advisory Board

Litigation, Investigation, and Law Enforcement

The Orlando Massacre Shows How ISIS Outsources Terror (Wired) When faced with acts of unfathomable cruelty, humans instinctually seek out simple narratives that can help us cope with the existence of such evil

Was Orlando Shooter Really Acting for ISIS? For ISIS, It’s All the Same (New York Times) The revelation that the 29-year-old man who opened fire on Sunday in a gay nightclub had dedicated the killing to the Islamic State has prompted a now-familiar question: Was the killer truly acting under orders from the Islamic State, or just seeking publicity and the group’s approval for a personal act of hate?

Omar Mateen, Terrorist Who Attacked Orlando Gay Club, Had Been Investigated by FBI (Daily Beast) Mateen was a ‘known quantity’ to federal law enforcement before he killed at least 50 people in the worst mass shooting in U.S. history

Orlando nightclub shooter worked at one of the world’s largest security firms (Washington Post) G4S, the company that employed the man believed to have killed 50 people at a night club in Orlando is one of the world's largest security firms, with a workforce rivaling the population of Washington, D.C., that has worked with U.S. agents on border patrol, provided security to the London Olympics and responded to the recent wildfires in Canada

Omar Mateen: From Early Promise to F.B.I. Surveillance (New York Times) Omar Mateen’s life seemed to be on a successful trajectory a decade before he carried out one of the worst cases of mass murder in American history

In Orlando Massacre, a New Target for Islamist Lone Wolves: LGBT (Foreign Policy) A massacre that left at least 50 dead and 53 wounded Sunday at a packed gay nightclub in Orlando, Florida, is now the deadliest shooting in U.S. history. But the rampage may also have set another disturbing precedent, marking the first large-scale attack inspired by Islamist extremism that successfully targeted the LGBT community in a Western country

NSA: We couldn't have hacked the San Bernadino iPhone (The Hill) The National Security Agency would not have been able to open the iPhone at the center of a spat between Apple and the FBI, a top official said Friday

Despite Clinton claims, 2012 email had classified marking (Fox News) Hillary Clinton, from the moment her exclusive use of personal email for government business was exposed, has claimed nothing she sent or received was marked classified at the time

WikiLeaks to publish more Hillary Clinton emails - Julian Assange (Guardian) New release likely to fan controversy and provide further ammunition for Republican presidential rival Donald Trump

Did you know there's a mega cybercrime backlog in Ireland? Now you do (Register) Garda need 5 years to tackle it... and the help of the FBI

Google, Facebook, Microsoft start working with [Bangladesh] govt, claims Tarana (Prothom Alo) Alongside Google and Facebook, the government has also started working with Microsoft for ensuring cyber security in the country and preventing child pornography, claimed state minister for posts and telecommunications Tarana Halim

Revealing Lessons About Vulnerability Research (Dark Reading) It's not clear why a dozen FBI agents showed up at a security researcher's door last month but as cyber becomes more a factor in product safety, our judicial system needs to get a better grasp on who the real criminals are

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

Upcoming Events

SANSFIRE 2016 (Washington, DC, USA , June 11 - 18, 2016) For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2016 is our annual "ISC Powered" event. Evening talks tap into the expertise behind...

4th International Conference on Cybercrime and Computer Forensics (ICCCF) (Vancouver, British Columbia, Canada, June 12 - 14, 2016) For the past four years, APATAS has organized the International Cybercrime and Computer Forensics conference at various locations throughout Asia. In 2016, our 4th annual ICCCF is moving for the first...

Show Me Con (St. Charles, Missouri, USA, June 13 - 14, 2016) SHOWMECON. The name says it all. Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they...

CISO DC (Washington, DC, USA, June 14, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and...

Cyber Security Opportunities in Turkey Webinar (Online, June 14, 2016) As in other countries, Turkey is a target of high profile attacks in the public and private sectors. Instability from neighboring countries increases their risk. Since 2014 Turkey is working on a cyber security plan which includes not only government but private sector and NGOs as well. Per Cisco's 2014 Security Report, attacks occur in ICS-SCADA, web servers and malwares-6% respectively, applications-31%, infrastructure-18%, and end-users-9%.Topics include: industry drivers, trends, and key players. Open Q&A session at the conclusion of presentations. Confirmed speakers: Alper Cem Yilmaz, Founder, and Jade Y. Simsek, Mrktg Specialist, CrypTech. Learn about the Cyber Security Market in Turkey with the objective of finding sales opportunities. Turkey's Transportation, Maritime Affairs and Communications Ministry formed SOME (Cyber Incident Response Teams)for protection of cyber attacks. ...

The Security Culture Conference 2016 (Oslo, Norway, June 14 - 15, 2016) The Security Culture Conference 2016 is the leading, global conference discussing how to build, measure and maintain security culture in organizations. The conference is a part of the Security Culture...

TECHEXPO Top Secret Hiring Event (Baltimore, Maryland, USA, June 15, 2016) Security-cleared professionals are invited to interview for new career opportunities on Wednesday, June 15 at the BWI Marriott in Baltimore, MD. Hot job opportunities are available in Cyber Security, Intelligence,...

2016 CyberWeek (Tel Aviv, Israel, June 19 - 23, 2016) The conference, held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), the Yuval Ne'eman Workshop for Science, Technology and Security, the Israeli National Cyber Bureau, Prime Minister's...

National Insider Threat Special Interest Group - South FL Chapter Kickoff Meeting (Palm Beach, Florida, USA, June 21, 2016) The National Insider Threat Special Interest Group (NITSIG) is excited to announce the establishment of a South Florida Chapter. Presentations and discussions will be provided by Insider Threat Defense,...

Cyber Security for Critical Assets LATAM (Rio de Janeiro, Brazil, June 21 - 22, 2016) Cyber-attacks on critical infrastructure have become an increasing threat for Latin American governments and companies within the oil and gas, chemical and energy sectors. Although the attack frequency...

Cyber 7.0 (Laurel, Maryland, USA, June 22, 2016) Cyber 7.0 delves into the cyber threat to the nation’s critical infrastructure—transportation, health care, utilities, and energy, to name a few. How can government and industry work together to battle...

Security of Things World (Berlin, Germany, June 27 - 28, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World in June...

SANS Salt Lake City 2016 (Salt Lake City, Utah, USA , June 27 - July 2, 2016) We are pleased to invite you to SANS Salt Lake City 2016, June 27-July 2. Are you ready to immerse yourself in the most intense cyber training experience available anywhere? Do you need to become a more...

DC / Metro Cyber Security Summit (Washington, DC, USA, June 30, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

TECHEXPO Cyber Security Hiring Event (Tysons Corner, Virgina, USA, June 30, 2016) Cyber security professionals are invited to interview face-to-face with employers including The CIA, Deloitte, Intel Security, Northrop Grumman, Lockheed Martin, Deloitte, Vencore and many more. Hundreds...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.