The European Commission sustained an hours-long distributed denial-of-service attack yesterday. Authorities say the attack was stopped without data loss. Both the EU's main website and its network gateways were targeted. No attribution yet, or motive, and details on how the attack was accomplished remain obscure.
The US Navy has disclosed that a compromised contractor's laptop has exposed the personal data of some 134,000 current and former Sailors. The information was in a re-enlistment eligibility database.
Kaspersky warns that a zero-day affecting the InPage text editor is being exploited in attacks against banks located for the most part in Asia and Africa.
Symantec is tracking the progress of the Gatak through the healthcare sector. How the unknown criminals behind Gatak are monetizing malware that affects many medical research, development, and device manufacturing sites is unclear.
Locky ransomware—still dangerous and still unbroken—is being heavily distributed in spam campaigns. CrytpoLuck is being served by the RIG exploit kit. In some good news on the ransomware front, the recently discovered TeleCrypt strain has been broken.
In industry news, Palantir has this month raised an additional $20 million. Analysts look at Symantec's acquisition of LifeLock and see two benefits: a near-term positive effect on the topline, and synergies from the identity protection business for Symantec's larger suite of security offerings.
The US Federal hiring event that led some to assert that there's no cyber talent shortage looks like an outlier.
It's Black Friday. Shop with circumspection, and be wary of free mall WiFi.
Today's issue includes events affecting Australia, Bangladesh, Canada, European Union, Ghana, India, Japan, Malaysia, Nigeria, Pakistan, South Africa, Thailand, United Kingdom, United States.
ON THE PODCAST
The CyberWire's regular daily Podcast is on holiday hiatus today, but we'll return as usual Monday. In the meantime, feel free to catch up on the episodes you may have missed here. And as always, if you enjoy the podcast, please consider giving it an iTunes review.)
AlienVault USM Webcast(Live Webcast, December 1, 2016) Find threats lurking on your systems with host-based intrusion detection and AlienVault USM.
Asian and African banks are attacked using a Zero-day vulnerability(IT News Africa) Kaspersky Lab has discovered attacks which appear to be using a zero-day exploit (a malicious programme allowing additional malware to be silently installed) for the InPage text editor. InPage is a software package used by Urdu- and Arabic-speaking people and organisations around the world. The exploit was used in attacks against banks in several Asian and African countries
InPage Zero Day Used in Attacks Against Banks(Threatpost) A zero-day vulnerability in InPage publishing software used primarily in Urdu, Pashto and Arabic-speaking nations has been publicly exploited in attacks against financial institutions and government agencies in the region
TeleCrypt Ransomware Decrypted In Three Weeks(VirusGuides) It took experts only three weeks to break the code of TeleCrypt, the ransomware which exploits the chat app Telegram messenger. The virus uses a simple cryptosystem which was easy to figure out
Non-Casino Rama patron also victim of cyber attack(Toronto Sun) A man who never stepped foot in Casino Rama was stunned to get a letter advising him that his personal information may have been stolen in a cyber attack targeting the gambling operation
UK organisations have a worrying digital security gap(Help Net Security) UK organisations reveals that while 82 percent of C-Suite and senior managers admit they are concerned about the vulnerability of their web sites, mobile applications and social media accounts to cyber attack and impersonation, according to Risk IQ
Big data company Palantir quietly raised another $20M in November(TechCrunch) Palantir — that $20 billion secretive outfit that provides government, finance, healthcare and other organizations with analytics, security and other data management solutions — has raised another $20 million in funding, according to a new SEC filing
What’s Symantec Getting from Its LifeLock Acquisition?(Market Realist) Symantec (SYMC) is buying identity theft protection company LifeLock (LOCK) for $2.3 billion. The deal values LifeLock at $24 per share, suggesting that Symantec is paying a 16% premium to LOCK’s closing price as of November 18, 2016
How IBM Is Changing Enterprise Cybersecurity Landscape(CXOtoday) The last couple of weeks have been quite exciting for IBM Security. Ealier in November, the Big Blue announced the initial integration of Watson for Cyber Security with IBM’s QRadar Security Intelligence Platform
New infosec products of the week: November 25, 2016(Help Net Security) Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed...Barracuda announces Web Security Gateway updates...Threat Stack unveils Cloud Security Platform support for Windows and hybrid environments...BullGuard updates BullGuard Internet Security...Fujitsu releases PalmSecure BioLock, a biometric security solution for SAP systems
Free Software Quick Security Checklist(SANS Internet Storm Center) Free software (open source or not) is interesting for many reasons. It can be adapted to your own needs, it can be easily integrated within complex architectures but the most important remains, of course, the price. Even if they are many hidden costs related to "free" software. In case of issues, a lot of time may be spent in searching for a solution or diving into the source code (and everybody knows that time is money!)
How Retailers Can Create A Cybersecurity-Aware Environment(Information Security Buzz) Last year, more than 40 million retail records were lost or stolen. And the recent Beyond the Phish Report revealed users in the retail industry incorrectly answered nearly 40% of questions about properly securing and disposing of sensitive data
Cyber Monday: What to watch out for when you hit the web(Naked Security) Cyber Monday happens immediately after the Thanksgiving weekend, and it’s a day of potential online bargains when many people will be flocking to their browsers to look for great deals, just as they flocked to the shopping mall for in-store Black Friday discounts
Blockchain has the potential to revolutionize the supply chain(TechCrunch) At the time of its inception some two centuries ago, the supply chain was a revolutionary idea that would improve visibility and control on goods and products as they moved from point A to point B. But the old concept and technology can no longer support today’s production and supply cycles, which have become extremely fragmented, complicated and geographically dispersed
Think Stock Photos of Hackers Are Cheesy? Blame This Guy(Motherboard) Trust me: picking stock photos for an article on hacking is the bane of a security journalist's existence. Either, you've got some abstract illustration of a padlock surrounded by The Matrix typography, or a dark hooded figure leaning menacingly over a laptop; there isn't much in between
Legislation, Policy, and Regulation
Thai Computer Crime Law Raises Rights Concerns(Infosecurity Magazine) Amendments to Thailand’s controversial Computer Crime Act were debated in parliament this week, with rights groups expressing concerns that the law will bolster government efforts to restrict online freedoms and spy on users
Microsoft calls for laws on cyber security(Ghana Business News) Microsoft has once again proven that it is a champion of cyber security awareness by joining a growing effort by the government and other agencies to promote Cyber safety and anti-piracy awareness in Ghana
DoD Opens .Mil to Legal Hacking, Within Limits(KrebsOnSecurity) Hackers of all stripes looking to test their mettle can now legally hone their cyber skills, tools and weaponry against any Web property operated by the U.S. Department of Defense (DoD), according to a new military-wide policy for reporting and fixing security vulnerabilities
DoD to begin piloting replacement for Common Access Card after Christmas(Federal News Radio) The Defense Department expects to begin pilot programs to test out new IT authentication mechanisms shortly after the Christmas holiday, an early step toward the DoD chief information officer’s objective of completely eliminating the Common Access Card within the next two years
DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman(JDSupra) This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk profile with its cybersecurity plan and recommendations for bridging the gap between IT and the boardroom
Census 2016: Government, IBM settle over website crash(Australian Broadcasting Corporation) The Government has reached a confidential settlement with computer giant IBM for costs after the census website crashed earlier this year, leaving millions of Australians unable to lodge their forms
Hacked or Not, Audit This Election (And All Future Ones)(Wired) After an election marred by hacker intrusions that breached the Democratic National Committee and the email account of one of Hillary Clinton’s top staffers, Americans are all too ready to believe that their actual votes have been hacked, too. Now those fears have been stoked by a team of security experts, who argue that voting machine vulnerabilities mean Clinton should demand recounts in key states
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
4th Ethiopia Banking & ICT Summit(Addis Ababa, Ethiopia, November 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial...
Insider Threat Program Development Training For NISPOM CC 2(Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...
Internet of Things (IoT)(Elkridge, Maryland, USA, November 29, 2016) This cybergamut Technical Tuesday features Dr. Susan Cole, currently the Cybersecurity Lead for a Federal Information Systems Controls Audit Management (FISCAM) preparation team and also provides consulting...
CIFI Security Summit(Toronto, Ontario, Canada, November 30 - December 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security...
AlienVault USM Webcast(Online, December 1, 2016) Host-based intrusion detection systems (HIDS), work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating...
Cyber Threats Master Class(Turin, Italy, December 1 - 2, 2016) The UNICRI Masterclass on Cyber Threats aims to provide media and public relations professionals, as well as those planning a career in public information and communication, with a deeper understanding...
Disrupt London(London, England, UK, December 3 - 6, 2016) TechCrunch Disrupt is the world’s leading authority in debuting revolutionary startups, introducing game-changing technologies, and discussing what’s top of mind for the tech industry’s key innovators.
US Department of Commerce Cyber Security Trade Mission to Turkey( Ankara and Istanbul, Turkey, December 5 - 8, 2016) Now is the time to expand in Turkey! The growth and frequency of cyber-attacks in recent years has increased the demand to protect critical data and infrastructure of governments and businesses. Turkey...
Practical Privacy Series 2016(Washingto, DC, USA, December 7 - 8, 2016) This year, the Practical Privacy Series will return to Washington, DC, with its rapid, intensive education that arms you with the knowledge you need to excel on the job. We’re programming some stunningly...
CISO Southern Cal(Los Angeles, California, USA, December 8, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...
SANS Cyber Defense Initiative 2016(Washington, DC, USA , December 10 - 17, 2016) Make plans to attend SANS Cyber Defense Initiative 2016 (CDI). SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative...
Privacy, Security and Trust: 14th Annual Conference(Auckland, New Zealand, December 12 - 14, 2016) This year’s international conference focuses on the three themes of Privacy, Security and Trust. It will provide a forum for global researchers to unveil their latest work in these areas and to show how...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.