Observers looking into the sale of iOS surveillance tools by NSO Group to users in the United Arab Emirates find that middlemen make it difficult to identify those end users.
Other observers draw lessons from other recent incidents. The threat of the recently disclosed MySQL flaws, CSO writes, affords an object lesson in the importance of permission management. The large number of private keys exposed on publicly accessible web servers (up by more than a million from the number reported in last year's study by SEC Consult) indicates, says Naked Security, that those who develop firmware for embedded devices shouldn't (1) share or reuse private keys, (2) enable remote administration by default, or (3) let users activate new devices until they've set the necessary passwords.
Symantec releases its August security trends report. It finds a rise in malware variants (up to 45.5 million worldwide, as Symantec counts variants) but a drop in attacks as major malware toolkit activity is disrupted and declines.
Today is Patch Tuesday; the latest updates will be available from Redmond later in the day. Microsoft is revamping its patch distribution policy in October—this is the last Patch Tuesday but one to follow the old policies.
In industry news, the US General Services Administration has expanded the availability of cyber security purchases under Schedule 70.
Russia's Defense Minister takes a shot at remarks last week by the US Defense Secretary, charging Russia with dangerous destabilization of the international order. Russia says not us. Also tu quoque.
Today's issue includes events affecting Australia, Canada, France, Germany, Iraq, Israel, Syria, United Kingdom, United States.
ON THE PODCAST
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll welcome Emily Wilson from our new partners at Terbium Labs. We'll also hear from Tony Dahbura, of the Johns Hopkins University, who'll describe their upcoming Senior Executive Cyber Security Conference. And as always, if you enjoy the podcast, please consider giving it an iTunes review.
Tech Expo Job Fair(Arlington, VA, USA, September 28 - 29, 2016) Software Engineering Institute at Carnegie Mellon University Invitational Hiring Event. This is an invitation-only event. Submit your resume for review by September 27. SEI staff will be interviewing at their offices in Arlington, VA to fill local positions immediately.
CyberMaryland 2016(Baltimore, MD, USA, October 20 - 21, 2016) This year's theme, “Leading the Cyber Generation,” captures the event’s intent to provide unparalleled information sharing and networking opportunities for development of cyber assets on both the human and technological side.
NICE Conference and Expo 2016(Kansas City, MO, USA, November 1 - 2, 2016) The NICE 2016 Conference and Expo will feature timely, topical, and thought-provoking presentations, bringing together cybersecurity workforce, training, and educational leaders from academia, business, and government for two days of focused discussions.
Dateline Billington Cybersecurity Summit
7th Annual Billington CyberSecurity Summit(Billington CyberSecurity) Over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors [are attending] the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity in the Nation’s Capital, on September 13 in Washington, D.C. at the Ronald Reagan Building and International Trade Center. Keynotes include NSA Director Admiral Michael Rogers and top U.K. and Israeli cyber leaders
Overnight Cybersecurity: House looking into election hacks | FTC seeks input on data safeguards(The Hill) ...At tomorrow's Billington Cybersecurity Summit in Washington D.C., Ryan Gillis, Palo Alto Network's vice president of cybersecurity strategy and global policy, will suggest a novel concept in information security: Successfully implementing cybersecurity policies in government and business might be less about technology or cost and more about being able to understand what other people are saying
How “Fileless” Ransomware Works(CrowdStrike) As ransomware becomes an increasingly lucrative business, organized crime groups are expanding their operations to reach more victims and extract more ransoms
Symantec's August malware stats show rise in malware but drop in attacks(Security Brief) Symantec's latest Monthly Intelligence Report has revealed that new malware variants are on the rise across the globe, reaching 45.5 million, the highest since the same time last year. Phishing attacks have dropped but email malware is also on the rise, suggesting a rollercoaster mix of threat types
Security Patches, Mitigations, and Software Updates
New Windows Patch Policy At Odds With Acceptable Risk(Threatpost) With Microsoft’s Patch Tuesday release tomorrow, the countdown begins for application developers to button down code ahead of Microsoft’s new servicing model starting in October that could present vulnerability issues for some businesses
Convergence makes broadcasters vulnerable to cyber attack(TVBEurope) Cyber security has been a hot subject at IBC. In announcing a supplier security checklist, a beginner’s guide and a longer user guide, DPP MD Mark Harrison said: “Collectively I cannot think of a more important subject than cyber security”
Why so many security strategies will fail(IT Online) While 66% of CEOs will have digital transformation at the heart of their corporate strategy, 70% of siloed digital transformation initiatives will fail by 2018 due to insufficient collaboration, integration, sourcing or project management – and security initiatives are no different
GSA retools Schedule 70 for cyber(FCW) Federal technology buyers who use the General Services Administration's Schedule 70 will soon have new options for acquiring cybersecurity services
Palo Alto - State Of The Union(Seeking Alpha) The cybersecurity industry is experiencing a paradigm shift. Palo Alto might not be perfectly positioned to withstand these shifts. Competition in the industry will make it hard for slow adopters to catch up with the new trends. Palo Alto’s current valuation might not be justified if it does not act fast
If an Infosec policy falls in the forest(CSO) When you are building an Information Security practice you need a solid governance structure in place. For those of you who might not be familiar we can look at it a more accessible way. If you are building a house you need a solid foundation otherwise the thing will collapse
Five ways to respond to the ransomware threat(Help Net Security) The ransomware threat has taken a sharp upturn this year. In fact, a recent industry study found that nearly half of all U.S. businesses have experienced at least one ransomware attack in the past year alone. While organizations wrestle with the ever-pressing issue of whether to pay or not to pay if they’re victimized, Logicalis US suggests CXOs focus first on how to protect, thwart and recover from a potential attack
Moving toward an intelligent hybrid security model(Help Net Security) Cyber attacks aren’t slowing down – in fact, 76 percent of organizations have experienced a breach within the last two years. Enterprises of all sizes, across every industry, are challenged to respond to increasingly complex and severe attacks – often only learning about the size, severity, and type of incident they’re dealing with as their security teams work to stop them
DoD is 'rebranding' endpoint security(C4ISRNET) The Defense Department is making changes to the tools that provide endpoint security to its network. In a news release, DISA said the Host Based Security System (HBSS) — a tool to enable DoD to detect and counter known threats in the network — will be folded into several other tools as to provide an “evolved, holistic approach to cybersecurity network defense
Artificial intelligence in cybersecurity: Snake oil or salvation?(Help Net Security) So what is machine learning? Machine learning in an integral part of the “umbrella term” artificial intelligence. Put simply, it is the science of enabling computers to learn and take action without being explicitly programmed. This is achieved through complex algorithmic models applied to data. From this are derived data-driven predictions or decision
CSM National Security Agency (NSA) Internship Program(Southern Maryand Online) NSA educational co-op program is available to College of Southern Maryland’s students. The program provides paid employment during alternate semesters, tuition reimbursement and one class pre-paid during the accepted student’s “off” semesters
How the US responds to cyber incidents(C4ISRNET) The U.S. and its political parties have repeatedly fallen victim to cyber intruders in recent years. The most recent being the intrusion into a number of networks and accounts affiliated with the Democratic National Committee as well as state election systems, sowing some concern and distrust in American institutions
U.S.and UK enter into cyber partnership(C4ISRNET) During his overseas trip last week, U.S. Secretary of Defense Ash Carter and his UK counterpart, Michael Fallon, announced a partnership for greater information sharing in cyberspace
Obama administration takes battle against Islamic State into cyberspace(Washington Times) The Obama administration has launched the first cyberwar against the Islamic State, a war that, coupled with real, not virtual, fighting, is producing one of the most encouraging on-the-ground successes in the conflict — sharply cutting into the number of foreign fighters sneaking into Syria to join the group’s terrorist army and its so-called Islamic caliphate
Will NSA and CyberCom Split?(NextGov) Talk of separating the National Security Agency and U.S. Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions
Nation's first CISO brings vision, strategy to cybersecurity mission(Federal Times) Last week, retired Air Force Gen. Gregory Touhill was appointed as the first federal chief information security officer. The appointment was well received throughout industry and the public sector as he brings technical expertise, leadership, accessibility and inclusion to the cybersecurity mission. He is viewed as a consummate cybersecurity professional who is well liked on both sides of the political aisle and by our global allies
3 Syrians arrested in Germany, believed sent by IS(AP) Three Syrian men believed to have been sent to Germany last year by the Islamic State group were arrested in raids on Tuesday, part of efforts to root out extremists sent to Europe amid the migrant influx, authorities said
Former Clinton email tech aide won’t testify at congressional hearing Tuesday(Washington Post) Lawyers for a former State Department staffer who worked on Hillary Clinton’s private email system have notified a House committee that their client will not testify Tuesday morning, saying that he previously invoked his constitutional right against self-incrimination before another Republican-led panel of Congress
Lawmaker issues subpoena to FBI for Clinton probe records(Fox News) A senior House Republican on Monday escalated the GOP's battle with the FBI over its decision not to recommend criminal charges against Hillary Clinton for her use of a private email system, serving a top FBI official with a subpoena for the investigation's full case file
The NSA whistleblowers who vetted Oliver Stone's 'Snowden' biopic(Christian Science Monitor Passcode) Former National Security Agency executives Bill Binney and Thomas Drake, who blew the whistle on US government surveillance programs more than a decade ago, served as advisers on the Edward Snowden film that opens nationwide Friday
Man hacked, blackmailed gold bullion trading firm(Help Net Security) 25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are delivered to the rightful owners
Montreal cops hunting data thieves(CSO) When I was a kid growing up I was always enamored with the old cops and robbers movies. I was always amazed a the criminals terrible OPSEC even at a young age
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
SANS Network Security 2016(Las Vegas, Nevada, USA , September 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity!...
Hacker Halted 2016(Atlanta, Georgia, USA, September 11 - 16, 2016) This year, Hacker Halted’s theme is the Cyber Butterfly Effect: When Small Mistakes Lead to Big Disasters. The goal of the conference is to bring the IT security community together...
(ISC)² Security Congress(Orlando, Florida, USA, September 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity...
7th Annual Billington Cybersecurity Summit(Washington, DC, USA, September 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity...
Privacy. Security. Risk. 2016(San Jose, California, USA, September 13 - 16, 2016) Innovative since Day 1, P.S.R. brings together two related fields—privacy and security—helping you see beyond your role in order to excel in your role. Because perspective is everything. Delivering the...
CISO GAS(Frankfurt, Hessen, Germany, September 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives...
ISS World Americas(Washington, DC, USA, September 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech...
Tarleton State University Cyber Security Summit 2016(Dallas, Texas, USA, September 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply...
SecureWorld Detroit(Dearborn, Michigan, USA , September 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
Insider Threat Program Development Training for NISPOM CC 2(Milwaukee, Wisconsin, USA, September 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795...
4th ETSI/IQC Workshop on Quantum-Safe Cryptography(Toronto, Ontario, Canada, September 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and...
Cyber Physical Systems Summit(Newport News, Virginia, USA, September 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection...
hardwear.io Security Conference(The Hague, the Netherlands, September 20 - 23, 2016) hardwear.io Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of...
New York Cyber Security Summit(New York, New York, USA, September 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...
Gigaom Change 2016 Leader's Summit(Austin, Texas, USA, September 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential...
NYIT Annual Cybersecurity Conference(New York, New York, USA, September 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry...
GDPR Comprehensive 2016(London, England, UK, September 22 - 23, 2016) The GDPR is now a reality. Are you prepared? We had an incredible response to the IAPP GDPR Comprehensive in Brussels and New York, where we prepared hundreds of privacy and data protection professionals...
Cyber Security: How to Identify Risk and Act(Frankenmuth, Michigan, USA, September 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information
CYBERSEC(Kraków, Poland, September 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC...
Third Annual Women in Cyber Security Reception(Baltimore, Maryland, USA, September 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in...
IP EXPO Nordic 2016(Stockholm, Sweden, September 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases...
SecureWorld Dallas(Plano, Texas, USA , September 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
escar Asia 2016(Tokyon, Japan, September 28 - 30, 2016)
Founded in 2003, escar has established itself as the premier forum for the discussion and exchange of ideas to identify and minimize threats to data and vehicles. Held in Europe, the US and now for the third time in Asia, escar provides a forum for collaboration among industry, academia and governments for in-vehicle cyber security.
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.