How are you handling your cloud monitoring and security?
Cloud providers offer many security measures, but you’re ultimately responsible for securing your own data. While 53% of organizations are training their staff to manage cloud security, 30% of organizations plan to partner with an MSP. In our white paper, we discuss the considerations you need to make before choosing a solution.
December 6, 2017.
By The CyberWire Staff
An ISIS video posted online promises to deliver a major cyberattack against the US this Friday. The former Caliphate, now clearly in its diaspora phase, has shown little ability to do much more than low-grade website defacements of indifferently defended targets, is probably feeling some pressure to demonstrate serious cyberattack capabilities. A threat worth watching, but so far unsupported by much evidence beyond the usual terrorist gasconade.
Iranian espionage group Charming Kitten is said (by ClearSky Cyber Security) to have embarked on a campaign targeting academics, journalists, human rights advocates, and political advisors. The targets have little in common beyond an interest in Iran (typically an unsympathetic interest). Charming Kitten is said to have established a bogus baited news service as a lure: "The British News Agency."
Citizen Lab reports finding evidence that the government of Ethiopia is using lawful intercept software developed by Cyberbit to spy on journalists.
Qihoo 360 Netlab reports that a big, Mirai-derived botnet, "Satori," awoke yesterday, perhaps exploiting a Huawei zero-day to herd 280,000 bots.
The International Olympic Committee has banned Russia from the next Winter Olympics, for "systemic abuse of the anti-doping system." Expect Russian security services to engage in some systemic abuse of IOC networks.
Ever wondered how much energy the Bitcoin network consumes? Digiconomist has taken a look at the question, and they estimate that, annually, Bitcoin uses about as much electrical power as Denmark. This has led to belated concerns about the sustainability of the cryptocurrency, and perhaps other blockchain-based systems.
DevSecOps experts from Visa and CYBRIC talk cyber threat survival.
How can you protect yourselves against breaches like Equifax? Swapnil Deshmukh, Sr. Director of Emerging Technologies Security, Visa and Mike D. Kail, CTO, CYBRIC weigh in. Rapid innovation and continuous delivery via DevOps exposes organizations to a constant, evolving cyber threat. Seamlessly embedding continuous security within existing ecosystems will enforce security across the production environment. In this webinar, you’ll learn cultural changes needed for true DevSecOps. Register for this webinar December 12 at 1PM ET.
Flying Blind: 2017 Cloud Configurations Gone Wrong(Webinar, December 7, 2017) How can you avoid data breaches from public cloud misconfigurations in the future? Join our team of cloud security experts for a 45-minute webinar to learn more about the steps you can take to improve your cloud security posture and keep your critical information protected.
Earn a master’s degree in cybersecurity from SANS(Online, December 21, 2017) Earn a master’s degree in cybersecurity from SANS, the world leader in information security training. Learn more at a free online information session on Thursday, December 21st, at 12:00pm noon ET. For complete information on master’s degree and graduate certificate programs, visit www.sans.edu.
Flying Kitten to Rocket Kitten, a Case of Ambiguity and Shared Code(Iran Threat) In our most recent post, "iKittens: Iranian Actor Resurfaces with Malware for Mac," the inadvertent disclosure of macOS Keychains from a malware test machine recalled a long dormant group through references to an alias "mb_1986" (a hacker named Mojtaba Borhani that we have tracked since at least April 2013).
Critical Flaw in WAGO PLC Exposes Organizations to Attacks(Security Week) Programmable logic controllers (PLCs) from Germany-based industrial automation company WAGO are affected by a potentially serious vulnerability that could give a remote attacker access to an organization’s entire network.
Cryptocurrency apps have severe security vulnerabilities, but do investors care?(BetaNews) A market cap of over $350 billion, daily volumes in excess of $10 billion, fast rising prices, a growing number of investors and little to no regulation all combine to make the cryptocurrency space a prime target for hackers. What's more, security is not exactly a main priority for many investors and exchanges, as numerous thefts go to show.
Anti-Skimmer Detector for Skimmer Scammers(KrebsOnSecurity) Crooks who make and deploy ATM skimmers are constantly engaged in a cat-and-mouse game with financial institutions, which deploy a variety of technological measures designed to defeat skimming devices.
Why Nadine Dorries’ Actions Causes Many to Question our Government’s Cyber Security(Acumin) The British public were shocked after the allegations of prnographic content being stored on Damien Green’s government computer earlier this month. To make matters worse, in hope of supporting the politician, Nadine Dorries caused a stir when she sent a tweet claiming all her staff know her computer logins, so how can we be sure Green is to blame.
TeamViewer Rushes Fix for Permissions Bug(Threatpost) TeamViewer says it has issued a hotfix to address a bug that allows users sharing a desktop session to gain control of the other’s computer without permission.
The Year to Come in ICS / Critical Infrastructure Security(Security Week) In my previous column, I outlined a series of high-level, prescriptive steps for organizations to follow to better the security posture of their Industrial Control Systems (ICS) networks. Hopefully, you found that helpful to moving the needle forward and are putting some of those steps in place.
API and Security Trends for 2018(BankInfo Security) Denial of Service, web application layer attacks, credential abuse and IoT - these are the attack trends and vectors that will make headlines in 2018. Ryan Barnett
Emerging Trends in Vulnerability Management(Security Week) Vulnerability management has historically been treated as an engineering exercise that is disconnected from how security flaws relate to the business and the actual threat they pose.
6 Personality Profiles of White-Hat Hackers(Dark Reading) From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking - most just like the challenge.
Why FireEye Is One of the Top Cybersecurity Stocks(Market Realist) FireEye (FEYE) went public in September 2013 and in December 2014, it acquired Mandiant for ~$1.0 billion. Mandiant was considered one of the most prominent data breach and response players in the space.
GlobalPlatform Announces 2018 Board of Directors(GlobalPlatform) Board to drive the association’s vision to create collaborative and open ecosystems in which stakeholders can effectively deliver simplicity and security for digital services and devices
Cleaning up security flaws with cyber hygiene(Tahawul Tech) As Cisco’s former CEO John Chambers famously said, there are only two types of companies – those that have been hacked and those that don’t know they have been hacked.
Is China's Great Firewall a Political Tool or an Economic Weapon?(Weekly Standard) Over the past couple of years, a succession of American tech executives have decamped to Beijing to pander to the dictatorial leadership there. Mark Zuckerberg, in particular, has shown a penchant for flattering the ruling caste in China; he has repeatedly visited the country that his company, Facebook, remains banned in.
Tiger Conference: Cybersecurity panel calls for use of local talent(KyivPost) Even as Russia’s war against Ukraine in Donbas drags on, and cyber attacks on Ukrainian power grids and other infrastructure become more common, Ukraine faces another threat – cybercrimes in the banking sector. Experts at the Cyber Security breakout session of the Kyiv Post’s Tiger Conference on Dec. 5 discussed the main threats, and the …
Security services thwart ‘Islamist plot to kill PM’(Times) An alleged Islamist plot to kill the prime minister at Downing Street has been thwarted by the police and security services, it was revealed last night. Theresa May is understood to have been the...
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Automotive ISAC Fall 2017 Summit(Derborn, MIchigan, USA, December 13 - 14, 2017) This year’s theme is “Start your engines” and is about how to build relationships and learn about a variety of timely and topical subjects in the world of automotive cybersecurity. The summit will focus...
2018 Leadership Conference(Arlington, Virginia, USA, January 17 - 19, 2018) We invite you to join us for this unique opportunity to share information, participate in leadership training, collaborate on solutions to common problems, and network with peers from around the globe.
Hackers Challenge(New York, New York, USA, December 6, 2017) Welcome to the Hackers Challenge - a must-attend event for IT security professionals across all industries. Radware and Cisco invite experienced hackers to attack the cyber-defense of a website within...
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.