2017 cyberattacks proved more numerous, sophisticated, and ruthless than in years past.
WannaCry, NotPetya, ransomware-as-a-service, and fileless attacks abounded. And, that’s not everything. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. Read The Cylance Threat Report: 2017 Year in Review Report and learn about the threat trends and malware families their customers faced in 2017.
October 29, 2018.
SecurityWeek's 2018 ICS Cyber Security Conference
We conclude or coverage of last week's SecurityWeek ICS Cyber Security Conference with some notes and observations. The conference (organized by SecurityWeek) will be posting video of the presentations on its site, and they'll be well-worth your time. You can conveniently browse the conference's interactive agenda here.
By The CyberWire Staff
On Friday Twitter took down a number of inauthentic accounts run from Iran. Earlier Iranian influence operations were artlessly direct in following the Islamic Republic's domestic and international line, but this latest round of trolling was effectively indistinguishable from the familiar St. Petersburg style. The content pushed was opportunistically divisive, directed against fissures in both American and British culture. St. Petersburg's Internet Research Agency apparently referred traffic to bogus pages operated by Iran. This could be a sign of collusion, but simple alignment of interests and recognition of good work ("good" from Moscow's point-of-view) are at least as likely.
Gab goes down after the Pittsburgh synagogue killings.
IBM announced its intention to acquire Red Hat for $34 billion, a bet that IBM's future lies in hybrid cloud and subscription-based software.
On Friday the Librarian of Congress and the US Copyright Office added more exemptions to Digital Millennium Copyright Act enforcement. The exemptions are intended to reduce the risk that legitimate security research would run afoul of the DMCA.
The FBI has glumly warned companies not to expect simple attribution to do much to deter North Korean hacking. Pyongyang really doesn't have much to fear when it comes to reputational risk alone, which shows how having nothing to lose can sometimes amount to a position of strength.
The Chinese government's policy of stationing loyal citizens, mostly ethnic Han, in the households of mostly Muslim Uighurs may remind Americans why their Bill of Rights has a Third Amendment to preclude such dragonnades.
Create a culture of cybersecurity awareness with Coachable Moments.
According to The Ponemon Institute, two out of three insider threat incidents are caused by employee or contractor mistakes. The good news is, these mistakes can easily be avoided ... with the right coaching. Just in time for Cybersecurity Awareness Month, the Coachable Moments series from ObserveIT gives cybersecurity teams the tools they need to empower people to understand the policies and best-practices intended to keep them safe. Check out Coachable Moments today to learn more.
ON THE PODCAST
In today's podcast, out later this afternoon, we speak with our partners at Terbium Labs, as Emily Wilson tells us how data from the most recent Facebook breach have been showing up on the dark web.
New York Times Event: Cyberwarfare with Google, Department of Justice & more(Washington, DC, United States, October 30, 2018) David Sanger, national security correspondent for The New York Times will moderate a discussion on cyberwarfare, one of the greatest threats to American democracy and commerce. He will be joined by John Demers, assistant attorney general for the national security division at the Department of Justice; Yasmin Green, the director of research and development for Jigsaw, a Google company; and Dmitri Alperovitch, co-founder of CrowdStrike, who discovered Russian hacking of the Democratic National Committee.
Maryland Cybersecurity Career & Education Fair(Rockville, Maryland, United States, November 9 - 10, 2018) Join us for two dynamic days that put on display why Maryland is where cyber works. Friday will feature a career and education fair, connecting cybersecurity job seekers with opportunities across the state of Maryland. On Saturday, high school and undergraduate students compete in our cyber challenge.
Bloomberg’s ‘bombshell’ (or dud) on Chinese espionage: Even if true, what’s new?(AEI) We are now three weeks past the publication of Bloomberg Businessweek’s “bombshell” story that claimed that groups associated with the Chinese military had managed to introduce malicious server chips during the manufacturing process in China. According to Bloomberg, the tiny chip corrupted thousands of servers that were subsequently used by some 30 US companies, including Apple and Amazon.
The Resilient Satori Botnet(The Art of Transforming Network into Networking) In 2018, Satori was starting to add capabilities to exploit Claymore cryptocurrency miners in addition to the IoT exploits it had used in late 2017.
Hacker creates seven new variants of the Mirai botnet(Security Boulevard) In September 2016, Twitter, CNN, Spotify, and many others were knocked offline by the biggest DDoS attack in history. Today we know it by the name Mirai, but no one would have imagined at the time that this attack was coming from a herd of Internet of Things (IoT) devices cobbled together to form a botnet.
Android device firmware cheats Chinese ad networks(Security Boulevard) After publishing our story about pre-installed malware on Android devices, we continued to analyze the firmware images of cheap Android devices. It is a rather sad endeavour, as our statistics put pre-installed malware as one of the top infection vectors. But, today we have a bit of a lighter story.
More than just a Data Breach: a Democratic Fundraising Firm Exposure(Hacken Blog) What happens when no proper cybersec check is performed? Confidential customer data becomes exposed to all Internet users! A Maryland-based Democratic fundraising firm didn't set a password to their database. Hopefully, Hacken's specialist found a vulnerability and prevented the catastrophe.
IBM to acquire software company Red Hat for $34 billion(Yahoo) The transaction is by far IBM's biggest acquisition. It underscores IBM Chief Executive Ginni Rometty's efforts to expand the company's subscription-based software offerings, as it faces slowing software sales and waning demand for mainframe servers. IBM, which has a market capitalization
IBM to Acquire Red Hat for About $33 Billion(Wall Street Journal) IBM agreed to buy software-and-services company Red Hat for about $33 billion, a deal that Chief Executive Ginni Rometty hopes will boost a cloud-computing business central to an effort to revive the tech giant.
Forget Watson, the Red Hat acquisition may be the thing that saves IBM(TechCrunch) With its latest $34 billion acquisition of Red Hat, IBM may have found something more elementary than “Watson” to save its flagging business. Though the acquisition of Red Hat is by no means a guaranteed victory for the Armonk, N.Y.-based computing company that has had more downs than …
IBM is betting the farm on Red Hat — and it better not mess up(TechCrunch) Who expects a $34 billion deal involving two enterprise powerhouses to drop on a Sunday afternoon, but IBM and Red Hat surprised us yesterday when they pulled the trigger on a historically large deal. IBM has been a poster child for a company moving through a painful transformation. As Box CEO (and…
Mimecast provides an ‘invisible cloak of security’ for UAE law company(Intelligent CIO Middle East) With an increase in sophisticated cyberattacks against its network a leading UAE law firm realised it was time to take action. As a result, Fichte & Co. implemented Mimecast Secure Email Gateway with Targeted Threat Protection, which the company’s CIO Matthew James Peet describes as: ‘like an invisibility cloak, it is so effective.’ When […]
How to Secure Your WiFi Network(The Mac Security Blog) Whether at home or at work, your wifi network is the gateway to the internet. While it lets your devices reach out into the world, it can also let hackers get into your network, potentially comprom...
FBI Investigation Out of NY Leads to South Florida Pipe Bomb Suspect(New York Law Journal) The FBI has arrested 56-year-old Cesar Sayoc Jr. of Aventura Florida in connection with a string of packages containing explosives that were mailed to various public figures including former U.S. President Barack Obama and former Secretary of State Hillary Clinton.
Mail bomb suspect made numerous references on Facebook to Russian associates and echoed pro-Kremlin views(Washington Post) The now deleted Facebook account belonging to Cesar Sayoc, the man charged with sending pipe bombs to prominent Democrats this week, discussed his “Russian brothers” and posted video links aligned with Russian views on the Syrian war. Sayoc’s Russian-themed discussions began abruptly in 2015. But the meaning and motive of the posts, many of them rambling and hard to understand, are not clear. The Washington Post obtained the posts from a researcher who collected them before Facebook deleted the account.
Mirai Co-Author Gets 6 Months Confinement, $8.6M in Fines for Rutgers Attacks(KrebsOnSecurity) The convicted co-author of the highly disruptive Mirai botnet malware strain has been sentenced to 2,500 hours of community service, six months home confinement, and ordered to pay $8.6 million in restitution for repeatedly using Mirai to take down Internet services at Rutgers University, his former alma mater.
Two Alleged Hackers Indicted for Lynda Breach(PYMNTS.com) Following a data breach at learning platform Lynda in 2016, two hackers were indicted in Florida this month on charges of extortion and hacking. One alleged hacker lived in Florida, while the other was a Canadian citizen who was a Toronto resident, according to reports. The two individuals allegedly were able to get a hold […]
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Symposium on Securing the IoT(Boston, Massachussetts, USA, October 29 - 31, 2018) Join us for the Symposium on Securing The Internet of Things, featuring keynote speakers from the leading industry companies who are solving the issues of IoT and secure connectivity. There will also be...
Times Talks: Arming for Cyberwarfare(Washington, DC, USA, October 30, 2018) David Sanger, a national security correspondent and author of “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age,” will moderate a discussion in Washington, D.C., on cyberwarfare, one of the...
SecureWorld Denver(Denver, Colorado, USA, October 31 - November 1, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...
Cyber Security Dallas(Dallas, Texas, USA, October 31 - November 1, 2018) Cyber Security Dallas will bring top speakers and industry experts to the Dallas-Fort Worth (DFW) metroplex, which boasts one of the largest concentrations of corporate headquarters in the United States.
InfoWarCon 18(Leesburg, Virginia, USA, November 1 - 3, 2018) InfoWarCon 18 brings together a highly elite group of political, military, academic, DIYer, and commercial cyber-leaders and thinkers from around the world. We examine the current, future, and potential...
RETR3AT Cybersecurity Conference(Montreat, North Carolina, USA, November 2, 2018) Each year, Montreat College’s Center for Cybersecurity Education and Leadership hosts RETR3AT, a conference designed to engage, educate, and raise awareness about cybersecurity in Western North Carolina...
4th Annual Cyber Southwest (CSW) Symposium(Tuscon, Arizona, USA, November 2, 2018) Be a part of the 4th Annual Cyber Southwest (CSW) Symposium set to take place at the University of Arizona, Eller College of Management - McClelland Hall in Tucson, AZ on Friday, November 2nd, 2018. CSW...
Hybrid Identity Protection Conference(New York, New York, USA, November 5 - 6, 2018) Learn what cutting-edge industry leaders are doing to improve identity protection in the modern organization and how they are boosting enterprise security. Network with the world’s leading identity experts...
Hybrid Identity Protection Conference 2018(New York, New York, USA, November 5 - 6, 2018) The Hybrid Identity Protection Conference is the premier educational and networking event for identity experts. Learn what cutting-edge industry leaders are doing to improve identity protection in the...
Cyber Security & Artificial Intelligence MENA Summit(Dubai, UAE, November 6 - 7, 2018) Cyber Security and Artificial Intelligence MENA Summit has been designed to bring you a remarkable opportunity to gain fresh insights into areas such as artificial intelligence and machine learning impact...
2nd Annual Aviation Cyber Security Summit Summit(London, England, UK, November 6 - 7, 2018) Now in its 2nd year, the Cyber Senate Aviation Cyber Security and Resilience Summit (AVCIP2018) will take place on 6th and 7th in London United Kingdom 2018. This two-day executive forum will include presentations,...
Federal IT Security Conference: FITSC 2018(College Park, Maryland, USA, November 7, 2018) Phoenix TS and Federal IT Security Institute (FITSI) are partnering to host the third annual Federal IT Security Conference (FITSC) this November. Speakers from NIST, DHS, the Defense Department as well...
SINET Showcase(Washington, DC, USA, November 7 - 8, 2018) Highlighting and advancing innovation. SINET Showcase provides a platform to identify and highlight “best-of-class” security companies that are addressing the most pressing needs and requirements in Cybersecurity.
SecureWorld Seattle(Seattle, Washington, USA, November 7 - 8, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...
Infosecurity North America(New York, New York, USA, November 14 - 15, 2018) With 23+ years of global experience creating leading information security events, Infosecurity Group is coming to New York in November 2018. Infosecurity North America will provide a focussed business...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.