Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
April 12, 2019.
By the CyberWire staff
As the face of WikiLeaks begins his efforts to resist extradition to the US, observers comment on the charge confronting him, which is, essentially, conspiracy to hack into a noncompliant computer in violation of the Computer Fraud and Abuse Act. Mr. Assange, the US maintains, offered to help then-US-Army-Specialist Manning crack passwords to gain access to classified files. He's not charged with espionage, or with possession of classified material. Those sympathetic to Mr. Assange (like Edward Snowden, WikiLeaks itself, and Britain's shadow home secretary) see the indictment as a way of railroading him, especially since the offer to help then-Specialist Manning break into Government systems seems more an act of stumblebum hubris than the sinister act of a criminal mastermind.
As the Washington Post notes, many security experts have long thought the Computer Fraud and Abuse Act outmoded and overly broad. But the prosecution would not appear, taken by itself, to represent a threat to journalists' First Amendment rights. Besides, as former NSA Associate General Counsel April Doss told Quartz, such hacking isn't a generally accepted journalistic legitimate practice. Many agree with her.
University researchers report that secure wi-fi protocol WPA3's SAE handshake may be susceptible to the same kind of exploitation as its predecessor, WPA2, was. One of the problems lies in the transition mode designed to ensure backward compatibility with the older protocol.
Carbon Black continues to track the maturation of the dark web's black market in tax-fraud and identity-theft tools. They're increasingly commodified and cheaper than ever.
Get a Backstage Pass to LookingGlass’ Digital Business Risk Roadshow
When it comes to digital business risk, you don’t want a general admission perspective. Get a backstage pass for the LookingGlass Digital Business Risk Roadshow to learn the industry-latest on effective third party risk management, taking a proactive security approach, and get a cybercriminal mastermind's insights on manipulating your organization’s cyber strengths and weaknesses. Come see us in a city near you. The tour includes San Francisco, NYC, D.C., and Houston!
Global Cyber Innovation Summit(Baltimore, Maryland, United States, May 1 - 2, 2019) This unique, invitation-only forum brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. Request an invitation today.
Cybersecurity Impact Awards(Arlington, Virginia, United States, May 14, 2019) The inaugural Cybersecurity Impact Awards are open for nominations until April 12 and are dedicated to recognizing companies that have corporate or Federal headquarters in the DMV area for their leadership and innovation within the cybersecurity industry. Award winners will be honored during an awards ceremony on May 14.
MuddyWater Group Using Spam Campaign to Hijack Victims’ Computers(Security Boulevard) The MuddyWater threat attack group is using a spam campaign to hijack victims’ computers and steal sensitive information. Discovered by Heimdal Security in early April, the campaign begins when malicious actors use social engineering techniques to trick a user into opening a malicious Microsoft Office document attached to a phishing email. The document contains VBA … Read More The post MuddyWater Group Using Spam Campaign to Hijack Victims’ Computers appeared first on The State of Security.
LockerGoga: What We Know and What You Should Do(CyberX) News of the ransomware attack on Norsk Hydro broke on March 19th and thanks to the admirable transparency shown by Norsk Hydro, the security world knows about the $41m USD in losses incurred in the first week, as well as the ways in which the company responded to the attack.
New Super-Secure Wifi Is Actually Full of Security Holes(Gizmodo) When the Wi-Fi Alliance released its next-generation WPA3 wifi security protocol last January, it was touted as being nigh impossible to crack. That made it a serious upgrade over WPA2, the current protocol used by modern wifi networks—including the one you’re probably reading this on. Except, researchers on Wednesday published findings that show WPA3 actually has several serious design flaws that leave it vulnerable to the same attacks that plagued WPA2.
How HTML5 Ping Is Used in DDoS Attacks(eWEEK) Imperva has discovered a new attack in which hackers abused a commonly used HTML5 attribute to launch a DDoS attack that generated 70 million requests hitting a target website in a four-hour span.
VPN apps found storing session cookies insecurly(SC Media) Researchers with National Defense ISAC Remote Access Working Group discovered multiple Virtual Private Networks (VPN) applications were insecurely storing Researchers with National Defense ISAC Remote Access Working Group discovered multiple (VPN) apps improperly storing session cookies.
Scary Hardware Attacks Aren't The Biggest Risks(Decipher) Supply chain attacks are scary, but there are plenty of other hardware-based issues organizations should be worrying about before they have to panic about the complex malicious implants in their servers.
Robocaller firm Stratics Networks exposed millions of call recordings(TechCrunch) If you’ve ever had a voicemail appear out of nowhere, there’s a good chance Stratics Networks was involved. The Toronto-based company is the self-proclaimed inventor of “ringless voicemails,” providing its customers a way of auto-dialing a list of phone numbers and dropping …
Email Scam Threatens WannaCry & DDoS Attack(Security Boulevard) As if tax season isn’t stressful enough, a new extortion email scam is currently underway to steal your personal details and commit fraudulent activities. Hackers are demanding two bitcoins from victims in exchange for keeping quiet about their presumed “tax evasion”. If they do not pay, they will find themselves hit with a DDoS attack and WannaCry ransomware.
Tax Fraud & “Identity Theft On Demand” Continue to Take Shape on the Dark Web(Carbon Black) Carbon Black’s recent research into various marketplaces on the dark web found W-2 forms, 1040 forms and how-to guides for illicitly cashing out tax returns available. W-2s and 1040s are available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, Social Security Numbers (SSNs) and birthdates can be obtained for a price ranging from $0.19 to $62.
Investors Are Betting Early On Cybersecurity Startups(Crunchbase News) In an increasingly digital world, startups, small businesses, and large corporations have at least one problem in common: ensuring the security of the data they store. We also know that security is top of mind for VCs, too—but likely more for the returns than the actual protection.
Huawei security questioned around the world(SearchSecurity) Huawei security is under fire from multiple fronts as a new report criticizes the company's security efforts and a Huawei driver flaw hits Windows, but Huawei and a U.S. association are fighting back against the criticisms.
TRON Partners With Swarm To Offer Security Token Support(UNHASHED) TRON has announced that it has partnered with Swarm, a major security token platform. This partnership will allow projects to issue security tokens, which can be programmed for regulatory compliance, on the TRON blockchain. Swarm is a leader in this area, which makes this a significant announcement. What the Partnership Means Security tokens simply represent…
NZ flags risk of foreign meddling in politics(The Business Times) NEW Zealand's intelligence chief said on Thursday the agency was concerned about activities by foreign state actors, including attempts to covertly influence politicians and monitor expatriate communities living in the South Pacific nation. Read more at The Business Times.
Navy looks to add cyber leadership(FCW) Navy Secretary Richard Spencer says adding a new assistant secretary for cybersecurity and tightening contractors' security practices are top priorities for 2020.
The Secret Sharers(Foreign Affairs) In three short responses, Peter Feaver, Allison Stanger, and Michael Walzer discuss the legitimacy of whistle-blowing in the Trump administration, debating whether the cascade of leaks from the White House and other parts of the executive serves to protect or undermine American democracy.
WikiLeaks’ Assange arrested in London, faces US charge(Fifth Domain) British police arrested Assange after the South American nation decided to revoke the political asylum that had given Assange sanctuary for almost seven years. In Washington, the U.S. Justice Department accused Assange with conspiring with Chelsea Manning to break into a classified government computer at the Pentagon.
The Latest: Quito arrest part of Assange probe(Washington Post) Friends of a Swedish software developer arrested in Ecuador as part of a probe into Julian Assange’s alleged efforts to stave off his eviction from the country’s embassy are describing him as a soft-spoken geek
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Boston Cybersecurity Conference(Chicago, Illinois, USA, June 20, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Tampa Cybersecurity Conference(Tampa, Florida, USA, June 27, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Minneapolis Cybersecurity Conference(Minneapolis, Minnesota, USA, July 11, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Raleigh Cybersecurity Conference(Raleigh, North Carolina, USA, July 18, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
New York City Cybersecurity Conference(New York, New York, USA, August 1, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
ISC West 2019(Las Vegas, Nevada, USA, April 10 - 12, 2019) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...
IMPACT ’19(Chantilly, Virginia, USA, April 15 - 17, 2019) Prepare for the changes ahead and get out in front of the compliance curve by attending the 34th annual NSI IMPACT Forum on April 15-17 at the Westfields Marriott in Chantilly, VA. The theme of this year’s...
San Antonio Cybersecurity Conference(San Antonio, Texas, USA, April 16, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.