Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
August 19, 2019.
The CyberWire's 6th annual Women in Cybersecurity Reception is just around the corner.
Specifically, around the corner at the International Spy Museum's new facility at L'Enfant Plaza in Washington, DC. Our 6th Annual Women in Cybersecurity Reception takes place October 24. The Women in Cyber Security Reception highlights and celebrates the value and successes of women in the cybersecurity industry. The event focuses on networking, and it brings together leaders from the private sector, academia and government from across the region, and women at varying points in their careers. It's not a marketing event; it's just about creating connections. If you're interested in getting an invitation to this year's event, tell us a little bit about yourself and request one here. A very limited number of sponsorship opportunities remain, so please let us know if you're interested.
By the CyberWire staff
A Reuters exclusive says that Google terminated a service it had offered mobile carriers as a means of testing their network coverage. The company's Mobile Network Insights service had since 2017 offered carriers data collected from Android users who opted in to sharing location and performance data. Although the program was organized on a transparent, opt-in basis, and the data it collected were both anonymized and aggregated, Google apparently decided that Mobile Networks Insights exposed the company to more regulatory risk than it wished to accept.
Authorities in Texas say that at least twenty state agencies have sustained a "coordinated ransomware attack," the Dallas Morning News reports. The state is responding with a multiagency task force led by the Department of Information Resources, with assistance from the Division of Emergency Management, the Texas Military Department, and Texas A&M's Cyberresponse and Security Operations Center.
Science Daily and other sources say that researchers at Southern Methodist University have developed a proof-of-concept in which smartphone sensors could record the sounds of keystrokes on nearby laptops, enabling eavesdroppers to capture and interpret those keystrokes. The technique doesn't seem to represent an immediate threat, but the researchers suggest it should raise awareness of the risks inherent in always-on sensors (like those in smartphones).
TASS is authorized to disclose that Russia's Sport Minister sees a good chance that "cyber sports" will be added to the Olympics in fifteen-to-twenty years. Minister Kolobkov appears to have video games in mind, not capture-the-flag competitions. Practice your Fortnite dance, Olympians.
Today's issue includes events affecting Algeria, Afghanistan, Australia, Canada, Colombia, Ecuador, Estonia, European Union, France, India, Indonesia, Japan, Malaysia, New Zealand, Pakistan, Peru, Russia, Singapore, Slovakia, Sri Lanka, Sweden, Tanzania, United Kingdom, United States, Uzbekistan, and Vietnam.
Bring your own context.
So, do credentials matter in the various trades and professions that make up the cybersecurity career field?
"I would say they are important, but they're not as important as other things. In fact, there was a blog post on a site called Indeed that was saying one of the problems with job postings is that they tend to demand credentials that aren't really necessary. You know, I would say that you need some tech training in that sort of stuff, but you can be trained on the job. And then, besides that, once you have done some work, credentials come with experience, I guess you'd say, you know, demonstrating that you can do a job is much, much more important than a degree or, you know, some other kind of certificate certification - things like that."
—Taylor Armerding of Synopsis, on the CyberWire Daily Podcast, 8.15.19.
Perhaps there's a suggestion here for hiring managers.
Is your cybersecurity program aligned with your business goals and objectives?
Cybersecurity is a business risk, not an IT problem, and a critical part of business strategy. Security should not be an afterthought. Taking a proactive approach facilitates board-level cyber initiative buy in, supports traction across business units, establishes management alignment for key priorities, and manages data complexity. Let Edwards Performance Solutions better structure and position your cybersecurity program – making it a business asset for continued success.
Cyber Warrior Women Summer Social: Sip and Paint(Columbia, MD, United States, August 21, 2019) Join the Cybersecurity Association of Maryland, Inc. (CAMI) for the annual Cyber Warrior Women Summer Social, an all-about-fun-and-networking event! We're adding an artistic element to this year's event with a wine glass painting exercise. No previous art experience required.
Cyber Security Summits: Chicago on August 27 and on September 17 in Charlotte(Chicago, Illinois, United States, August 27, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Google, IBM, Darktrace, and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today: www.CyberSummitUSA.com
Second Annual DataTribe Challenge(Online, October 1, 2019) Register now for a chance to be DataTribe's next world-class company. Finalists will split a $20,000 prize, and the winner may receive $2m in funding from DataTribe. Contestants have until October 1st to apply at www.datatribe.com/challenge.
Zero Day Con(Washington, DC, USA, October 22, 2019) Zero Day Con hosts a day of expert discussion on security approaches to regain control over your systems, data, and information. Join us to examine insights, security technologies, and key priorities to secure your systems. Get a 30% discount for Labor Day using code LABOR30.
New Android Malware disguised as Fake Adobe Flash Player installation(S4Tips.com) Millions of Android users are at risk because of a new trojan named Cerberus, which infects devices by disguising itself as an Adobe Flash Player installation. After being installed, the imposter requests accessibilities that allow a future attack to take place. How it works The malware overlays login tabs of banking apps, it steals credentials
New Bluetooth KNOB Attack Lets Attackers Manipulate Traffic(BleepingComputer) A new Bluetooth vulnerability named "Key Negotiation Of Bluetooth attack" or "KNOB" has been disclosed that allow attackers to more easily brute force the encryption key used during pairing to monitor or manipulate the data transferred between two paired devices.
MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself(Private Internet Access Blog) Many popular MiFi devices used as 4G hotspots are vulnerable to hacking. A DEFCON 27 talk by Pen Test Partners revealed command injection and remote code execution vulnerabilities in popular 4G hotspots and MiFi routers made by ZTE, Netgear, TP-Link, and Huawei. Affected models include the Netgear Nighthawk M1, the ZTE MF910 and the ZTE … Continue reading "MiFi 4G hotspots are vulnerable to hacking, use a VPN to protect yourself"
Are you using home Wi-Fi for online banking? ALERT! Fraudster can steal your money with this trick; know how(India TV News) Online banking or net banking credentials are very confidential that we never share it with anyone. However, we end up doing a big mistake unintentionally. Every now and then we do an online transaction like payment by connecting a smartphone or a laptop to 'secure' home Wi-Fi. However, you will be shocked to know-how with an easy trick fraudster can get authorise access to your bank account and steal your hard-earned money.
Cyber attack hits medical centres(Times Age) A global cyber security attack has forced the websites of four Wairarapa medical practices to be taken down after a Tu Ora Compass Health server fell victim to a hacker. Tu Ora Compass Health’s website and the websites of Kuripuni, Greytown, Featherston, and Carterton medical centres cannot be …
Steam Security Saga Continues with Vulnerability Fix Bypass(BleepingComputer) A bypass for a recent Steam vulnerability that could allow malware or a local attacker to gain admin privileges has been disclosed on Twitter. This new method allows an attacker to bypass the fix created by Steam and exploit the vulnerability again.
What’s Trending in Data Breaches and Cyberattacks?(MeriTalk) While “large impactful [cyber] incidents” are on the rise, there are fewer “high-profile public disclosures,” according to a FireEye’s year’s M-Trends 2019 Report, which is based on FireEye Mandiant’s investigations of the most interesting and impactful cyberattacks of 2018.
Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft(Palo Alto Networks Blog) Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for its contributions to vulnerability research, including first place for discovery of Zero Day vulnerabilities. Microsoft also recognized Unit 42 researchers Gal De Leon and Bar Lahav in its annual list of the Most Valuable Security Researchers.
Cisco Lays Off 488(Light Reading) The company seems to be making adjustments in the face of a disappointing quarterly projection; in addition to the layoffs it's also hiring, and shut down development in an emerging cable data networking technology.
DIY Threat Intelligence Gathering If Your Security Solutions Seem Lacking(CircleID) Security solutions are not made equal. Some are better than others when it comes to providing overall protection, but most will require you to buy an entire suite that's enough to break the bank just so you'd feel safe from cyber attacks. So what are you to do if your budget just isn't big enough to afford all-around protection?
Rebuilding Your Brand’s Reputation After A Cyber Attack(The Hack Post) It is estimated that one cyber attack occurs every 39 seconds, with millions of records being stolen daily. According to IT Governance USA, some of the most common attacks include malware, phishing, distributed denial-of-service attacks, SQL injection, and ‘man-in-the-middle’ (MITM). Take an MITM attack, which involves an attacker intercepting and relaying messages between one party and another. …
Think cyber-safety even when on vacation(KOMO) You're headed off on vacation. You can't wait to relax and unwind, but you want to stay connected, maybe sneak in a little bit of work in between the beach and cocktail hour. So, you plan to take your business laptop with you. Is that really the best idea to bring that work laptop with all of your corporate information with you? Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, suggests a more secure way to do it.
Design and Innovation
WebKit’s new anti-tracking policy puts privacy on a par with security(TechCrunch) WebKit, the open source engine that underpins Internet browsers including Apple’s Safari browser, has announced a new tracking prevention policy that takes the strictest line yet on the background and cross-site tracking practices and technologies which are used to creep on Internet users as …
Decade-Long Bank Account Hacking Scheme Gets Fraudster 57 Months(BleepingComputer) Brooklyn man Jason Mickel Elcock was sentenced today to 57 months in prison for a series of account hijacking attacks spanning more than a decade, having used stolen personal and financial information to pilfer over $1.1 million from banks and online retailers.
Roger Stone Tried to Subpoena a Cybersecurity Company for Sensitive DNC Information(Law and Crime) In a bit to gain access to allegedly "privileged and highly sensitive" information, Roger Stone attempted to subpoena CrowdStrike, a cybersecurity company that handles Democratic National Committee (DNC) and Democratic Congressional Campaign Committee (DCCC) documents, as part of his defense in his ongoing case against the U.S. government. More specifically, Stone has asked for "unredacted versions of three reports that were prepared by CrowdStrike" to provide the DNC and DCCC with legal counsel regarding "an unprecedented cyberattack orchestrated by Russian-based hackers during the 2016 presidential election."
RBS hides Natwest data breach from customers(Times) Highly sensitive personal data, including banking details of more than 1,600 Natwest customers, has been left in a former employee’s home for more than a decade because the bank has been unable to...
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
SecureWorld Bay Area(Santa Clara, California, USA, August 21, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...
Pittsburgh Cybersecurity Conference(Pittsburgh, Pennsylvania, USA, August 22, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Integrate(Melbourne, Victoria, Australia, August 27 - 29, 2019) Get ready to think beyond and lose yourself in the technology of tomorrow at Integrate 2019. Integrate is Australia's leading event dedicated to helping businesses harness the power of AV technology to...
Washington DC Cybersecurity Conference(Washington, DC, USA, August 29, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.