Don’t slow down development for application security.
We know that application security testing is a bottleneck for software development—but it’s also crucial. You need a solution that can simplify and automate as much of that process as possible without grinding development to a halt. Code Dx automates the most time-consuming steps in AppSec testing, keeping your DevOps pipeline running as smoothly as possible.
December 17, 2019.
By the CyberWire staff
ZDNet, citing NetLab 360, says that North Korea's Lazarus Group has begun using the Dacts Trojan as it pivots from a concentration on Windows targets into the Linux ecosystem.
KeyFactor warns that encryption weaknesses in RSA keys (the weaknesses arise from poor entropy, that is, inadequate randomness in key generation) could leave large numbers of IoT devices vulnerable to exploitation.
Check Point urges WhatsApp users to update to the latest version of the app. Their researchers have found that attackers could hit older versions and permanently delete chats, as well as work other mischief.
The city of Pensacola, Florida, continues to recover from the ransomware attack it sustained. The mayor is short on details but says things are going well, WUWF reports. The city has, according to the Pensacola News Journal, hired Deloitte to figure out exactly what damage was done.
In Louisiana, as New Orleans continues its recovery from a Ruyk ransomware attack, a similar incident hits Baton Rouge Community College, the Advocate reports.
Julian Assange is expected to argue during his upcoming extradition hearings that, during the period he enjoyed asylum, holed up in Ecuador's London embassy, he was illegally monitored, and that the data collected in such personal surveillance was sold to the US CIA. This, he is thought likely to maintain, is evidence that he won't be able to receive a fair trial in the US, where he faces multiple charges of violating the Espionage Act, the Guardian reports. Mr. Assange is currently in British custody.
Today's issue includes events affecting Australia, China, Germany, India, Democratic Peoples Republic of Korea, Russia, Spain, United Kingdom, United States.
Bring your own context.
Modeling the IoT and modeling ICS may look similar, but they present different challenges.
"But one of the challenges that we're finding, one of the things I wanted to talk about, is when you move from ICS to IoT, you're moving to this completely different physical process. So within industrial control systems, actually, it's quite straightforward to create something that emulates the water treatment work or electricity grid - notwithstanding those are quite complex, but it's a defined and scoped process. But the problem with a lot of IoT-type work is the process you're trying to emulate and simulate is that of people, that of a group of people working in a building. If you're thinking about industrial IoT, yes, again, that's related to industrial processes. But a lot of the IoT technology that sits around that also interacts with humans in a slightly different way than just your pure industrial control system. So one of the challenges we're trying to tackle here at Lancaster is how do we build an IoT testbed that enables us to have high accuracy around the human aspect of interaction with those systems."
—Daniel Prince, senior lecturer in cybersecurity at Lancaster University, on the CyberWire Daily Podcast, 12.13.19.
And, of course, all models remain imperfect representations of reality. Extremely useful, but not exactly the real thing, either.
Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
Information Security Institute Virtual Information Session(Online, January 23, 2020) Our graduate students in the Johns Hopkins University Information Security Institute work alongside our faculty who are world-renowned for their research in cryptography, privacy, medical information security, and network and system security. To learn more, register for the January 23rd one-hour session to get an overview of the Information Security Institute. Panelists will provide a program overview, areas of research, admissions requirements, and discuss life in Baltimore.
6th Annual Cyber Security Conference for Executives(Baltimore, Maryland, United States, March 25, 2020) The 6th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Wednesday, March 25th, in Baltimore, Maryland. Learn about the do’s and don’ts of risk management with industry leaders and other cyber professionals. Check out the details at http://isi.jhu.edu and click on 6th Annual Cybersecurity Conference for Executives.
SQL Server 2019 Security Tool Inadvertently Reveals Where Sensitive Data is Stored(Imperva) The first step in protecting your data and ensuring your database is compliant with security benchmarks and privacy regulations such as SOX, PCI, HIPAA, and GDPR is to understand what sensitive information resides in that database. Microsoft’s SQL Server 2019 introduces a new tool SQL Data Discovery & Classification. Built into SQL Server Management Studio …
Radware issues warning over 'Jingle Bots' eCommerce disruption(Mobile Marketing Magazine) As consumers head online to get the best deals in the run up to Christmas and during the January sales, research from Radware , a web application security firm, reveals it could be in vain, thanks to so called ‘Jingle Bots’ playing havoc. An in-depth analysis of internet traffic on Cyber Monday and Black Friday carried out by the firm reveals that only a third of shoppers were real people. The rest were automated bots designed to disrupt the smooth running and revenues of eCommerce sites by jamming them with fake shoppers so genuine shoppers give up or shop elsewhere. Nick-named ‘Jingle bots’, these internet bots disguised as bona fide shoppers because they behave just as people would, made...
Maze Ransomware Gang Dumps Purported Victim List(BankInfo Security) The gang behind Maze ransomware has begun publicly identifying its victims and listing data that it exfiltrated from systems before leaving them crypto-locked. The intent is clear: By naming and shaming victims, the Maze gang is trying to compel them to pay.
Maze behind Pensacola ransomware attack(SC Media) Maze was behind the ransomware attack on the City of Pensacola that began early Saturday morning, and its operators have demanded a $1 million ransom to
1-in-3 computers dealing with biometric data face hacking attempts: Kaspersky report(CRN - India) One in three computers (37 per cent) engaged in collecting biometric data globally faced hacking attempts in the third quarter of this year, a new report said. The devices — servers and workstations — use to collect, process and store biometric data (such as fingerprints, hand geometry, face, voice and iris templates). Overall, a significant …
Financial Services Get Hooked, Experience 147% Increase in Phishing Clicks(Menlo Security) According to JPMorgan Chase CEO Jamie Dimon, “The threat of cyber security may very well be the biggest threat to the US financial system.”Reports show a 56% year-over-year increase in digital threats targeting the sector, and according to new research, phishing is a key threat vector
Mac threat detections on the rise in 2019(Malwarebytes Labs) For the first time ever, Mac threats broke into Malwarebytes' top five overall detections of 2019. See how our data shows Mac malware on the rise.
CrowdStrike: Strike While Its Iron Is Hot(Seeking Alpha) CrowdStrike shares are down more than 50% from their peak. The company just announced another blow-out quarter that has compressed valuation metrics substantially.
Booz Allen Opens New Colorado Office(ExecutiveBiz) Booz Allen Hamilton has inaugurated a new office in Aurora, Colo., that will function to support federal government customers from the intelligence and defense sectors, Denver Post reported Friday.
Tenable Appoints Marty Edwards as Vice President of Operational Technology Security(Tenable®) Longest-serving Director of ICS-CERT joins Tenable following its acquisition of industrial security leader Indegy Tenable®, Inc., the Cyber Exposure company, today announced the appointment of Marty Edwards, a globally recognized expert in cybersecurity for industrial control systems and operational technology (OT), as Vice President of OT Security.
CISA Hosts First Annual President’s Cup Cybersecurity Competition(CISA) WASHINGTON – The first annual President’s Cup Cybersecurity Competition wrapped up yesterday. The competition began in September and drew more than 1,000 individuals and 200 teams. After two qualifying rounds, 10 individual finalists and five team finalists came to the Washington, D.C. area for the final round at the CISA Cybersecurity Lab.
How a Password Manager Protects You From Phishing Scams(How-To Geek) Password managers make it easy to use strong, unique passwords everywhere. That’s one significant benefit to using them, but there’s another: Your password manager helps protect you from imposter websites trying to “phish” your password.
You Are A Cyber Threat To Your Mother In Retirement, Here’s How(Forbes) Smart technology, or Internet-of-Things, now provides a critical role in supporting caregivers and the wellbeing of older adults living in retirement. But, these technologies also provide opportunities to hackers. Caregivers now have a new job, ensuring the cyber security of their older loved ones.
Closing a Critical Gap in Cybersecurity(Lawfare) A new proposal improving the Cybersecurity and Infrastructure Security Agency’s ability to identify and issue notifications regarding vulnerabilities connected to the public Internet would help the agency improve American critical infrastructure cybersecurity.
Is using TikTok a national security risk?(Fifth Domain) The chairman of a national security subcommittee in the House of Representatives is worried that federal employees who use TikTok, Grindr and other mobile applications owned by foreign governments could be susceptible to blackmail or become national security vulnerabilities.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Georgetown Law 2020 Cybersecurity Law Institute(Washington, DC, USA, May 20 - 21, 2020) It is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity. You have an important role to play in cybersecurity leadership,...
2020 Billington CyberSecurity Summit(Washington, DC, USA, September 8, 2020) Billington CyberSecurity produces world class educational forums and virtual seminars about the threats, challenges, and opportunities related to protecting our nation's critical cyber infrastructure.The...
QuBit Belgrade 2020(Belgrade, Serbia, October 1, 2020) Practical workshops, excellent speakers, educational session, news & networking. QuBit consists of one day full of educational presentations, keynotes, case studies and interactive panel discussions in...
CPX 360 Bangkok(Bangkok, Thailand, January 14 - 16, 2020) Mark your calendar now for CPX 360 2020, the world’s premiere cyber security summit of the year. Globally renowned industry experts will take to the stage to share analysis, core insights, and actionable...
Cyber Security for Critical Assets, MENA 2020(Dubai, United Arab Emirates, January 20 - 21, 2020) The 17th in a global series of Cyber Security for Critical Assets summits, #CS4CA MENA 2020 focuses on safeguarding the critical industries of the Middle East and Northern Africa from cyber threats. CS4CA...
CPX 360 New Orleans(New Orleans, Lousiana, USA, January 27 - 29, 2020) Mark your calendar now for CPX 360 2020, the world’s premiere cyber security summit of the year. Globally renowned industry experts will take to the stage to share analysis, core insights, and actionable...
SINET: Global Cybersecurity Innovation Summit(London, England, UK, January 30, 2020) Advancing global collaboration and innovation, SINET convenes a summit of international cybersecurity leaders at the British Museum. The conference will bring together innovators, investors, researchers,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.