What if your security solution could provide zero doubt?
A foundation of artificial intelligence delivers smart, simple, and secure solutions that change how organizations approach endpoint security. Cylance provides full-spectrum, predictive threat prevention and visibility across the enterprise to combat the everyday - as well as the most notorious and advanced - cyberattacks. Let Cylance help you understand how you can create real confidence in your organization’s security posture and zero in on what really matters.
February 7, 2019.
By the CyberWire staff
The US Department of Homeland Security thinks China’s APT10 has been quieter since two of its (alleged) operators were indicted late last year, reports FCW, but DHS is pretty confident APT10 hasn’t gone away, and will be heard from again.
Among APT10’s activities last year, according to Recorded Future and Rapid7, was a campaign against a Norwegian managed service provider. Microsoft Security thinks otherwise, and that the threat actor in this case was APT31, also known as Zirconium.
Akamai reports a phishing campaign that uses Google Translate to obtain Facebook and Google credentials. The victim receives an email purporting to be a notification from Google that a device has logged into the victim’s account. The victim is invited to verify that the login is legitimate. When they follow the link provided, the malicious domain of a credential-harvesting page is loaded via Google Translate. The victim is then forwarded to a phony Facebook login page. Akamai says the fraud looks pretty good on a mobile device, but it’s much less convincing on a laptop or desktop.
A researcher finds a macOS Keychain zero-day but won’t share it with Apple until Cupertino sets up a proper bug bounty program, reports BleepingComputer.
Symantec has found a variant of the familiar tech support scam in the wild. It mimics a Norton system scan while it installs potentially unwanted programs.
Vendors, suppliers, and independent subsidiaries are gaining more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a new world of risk to your organization. In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.
ON THE PODCAST
In today's podcast, up later this afternoon, we talk to our partners at the University of Bristol, as Awais Rashid offers some thoughts on the challenges of securing smart phones. And Carole Theriault explores recent concerns over popular video app VLC Player security issues with Paul Ducklin of Sophos.
Cyber Job Fair, Feb 13, San Antonio(San Antonio, Texas, United States, February 13, 2019) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, February 13 in San Antonio. Meet leading cyber employers including AF Civilian Service, CNF Tech, Lockheed Martin, and more. Visit ClearedJobs.Net or CyberSecJobs.com for details.
Cyber Security Summits: February 13th in Atlanta and on April 2nd in Denver(Atlanta, Georgia, United States, February 13 - April 2, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, U.S. Secret Service, Darktrace and more. Passes are limited, secure yours today: www.CyberSummitUSA.com
Rapid Prototyping Event: The Needles in the Haystack(Columbia, Maryland, United States, February 26 - 28, 2019) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM, is hosting a Rapid Protoyping Event in which we hope to find a solution that can not only 'map' the network in the traditional sense but provide inferences as to the most important servers, workstations or hardware devices. Once these assets are identified they could be isolated, replicated or studied closely via live forensics.
Global Cyber Innovation Summit(Baltimore, Maryland, United States, May 1 - 2, 2019) This unique, invitation-only forum brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. Request an invitation today.
Power Company Has Security Breach Due to Downloaded Game(BleepingComputer) South African energy supplier Eskom Group has been hit with a double security breach consisting of an unsecured database containing customer information and a corporate computer infected with the Azorult information-stealing Trojan.
Phishing Attacks Against Facebook / Google via Google Translate(Akamai) When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....
A Grim Gap: Cybersecurity of Level 1 Field Devices(POWER Magazine) Industrial control system cybersecurity is today largely focused on securing networks, and efforts largely ignore process control equipment that is crucial for plant safety and reliability, leaving it woefully Industrial control system cybersecurity is today largely focused on securing networks, and efforts largely ignore process control equipment that is crucial for plant safety and reliability, leaving it woefully vulnerable, an expert warns.
Many popular iPhone apps secretly record your screen without asking(TechCrunch) Many major companies, like Air Canada, Hollister and Expedia, are recording every tap and swipe you make on their iPhone apps. In most cases you won’t even realize it. And they don’t need to ask for permission. You can assume that most apps are collecting data on you. Some even monetize…
Which countries have the worst (and best) cybersecurity?(Comparitech) With so much of our information (including incredibly personal data) being found online, cybersecurity is of the utmost importance. So just where in the world are you cyber safe – if anywhere? Our study looked at 60 countries and found huge variances in a number of categories, from malware rates to cybersecurity-related legislation. In fact, …
SAIC Names Nathan Rogers as New Chief Information Officer(AP NEWS) Feb 6, 2019--Science Applications International Corp. (NYSE: SAIC) announced today that Nathan G. Rogers will assume the role of chief information officer effective Feb. 2, reporting to SAIC CEO Tony Moraco. Rogers succeeds Bob Fecteau who retires from the company in April. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20190206005042/en/ Nathan Rogers, former Engility CIO, named new CIO for SAIC. (Photo: Business Wire)
Zendesk President of Products Adrian McDermott Joins FireEye Board of Directors(AP NEWS) FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced that Adrian McDermott has been appointed to the FireEye board of directors. McDermott is currently President of Products at Zendesk, a global company that builds software for customer service and engagement. McDermott brings 25 years of business experience across a number of technology markets. McDermott has led the product management and engineering teams for Zendesk since 2010. In his role, McDermott is responsible for defining and leading global product strategy and product development for the publicly-traded, web-based customer service software leader.
Facebook will reveal who uploaded your contact info for ad targeting(TechCrunch) Facebook’s crack down on non-consensual ad targeting last year will finally produce results. In March, TechCrunch discovered Facebook planned to require advertisers to pledge that they had permission to upload someone’s phone number or email address for ad targeting. That tool debuted i…
Japan targets complacency with cyber attack on citizens(The Straits Times) Last November, when Japan's 68-year-old minister for cyber security admitted he had never used a computer and was "not very familiar" with cyber security issues, it was, of course, hilarious.. Read more at straitstimes.com.
CNO Wants More Cyber, IW in Navy’s Wargames(Breaking Defense) The Navy needs to increase both the number and complexity of its wargames, the service’s top admiral said Wednesday, citing rapid advances being made by competitors in cyber and information warfare tactics that will muddy and confuse future battlefields.
Fabula AI is using social spread to spot ‘fake news’(TechCrunch) UK startup Fabula AI reckons it’s devised a way for artificial intelligence to help user generated content platforms get on top of the disinformation crisis that keeps rocking the world of social media with antisocial scandals. Even Facebook’s Mark Zuckerberg has sounded a cautious note…
Attacking Artificial Intelligence: How To Trick The Enemy(Breaking Defense) “Autonomy may look like an Achilles’ heel, and in a lot of ways it is” – but for both sides, DTRA's Nick Wager said. “I think that’s as much opportunity as that is vulnerability. We are good at this… and we can be better than the threat.”
Using Huawei technology is a matter of faith(Deutsche Welle) What role can Chinese network supplier Huawei play in building Germany's 5G network? It's a question of faith, but not only — so Berlin is taking its time to give a definitive answer.
Marco Rubio Continues to Swing Away at ZTE(Sunshine State News) This week, U.S. Sen. Marco Rubio, R-Fla., who sits on the U.S. Senate Foreign Relations Committee, brought back a proposal taking aim at ZTE, a telecommunications company run by the Chinese government.
Huawei, ZTE Parts Weaken Rural Networks, Sens. Told(Law360) Chinese telecom equipment makers Huawei and ZTE continue to be threats to the security of U.S. networks, but some small and rural broadband providers are still pressured to buy the foreign-made components because they're the least expensive, the full Senate Commerce Committee heard Wednesday.
Valuable, messy and contentious: How big data became 'new oil'(Federal News Network) While agency IT officials recognize the Foundations for Evidence-Based Policymaking Act and OPEN Government Data Act present opportunities to get more value out of their data, they also see challenges in preparing the workforce to manage all that data.
DHS prioritizes restart of election security programs post-shutdown (CNN) Since the shutdown ended, the Department of Homeland Security has prioritized the resumption of its election security programs, some of which were forced to go on hiatus during the lapse in government funding, according to Cybersecurity and Infrastructure Security Agency Director Chris Krebs.
More Alleged SIM Swappers Face Justice(KrebsOnSecurity) Prosecutors in Northern California have charged two men with using unauthorized SIM swaps to steal and extort money from victims. One of the individuals charged allegedly used a hacker nickname belonging to a key figure in the underground who’s built a solid reputation hijacking mobile phone numbers for profit.
The plot to revive Mt. Gox and repay victims’ Bitcoin(TechCrunch) It was the Lehman Brothers of blockchain. 850,000 Bitcoin disappeared when cryptocurrency exchange Mt. Gox imploded in 2014 after a series of hacks. The incident cemented the industry’s reputation as frighteningly insecure. Now a controversial crypto celebrity named Brock Pierce is trying to …
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Border Security: Physical Wall vs. Virtual Wall(Arlington, Virginia, USA, February 18, 2019) Marymount University ISACA Student Group (MUISG) has its CyberNight at MU scheduled for 9 March 2019 from 6-8pm. Panelists will discuss Border Security: Physical vs Virtual Wall. This is an educational...
Insider Threat Program Development-Management Training Course(Herndon, Virginia, USA, February 18 - 19, 2019) Insider Threat Defense announced it will hold its highly sought after 2 day Insider Threat Program Development-Management Training Course, in Herndon, VA, on February 19-208, 2019. This 2 day training...
QuBit Conference Belgrade 2019(Belgrade, Romania, February 7, 2019) QuBit is a Cybersecurity Community Event connecting the East and West. We create a unique way to meet the best and the brightest minds in the information security fields across multiple industries, and...
National Security Technology Forum and Exposition (NSTFX)(San Diego, California, USA, February 12, 2019) AFCEA International and the University of California, San Diego are proud to host a new and innovative event entitled “The National Security Technology Forum and Exposition (NSTFX)”. NSTFX will bring...
3rd Next Generation Cyber Security for Utilities(Denver, Colorado, USA, February 13 - 14, 2019) With the value of damages caused by cyber-attacks growing rapidly every year, adopting a new and comprehensive approach to cyber security for utilities is more important than ever. Among essential facilities...
BSides Huntsville(Huntsville, Alabama, USA, February 15 - 16, 2019) The fun and cheap way to earn CEU's. Instead of paying way too much to listen to some guy in a suit try and sell you something, you can pay just a few bucks to hear actual programmers and hackers talk...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.