Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
January 15, 2019.
By the CyberWire staff
A well-known bug hunter has told TechCrunch he’s located some twelve flaws that affect some of the largest web hosting companies on the Internet: Bluehost, DreamHost, Hostgator, OVH and iPage.
Agari is seeing an uptick in payroll diversion attempts. The criminals are using social engineering, specifically business email compromise, against human resources departments.
If you’re out there fabricating connections between Huawei and espionage, the Chinese government would like you to please knock it off, says Reuters. The counsel will probably fall largely on deaf ears, even after a statement from Huawei founder and CEO Ren Zhengfei. The Wall Street Journal reports that Mr. Ren says the company hasn’t installed backdoors in its products, isn’t required by Chinese law to do so, and would refuse requests to assist in espionage. Despite American animadversions about Huawei and security, Mr. Ren says he likes the cut of President Trump’s jib.
Beijing is probably scowling in the general direction of Warsaw, where, the Wall Street Journal notes, the Polish government is not only considering a ban on Huawei, but also is urging its NATO allies to develop a coordinated response to Chinese spying.
A Facebook executive has been subjected to a swatting attack. Naked Security calls it a “prank,” but it’s an unusually repellent and dangerous one. The caller pretended to be the executive (unnamed in reports) and told police “he’d” shot his wife, tied up his children, and placed pipe bombs throughout their home. Fortunately no one was injured in the police response.
Bridge the Gap Between Policy & Technology at Georgetown
The Georgetown University Master's in Cybersecurity Risk Management prepares you to navigate today’s increasingly complex cyber threats. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. Join us for a webinar on Tuesday, January 29, at noon ET to explore our program.
Proactive Cybersecurity: Modeling Adversarial Behavior(Online, January 23, 2019) Join LookingGlass Product Manager, Dan Martin, and Security Ledger Editor-in-Chief, Paul Roberts for an introduction to ScoutThreat™, a threat management platform that helps security analysts streamline threat analysis work and extract the maximum value from threat intelligence.
5th Annual Cyber Security Conference for Executives(Baltimore, Maryland, United States, March 13, 2019) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Wednesday, March 13th, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. Register today!
Demonstrating Command Injection and E-Stop Abuse Against Industrial Radio Remote Controllers(TrendLabs Security Intelligence Blog) In our research, we found that it is possible to perform attacks within or out of RF range. For remote attackers out of the transmission range, there are two possibilities: be a truly remote attacker and do a computer-borne attack (that is, to take control of a computer used to software-program or -control the RF devices), or have temporary physical access to the facility to drop a battery-powered, pocket-sized embedded device for remote access. As a proof of concept (PoC), we developed such a device to show the feasibility.
Ryuk Ransomware Partners with TrickBot to Gain Access to Infected Networks(BleepingComputer) Ryuk has historically been considered a a targeted ransomware where the actors scope out networks in order to gain access and install their ransomware. New research now indicates that the Ryuk actors may be using other malware as an Access-as-a-Service to gain access to networks.
Fake Movie File Infects PC to Steal Cryptocurrency, Poison Google Results(BleepingComputer) A malicious Windows shortcut file posing as a movie via The Pirate Bay torrent tracker can trigger a chain of mischievous activities on your computer, like injecting content from the attacker into high-profile web sites such as Wikipedia, Google and Yandex Search or by stealing cryptocurrency.
The Shikata Ga Nai Encoder (Booz Allen Hamilton) Everything you need to know about the Shikata Ga Nai encoder. How it works, how to generate your own signatures, and ways you can help improve the encoder.
Introducing Nick Hayes, IntSights’ New VP of Strategy!(IntSights Blog) I’m excited to kick off the new year with an important announcement. IntSights has hired Nick Hayes, formerly Senior Analyst at Forrester Research, as our Vice President of Strategy! Here’s a bit more about Nick’s experience, what he’ll be responsible for and why he joined IntSights.
Three encrypted Slack alternatives worth a look(CSO Online) Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private.
LastPass Launches STEM Scholarship Program to Build Next Generation of Tech Leaders(Logmein) LastPass by LogMeIn, a leader in password management, today announced the launch of the LastPass STEM Scholarship Program , which aims to support students pursuing an education in science, technology, engineering or math (STEM) fields. Through the new program, LastPass will award one graduating high school or current college student $10,000 for tuition and $2,000 for books.
Courts Hand Down Hard Jail Time for DDoS(KrebsOnSecurity) Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Zero Day Con(Dublin, Ireland, March 7, 2019) On March 7 2019, Zero Day Con will bring together leading technology firms, industry experts and government officials that will share insights for cybersecurity professionals grappling with the rise of...
Derbycon 2019(Louisville, Kentucky, USA, September 4 - 8, 2019) DerbyCon isn’t just another security conference. We’ve taken the best elements from all the conferences we’ve ever been to and put them into one. DerbyCon is a place you can call home, where you can meet...
SINET Global Institute CISO Series(Scottsdale, Arizona, USA, January 15 - 16, 2019) By invitation only. These intimate CISO workshops address the challenges that Board of Directors are placing on security and risk executives, and how to successfully manage and communicate today’s enterprise...
CPX Asia 360 2019(Bangkok, Thailand, January 21 - 23, 2019) CPX 360 - the industry’s premier cyber security summit and expo - brings together the world’s leading cyber security experts to one venue. Gain a deep understanding of current challenges cyber security...
CPX Americas 360 2019(Las Vegas, Nevada, USA, February 4 - 6, 2019) CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security...
QuBit Conference Belgrade 2019(Belgrade, Romania, February 7, 2019) QuBit is a Cybersecurity Community Event connecting the East and West. We create a unique way to meet the best and the brightest minds in the information security fields across multiple industries, and...
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.