skip navigation

More signal. Less noise.

Worried About Your Data? Research From Forrester Says You’re Not Alone.

Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Download this free Forrester report on ‘The Future of Data Security and Privacy’ to understand why security executives see privacy as a source of growth and differentiation in 2019. Click here to get your copy.

Daily briefing.

POLITICO reports that EU elections, scheduled for this May, are thought to present an attractive target for nation-state hacking and influence operations. The US Democratic National Committee has amended its civil complaint against Russia (and others) to include post-midterm hacking attempts.

France's CNIL (Commission nationale de l'informatique et des libertés) has fined Google €50 million over GDPR issues, essentially lack of transparency in user consent, the Telegraph reports. Former Facebook CISO Alex Stamos is interested to see whether GDPR will prove to be more about competition than privacy.

Stamos's point is worth considering, but Ad Exchanger noticed in November that CNIL had warned a small European ad company, Vectaury, about possible violations despite Vectaury's having structured its operations in accordance with the IAB GDPR Transparency and Consent Framework, generally thought a safe guide to compliance.

Russian censorship authority Roskomnadzor has opened an administrative enforcement action against Facebook and Twitter, the Wall Street Journal reports. The communications agency says the two social networks haven't complied with requirements that data on Russian citizens be stored in Russia.

SecurityWeek notes that Facebook may be set for a large fine in the US: the Federal Trade Commission is said to be preparing an enforcement action against the company for privacy failings related to the Cambridge Analytica scandal.

The Washington Post has new details on Russia's arrest of Paul Whelan on espionage charges. He is said to have been passed a USB drive containing secret information. Whether he knew that's what he'd received remains unclear.

Notes.

Today's edition of the CyberWire reports events affecting Australia, Belgium, Cameroon, Canada, China, Congo, Côte d'Ivoire, Croatia, Finland, France, Equatorial Guinea, European Union, Germany, Ghana, Hungary, India, Italy, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Russia, Slovenia, Sweden, United Kingdom, United States.

FedRAMP-ready in less than six months.

It usually takes a year to get FedRAMP assessment-ready. But this can be cut in half--just six months to confident readiness. Learn how cybersecurity leader Coalfire helped Innovest prepare for its FedRAMP assessment through Security Automation and Orchestration (SAO). Innovest's CSO, Erick Lindley, said, “Coalfire helped us fast-track our path to FedRAMP compliance and save between six and twelve months of work we would have had to do ourselves.” Find out how.

In today's podcast, out later this afternoon, we speak with our partners at the SANS Institute, as Dean of Research and proprietor of the Stormcast podcast Johannes Ullrich shares the skinny on gift card scams. Our guest, Maria Varmazis, talks us (and all you online gamers) through Fortnite vulnerabilities.

And Recorded Future's podcast, produced in cooperation with the CyberWire, is also up. In this episode, "NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report," Sanja Nedic and Adrian Sanabria of NopSec join us to discuss threat intelligence, how geopolitics can affect government-run vulnerability databases, and more.

State of the Phish Webinar (Online, January 30, 2019) Phishing is the number one attack vector. Wombat's State of the Phish Report provides the data-driven intelligence your team needs to manage end-user risk effectively within your organization. In this report, the focus mirrors that of cyber attackers: people. Register for their webinar and learn more.

DreamPort Event: The Red Hat Ansible Tower Workshop (Columbia, Maryland, United States, February 7, 2019) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM is hosting the Red Hat Ansible Tower Workshop. This workshop will enable you to create playbooks, while building in security. Automation features will save time, empower junior staff, offload senior staff and automate your most tedious tasks!

CYBERTACOS RSA (San Francisco, California, United States, March 4, 2019) Join us for ALL YOU CAN EAT FREE TACOS! What better way to start your week at RSA? On Monday, March 4, CYBERTACOS is coming back to San Francisco as part of RSA. Join us from 7:00-10:00pm for networking, food and drinks.

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, March 13, 2019) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Wednesday, March 13th, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. Register today!

Cyber Attacks, Threats, and Vulnerabilities

Europe’s most hackable election (POLITICO) The EU faces hackers, trolls and foreign agents as it gears up for a vote in May.

Facebook, Germany to Collaborate Against Election Interference (Wall Street Journal) Facebook operating chief Sheryl Sandberg said the company will work with the German ministry for information security to guide policy throughout Europe on election interference.

Washington fears new threat from 'deepfake' videos (TheHill) Lawmakers and experts are sounding the alarm about "deepfakes," forged videos that look remarkably real, warning that they are growing increasingly easy to create and harder to detect.

Analysis | The Cybersecurity 202: How does a country spy on its citizens? A cybersecurity company got an inside look (Washington Post) Government surveillance is getting more accessible.

SSDP amplification attacks rose 639% (Help Net Security) The Nexusguard Q3 2018 Threat Report has revealed the emergence of an extremely stealthy DDoS attack pattern targeting communications service providers

New tricks with old methods (Nexusguard) In Q4 2018, 50% more ASNs suffered from a new type of stealthy network attacks carried out in a piecemeal fashion.

Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution (Help Net Security) A Marvell Avastar Wi-Fi vulnerability can be exploited to compromise devices without user interaction, Embedi researcher Denis Selianin has found.

Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution (Help Net Security) A Marvell Avastar Wi-Fi vulnerability can be exploited to compromise devices without user interaction, Embedi researcher Denis Selianin has found.

Google Play malware used phones’ motion sensors to conceal itself (Ars Technica) To elude emulators, banking trojan would trigger only when infected devices moved.

Fallout Exploit Kit: A deep dive into the exploit kit’s campaigns distributing various malware strains (Cyware) Fallout exploit kit was first spotted in a malvertising campaign affecting users in Japan, Korea, the Middle East, Southern Europe, and more. Later, the exploit kit was spotted distributing GandCrab ransomware, SAVEfiles ransomware, Kraken Cryptor ransomware, DanaBot trojan, Nocturnal malware, GlobeImposter ransomware, AZORult variants, Vidar malware, and more.

Qealler — The Silent Java Credential Thief (Security Boulevard) Qealler is a new type of malware that CyberArk Labs recently detected in a spam campaign targeting corporate mailboxes in the UK. At first sight, it looks to be a simple, harmless file that can...

Researchers analyze DDoS attacks as coordinated gang activities (Help Net Security) In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related

Former Employee Hacks Popular WordPress Plugin’s Website (SecurityWeek) The website for a popular WordPress plugin was hacked over the weekend, when a former employee abused a previously implemented backdoor to take over the domain.

WPML.org Site Back to Normal After an Attack During the Weekend - WPML (WPML) Our site got hacked during the weekend, causing loss of client data. We just finished rebuilding the site and it's back to working state. Many of our

DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan (BleepingComputer) New malicious campaigns attributed to DarkHydrus APT group show the adversary's use of a new variant of the RogueRobin Trojan and of Google Drive as an alternative command and control (C2) communication channel.

Check Point Forensic Files: GandCrab Returns with Friends (Trojans) (Check Point Software Blog) SandBlast Agent’s Behavioral Guard robust detection engine is capable of adapting to a malware’s evolution over time. It is also sufficiently robust to handle the prevention of several malware variants simultaneously.

Websites Can Exploit Browser Extensions to Steal User Data (SecurityWeek) Web applications can exploit browser extensions to access privileged capabilities and steal sensitive user information, including credentials, a researcher has discovered.

Flaws in Omron HMI Product Exploitable via Malicious Project Files (SecurityWeek) Omron’s CX-Supervisor HMI/SCADA designer is affected by several vulnerabilities that can be exploited for DoS attacks and remote code execution using specially crafted project files.

Hackers Wield Commoditized Tools to Pop West African Banks (BankInfo Security) Banks in West Africa have been targeted by at least four hacking campaigns since mid-2017, with online attackers wielding commoditized attack tools and "living

Symantec Spots Cyberattacks in West Africa (PYMNTS.com) Hackers are targeting financial firms in the Ivory Coast, Cameroon, Congo, Ghana and Equatorial Guinea, using commodity malware and living off the land tools, reported Symantec, the cybersecurity company, in a new blog post. According to the company’s Thursday (Jan. 17) blog post, banks and other financial firms in a number of West African countries have been […]

Hackers Actively Scanning for ThinkPHP Vulnerability, Akamai Says (TechBizWeb) Have you been attacked? Digitpol the global investigation firm can help you, visit Digitpol’s website to learn more. There is widespread scanning for a recently disclosed remote code execution vulnerability in the ThinkPHP framework, Akamai reveals.  ThinkPHP, a web framework by TopThink, is a Chinese-made PHP framework used by a large number of web developers …

ThinkPHP Exploit Actively Exploited in the Wild (Akamai) While investigating the recent Magecart card skimming attacks, I came across a payload I was not familiar with. Further research into it lead me to discover that in December a researcher disclosed a remote command execution vulnerability in ThinkPHP, a...

Fake outstanding payment delivers Formbook and an unknown malware at same time (My Online Security) A slightly unusual malware campaign this morning. The email is nothing special and spoofs a Maltese Shipping company ( it is highly probable that multiple other companies will also be spoofed with…

Twitter bug exposed some Android private tweets to public view (Naked Security) The latest privacy glitch, which went unnoticed for over four years, may trigger yet another EU privacy probe.

There's Much More To Collection 1 Than 772 Million Leaked Records (Forbes) As scary as Collection 1 isn't the only mammoth stash of credentials floating around.

Attackers used a LinkedIn job ad and Skype call to breach bank’s defences (Naked Security) A Chilean Senator has taken to Twitter with alarming news – the company running the country’s ATM network suffered a serious cyberattack.

Youth-run agency AIESEC exposed over 4 million intern applications (TechCrunch) AIESEC, a non-profit that bills itself as the “world’s largest youth-run organization,” exposed more than four million intern applications with personal and sensitive information on a server without a password. Bob Diachenko, an independent security researcher, found an unprotecte…

Zero day virus closes North Bay's cancer clinic this week (North Bay Nugget) North Bay Regional Health Centre’s satellite chemotherapy clinic was closed for three days this week because of a so-called zero day virus in the computer systems at Health Sciences North in Sudbur…

Hospital computer systems in northeast step closer to normal (Sudbury Star) Things are starting to return to normal after a virus got into the computer system at Health Sciences North — along with 23 other hospitals across the northeast -Wednesday morning.“This…

'Faster Payments' glitch affecting Lloyds, Halifax and Bank of Scotland (Computing) No-so-Faster Payments borkage hits Lloyds Banking Group,Software ,Halifax,Lloyds Bank,Bank of Scotland,

Fees phishing scam targets schools (BBC News) Parents at Newcastle's Royal Grammar School were sent fraudulent emails offering reduced fees.

Vandal severs Telstra services in Lismore (CRN Australia) Crews work to restore vandalised cables.

Security Patches, Mitigations, and Software Updates

Temporary fix available for one of the two Windows zero-days released in December (ZDNet) Microsoft did not issue official fixes during the recent January Patch Tuesday update window.

Microsoft sets death date for Windows 10 Mobile (CRN Australia) "We recommend that customers move to a supported Android or iOS device."

SUSE-SU-2019:0130-1 | SUSE (SUSE Security Update) Security update for wireshark

Malwarebytes Fixes Windows 7 Freeze Problem in New Update (BleepingComputer) Malwarebytes released an update today for the component package that fixes the problem with Windows 7 stations freezing. The problem manifests on systems with the Web Protection feature enabled in the security solution.

Cyber Trends

A blitzkrieg reborn: Weaponizing cyberspace (Capitol Weekly) Whether the president colluded with Russia, was blackmailed or merely is a dupe, evidence points to Russian interference in the 2016 presidential election.

Social media as an instrument of combat (Business Statdard) The Age of Information that set in with the success of IT revolution some three decades ago pushed the world economy and cross-border human interactions up in a transformational manner and established globalisation as a new reality.

2019 S4 Conference – Observations and Challenges Especially for Engineering (Control Global) Addressing the field device level requires engineering expertise and is what makes control system cyber security different than IT/OT cyber security. Automation/process/relay engineers, field instrument/relay technicians, etc. are not OT but Engineering whereas OT is the network engineers and network technicians. Consequently, the real culture gap is between Engineering and IT/OT.

For Industrial Robots, Hacking Risks Are On the Rise (Wall Street Journal) 5G promises to make factories a lot smarter. And that means they’ll be a lot more vulnerable.

Cyberspace becoming more complex (Telangana Today) Cyber security experts say vulnerabilities are growing and mechanisms to counter are the need of the hour.

Serious Security: What 2000 years of cryptography can teach us (Naked Security) Here’s a fascinating history of cryptography that has plenty to teach you – and you don’t need a degree in mathematics to follow along!

Cybercrime could cost companies trillions over the next five years (Help Net Security) Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks.

Hey, guess what; IoT security still sucks, finds Gemalto and Trend Micro (Rethink) This horse has been beaten past death so much that it’s well on its way to ending up in a dodgy lasagne microwave dinner, but it is still disappointing to see that IoT security capabilities shows no real sign of improvement in the short-term. Two studies, from Gemalto and Trend Micro, illustrate the scale of the problem...

CIO role: Should a CIO manipulate information? (SearchCIO) The Wall Street Journal's report on the CIO of Liberty University using his private company to manipulate data raises interesting questions about the CIO role and personal behavior.

Tidying Up When We Have No Control over Our Digital Lives (WIRED) Never-ending notifications. Pull-to-refresh rewards. There's no escape from surveillance capitalism.

Turn Off Your Push Notifications. All of Them (WIRED) RIP my mentions.

Most Aussie orgs can't detect an IoT breach (Technology Decisions) Nearly two-thirds of Australian organisations are unable to detect when an IoT device has suffered a security breach, according to Gemalto.

Is the Ten Year Challenge a Facebook scam??? (Naked Security) Get a grip.

ERP Maestro's Survey Examines American Beliefs and Behaviors Towards Cybercrime (PR Newswire) ERP Maestro, provider of automated and cloud-based controls for access, security and GRC, today releases The...

Marketplace

In dangerous times, cyber insurance comes of age (Raconteur) Once considered exotic and complex, cyber insurance is now an essential tool for large companies seeking to manage risk

Huawei kicks off unprecedented media blitz (CRN Australia) Low-key founder fronts international media as security fears grow.

Huawei follows laws wherever it operates, founder insists (Nikkei Asian Review) 'We would refuse' to harm clients by handing over data, Ren Zhengei says as more products banned

Huawei's CEO threatens to axe 'mediocre' staff after global security worries (Business Insider) Ren Zhengfei warned that the days of Huawei's explosive growth might be over.

Huawei founder confident the West will eventually buy its 5G products (South China Morning Post) In his first ever TV interview, Ren Zhengfei said Huawei’s wireless and 5G solutions are world class and will solve issues many Western countries face in 5G

The Public Face of Huawei’s Global Fight (Wall Street Journal) Meng Wanzhou, Huawei’s finance chief and daughter of its founder, helped lead the company’s effort to improve its image. With her arrest, she’s caught up in one of the probes ensnaring the company around the world.

Why Silicon Valley’s “growth at any cost” is the new “unsafe at any speed” (Ars Technica) Video: For years, Ashkan Soltani has warned of Facebook's privacy-eroding tendencies.

Opinion | Happy 18th birthday, Wikipedia. Let’s celebrate the Internet’s good grown-up. (Washington Post) On Wikipedia, truth matters more than self-expression.

Fortinet's Progress Is Real, But It Seems Largely Priced In (Seeking Alpha) The company has made considerable progress, especially with its Fabric platform which is an attractive proposition for enterprise customers. While the company h

Trend Micro's ZDI Looks to Acquire More Vulnerabilities in 2019 (eWEEK) Trend Micro's Zero Day Initiative (ZDI) published 1,444 security advisories in 2018, with issues in PDF technologies leading the way.

Microsoft launches Azure DevOps bug bounty program (Help Net Security) Microsoft has launched yet another bug bounty program and is urging security researchers to look into the security of Azure DevOps.

Ericom Software Snags Ex-Symantec Exec David Canellos For CEO Role (CRN) New Ericom Software CEO David Canellos plans to focus on boosting cross-selling the company's entire portfolio and pursuing integrations with other security technologies.

Exclusive: Local cyber firm beefs up exec team with veteran hires (Washington Business Journal) [Atomicorp's] new leaders have some serious resumes coming into the company.

Products, Services, and Solutions

PrinterLogic's 18.3 Release Brings Added Security, Ease of Use (PrinterLogic) Version 18.3 of PrinterLogic brings several highly requested security and mobile features, including CAC/PIV authentication, FIPS certification and app-based print release.

Welcome to a New ERA™ - The First Auto-Generated Security Agent for IoT Devices (VDOO) Read about the new VDOO product - ERA™ - The First Auto-Generated Security Agent for IoT Devices

WhiteHat Security Launches New ‘Essentials’ Product Line for High-speed, Fully-automated Security Testing with Comprehensive Code Coverage (BusinessWire) WhiteHat Security, the leading application security provider committed to securing digital business, today announced the general availability (GA) of

NSA preps public release of powerful cybersecurity tool (Washington Examiner) The National Security Agency is preparing to release to the public a powerful cybersecurity tool used within the spy agency to analyze computer viruses, winning outside praise and helping rehabilitate the agency’s reputation after years of controversy.

Emsisoft Browser Security Protects You from Malicious Sites (BleepingComputer) For those looking for extra protection while browsing the web, Emsisoft has a released a browser extension that will block you from interacting with known phishing, malware, or scam sites.

ANSecurity And Gemalto Help Trustology Deliver Blockchain Technology To Secure Digital Assets (Security Informed) ANSecurity, a specialist in advanced network and data security, has announced a successful project with Gemalto to help Trustology deliver innovative Blockchain technology used to secure digital...

Credit Bureau Connection Announces New Synthetic Identity Fraud Prevention Solution (PR Newswire) Credit Bureau Connection (CBC), the industry leader of credit reports, compliance solutions, alternative credit...

How to tackle phishing with machine learning (TechRepublic) ​Learn how one company is capitalizing on machine learning to address phishing problems.

Verizon customers get spam and robocalling protection for free (Notebookcheck) Although some customers received protection from spam and robocalling in the past, now Verizon is ready to provide these useful security features to all its customers. These two treats will be offered for free starting in March, revealed Joe Russo, senior vice president of network operations for Verizon.

Kaspersky CyberTrace – A Free Threat Intelligence Tool to Identify What Threats Pose A Danger (CIOL) With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large

Peek-a-boo! CAST helps you look inside software to find what might kill your business (diginomica) CAST Software has been stopping some of the more edgy, extravagant applications developments from being freely used in business without serious inspection and evaluation, an important task.

Technologies, Techniques, and Standards

Is cyber security evolving to meet NIS requirement in the utility sector? (Information Age) Daniel Lewis, CEO of Awen Collective, explains why utility companies need to evolve their cyber security to meet the NIS directive

Shadow IT, IaaS & the Security Imperative (Dark Reading) Organizations must strengthen their security posture in cloud environments. That means considering five critical elements about their infrastructure, especially when it operates as an IaaS.

How to avoid becoming the next victim of a Magecart attack (www.SecurityInfoWatch.com) Make sure your web servers and the software running on them have the latest security updates

Huawei vs US: why trade secrets need to be carefully managed (Computing) Trade secrets don't enjoy the same legal protection as patents, warns Withers & Rogers patent attorney John-Paul Rooney. So how should they be protected?

Beware the man in the cloud: How to protect against a new breed of cyberattack (Help Net Security) To gain access to cloud accounts, a MitC attack takes advantage of the OAuth synchronisation token system used by cloud applications.

How to remove Oxar OXR ransomware (Virus Removal Guide) (MalwareTips Guides) If your documents are encrypted with a OXR extension, then your PC is infected with the Oxar ransomware. Oxar is a file-encrypting ransomware, which encrypts the personal documents found on victim’s computer (extensions: .OXR, .FDP, .PEDO or .ULOZ), then displays a message which offers to decrypt the data if a payment in Bitcoin is made. …

Machine learning trumps AI for security analysts (Help Net Security) Machine learning is an algorithm that gives the software applications it is applied to the ability to autonomously learn from its own environment.

Deloitte: Natural Language Processing Key to Utilize Unstructured Gov’t Data - GovCon Wire (GovCon Wire) A Deloitte report has urged agencies to explore artificial int

How more women on cybersecurity teams can create advantages (Fifth Domain) Industry leaders say a gender gap in the cybersecurity sector could represent an unaddressed tactical disadvantage for government and businesses alike.

Agents of disruption: Four testing topics argue the case for agentless security (Help Net Security) Let me introduce myself. I’m a set of flaws in your otherwise perfect, agent-based security world. Like all disruptive agents, I derail your best-laid

Shodan Safari, where hackers heckle the worst devices put on the internet (TechCrunch) If you leave something on the internet long enough, someone will hack it. The reality is that many device manufacturers make it far too easy by using default passwords that are widely documented, allowing anyone to log in as “admin” and snoop around. Often, there’s no password at …

Design and Innovation

Securing the Digital Economy: Reinventing the Internet for Trust (Accenture Strategy) When a person creates an online account, makes a purchase from a website or downloads an app, it’s not just the exchange of data, goods or services taking place. It’s a transaction in the ultimate currency: trust. Today, there is a real risk that trust in the digital economy is eroding.

Research and Development

IBM unveils quantum computing system (Gasworld) More than 50 years of advances in mathematics, materials science and computer science have transformed quantum computing from theory to reality.

PlatON Partners With Top University Researchers on Cryptography (AP NEWS) PlatON, a pioneering global privacy-preserving computing network, has announced a partnership with top university professors in the US as part of an effort to strengthen its cybersecurity and cryptography research, specifically in the area of designing and building protocols for secure multi-party computation (MPC).

Academia

Oxford University’s chancellor warns  of national security risks when academics collaborate with China (The Telegraph) Oxford University’s chancellor has warned of national security risks when academics collaborate with China.

Universities cyber attack each other to test defences (UKAuthority) Twenty UK universities have signed up to take part in a cyber attack exercise that aims to expose weak spots in their systems that could be exploited by illegal hackers.

Iowa State adopts new cybersecurity system to protect campus community (The Ames Tribune) Iowa State University recently adopted a new identity and access management security platform, which resulted in a decrease in compromised student and

Legislation, Policy, and Regulation

Canada dismisses Chinese threats over potential 5G network ban for Huawen (Computing) China had warned of 'repercussions' should Canada bar Huawei from the country's 5G networks,

For the security of Canadians, Huawei should be banned from our 5G networks (The Globe and Mail) China is willing to take extreme measures for its national interests; we must do the same

France considers bill amendment to target Huawei: Les Echos (Reuters) France is considering introducing a bill amendment to empower its security and d...

Future Wars Will Be Fought In Cyber Domain, Says Army Chief (NDTV.com) Army Chief General Bipin Rawat today said there is a need to focus on incorporating Artificial Intelligence (AI) and big data computing into the Armed forces' system, saying the northern adversary of the country (China) is spending "huge money" on this technology.

EU Copyright Directive compromise rejected by 11 countries (Computing) Copyright Directive and accompanying regulation unlikely to be passed before May's European elections,

CPJ joins letter expressing concern about proposed cyberspace law in Venezuela (CPJ) The Committee to Protect Journalists joined more than 30 regional and international rights organizations expressing concern about a proposed law in Venezuela that would expand the powers of the government to control and monitor internet use without institutional checks....

India’s Plan to Curb Hate Speech Could Mean More Censorship (WIRED) India's government has proposed rules that would require encrypted messaging services like WhatsApp to decrypt data, threatening the security of users globally.

Ontario electric utilities to report soon on their on cyber security maturity (IT World Canada) The federal and provincial governments have been urging critical sectors of the economy to toughen their cybersecurity defences for at

Four cybersecurity priorities for Congress to confront active threats (TheHill) Every individual who uses a phone or laptop to perform a function of their job is part of the cyber workforce.

Can State’s New Cyber Bureau Hack It? (Foreign Policy) The U.S. State Department is working to stand up a new cybersecurity bureau, but it's hobbled by debates with lawmakers on its purpose and mandate.

Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday (SecurityWeek) Cybersecurity professionals comment on the impact of the U.S. government shutdown, which is the longest in U.S. history, nearing one month.

The shutdown is breaking government websites, one by one (Washington Post) Over 130 Web security certificates belonging to federal agencies have now expired, making it harder to access online services, researchers say.

Marco Rubio Proposes New Federal Data Privacy Bill (SecurityWeek) Republican Senator Marco Rubio has introduced a bill called the "American Data Dissemination Act" which is designed to provide privacy legislation for the entire nation.

Natl' Guard cyber units protect country's interests, still face training issues (Federal News Network) National Guard cyber teams are helping with police networks, elections and national missions.

Analysis | The Cybersecurity 202: What do Kamala Harris, Elizabeth Warren and Kirsten Gillibrand have in common? Cybersecurity chops (Washington Post) All three Democratic candidates have pushed for major reforms.

This is how Sunderland City Council is looking to stop a rise in cyber attacks (Chronicle) In the past six months, Sunderland City Council has seen a rise cyber attacks

Litigation, Investigation, and Law Enforcement

American charged by Russia with espionage was handed classified material, lawyer says (Washington Post) Paul Whelan, 48, was given a flash drive containing secret information during a visit to Moscow in December.

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms (BleepingComputer) According to documents added to an amended complaint filed on January 17, the Democratic National Committee says that it was allegedly targeted by a Russian intelligence-coordinated phishing attack just a few days after the 2018 midterms.

Google Fined $57 Million in Biggest Penalty Yet Under New European Law (Wall Street Journal) Google was fined $57 million by a French regulator—the biggest penalty levied yet under a new European privacy law—alleging the search-engine giant didn’t go far enough to get valid user consent to gather data for targeted advertising.

Industry reactions to Google's €50 million GDPR violation fine (Help Net Security) On 21 January 2019, the CNIL imposed a financial penalty of €50 million against Google, in accordance with the General Data Protection Regulation.

Google’s €50m GDPR Fine Heralds a New Era (Infosecurity Magazine) French regulator punishes firm for lack of transparency, valid consent and adequate info

Report: Facebook's Privacy Lapses May Result in Record Fine (SecurityWeek) Facebook may be facing the biggest fine ever imposed by the U.S. Federal Trade Commission for privacy violations that breached a commitment to protect the personal information of its social network’s 2.2 billion users.

Russia Accuses Facebook, Twitter of Failing to Comply With Data Laws (Wall Street Journal) Russia launched administrative action against Facebook and Twitter for failing to comply with its data laws, days after Facebook removed the accounts of what it said were two Russia-based misinformation campaigns.

Inside the Mueller team’s decision to dispute BuzzFeed’s explosive story on Trump and Cohen (Washington Post) The special counsel's office did not realize the extent of what the story would allege before it was published.

US to formally seek extradition of Huawei exec Meng Wanzhou: Report (CNBC) Canada's ambassador to the United States David MacNaughton, in an interview, did not say when the formal extradition request will be made but the deadline for filing it is Jan. 30, according to the Globe and Mail.

Huawei executive arrested in Poland says spying allegations ‘groundless’ (Global News) The case comes as a range of Western countries have either taken steps or said they are considering measures to limit access of Huawei to their markets.

Bulgaria Extradites Russian Hacker to US: Embassy (SecurityWeek) Bulgaria has extradited Alexander Zhukov indicted by a US court for mounting a complex hacking scheme to the United States, the Russian embassy in Washington said Saturday.

DEMOCRATIC NATIONAL COMMITTEE, Plaintiff, v. THE RUSSIAN FEDERATION... (UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK) Plaintiff the Democratic National Committee (“DNC”) brings this Complaint against The Russian Federation (“Russia”); Aras Iskenerovich Agalarov (“Aras Agalarov”); Emin Araz Agalarov (“Emin Agalarov”); Joseph Mifsud (“Mifsud”); WikiLeaks; Julian Assange (“Assange”); Donald J. Trump for President, Inc. (“the Trump Campaign”); Donald J. Trump, Jr. (“Trump, Jr.”); Paul J. Manafort; Jr. (“Manafort”); Roger J. Stone, Jr. (“Stone”); Jared C. Kushner (“Kushner”); George Papadapoulos (“Papadapoulos”); and Richard W. Gates, III (“Gates”); and alleges as follows:

DNC: Russian Hackers Attacked Us Again After Midterm Elections (SecurityWeek) The US Democratic National Committee (DNC) says it was again targeted by Russian hackers shortly after last year’s midterm elections.

DNC Claims Russian Hackers Targeted Staffers After Midterms (Infosecurity Magazine) Civil case against alleged Kremlin/Trump conspiracy updated with new revelations

DNC alleges it was targeted in phishing attack after midterms (ABC News) The DNC's latest complaint is part of an ongoing lawsuit.

DNC says it was targeted by cyber attack days after 2018 miderms: court docs (New York Post) The Democratic National Committee was targeted by a cyber attack days after the 2018 midterm elections, the political organization reportedly revealed in a court documents filed Thursday night...

PN mum on "theft" of Delia’s passwords (Newsbook) A spokesperson for the Partit Nazzjonalista did not answer questions by Newsbook.com.mt about whether it is true that several passwords of party leader Dr Adrian Delia were stolen and whether Delia had reported the matter to the police.

What Mueller's extraordinarily unprecedented move to dispute BuzzFeed's story on the record tells us (SFGate) Experts are flummoxed by a statement the special counsel Robert Mueller put out disputing a BuzzFeed News report that indicated President Donald Trump told Michael Cohen to lie to Congress about the proposed Trump Tower Moscow deal.

Senator Wyden Hammers T-Mobile For Empty Promises on Sale of Cell Phone Location Data (Motherboard) The Senator expressed “disappointment” and “disbelief” at CEO John Legere’s unfulfilled promise to end the sale of geolocation data to “shady middlemen.”

Odisha Police building capacity to tackle cyber crime (Odisha TV) From hacking air traffic systems to stealing data from cellphones, there has been a significant rise in the number of cyber crimes posing a serious challenge for the Odisha Police. During the 61st Senior Police Officers' Conference in Bhubaneswar today, several sessions were organised to discuss and prepare strategies to tackle the challenges posed by cyber crime.

Football leaks suspected hacker hires Edward Snowden's lawyer (Mail Online) Suspected computer hacker Rui Pinto, who has been linked to the Football Leaks scandal is being represented by Edward Snowden's lawyer William Bourdon following his arrest in Hungary.

Arrested Portuguese hacker is Football Leaks 'whistleblower': lawyers (Reuters) A Portuguese man arrested in Hungary on suspicion of extortion and secrecy viola...

Employee’s firing prompts Baltimore IT security review (Washington Times) A Baltimore employee was found with hacking tools on his city computer, prompting the mayor to order a security review.

Former Baltimore city IT worker who was target of investigation loses job with Baltimore County schools (Baltimore Sun) A former Baltimore public works IT staffer who was found to have hacking tools on his city-issued computer and backdoor access to the department director's computer says he's lost his new job working for the Baltimore County Public School system.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber USA (College Park, Maryland, USA, January 24, 2019) CyberUSA is a collaboration of states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience - all while connecting the cyber...

CyCon 2.0 (Loudon, Virginia, USA, March 9, 2019) CyCon - cyber for the community is back with a full lineup of experts in the field of Cybersecurity to present on current topics or demo bleeding edge technologies to include the deep and dark web, securing...

BSidesIowa (Des Moines, Iowa, USA, April 20, 2019) BSidesIowa is the longest running security conference in Iowa. It is back in 2019 for its 6th event! There will be a Capture The Flag event presented by SecDSM, as well as presentations and networking...

Upcoming Events

CPX Asia 360 2019 (Bangkok, Thailand, January 21 - 23, 2019) CPX 360 - the industry’s premier cyber security summit and expo - brings together the world’s leading cyber security experts to one venue. Gain a deep understanding of current challenges cyber security...

International Cybersecurity Forum (Lille, France, January 22 - 23, 2019) The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market...

Cyber USA (College Park, Maryland, USA, January 24, 2019) CyberUSA is a collaboration of states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience - all while connecting the cyber...

Zero Trust Technology Showcase (Columbia, Maryland, USA, January 28, 2019) Register for the Zero Trust Technology Showcase. The working group, mainly consisting of US Government employees, will be organized into four teams to include teams exploring data, networking, analytics...

CPX Americas 360 2019 (Las Vegas, Nevada, USA, February 4 - 6, 2019) CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.