Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
July 17, 2019.
This just in: humans now read the CyberWire on Alexa.
No time to read the Daily News Briefing? Let our own talent do it for you on your Alexa. Just say, "Alexa, what's my flash briefing?" or "Alexa, what's in the news?" after you've set the CyberWire as part of your flash briefing and the hosts of our podcast will take it away.
By the CyberWire staff
Yahoo reports that Bulgarian authorities have arrested a 20-year-old man in connection with a data breach at the national tax agency that exposed some seven-million people's personal information. The unidentified suspect is said to have been a legitimate penetration tester who went over to the dark side.
Congress is raising concerns about the 2020 US census, according to TheHill. This is the first census in which a significant portion of the data collection will be done online, with the attendant possibility of hacking, and a priori jitters are to be expected.
Researchers at Boston University report that they've demonstrated ways of defeating Media Access Control (MAC) address randomization Bluetooth Low Energy (BLE) uses to protect devices from being identified and tracked. Even properly, carefully implemented instances can yield a lot more information about a device than had generally been believed.
The US FBI has issued a Flash alert offering master decryption keys and other useful information concerning the now possibly retired but still troublesome GandCrab ransomware.
Monroe College, a proprietary school headquartered in the Bronx borough of New York, is grappling with a significant ransomware incident. Naked Security puts the extortion demand at $1.8 million; Inside Higher Ed says it's an even $2 million. Monroe has declined to say whether it will pay the ransom, but it has reverted to manual operations wherever possible.
The US House Armed Services Committee has asked to see “all National Security Presidential Memorandums relating to Department of Defense operations in cyberspace," Roll Call reports.
Today's issue includes events affecting Bulgaria, Czech Republic, Germany, India, Iran, Israel, Lithuania, Russia, Ukraine, United Kingdom, United States.
Bring your own context.
A lot of people talk about moving away from passwords and, even moreso, about moving away from other knowledge-based modes of authentication. Why is this?
"And so what we've been advocating for - in fact, we do this millions and millions of times each day for some of the largest financial institutions in the country - is relying far less on the asking of questions, the knowledge information. That whole approach, frankly, is broken because criminals know your date of birth. It's on social media. It's been shared. The sad news is, with all the data breaches and hacks and so on out there, they have your Social Security number. They have your address. They have your mortgage payment information. The information has been shared with the bad guys."
—Patrick Cox, founder of TRUSTID, on the CyberWire Daily Podcast, 7.15.19.
You've seen the old war movies where the enemy spy tries to pass for a GI but he's tripped up because he doesn't know things any decent American would know, like what a Baltimore chop is, or who's Popeye's girlfriend? That's Hollywood, friends: it's not real. Trust us, Fancy Bear and Cozy Bear already know all that stuff. But just for the record, the answers, respectively, are a high bouncing fair ball that can't be caught in time to throw the batter out at first, and Olive Oyl. (Stone Panda? Charming Kitten? You knew that too, right?)
Conduct secure and anonymous research on the open and dark web.
If you are doing online research, the common web browser can betray you by exposing you and your organization to cyber attacks. Authentic8, the maker of Silo Cloud Browser and Silo Research Toolbox, ends this betrayal. Silo insulates and isolates all web data and code execution from user endpoints, providing powerful, proactive security even if you are gathering data and collections across the deep and dark web. Learn more.
XM Cyber is coming to Black Hat(Las Vegas, Nevada, United States, August 3 - 8, 2019) Visit XM Cyber at our booth 875, to experience the first fully automated APT simulation platform to Simulate, validate and remediate hackers’ path to organizational critical assets.
Wicked6 Cyber Games(Las Vegas, Nevada, United States, August 8, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.
Alarm sounds over census cybersecurity concerns(TheHill) Lawmakers are raising concerns that the upcoming 2020 census, which people are expected to fill out primarily online for the first time, is opening the door to potential cyber vulnerabilities.
Aavgo security lapse exposed hotel bookings(TechCrunch) A security lapse at a hotel management startup has exposed hotel bookings and guests’ personal information. The security lapse was resolved Monday after TechCrunch reached out to Aavgo, a hospitality tech company based in San Francisco, which secured a server it had left online without a pass…
CrowdStrike: Too Challenging To Win Here(Seeking Alpha) Recently IPOed fast-growing company with an enviable story. CrowdStrike has a huge assemble of A-list customers.Neverthless, its stock is unquestionably overvalued.
Time For Check Point To Let Its Hair Down(Seeking Alpha) Check Point is a long time leader in IT security but has disappointing revenue growth of 3.4% YoY. Company fundamentals are great with extremely good free cash flow margin, SG&A expenses, and the company meets the software Rule of 40. Check Point appears to be prioritizing the balance sheet over growth and is in danger of losing market share to high growth competitors. The company may be a conservative investment but be prepared for single-digit growth for a couple of years and 15% growth long term.
FBI Releases Master Decryption Keys for GandCrab Ransomware(BleepingComputer) In an FBI Flash Alert, the FBI has released the master decryption keys for the Gandcrab Ransomware versions 4, 5, 5.0.4, 5.1, and 5.2. Using these keys, any individual or organization can create and release their very own GandCrab decryptor.
A blueprint for cyber disruption response(GCN) National Governors Association offers recommendations on how states can build cyber disruption response plans based on its analysis of 15 states' current plans.
Senators grill Facebook executive on company’s cryptocurrency plans(Silicon Valley Business Journal) Facebook’s cryptocurrency project, Libra, has an ambitious goal: to offer an alternative financial system that makes it possible to send money around the world with few fees. But almost immediately, the company has run into resistance from lawmakers from both sides of the aisle.
Highlights from Facebook’s Libra Senate hearing(TechCrunch) Facebook will only build its own Calibra cryptocurrency wallet into Messenger and WhatsApp, and will refuse to embed competing wallets, the head of Calibra David Marcus told the Senate Banking Committee today. While some, like Senator Brown, blustered that “Facebook is dangerous!,” othe…
Trump threatens to ‘take a look’ at Google for China ties(Washington Post) Trump’s shot at Google came in a tweet that cited recent comments from Peter Thiel, a venture capitalist and one of the president’s top supporters, who this week called for the FBI and the CIA to probe the company on grounds it may have committed treason for its operations in China.
Ukrainian hacker sought by US arrested(Yahoo) Ukraine has arrested an alleged major computer hacker who has been sought by the United States for years. The head of Ukraine's national security service Ivan Bakanov said Tuesday that Mykhailo Rytikov was arrested in the city of Odessa, in an operation conducted in coordination with Britain and
Bulgarian cybersecurity worker detained over tax agency hack attack(Yahoo) A 20-year-old Bulgarian cybersecurity worker has been arrested on suspicion of involvement in a hacking attack that stole millions of taxpayers' personal and financial data, interior ministry officials said on Wednesday. The man, who works for a company that protects IT systems against breaches,
Siemens unter Peter Löscher, das iranische Atomprogramm & Stuxnet(German Daily News - Amerikas deutschsprachige Zeitung) Der aktuelle Fall einer Bedrohung des Siemens-CEO Joe Kaeser ruft einen Urheberrechtsfall bei der Generalstaatsanwaltschaft Frankfurt am Main ins Gedächtnis: Beschuldiger war ein iranischer Beschaffungsagent – in Bezug zu Siemens-Software.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
EXCHANGE 2-19(New York, New York, USA, October 16 - 17, 2019) BitSight presents EXCHANGE 2019, The Intersection of Business and Cyber Risk, an event for security and risk professionals to navigate the demands of today's dynamic cyber risk landscape. During this two-day...
North American International Cyber Summit(Detroit, Michigan, USA, October 28, 2019) Taking the Lead: Collaborating to Solve National Cyber Security Problems – Building partnerships and balancing competition and information sharing for improved security. The theme is designed to highlight...
Raleigh Cybersecurity Conference(Raleigh, North Carolina, USA, July 18, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
Cybertech Midwest 2019(Indianapolis, Indiana, USA, July 24 - 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...
Smoky Mountain Bigfoot Conference(Gaitlinsburg, Tennessee, USA, July 27, 2019) Join us for the first ever Smoky Mountain Bigfoot Conference. We have some of America's most experienced Bigfoot researchers and investigators including Cliff Barackman, Bigfoot Field Researcher and co-host...
Cyber:Secured Forum 2019(Dallas, Texas, USA, July 29 - 31, 2019) Cyber:Secured Forum delivers two days of in-depth content on cybersecurity trends and best practices related to the delivery of physical security systems and other integrated systems. Collaboratively developed...
Community College Cyber Summit (3CS)(Bossier City, Louisiana, USA, July 30 - August 1, 2019) The 2019 Community College Cyber Summit (3CS) at Bossier Parish Community College in Louisiana marks the sixth annual edition of 3CS. 3CS is the only national academic conference focused on cybersecurity...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.