Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
June 12, 2019.
By the CyberWire staff
Google services, designed for easy interoperability, are being exploited in a range of social engineering campaigns, Kaspersky has found. The two services in question, Gmail and Google Calendar, have over a billion users worldwide. Attackers are using calendar invitations, which generate a pop-up notification on the recipient's phone, to send a malicious payload embedded in the invitation. Because users are accustomed to trusting the invitations, the pop-up becomes an effective phishing tool. The attacks observed so far send victims to credential-stealing sites, but there’s considerable room for expansion into other scams.
The US signalled a new willingness to undertake offensive operations in cyberspace to counter hostile nation-state economic espionage. The Wall Street Journal reports that National Security Advisor Bolton alluded to the policy shift ("opening the aperture") during annual meetings of the Journal's CFO Network. The Washington Post's quick discussions with security industry leaders found them to be, in general, cautiously in favor of the policy.
AppleInsider reports that Foxconn says it can shift its iPhone-related production out of China, should Sino-American relations deteriorate to a point where continuing to supply Apple from Chinese plants became impossible.
Huawei told the UK's Parliament Monday that the company wasn't bound by Chinese laws requiring cooperation with Beijing's intelligence services, SecurityWeek notes.
Microsoft patched eighty-eight vulnerabilities Tuesday, twenty-one of them classified as critical. Four of the vulnerabilities fixed, BleepingCompter notes, seem to be the ones disclosed by SandboxEscaper. Adobe also patched, as expected, addressing issues in its Flash, Cold Fusion, and Campaign products.
Today's issue includes events affecting China, Ethiopia, Ghana, Israel, Kenya, Nigeria, Russia, Rwanda, Saudi Arabia, Senegal, South Africa, Tanzania, United Arab Emirates, United Kingdom, United States, and Uganda.
Bring your own context.
Cybersecurity is not (not yet, anyway) a highly credentialed field like medicine or law. Suppose you were an English major. Does that mean you have to pursue only those job openings that say "B.A. in English required?" No.
"I'll be perfectly honest with you, speaking from experience, it wasn't always my English degree that got me my job. In fact, it pretty much never was my English degree that got me the job."
—Frank Downs, director of cybersecurity practices at ISACA, offering encouragement to those who might think their degree bars them from the field, in the CyberWire Daily podcast, 6.7.19.
His point is not that your English degree is valueless, but rather that it's not restrictive, and that universities should realize that it's not that tough to give English majors and others a tech arrow in their job-hunting quiver.
Get the In-Depth Guide to Operationalizing Threat Intelligence.
Threat intelligence is critical but often difficult to manage, automate, or operationalize. Threat Intelligence Gateways are an exciting, emerging network security technology that take the heavy lifting out of making threat intelligence actionable, operational, and useful. Learn about how this technology is turning threat intelligence into action to block threats at scale in the whitepaper, Operationalizing Threat Intelligence: An In-Depth Guide to Threat Intelligence Gateways.
And Recorded Future's podcast, produced in partnership with the CyberWire, is up. In this episode, "The Threat Intelligence Value Proposition," the discussion is about how organizations can use threat intelligence to manage risk, keep business leaders informed, and "get the best bang for their cybersecurity buck."
Cyber Security Summits: Seattle on June 25th and in DC on July 16(Seattle, Washington, United States, June 25, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The DOJ, U.S. Secret Service, Verizon, Center for Internet Security, Google and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today: www.CyberSummitUSA.com
RSA Conference 2019 Asia Pacific & Japan(Singapore, Republic of Singapore, July 16 - 18, 2019) Join industry leaders and peers at the region’s leading cybersecurity event. Learn the latest issues and solutions, stay on top of new regulations, demo cutting-edge products, expand your skills and grow your personal network. Register now.
Siemens SCALANCE X(ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 7.1ATTENTION: Low skill level to exploitVendor: SiemensEquipment: SCALANCE X SwitchesVulnerability: Storing Passwords in a Recoverable Format2. RISK EVALUATIONSuccessful exploitation of this vulnerability could allow an attacker to reconstruct passwords for users of the affected devices, if the attacker is able to obtain a backup of the device
DICOM Standard in Medical Devices(ICS-CERT) 1. EXECUTIVE SUMMARYNCCIC is aware of a public report of a vulnerability in the DICOM (Digital Imaging and Communications in Medicine) standard with proof-of-concept (PoC) exploit code. The DICOM standard is the international standard to transmit, store, retrieve, print, process, and display medical imaging information. According to this report, the vulnerability is
Siemens SIMATIC Ident MV420 and MV440 Families(ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 7.1ATTENTION: Exploitable remotely/low skill level to exploitVendor: SiemensEquipment: SIMATIC Ident MV420 and MV440 FamiliesVulnerabilities: Improper Privilege Management, Cleartext Transmission of Sensitive Information2.
Siemens SCALANCE X (Update A)(ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 5.4ATTENTION: Exploitable remotelyVendor: SiemensEquipment: SCALANCE XVulnerability: Expected Behavior Violation2. UPDATE INFORMATIONThis updated advisory is a follow-up to the original advisory titled ICSA-19-085-01 Siemens SCALANCE X that was released March 26, 2019, on the NCCIC/ICS-CERT website.
12 top cloud security threats: The dirty dozen(CSO Online) More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.
Hackers are stealing personal medical data to impersonate your doctor(The Next Web) When it comes to health, prevention is the best cure. Now it’s becoming apparent it is time to extend this philosohphy to medical data as well. While personally identifiable information — full names, social security numbers, home addresses, dates of birth, credit card numbers — can be exploited by criminals to commit identity fraud, the …
Baltimore home sales fall after malware attack(Maryland Daily Record) The number of closed home sales in Baltimore fell last month by nearly 20% from the previous May after a ransomware attack crippled the city’s ability to process sales.
Security Update Guide(Microsoft) The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.
Security Bulletins and Advisories(Adobe Security Bulletins and Advisories) This page contains important information regarding security vulnerabilities that could affect specific versions of Adobe products.
The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types(HackerOne) We’ve put together a list of the most impactful vulnerabilities on the HackerOne platform so you can see where to aim your security efforts and how to better align your security team to today’s biggest risks. Learn which vulnerabilities aren’t in the OWASP Top 10 and see the top vulnerabilities submitted by volume, bounty awards, and more.
What Is the Cybersecurity Tipping Point?(CMSWire.com) Data breaches are our new reality. Cybercrime is a business, its participants are always honing their skills to take advantage of business and consumer data.
Anger at Big Tech unites noodle pullers and code writers(Silicon Valley Business Journal) Oracle and the Handpulled Noodle would seem to have little in common. One is a multibillion-dollar software company in Silicon Valley with tens of thousands of employees all over the world. The other is a small Harlem spot that serves Chinese comfort food and is known for its tasty dumplings.
Nixu carried out an employee share issue directed to its cybersecurity professionals(News Powered by Cision) Nixu Corporation, the European cybersecurity services company, announced on March 27, 2019, the establishment of the All-Employee Matching Share Plan 2019–2021. The plan consists of a directed share issue against payment (Share Issue 1/2019) whereby a maximum of 100,000 new Nixu shares were offered to employees of Nixu and its subsidiaries for a subscription.
Akamai Elects Madhu Ranganathan to Board of Directors(Yahoo) Akamai Technologies Inc., (AKAM), the intelligent edge platform for securing and delivering digital experiences, today announced the election of Madhu Ranganathan to fill a vacancy on the Akamai Board of Directors effective June 7, 2019. For the past 25
Help NINJO celebrate our four-year anniversary, give the gift of security awareness(NINJIO) IBM reports that anywhere from 70 to 90 percent of breaches are caused by human error, not merely technological glitches. According to Accenture, there has been a 67 percent increase in security breaches over the past five years. A recent Global Information Security Survey says that more than one-third of organizations say careless employees are their biggest security risk.
The Economic Value of DNS Security(Global Cyber Alliance) The Domain Name System (DNS) is a critical component of the Internet. It serves as a translator between the human-recognizable domain names and machine-recognizable locations on the Internet. When DNS is used as a security measure, aka DNS firewall, the benefits can be significant.
Eliminating Excessive Permissions(Radware Blog) Excessive permissions are the #1 threat to workloads hosted on the public cloud. Eliminating them is critical to an organization's security.
To detect fake news, this AI first learned to write it(TechCrunch) One of the biggest problems in media today is so-called "fake news," which is so highly pernicious in part because it superficially resembles the real thing. AI tools promise to help identify it, but in order for it to do so, researchers have found that the best way is for that AI to learn to creat…
Tech takes stage in Cyber FastTrack program(Overton County News) Tennessee Tech students play the serious game of cybersecurity at a national level, ranking in the top 25 in the nation out of more than 1,200 in a recent competition.
IBM brings its Quantum computer program to 16 African universities(TechCrunch) IBM launched its Quantum computer program in Africa today, announcing a partnership with South Africa’s Wits University that will extend to 15 additional universities across 9 countries. Quantum—or IBM Q, as the U.S. based company calls it—is a computer that uses quantum bits (or qubits) to top the…
Huawei Denies Being Bound by Chinese Spy Laws(SecurityWeek) Huawei's cyber security chief told the UK parliament Monday that the Chinese telecoms giant has been advised it was under no obligation to spy for Beijing if so asked by the Communist state.
Bolton Says U.S. Is Expanding Offensive Cyber Operations(Wall Street Journal) The U.S. intends to expand offensive cyberoperations to counter digital economic espionage and other commercial hacks, White House national security adviser John Bolton said at The Wall Street Journal’s CFO Network annual meeting.
McConnell: Senate will hold election security briefing(TheHill) Majority Leader Mitch McConnell (R-Ky.) on Tuesday said that the Senate will have an election security briefing in the wake of special counsel Robert Mueller's report on Russian meddling in the 2016 election.
Electric Grid Security Unites Public and Private Sectors(Government Technology) These agencies must converge to develop solutions for an electric grid that is vulnerable to cyber- and physical attacks that continue to evolve, and present moving targets created by sophisticated, motivated actors.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
International Cyber Risk Management Conference(Bermuda, December 4 - 6, 2019) The International Cyber Risk Management Conference (ICRMC) provides delegates with an essential forum to learn from experts, network and share experiences with peers and colleagues, and get the answers...
Cybertech Midwest 2019(Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...
NetDiligence® Cyber Risk Summit(Philadelphia, Pennsylvania, USA, June 12 - 14, 2019) The NetDiligence® Cyber Risk Summit in Philadelphia is attended by more than 600 cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event,...
SecureWorld Chicago(Chicago, Illinois, USA, June 13, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...
Baltimore Cybersecurity Conference(Baltimore, Maryland, USA, June 13, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
SINET Innovation Summit 2019(New York, New York, USA, June 13, 2019) SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration on security initiatives.
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.