Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
March 11, 2019.
By the CyberWire staff
Venezuela continues to experience widespread blackouts, Reuters says. President Maduro, the legitimacy of whose government is disputed by the country's National Assembly, has blamed the power outages on US cyberattacks, aided and abetted with sabotage committed by internal wreckers. The opposition blames corruption, incompetence, and deteriorating infrastructure. Most outside observers seem to think the opposition probably has it right. While a cyberattack is a possibility, as an op-ed in Forbes notes, it seems unlikely. The specific allegation, evidence for which Maduro's regime says it intends at some point to refer to the UN, is that US cyber operators induced generator failure at the Guri hydroelectric dam. And the wreckers did it, too.
Citrix disclosed Friday that it had sustained a data breach, probably accomplished through a password-spraying attack. Resecurity thinks the actor was Iran's Iridium group, thought to be a state-sponsored espionage operation. Some six terabytes of business documents were accessed. What those documents contained remains under investigation.
US authorities continue to warn of the threat of both Chinese penetration of infrastructure and of Beijing's attempts at influence operations, the Sydney Morning Herald reports. Much of that concern centers on manufacturer Huawei, currently suing the US Government in Federal court with, as the Washington Post notes, the hearty approval of the Chinese Foreign Ministry. Huawei's smaller rival ZTE, EJ Insight observes, faces similar suspicion, but receives less support from Beijing.
Bloomberg reports that Russian trolling may have turned to amplification of existing memes, the better to evade hunts for inauthenticity.
Earn Your Master’s in Cybersecurity from Georgetown
Looking to advance your cybersecurity career? Check out Georgetown University's graduate program in Cybersecurity Risk Management. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. You'll leave the program with the expertise you need to effectively manage risks and navigate today’s increasingly complex cyber threats. Explore the program.
OSSEC Con2019(Herndon, Virginia, United States, March 20 - 21, 2019) OSSEC Con2019, “The Future of OSSEC: Security and Compliance for Cloud, On-Premise and Hybrid Environments” will take place March 20-21 in Herndon, VA. Join OSSEC users to share best practices and use cases with plenty of peer-to-peer networking.
Could Venezuela's Power Outage Really Be A Cyber Attack?(Forbes) While the reality is that Venezuela’s blackout this week was most likely due to chronic underfunding of its electrical infrastructure and deferred maintenance, the idea of a foreign nation state manipulating an adversary’s power grid to force a governmental transition is very real.
Venezuela's Maduro Says Cyber Attack Prevented Power Restoration(TechBizWeb) Venezuela President Nicolas Maduro claimed on Saturday that a new cyber attack had prevented authorities from restoring power throughout the country following a blackout on Thursday that caused chaos. Maduro told supporters in Caracas that almost 70 percent of power had been restored when “we received at midday another cyber attack at one of the …
New SLUB Backdoor Uses GitHub, Communicates via Slack(TrendLabs Security Intelligence Blog) We discovered a malware that uses three different online services -- including Slack and GitHub-- as part of its routine. Analysis of the attacker's tools, techniques, and procedures lead us to believe that this might be a targeted attack from very capable threat actors.
1 in 5 cyber incidents come from within(MyBusiness) Businesses face a significant cyber threat from within their own ranks, according to a new report, which found that one in five cyber “incidents” and 15 per cent of all data breaches are caused internally.
ZTE remains vulnerable amid Sino-US trade war(EJ Insight) As the Sino-US trade war rages, ZTE Corporation (00763.HK, 000063.CN), China’s second-biggest supplier of telecommunications equipment, remains vulnerable to punishment by the US side and enjoys less protection from Beijing. A ban on buying US components in 2018 forced the firm to close production temporarily and led to a loss of 7.8 billion yuan (US$1.16 billion)…
FireEye empowers security teams with Expertise On Demand(Saudigazette) Further augmenting these technologies with processes and tools is FireEye Helix, which provides SIEM, SOAR, and investigative capabilities in a single security operations platform. Working together, Expertise on Demand, the FireEye email, network and endpoint security solutions, and Helix help organizations apply a comprehensive range of technologies and expertise for the best security posture.
Marriott cyber attack: could it have been prevented? (Strategic Risk Europe) The hotel chain was hit by a significant cyber hack, affecting 500,000 customers, who had sensitive data stolen, including names, addresses, dates of birth and passport numbers. From IT security, due diligence to cyber insurance, risk managers draw out lessons for the future
DARPA takes on cyber defense with hackathons(FCW) Dr. Jennifer Roberts, program manager for the Defense Advanced Research Projects Agency’s information innovation office, talks about what cyber capabilities are in the works.
Cyber Warfare: Competing National Perspectives(Modern Diplomacy) The threat of cyberwarfare is a growing fear among all intelligence communities. “In June 2009 the U.S. Cyber Command was created and in July of 2011 Deputy Secretary of Defense William J. Lynn III announced that as a matter of doctrine, cyberspace will be treated as an operational domain similar to land, air, sea, and […]
New FBI Director, Same Message on Encryption(PCMAG) FBI Director Christopher Wray reiterates that law enforcement should have access to encrypted data, but acknowledges that privacy advocates are not trying to weaken national security.
Hungarian Judge OKs Extradition of Portuguese Hacker(SecurityWeek) A Portuguese man linked to the publication of internal documents that embarrassed top European clubs and soccer officials in the Football Leaks case will be extradited to his home country, a Hungarian court has ruled.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
9th Annual Peak Cyber Symposium(Colorado Springs, Colorado, USA, September 3 - 5, 2019) The Peak Cyber Symposium is designed to further educate Cybersecurity, Information Management, Information Technology and Communications Professionals by providing a platform to explore some of today's...
CyberMaryland 2019(Baltimore, Maryland, USA, December 5 - 6, 2019) The CyberMaryland Conference includes thought leaders from Maryland’s Cyber Security sector and also features nationally recognized speakers and panelists on cyber and technology innovations. Sessions...
National Cyber League Spring Season(Various, February 25 - March 24, 2019) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...
PCI Security Standards Council 2019 India Forum(New Delhi, India, March 13, 2019) You’re invited to a day of networking opportunities and educational sessions as the PCI Security Standards Council holds its first ever India Forum in New Delhi, India. You won’t want to miss our engaging...
Annual Cybersecurity Conference for Executives(Baltimore, Maryland, USA, March 13, 2019) Computer breaches seem to be increasing in frequency and severity around the world, causing the leadership of organizations large and small to assess whether they’re doing enough to protect their data.
SecureWorld Charlotte(Charlotte, North Carolina, USA, March 14, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...
OSSEC Open Source Security Conference(Herndon, Virginia, USA, March 20 - 21, 2019) With tens of thousands of global users, OSSEC is the world’s most widely used open source host-based intrusion detection system. Join this exclusive event on March 20-21, 2019 at the Dulles Hilton in Herndon,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.