skip navigation

More signal. Less noise.

How to Build a Security Operations Center (SOC) on a Budget

Get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. Get all 5 Chapters in 1 eBook. Download your free copy now.

Daily briefing.

SecurityWeek's 2019 ICS Cyber Security Conference

The conference program this morning took up the difficulties of "blindness" with respect to both programs and supply chains. Eric Byres, CEO of aDolus, offered a moderately encouraging view of the challenges of developing a software bill of materials suitable for securing the supply chain. Robert Dyson, Global OT Security Services Business Leader at IBM, delivered a plea for attention to detail in the OT space, and for applying the security lessons learned in IT environments to control systems.

Our coverage of SecurityWeek's 2019 ICS Cyber Security Conference will continue through the week. An account of a fireside chat with Admiral (retired) Rogers, former Director, US National Security Agency, is available here.

Malwarebytes reports on the relationship between Magecart (specifically Magecart Group 5), the Dridex banking Trojan, and the Carbanak crime gang that seems to be behind both of them. Magecart Group 5 represents an advance in sophistication over its predecessors in that it compromises third-party suppliers the better to propagate itself downstream.

VPNMentor discovered data exposed by Best Western's recently-acquired Autoclerk reservation system. US Government personnel travel itineraries were among the information open to inspection.

Pradeo warns that it's found Joker malware in another app that's been offered in Google Play. The app in question is Int App Lock, which is intended to enable users to lock certain data behind a PIN.

The UK's National Cyber Security Centre (NCSC), a GCHQ unit, has released its 2019 Annual Report. The NCSC says it handled six-hundred-fifty-eight cyber incidents over the past twelve months. The most attackers sectors were, in order, government, universities, technology companies, and managed service providers, with healthcare and transportation sharing fifth place in a dead heat. The report's tone is modestly proud and customer-friendly, featuring easily grasped case studies in the explanatory framework it offers.

Fan of celebrity news? McAfee offers its annual study of the most dangerous celebrities to search online, the ones for whom search results are likeliest to send the curious to malicious sites. This year the shiniest lure in the hackers' tackle box is Alexis Bledel, formerly of the Gilmore Girls, now of the Handmaid's Tale. Stick to the tabloids in the supermarket checkout line, fans.

Notes.

Today's issue includes events affecting China, Denmark, Japan, Nigeria, Norway, Sweden, United Kingdom, United States.

Bring your own context.

If the data are anomymized, then no big privacy deal, right? Not necessarily.

"It's fairly trivial to reidentify people from an anonymized data set. First off, let's explain why we have these things called anonymized data sets, particularly in the field of health care. A lot of times, we need these data sets in order to perform research, right? But there are regulations. There are HIPAA regulations, and there might be some internal IRB regulations that say if you're going to store this kind of information, you have to store it in an anonymized fashion. Which means that all of the personal identifiable information has been stripped from the data set and replaced with tokens. But there is some information that can't be stripped because it's important to the research, and those things happen to be demographic pointers, like your age, your gender, whatever."

—Joe Carrigan, from the Johns Hopkins University Information Security Institute, on the CyberWire Daily Podcast, 10.21.19.

The data aren't collected for frivolous reasons, but it's possible to put enough of them together to build up an identity.

Zero-Trust in the Modern Workplace

The modern workplace is infiltrated everyday — bring your own device policies and increased vendor access have introduced a whole new layer of cyber risk to the office environment. Since no vendor or customer should be automatically trusted, Zero-Trust frameworks have become more prevalent. How can organizations best protect themselves and their networks? Join LookingGlass’ Eric Olson & James Carnall for a webinar discussing best practices and war stories at 1 pm ET October 31, 2019.

In today's Daily Podcast, out later this afternoon, we hear from our partners at the University of Maryland's Center for Health and Homeland Security, as Ben Yelin discusses a federal injunction against a company's scraping user profiles from LinkedIn. Our guest is Mandy Rogers from Northrop Grumman, describing her own professional journey and the importance of diversity.

And Recorded Future's latest podcast, produced in partnership with the CyberWire, is also up. In this episode, "Strategy and Focus Protect New York City," the guest this week is Quiessence Phillips, deputy CISO and head of threat management for New York City Cyber Command. She’s one of the leaders of a team of cybersecurity professionals working to strengthen and coordinate the cyber defenses of one of the largest and most important cities in the world.

Georgetown University Programs in Cybersecurity Webinar (Online, October 29, 2019) We invite you to learn more about the Master's and Graduate Certificate in Cybersecurity Risk Management at Georgetown University. Our programs prepare you with hands-on practice developing and executing integrated strategies, policies, and safeguards to manage cybersecurity risks across an enterprise. Register for a free webinar on October 29 at noon ET to learn more.

IMAGINE, A MISI salon-style bespoke dinner event (Columbia, Maryland, United States, November 1, 2019) IMAGINE a world where more young women can see themselves in the faces of the legendary women of science & technology – and say, "Yes I can!" The event on November 1 is a fundraiser in support of the region's unique and inclusive STEM program and will be held at the DreamPort Facility in Columbia Maryland. While its focus is on the under-represented young women, young men are also included in MISI's STEM programs.

Cyber Security Summits: November 6 in Boston and November 21 in Houston (Boston, Massachusetts, United States, November 6, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Google, IBM, Verizon, Center for Internet Security and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Your full day’s attendance will earn you 6 CEUs. Passes are limited, secure yours today: www.CyberSummitUSA.com

NXTWORK 2019 (Las Vegas, Nevada, United States, November 11 - 13, 2019) Join us at NXTWORK 2019 to learn, share, and collaborate with GameChangers from companies across the networking industry. This year’s event features keynotes from Juniper executives, as well as special guest speaker Earvin “Magic” Johnson, along with 40+ breakouts and master classes led by Distinguished Engineers, as well as various opportunities for certification testing and training.

Dateline SecurityWeek's 2019 ICS Cyber Security Conference

Risk management, cyber operations, and the Westphalian system (The CyberWire) Understanding the opposition's strategy is essential to sound risk management.

Outdated OSs Still Present in Many Industrial Organizations: Report (SecurityWeek) Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations

How to reduce the risk posed by vulnerabilities in IoT/ICS networks? (Help Net Security) New CyberX analysis of real-world network traffic reveals alarming prevalence of IoT and industrial control system (ICS) vulnerabilities.

New Analysis of Real-World Network Traffic Reveals Alarming Prevalence of IoT and Industrial Control System Vulnerabilities (CyberX) “2020 Global IoT/ICS Risk Report” illustrates why organizations are susceptible to costly downtime, catastrophic safety incidents and theft of sensitive intellectual property

Forescout Joins Global Cyber Security Alliance for Operational Technology (Forescout) New Cyber Security Alliance will develop comprehensive cyber security guidelines for operational technology infrastructure SAN JOSE, Calif., October 22, 2019 – Forescout Technologies, Inc. (NASDAQ: FSCT), the leader in device visibility and control, today announced that it has joined a new alliance to provide a technical and organizational framework for safe and secure operational technology …

Gerry Cauley, Head of Strategy at Siemens, is Creating a New Program to Perform NERC Compliance for Power Plants (Yahoo) Gerry Cauley is the Principal Consultant and Head of Strategy and Planning Practice at Siemens Energy Business Advisory in Fairfax, VA. Cauley's team works tirelessly to anticipate extreme risk events that threaten to hinder energy companies and shares

Cyber Attacks, Threats, and Vulnerabilities

Just say the 'magic password': Boffins turn up potential backdoor in SQL Server 2012, 2014 (Register) Admin rights needed to fire up the malware and – hey presto!

The Pradeo Lab identifies another app with Joker malware on Google Play (Pradeo) Joker is a malware that silently exfiltrates data and subscribes users to unwanted premium subscription. The malware was found in 24 apps on Google Play.

New Variant of Gustuff Android Banking Trojan Emerges (SecurityWeek) Recent Gustuff Android banking Trojan campaigns featured an updated malware version.

Attackers improving BEC skills (SC Magazine) Business email compromise or impersonation attacks overall rises 25 percent during the second quarter of 2019

Supply Chain Impersonation: Just Another Tool in a Threat Actor’s Bag (FireEye) Many companies are experiencing supply chain impersonation attacks that involve their vendors being spoofed.

New Winnti Backdoor Targets Microsoft SQL (SecurityWeek) A recently identified backdoor used by the China-linked Winnti hackers and which targets Microsoft SQL (MSSQL) is very stealthy.

Historical Breadcrumbs Link Magecart 5 to Carbanak Group (SecurityWeek) Malwarebytes has found sufficient evidence to suggest that Magecart 5 is really the APT group known as Carbanak

Magecart group linked to Dridex banking Trojan, Carbanak (ZDNet) Domain tracking has led to connections between different cyberattack campaigns.

'Sensitive US Army data 'exposed online' (BBC News) Hotel room numbers, phone numbers and names were left exposed on an unencrypted server, researchers say.

Autoclerk leak exposing US military “should never have been possible” (Verdict) A vast leak of a database belonging to reservations management system Autoclerk has been condemned by the cybersecurity industry.

Here's what the NordVPN hack means (Tech Advisor) With news of a serious security breach on one of its severs, you’d be forgiven for wondering whether NordVPN is safe to use. We explain what you need to know.

Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint Reader (BleepingComputer) At least three banks operating in the UK have decided to temporarily suspend their mobile banking services for Samsung Galaxy S10 users.

Malicious Apps on Alexa or Google Home Can Spy or Steal Passwords (BleepingComputer) Google and Amazon smart speakers can be leveraged to record user conversation or to phish for passwords through malicious voice apps, security researchers warn.

Configuration mistakes that provide field days for hackers (AME Info) Common security mistakes and overlooked misconfigurations can open the door for malware or attackers, potentially leaving your environment and any exposed data ripe for the picking

SafeBreach discloses vulnerabilities in Avast, AVG, Avira (The Parallax) Exploiting newly-revealed vulnerabilities in popular antivirus programs Avast, AVG, and Avira requires a hacker to have administrator privileges.

UC Browser Android Users are Vulnerable to Man-in-the-Middle Attacks (CISO MAG) Security experts found unusual activities in UC Browser for Android exposing more than 500 million users to Man-in-the-Middle attacks.

Schneider Electric ProClima (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Schneider Electric Equipment: Proclima Vulnerabilities: Code Injection, Improper Restriction of Operations within the Bounds of a Memory Buffer, Uncontrolled Search Path Element 2.

Vulnerability Summary for the Week of October 14, 2019 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

Billing Provider Billtrust Suffers Outage After Malware Attack (BleepingComputer) U.S. financial services provider Billtrust experienced an outage affecting all of its services after some of the company's computing systems were impacted by a malware attack on October 17.

What I learned by chatting with Chinese robocallers (Marketplace) Those Chinese-language phone scams are on the rise again.

Pay and the Ransomware May Not Go Away, Warns Databarracks (Fintech Times) Earlier last week, US shipping tech firm, Pitney Bowes, was hit with a ransomware attack that encrypted information on its systems. While it is reported

'Your whole business is basically gone': Gillian Franklin hit by $2 million cyber attack (The Sydney Morning Herald) The Heat Group's founder logged on from London to discover all her online documents and files were missing and were replaced by a ransom note demanding payment of the equivalent of $40,000 in Bitcoin.

A terrifying 650 cyber attacks designed to wreak havoc across Britain thwarted last year (Express.co.uk) More than 650 cyber plots designed to wreak havoc across the country were foiled last year, the intelligence services have revealed. Hostile foreign states, criminals and activists were behind attempts to crash vital public services, businesses and university systems.

Email scams target UNL students (The Daily Nebraskan) Students at the University of Nebraska-Lincoln have been targets of recent scam emails.

Security Patches, Mitigations, and Software Updates

Firefox 70 arrives with social tracking blocked by default, privacy report, and performance gains on macOS (VentureBeat) Mozilla today launched Firefox 70 with social tracking protection, a Privacy Protections report, new Lockwise features, and performance improvements.

Cyber Trends

SonicWall: Encrypted Attacks, IoT Malware Surge as Global Malware Volume Dips (SonicWall) Exclusive cyber threat intellignce through the first three quarters of 2019. Only from SonicWall.

Ransomware Attacks Map (StateScoop) Innovative Digital Reference Tool Provides Up-to-Date View of Ransomware Attacks Against State and Local Governments, K-12 Districts, Higher Education Institutions in the U.S.

Perceptions on the impact of data breaches and identity protection (Help Net Security) 4iQ recently completed research focusing on Americans’ attitudes about cybersecurity breaches and the efforts that organizations make to mitigate

The Internet and the Third Estate (Stratechery by Ben Thompson) Mark Zuckerberg suggested that social media is a “Fifth Estate”; in fact, social media is a means by which the Third Estate — commoners — can seize political power. Here history matters…

Cyber Security Connect UK Advice British Businesses To Enhance Their Protection Against Cyberattacks (Security Informed) British businesses should drastically up their game when it comes to being prepared and able to effectively deal with cyberattacks, according to Cyber Security Connect UK (CSC UK), the industry forum...

Cybersecurity: Hostile nations responsible for 'significant' number of attacks against UK organisations (ZDNet) The NCSC annual report reveals the number of incidents it has had to help organisations deal with in the past 12 months - and points to nation-state hackers as a major source.

U.K. Repelled 600 Cyber Attacks This Year, Many From Overseas (Bloomberg) Government, universities among sectors most at risk: NCSC. Most-hacked passwords include Liverpool, Superman, 123456

NTT Report Finds Digital Natives Don’t Prioritize Cybersecurity (Valdosta Daily Times) In today’s multigenerational workforce, professionals over the age of 30 are more likely to adopt cybersecurity best practices than their younger colleagues who have grown up with technology.

Cyber threats in rail industry to worsen, warn experts (The Straits Times) Cyber security threats to rail operations are a pressing issue that will get more serious, a panel of experts said yesterday.. Read more at straitstimes.com.

Marketplace

When Espionage Skills Are for Sale, So Is Your Security (Stratfor) Everything has a price. And increasingly that includes world-class tools and capabilities on par with top intelligence agencies, changing how we understand and protect against corporate espionage threats.

ZTE calls for joint effort on security (Mobile World Live) LIVE FROM ZTE WIRELESS USER CONGRESS AND 5G SUMMIT 2019, VIENNA: A ZTE executive tackled ...

ZTE gets ready for 5G security assessments in Brussels’ lab: executive (RCR Wireless News) ZTE’s labs in China, Belgium, and Italy allow local and remote source code review and security design review of 5G products

Hacker contest planned to locate defenders of cyberspace (The Asahi Shimbun) The Defense Ministry will hold its first hacking competition next fiscal year to find experts who ca

McAfee lays off 100 in Hillsboro (Portland Business Journal) The company has an office of more than 300.

Sumo Logic In Talks To Acquire Cybersecurity Startup JASK: Sources (CRN) Data analytics vendor Sumo Logic is in negotiations with JASK about purchasing the four-year-old cybersecurity startup, according to multiple sources familiar with the situation.

Splunk Buys Another Startup, Launches Mission Control (SDxCentral) Splunk bought another startup, announced a security platform called Mission Control, and new capabilities in its Data-to-Everything Platform.

What Rich McBee’s Move to Riverbed Means for SD-WAN (Insight for the Connected Enterprise) As Rich McBee assumes the role of Riverbed CEO, what acquisitions might he have on his mind?

KnowBe4 Africa expands continental reach thanks to Cyber Security Africa partnership (IT News Africa) Security awareness training company, KnowBe4 Africa announced on Monday, 21 October 2019, that has chosen Cyber Security Africa as its African distributor. The

Former Gov. McAuliffe Joins Hunton Andrews Kurth Industries (Virginia Business) Former Virginia Gov. Terry McAuliffe has joined Hunton Andrews Kurth LLP, Virginia's second-largest law firm, as the global strategy advisor for the Centre for Information Policy Leadership (CIPL), the firm's Washington, D.C.-based global privacy and cybersecurity think tank.

Marvell CFO Jean Hu Joins Fortinet Board of Directors (Yahoo) Ken Xie, CEO, founder and Chairman of the Board at Fortinet“We are pleased to have Jean join the Fortinet Board of Directors. With the.

New Claroty CEO Thorsten Freitag To Drive IT, OT Security Convergence (CRN) Rising industrial cybersecurity star Claroty has snagged industry veteran Thorsten Freitag to help organizations better close the gap between IT and OT responsibilities in security.

Former Deputy Director of the National Security Agency Chris Inglis Joins the RangeForce Advisory Board (PR Newswire) Chris Inglis, the former Deputy Director and senior civilian leader of the National Security Agency, has joined...

The Washington Post’s New Columnist Consults for Spyware Firm That Helps Saudi Arabia Surveil Journalists (Vice) The new Washington Post columnist consults for NSO Group, which is currently being sued for helping Saudi Arabia surveil Washington Post columnist Jamal Khashoggi, who was murdered.

Products, Services, and Solutions

Persistent File Protection for Gmail - Secure File Sharing from Virtru (Virtru) Virtru’s Persistent File Protection for Gmail enables private, compliant sharing of attachments beyond Gmail to desktops, Google Drive, shared network folders, and other cloud platforms—while maintaining control and visibility.

Lynx Technology Partners Receives Ivanti One Certification for Lynx Risk Manager (Ivanti) Through Certified Integration with Ivanti Service Manager, Lynx Risk Manager Simplifies and Automates Integrated Risk Management Processes

Cynet’s free vulnerability assessment offering helps organizations significantly increase their security (Threatpost) By monitoring their environment, companies can be ready to take action if any weakness – usually a software vulnerability – is found.

Bugcrowd launches Attack Surface Management platform (SearchSecurity) Bugcrowd introduced Attack Surface Management, an asset discovery and prioritization tool aimed to secure legacy and shadow IT resources by identifying and prioritizing unknown assets.

Nok Nok Labs First to Provide FIDO-Based Authentication for Smart Watches (Yahoo) Strong, FIDO-based authentication now available across all digital channels - Mobile Apps, Mobile Web, Desktop Web and Smart Watch

Splunk Mission Control Takes Off (Dark Reading) New Splunk Security Solutions Help the SOC Turn Data into Business Outcomes

Silverfort Joins the Microsoft Intelligent Security Association (BusinessWire) Silverfort, the provider of agentless authentication and Zero-Trust security solutions, announced today that it has joined the Microsoft Intelligent S

Coalfire Achieves Amazon Web Services Security Competency Status (PR Newswire) Coalfire, a provider of cybersecurity advisory and assessment services, announced today that it attained the...

Adobe intros new commerce tools for SMB, mid-market merchants (ZDNet) Key updates include the launch of an Amazon sales channel in Magento for Europe and a new multi-cloud infrastructure offering with Microsoft.

GlobalPlatform Launches Comprehensive Approach to IoT Cybersecurity Implementation - GlobalPlatform (GlobalPlatform) Building on GlobalPlatform’s previous work to secure the IoT, IoTopia proposes a common framework for standardizing the design, certification, deployment and management of IoT devices

Escalated Makes On-Demand Ad Fraud Solution Available to the Wider Market (PR Newswire) Escalated (www.escalated.io) offers real-time ad fraud protection from bots, invalid traffic, and other types of...

Technologies, Techniques, and Standards

Why organizations must arm their SOCs for the future (Help Net Security) SOC operations today are primarily reactive in nature, and the most work that organizations proactively do is patch their systems at some cadence.

How Does a Spy Operate? By Circumventing Your Facility Security (ClearanceJobs) ClearanceJobs is your best resource for news and information on security-cleared jobs and professionals. Learn more with our article, "How Does a Spy Operate? By Circumventing Your Facility Security ".

‘Don’t leave campus’: Parents are now using tracking apps to watch their kids at college (Washington Post) As Gen Z grows up and goes to college, some parents are using technology to keep a close watch

Understanding How Your Networked Enterprise Behaves Under a Cyber Attack (JSA - Jaymie Scotto & Associates) What are Cyber Attacks? A cyber attack is a deliberate attempt, using malicious software, to degrade or disable the target network’s operations or to steal or corrupt sensitive data. No organization is safe from cyber attacks on its infrastructure. Former Cisco CEO John Chambers once said, “There are two types of companies: those that have been …

What the Army learned about multidomain operations at Cyber Blitz (C4ISRNET) The Army's Cyber Blitz experiment sought to test capabilities and concepts of the new I2CEWS detachment.

US nuclear weapons command finally ditches 8-inch floppies (Naked Security) The disks are part of the command centres that run the country’s nuclear missile deterrent on behalf of SACCS.

Design and Innovation

Beware of using AI to automate bad assumptions (Computing) Our previous report explored...

A face-scanning algorithm increasingly decides whether you deserve the job (Washington Post) HireVue claims it uses artificial intelligence to decide who’s best for a job. Outside experts call it “profoundly disturbing.”

Facebook's Plan for 2020 Is Too Little, Too Late, Critics Say (Wired) The social media company says it will more closely monitor foreign outlets, and warn users when posts are considered false—unless they're from politicians.

It's Time to Outsource Your Passwords to an App (Wired) Your brain has better things to do than store secure passwords. Get a dedicated password manager to keep your login data synced and secure across all devices.

Amazon joins Facebook and Microsoft to fight deepfakes (The Next Web) Deepfakes have come across as serious problems this year and big companies are now paying attention. Amazon announced today it’s joining the DeepFake Detection challenge (DFDC) driven by major corporations such as Facebook and Microsoft to boost efforts to identify manipulated content. The company is going to contribute $1 million in AWS credits over the …

CISO/Thought Leader Napkin Sketch Challenge (LinkedIn) Sometimes the best ideas come from sketches done on cocktail napkins. I’ve been in the cyber security industry for several years and have been searching for a meaningful, comprehensive (and usable) depiction of the architecture desired by thought leaders in the CISO world.

Research and Development

IBM disputes Google claims of 'quantum supremacy' (Computing) IBM accuses Google of over-hyping its quantum computing claims

Academia

Southern University launches first Cyber security course at an HBCU (US Black Engineer) A new project at Southern University will 'create the first cybersecurity spine in an engineering program at a historically black college or university while training students in an area of critical need.'

World’s top student hackers dust off their white hats for NYU CSAW finals (StreetInsider.com) BROOKLYN, New York, Tuesday, October 22, 2019 - After besting 1,225 teams from 90 countries, an elite corps of high school, college, and graduate students will advance to the finals of...

Legislation, Policy, and Regulation

China Sharpens Hacking to Hound Its Minorities, Far and Wide (New York Times) New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.

Trade tensions, jibes at U.S. overshadow Chinese cyber conference (Reuters) At one of the world's showpiece tech conferences in China, jibes at the Uni...

Nordic governments open to Huawei’s ‘no spy’ offer (ComputerWeekly.com) Chinese tech giant seeks to reassure Nordic governments over security concerns in 5G contracts.

Election security hearing breaks along stark partisan lines (Federal News Network) A congressional hearing on election security is breaking along stark political lines, with Republicans focusing on what they say is political bias within the FBI and ‘partisan ambitions to impeach the…

Senate Republicans block two election security bills (TheHill) Senate Republicans on Tuesday blocked legislation that would provide funding for states to shore up election security and create more transparency around online advertisements.

Democrats offer cybersecurity bill for 'internet of things' (TheHill) Democratic lawmakers in the House and Senate on Tuesday introduced legislation to increase the security of internet-connected devices.

Congress could require Facebook to build more open APIs under new bill (The Verge) Mark Zuckerberg wants his own apps to be interoperable, but not like this.

Why did Cyber Command back off its recent plans to call out North Korean hacking? (CyberScoop) U.S. Cyber Command was on the verge of publicly calling out North Korean hackers in late September, but ultimately backed off the plan by early October.

Cyber Defense Correlation Cell for Space stands up (DVIDS) The Cyber Defense Correlation Cell for Space stood up Oct. 18 at Schriever Air Force Base, Colorado, and will operate at the enterprise level by detecting and responding to cyber threats against Air Force Space Command mission systems.

Army Guard announces stationing of new cyber battalion (US Army) The director of the Army National Guard, Lt. Gen. Daniel R. Hokanson, announced today the stationing of the newly formed 127th Cyber Battalion in Indianapolis.

Litigation, Investigation, and Law Enforcement

Nigerian military targeted journalists’ phones, computers with “forensic search” for sources (Committee to Protect Journalists) Hamza Idris, an editor with the Nigerian Daily Trust, was at the newspaper’s central office on January 6 when the military arrived looking for him. Soldiers with AK47s walked between the newsroom desks repeating his name, he told CPJ. It was the second raid on the paper that day;...

In a First, FTC Bans Company From Selling ‘Stalkerware’ (Vice) The FTC’s move comes after Motherboard revealed a hacker had repeatedly breached Retina-X and gained access to sensitive user data.

Forty-six attorneys general have joined a New York-led antitrust investigation of Facebook (Washington Post) Forty-six attorneys general have joined a New York-led antitrust investigation of Facebook, the states announced Tuesday, commencing a high-stakes, sweeping bipartisan probe of the tech giant.

Analysis | The Cybersecurity 202: Some House Republicans also think the DNC server is in Ukraine (Washington Post) Trump defenders focused on the conspiracy theory in an elections security hearing

Targeted online messaging dissuading young gamers from getting involved in cybercrime (Help Net Security) Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Suits & Spooks, 10th Anniversary: Taking Ownership of the Future of our Security (Washington, DC, USA, February 6 - 7, 2020) Suits & Spooks DC is the only international security summit where the attendees and speakers engage in discussion and debate of cyber/physical security challenges over the course of two days. World-class...

Upcoming Events

Industrial Control Systems (ICS) Cyber Security Conference (Atlanta, Georgia, USA, October 21 - 24, 2019) SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze...

PCI SSC 2019 Europe Community Meeting (Dublin, Ireland, October 22 - 24, 2019) The PCI Security Standards Council’s 2019 Europe Community Meeting is the place to be. We will provide you with the information and tools to help secure payment data. We lead a global, cross-industry effort...

Omaha Cybersecurity Conference (Omaha, Nebraska, USA, October 24, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Florida Cyber Conference 2019 (Tampa, Florida, USA, October 24 - 25, 2019) Join hundreds of stakeholders from Florida's cybersecurity community and beyond for innovative content, in-depth discussion, hands-on demos, networking, and more! With more than 20 breakout sessions across...

National Security Leaders Symposium (Naples, Florida, USA, October 27 - 29, 2019) If there is anything that unifies CISOs, change is the one constant. For 2019, the focus is on the rapid evolution of the security industry, the rising tide of visibility on security organizations, and...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.