Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Are you attending RSA Conference 2020 in San Francisco February 24–28? Don't forget to stop by Booth 743 to meet the Recorded Future team in person and pick up a free copy of their new book, "The Threat Intelligence Handbook."
February 11, 2020.
By the CyberWire staff
The US yesterday revealed the indictment of four members of China’s People’s Liberation Army for “conspiracy to hack and commit economic espionage” in the 2017 data breach at Equifax. Wu Shiyong, Wang Qian, Xu Ke, and Liu Lei are accused of nine charges: computer fraud conspiracy, computer fraud and abuse (intentional damage), computer fraud and abuse (unauthorized access), conspiracy to commit economic espionage, economic espionage, conspiracy to commit wire fraud, and three separate counts of wire fraud. WIRED offers a summary of how the Government says the PLA operators succeeded in hacking Equifax.
Also yesterday the US released its National Counterintelligence Strategy. The document lays out a case, described in the Wall Street Journal, that the intelligence threats the US faces have grown more diverse, more complex, and more damaging, especially as they merge traditional intelligence disciplines with cyber operations and as they show an increased disposition to engage in economic espionage.
The Jerusalem Post reports that the data leaked from a voter database app used by the Likud Party may have compromised information on Israeli intelligence officials.
According to ZDNet, the US FBI has circulated a private warning to industry cautioning companies that threat actors are working to infect software supply chains with the Kwampirs remote access Trojan.
The US state of New Hampshire conducts its presidential primary today, and CISA distributed an encouraging email praising successful threat information and reminding everyone that “The accuracy of the vote total is much more important than the timeliness of releasing results.”
Today's issue includes events affecting China, Denmark, Germany, Iran, Ireland, Israel, Russia, United Kingdom, United States.
Bring your own context.
Ransomware's new normal.
"Well, you know, the challenge here when we talk about a ransomware incident is, first of all, remember; if the data can get ransomed, it can just as easily get stolen or extorted. And we're starting to see instances where when a hospital doesn't pay the ransom, the bad guys may try to extort them for the data. So, you know, you have both the privacy concern as well as the impact of getting locked up."
—Caleb Barlow, CEO at CynergisTek, on the CyberWire Daily Podcast, 2.6.20.
Consider a ransomware incident as now being, probably, a breach as well.
Coming soon: CyberWire Pro.
Our new subscription program, CyberWire Pro, will be available soon. Designed for cyber security professionals and others who want to stay abreast of our rapidly evolving industry, CyberWire Pro is a premium news service that will save you time and keep you informed. Learn more and sign up to get launch updates here.
Georgetown University Part-Time Master's in Cybersecurity Risk Management
Looking to advance your cybersecurity career? Check out Georgetown University's graduate program in Cybersecurity Risk Management. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. You'll leave the program with the expertise you need to effectively manage risks and navigate today’s increasingly complex cyber threats. Learn more.
And Recorded Future's threat intelligence podcast, produced in partnership with the CyberWire, is also up. In this episode, "Understanding Russia’s Global Online Influence," Their guest is Oscar Jonsson. He’s the director of the Stockholm Free World Forum, a Swedish foreign and security policy think tank, and an associated researcher at the Swedish Defense University. Previously, Oscar was a subject-matter expert at the Policy and Plans Department at the Swedish Armed Forces Headquarters. Their conversation focuses on his recent book, “The Russian Understanding of War: Blurring the Lines Between War and Peace.” In it, he tracks the history of Russian tactics and strategies, and explores how Russia sees itself in the online global community.
CyCon 3.0(Sterling, Virginia, USA, February 15, 2020) Join us at this upcoming cybersecurity event in Loudoun, VA with a full lineup of industry experts, speakers and federal contractors presenting on cutting-edge topics in the domain of cyber. This event is FREE for everyone! Register today!
Industrial Control Systems are Everywhere Hands-On Demonstration(Online, February 18, 2020) Join Dragos at their Feb. 18 ICS Range demonstration to see real control systems, learn about ICS adversaries and hear how to protect your networks. Tom VanNorman, Dragos Director of Engineering Services and co-founder of the ICS Village, walks you through this realistic range and shares his inspiration for developing it.
The Human Hacking Conference(Orlando, Florida, USA, February 20 - 22, 2020) The Human Hacking Conference is an all-encompassing event that teaches business, security, technology, and psychology professionals the latest expert techniques in human deception, body language analysis, cognitive agility, intelligence research, and security best practices.
RSAC 2020(San Francisco, California, United States, February 24 - 28, 2020) Connect to the people and ideas that matter. To your growth. To your organization. At RSAC 2020, February 24 – 28, explore current and emerging trends, gain valuable skills and network with peers. Register today!
CyberCon 2020(Anaheim, California, USA, March 30 - April 1, 2020) The CyberCon Industrial Cybersecurity CISO Summit & Workforce Development Conference is a solutions-based cybersecurity conference promoting networking, collaboration and sharing of solutions between cybersecurity experts and leaders in power and utility companies. Gain unprecedented access to over 40 innovative speakers covering a range of pressing cybersecurity topics and an expo featuring 100+ cybersecurity technology providers showcasing innovative solutions. A “Workforce Development Forum” will provide strategies companies need to recruit, train and retain top cybersecurity talent.
The U.S. Is Vulnerable to an Iranian Cyberattack. Here's How.(Wall Street Journal) U.S. tensions with Iran have escalated after the assassination of Gen. Qassem Soleimani, and experts are worried about retaliatory cyberattacks. Cybersecurity expert John Hultquist and WSJ's Dustin Volz discuss what new tactics hackers have at their disposal and whether the U.S. is prepared to defend itself. Photo illustration: Alexandra Cardinale.
How Big Companies Spy on Your Emails(Vice) Multiple confidential documents obtained by Motherboard show the sort of companies that want to buy data derived from scraping the contents of your email inbox.
North Miami Beach Police Department Hit With Ransomware Attack(NBC 6 South Florida) The North Miami Beach Police Department was hit with a ransomware attack and is now being told to pay millions to regain access to information it stored online. The department said in a statement Friday that it was impacted by ransomware earlier that week and contacted the FBI, Secret Service and the Miami-Dade Police Department to investigate. “The most important…
LPSO Fends Off Cyber Attack(News15 | Lafayette, LA) The Lafayette Parish Sheriff’s Office has confirmed that its IT department successfully defended the agency against a recent attempted cyber attack. Lt. John Mowell, the LPSO’s public information officer, tells News15 the attempted attack triggered security measures already in place following a successful cyber attack against the department in 2017. “It’s not a big deal …
2019 Year End Data Breach QuickView Report(Risk Based Security) Our QuickView Report is sourced from our product Cyber Risk Analytics® and has garnered media attention from publications such as Forbes and USA Today.
10 Hot Cybersecurity Topics at RSA Conference 2020(BankInfo Security) Which cybersecurity topics are hot? One topical answer to that question comes via the upcoming RSA Conference 2020. Organizers say they received 2,400 responses to their call for speakers, and they've have highlighted 10 predominant themes, including secure design, frameworks, privacy and the human element.
2020 MD Cybersecurity Buyer's Guide(CAMI) Below are details for the 5th Annual Maryland Cybersecurity Buyer's Guide on which the Cybersecurity Association of Maryland, Inc. (CAMI) is once again partnering with the Baltimore Business Journal (BBJ) to produce, print and distribute.
Underwriters Labs wants to certify IoT security(TheNewsTrace) In a bid to beef up security across the burgeoning realm of the Web of Issues (IoT), product security testers Underwriters Laboratories (UL) launched new requirements to take a look at web-connected units for vulnerabilities. In accordance to the Christian Science Monitor, UL’s transfer to start scrutiny of IoT programs follows the Cybersecurity Nationwide Motion …
Intelligence in the Enterprise(McAfee Blogs) Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of
Netskope CEO: Don’t Fall for SASE Washing(SDXCentral) Riding high on his company’s new $340 million investment, which puts Netskope at a nearly $3 billion valuation, CEO Sanjay Beri says the rest of the industry is finally coming around to his vision of cloud-delivered security. Eight years later, this vision that Beri drew on a napkin in 2012 has a name, and its name is SASE.
University to Unveil New Cybersecurity Center(University of New Haven) The Samuel S. Bergami Jr. Cybersecurity Center will be dedicated in honor of a longtime University supporter during a special event on February 11 that will bring together national and local cybersecurity experts. The state-of-art space will be the home of the only NSA-designated Center of Academic Excellence in Cyber Operations in the state of Connecticut.
National Counterintelligence Strategy of the United States of America 2020-2022(Office of the Director of National Intelligence) Protecting our Nation’s security and continuing to enhance the prosperity of our citizens are my top priorities. Ensuring that the United States is protected against espionage and other damaging intelligence activities conducted by our foreign adversaries is essential to meeting those goals.
State and Local Cyber5 security Improvement Act(US House of Representatives) To establish a program to make grants to States to address cybersecurity risks and cybersecurity threats to information systems of State, local, Tribal, or territorial governments, and for other purposes.
DoD has enduring role in election defense(Edwards Air Force Base) The Defense Department plays an important role in that whole-of-government partnership, spearheaded by the NSA and Cybercom's Election Security Group, formed in the wake of the successes of the Russia
Equifax breach is the latest of many hacks linked to China(Star Tribune) In 2014, the Obama administration accused five Chinese military agents of targeting Pittsburgh-area industrial companies including Westinghouse Electric, Alcoa and U.S. Steel. Since then, the number of companies allegedly targeted by Chinese hackers has only grown.
2020 OurCrowd Global Investor Summit(Jerusalem, Israel, February 11 - 13, 2020) We’re expanding the Summit to three days! Invite-only events will take place February 11-12, with Summit Day on February 13. Summit Week will be packed as ever, with corporate meet ups, VC forums, insider...
CyCon 3.0(Sterling, Virginia, USA, February 15, 2020) Our 3rd Annual NOVA CyCon event in Loudoun has a full lineup of cybersecurity experts, speakers and federal contractors presenting on cutting-edge topics! Networking, free lunch and refreshments, door...
The Human Hacking Conference 2020(Lake Buena VIsta, Florida, USA, February 20 - 22, 2020) Once flagged by the FBI and the US banking industry as a potential national security threat, the Social Engineering Village (SEVillage) presents this unprecedented experience, The Human Hacking Conference,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.