skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Are you attending RSA Conference 2020 in San Francisco February 24–28? Don't forget to stop by Booth 743 to meet the Recorded Future team in person and pick up a free copy of their new book, "The Threat Intelligence Handbook."

Daily briefing.

The US Justice Department has secured another indictment against Huawei. Tech Crunch calls the sixteen-charge indictment "sprawling." The charges are being brought as a RICO conspiracy, so the US Justice Department is using the law that put so much of La Cosa Nostra behind bars to prosecute Huawei for racketeering. The US alleges a decade-long conspiracy to steal the intellectual property of US firms. The defendants are Huawei Technologies Co., Ltd.; Huawei Device Co., Ltd.; Huawei Device Usa Inc.; Futurewei Technologies, Inc.; Skycom Tech Co., Ltd.; and Wanzhou Meng, the company's CFO who's currently in Vancouver, British Columbia, fighting extradition to the US.

Huawei calls the charges baseless, and another move by the US to "irrevocably damage" the company. Huawei says it expects to "prevail" in court.

Lawfare points out that Huawei has shifted position, a bit, on the Wall Street Journal's report that the company's devices were backdoored. They've moved from saying "we can't intercept traffic" to "we could intercept traffic, but someone would notice if we did."

The FBI and CISA have released six Malware Analysis Reports detailing malware used by North Korea's Hidden Cobra, according to BleepingComputer.

Iran, which had been slow to attribute blame for last weekend's distributed denial-of-service attack, has now decided to call the incident an American operation, Tasnim reports.

Researchers at Cisco's Duo worked with Google to help Mountain View take down more than five-hundred malicious extensions from its store. The bad Chrome extensions were part of an extensive malvertising and click-fraud network.


Today's issue includes events affecting Australia, Belgium, Canada, China, Estonia, European Union, France, Iran, Japan, Democratic Peoples Republic of Korea, New Zealand, Russia, South Africa, United Kingdom, United States.

Bring your own context.

Should international cyber norms evolve the way the laws of armed conflict have, putting certain kinds of civilian targets off limits to attack? Are the governments of the world on board with that?

"They're all completely on board with the idea of everybody but them keeping it off the table. There's like no state - I mean, I don't know, maybe the Vatican comes up with it or something, but there's like no state that's like, hey, let's deny capabilities to everybody. Every state is let's deny capabilities to everybody but us. And that has always been the problem. And there's all sorts of, you know, political theories you can get into there. And the reality is, without dragging things into the light and holding people accountable, it's just not going to work."

—Robert M. Lee, CEO of Dragos, on the CyberWire Daily Podcast, 2.11.20.

What, hey, didn't that League of Nations thing work out? Or the Kellogg-Briand treaty? What? No? Sad! Well, we'll always have the Missile Technology Control Regime, right?

Coming soon: CyberWire Pro.

Our new subscription program, CyberWire Pro, will be available soon. Designed for cyber security professionals and others who want to stay abreast of our rapidly evolving industry, CyberWire Pro is a premium news service that will save you time and keep you informed. Learn more and sign up to get launch updates here.

A note to our readers: no publication on Monday.

Monday is Presidents Day, and the CyberWire will be observing the US Federal holiday by taking the day off. We'll be back as usual on Tuesday.

Georgetown University Part-Time Master's in Cybersecurity Risk Management

Looking to advance your cybersecurity career? Check out Georgetown University's graduate program in Cybersecurity Risk Management. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. You'll leave the program with the expertise you need to effectively manage risks and navigate today’s increasingly complex cyber threats. Learn more.

In today's CyberWire Daily Podcast, out later this afternoon, we talk with our partners at Cisco Talos, as Craig Williams gives us an update on JhoneRAT. Our guest, Shuvo Chatterjee from Google, shares lessons from the company's Advanced Protection Program, and in particular on the importance of reducing user friction. If security is an impediment, users will bypass it.

CyCon 3.0 (Sterling, Virginia, USA, February 15, 2020) Join us at this upcoming cybersecurity event in Loudoun, VA with a full lineup of industry experts, speakers and federal contractors presenting on cutting-edge topics in the domain of cyber. This event is FREE for everyone! Register today!

Industrial Control Systems are Everywhere Hands-On Demonstration (Online, February 18, 2020) Join Dragos at their Feb. 18 ICS Range demonstration to see real control systems, learn about ICS adversaries and hear how to protect your networks. Tom VanNorman, Dragos Director of Engineering Services and co-founder of the ICS Village, walks you through this realistic range and shares his inspiration for developing it.

The Human Hacking Conference (Orlando, Florida, USA, February 20 - 22, 2020) The Human Hacking Conference is an all-encompassing event that teaches business, security, technology, and psychology professionals the latest expert techniques in human deception, body language analysis, cognitive agility, intelligence research, and security best practices.

RSAC 2020 (San Francisco, California, United States, February 24 - 28, 2020) Connect to the people and ideas that matter. To your growth. To your organization. At RSAC 2020, February 24 – 28, explore current and emerging trends, gain valuable skills and network with peers. Register today!

Cyber Conversation Speaker Series with author Andy Greenberg (Columbia, Maryland, United States, March 11, 2020) On March 11, 2020 at 11:00am at the Maryland Innovation and Security Institute's DreamPort cyber capabilities and mission accelerator facility we will be hosting the first cyber conversation speaker series with author Andy Greenberg.

CyberCon 2020 (Anaheim, California, USA, March 30 - April 1, 2020) The CyberCon Industrial Cybersecurity CISO Summit & Workforce Development Conference is a solutions-based cybersecurity conference promoting networking, collaboration and sharing of solutions between cybersecurity experts and leaders in power and utility companies. Gain unprecedented access to over 40 innovative speakers covering a range of pressing cybersecurity topics and an expo featuring 100+ cybersecurity technology providers showcasing innovative solutions. A “Workforce Development Forum” will provide strategies companies need to recruit, train and retain top cybersecurity talent.

Cyber Attacks, Threats, and Vulnerabilities

Large-scale cyberattack on Iran probably originated from U.S., official says (Tehran Times) A senior civil defense official says the large-scale cyberattack that recently targeted Iran’s infrastructure probably originated from the U.S.

Iran Foils Major Cyber Attack from US: Official - Politics news (Tasnim News Agency) Head of Iran's Civil Defense Organization Brigadier General Gholam Reza Jalali said the recent large-scale cyber attack targeting the country’s infrastructure carried out by the US government has been foiled.

Pentagon, FBI, DHS to jointly expose a North Korean hacking effort (CyberScoop) The Pentagon, FBI, and Department of Homeland Security plan to publicly identify a North Korean hacking campaign, CyberScoop has learned.

US Govt Updates Info on North Korean Malware (BleepingComputer) The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released new info on North Korean malware with six new and updated Malware Analysis Reports (MARs) related to malicious cyber activity from North Korea.

Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks (Lawfare) In a Wall Street Journal article, a senior Huawei official acknowledged the company has a significant capability.

Google removes 500+ malicious Chrome extensions from the Web Store (ZDNet) A network of malicious Chrome extensions was injecting malicious ads in millions of Chrome installs.

500 Chrome extensions secretly uploaded private data from millions of users (Ars Technica) Extensions were part of a long-running ad-fraud and malvertising network.

Nasty Android malware reinfects its targets, and no one knows how (Ars Technica) Users report that xHelper is so resilient it survives factory resets.

Here’s your latest reminder that Android security is a joke (BGR) The pile of Android threats to watch out for has been mounting at a pretty rapid clip so far this year, with apps sneaking into the Google Play Store that can do everything from log in to your Goog…

Parallax RAT: Common Malware Payload After Hacker Forums Promotion (BleepingComputer) A remote access Trojan named Parallax is being widely distributed through malicious spam campaigns that when installed allow attackers to gain full control over an infected system.

Official: Puerto Rico govt loses $2.6M in phishing scam (AP NEWS) Puerto Rico's government has lost more than $2.6 million after falling for an email phishing scam, according to a senior official. The finance director of the...

Puerto Rico online scam targeted more than $4M amid crisis (NBC News) Authorities have frozen at least $2.9 million, an official said. The government has not said how much money was seized by the hacker.

Attackers Expand Coronavirus-Themed Attacks and Prey on Conspiracy Theories (Proofpoint US) Proofpoint researchers continue to monitor the latest news and reports around the global Coronavirus outbreak for malicious activity.

Defending Against Coronavirus Phishing and Malware Attacks (OneSpan) At OneSpan, we have been concerned and saddened by the impact of the coronavirus (Covid-19).

New phishing scam targets Alaska USA Federal Credit Union members (Webcenter 11) According to a press release from the Alaska Department of Law, the scammers send a text or email claiming the recipient's account has been suspended. The messages say the recipient must click on a link that will allow them to reactivate their account.

SweynTooth Bug Collection Affects Hundreds of Bluetooth Products (BleepingComputer) Security researchers have disclosed a dozen flaws in the implementation of the Bluetooth Low Energy technology on multiple system-on-a-chip (SoC) circuits that power at least 480 from various vendors.

Sophisticated Emotet malware loader thriving on unsophisticated passwords (Techxplore) Emotet has evolved. And that's not good. The worm is winning the attention of security watchers this month, as an exploit of Wi-Fi networks. It hops. It spreads. Its triggers are insecure passwords on routers and Windows PCs.

Schneider Electric Modicon Ethernet Serial RTU (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Schneider Electric Equipment: Modicon BMXNOR0200H Vulnerabilities: Improper Check for Unusual or Exceptional Conditions, Improper Access Control 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow remote code execution or cause a denial-of-service condition.

Report: 1,000s of Plastic Surgery Patients Exposed in Massive Data Leak (vpnMentor) Led by Noam Rotem and Ran Locar, vpnMentor’s research team recently discovered a breached database belonging to plastic surgery technology company

US non-profit for international study exposes private documents of thousands of students: report (Security Discovery) The Institute of International Education (IIE), a US nonprofit that focuses on foreign exchange study and scholarship, exposed a database on the web containing thousands of logs and links to private student documents. The database...

Nedbank data breach potentially affects 1.7 million clients (The South African) According to a statement issued by Nedbank on Thursday 13 February, a subset of the allegedly compromised data at a third-party service provider included the personal information of 1.7m Nedbank clients.

New alarming texting scam: scammers pose as Verizon Wireless, ask for personal information (WKBW) According to, a scammer texts people with an "account security" message. The message takes you to a site that looks like Verizon's website.

Babel of IoT Authentication Poses Security Challenges (Dark Reading) With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.

'Sloppy' Mobile Voting App Used in Four States Has 'Elementary' Security Flaws (Vice) MIT researchers say an attacker could intercept and alter votes, while making voters think their votes have been cast correctly, or trick the votes server into accepting connections from an attacker.

Documents reveal DNC was 'intimately involved' in development of troubled Iowa caucus app (Yahoo News) Internal correspondence provided to Yahoo News demonstrates that national party officials had extensive oversight over the development of the technology.

No, Pete Buttigieg Is Not a CIA Asset (Foreign Policy) The agency’s history of bloody-handed bungling abroad has come back to haunt U.S. politics.

Leading Singapore Online Florist Floristique Recovers from Cyber-Attack (Business Insider Singapore) Cybercrimes have been disrupting hundreds of businesses for years. Singapore-based Floristique's journey to recovery post the detrimental cyberattack.Services back online and stronger than ever to cater for Valentine's Day.

Dozens of Rutter's locations affected by data breach (WHP) Rutter's is notifying customers that the company experienced a data breach in 2018 and 2019. Most customers may have been impacted by the breach if they shopped at Rutter's stores between October 1, 2018 and May 29, 2019. At nine locations, access to data may have begun as early as September 20, 2018. At one location, the breach may go back as far as August 30, 2018. Rutter's has provided a list of locations affected, including time frames for each one.

1 in 6 Massachusetts Communities Hit by ‘Ransomware’ Attacks (NBC Boston) One January morning two years ago, hackers seized control of the Bedford Police Department’s electronic records. They were holding them hostage, and time was ticking; the longer the town waited to pay up, the higher the ransom demand would climb.

City of Racine sees slow progress dealing with aftermath of cyberattack (TMJ4) Nearly two weeks after a cyberattack, the City of Racine is seeing slow progress as they work through the aftermath.

Confederation College students get scam phone calls and emails after malware incident (CBC) The man in charge of cleaning up after malware incident at Confederation College says IT services should be fully restored in a few days. But Rob Zuback says some students have received automated phone calls and spam emails referencing the incident.

Nine-year-old boy's identity stolen in data breach, cybersecurity expert weighs in (KATU) A trip to the hospital a few years ago has cost Kristen Matthews' 9-year-old son his identity. As a Health Share of Oregon member, his data was not only compromised in the organization's recent breach, but used to open a U. S. Bank Credit Card, according to his mother. The credit card with her son's name arrived at Matthews' home the other day, just after she learned about the data breach. "This is not OK, especially for a child. This is not OK," said Matthews.

Security Patches, Mitigations, and Software Updates

WordPress GDPR Cookie Consent plugin fixed vulnerability. (NinTechNet) The WordPress GDPR Cookie Consent plugin, which has 700,000+ active installations, fixed a vulnerability affecting version 1.8.2 and below that could lead to authenticated stored XSS and privilege escalation.

Almost 2 billion malware installs thwarted by Google Play Protect in 2019 (WeLiveSecurity) Google Play Protect blocked more than 1.9 billion malicious app installs from outside of the official Android marketplace last year, while stopping almost 800,000 bad apps from reaching Google Play.

Google Nest users will be required to follow 2F-authentication (Includes interview) (Digital Journal) Within a few months, Google Nest users will be required to use two-factor authentication (2FA) to access their devices. This has come a little late, but is still welcomed by Pulse Secure CMO Scott Gordon.

Cyber Trends

Number of Records Exposed in 2019 Hits 15.1 Billion (Risk Based Security) Today, we released our 2019 Year End Data Breach QuickView Report, which finds that the total number of records exposed increased by 284% compared to 2018. In total, there were over 15.1 billion records exposed shattering industry projections. There were 7,098 breaches reported in 2019, a 1% inc

Data Leaks in the Medical Industry: The Problem Continues (WizCase) After our previous report on database leaks from medical websites around the world, WizCase’s security team diligently continued their research. They discovered 3 additional unsecured medical databases with confidential information, including full names, passport numbers, birth dates, addresses, and phone numbers. These databases were found in the context of performing research to help companies ...

Cybercrime Cost Business $3.5B, Says FBI: It's a Massive Underestimate (Computer Business Review) New figures from the FBI suggest that cybercrime cost the US businesses $3.5 billion in 2019, with business email compromise (BEC) the most costly attack.

One in five Brits has secretly logged into their ex's social media accounts (Mirror) A new survey by Google has revealed that almost a fifth of Brits have secretly logged into their ex’s social media accounts

Cybersecurity top digital focus for upstream industry: poll (Offshore Technology) Upstream oil professionals have named cybersecurity as one of their biggest digital concerns in a poll, with AI to be the next big area of investment.


Cisco Isn’t Bidding for FireEye, Contrary to Rumors (Barron's) The stock of the security software company FireEye rose following a report that Cisco might buy it.

Cisco Prepares Acquisition Bid For Cybersecurity Firm FireEye: Report (CRN) Cisco is putting together an offer to purchase platform security vendor FireEye and expects to present the bid in the coming weeks, according to OKDIARIO.

London-based OutThink snaps up €1.4 million to expand its human risk intelligence platform (EU-Startups) UK startup OutThink, the startup behind one of the world’s first Predictive Human Risk Intelligence SaaS Platforms, has announced the completion of its €1.4 million seed funding round, led by Forward Partners. OutThink was founded by CISOs for CISOs as an alternative to traditional security awareness computer-based training.

Top UK cyber insurance providers - Information Age (Information Age) With cyber insurance developing as a market in response to rising cyber attacks, we look at the top cyber insurance providers in the UK

RSA 2020: The Show Must Go On (BankInfo Security) While public health concerns over the spread of the coronavirus are leading to the cancellation of some international events, the RSA Conference 2020 will proceed

BAE to Protect Digital Files From Cyber Threats (National Defense) BAE to Protect Digital Files From Cyber Threats

Defense contractor BAE Systems is hiring ‘cryptocurrency exploiters’ (TokenPost) BAE Systems, the U.S. subsidiary of BAE Systems plc an international defense, security and aerospace company, is looking for a cryptocurrency exploiter.The company, which is counted among the worlds largest defense...

Should the Pentagon stop playing the role of venture capitalist? (Defense News) In this commentary, a reader discusses what role the government should serve when it comes to working with startups on defense projects.

Want to make £££ in IT? Go into quality assurance, security, architecture or programme management (Computing) Then work your way up to CIO - but avoid the helpdesk, which (as always) offers the worst-paid roles in IT

WSJ News Exclusive | Google in Talks to Pay Publishers for Content in Premium News Product (Wall Street Journal) Most of the publishers in talks with Google are outside the U.S., including in France and Europe.

France to open new cyber campus next year (The Daily Swig) C’est la cyber

New York turns to Israeli start-ups to become capital of cybersecurity (The Jerusalem Post) Innovation: The concrete jungle with an Israeli state of mind

As hackers’ tactics intensify, the city invests $30M to become a cybersecurity hub (Crain's New York Business) Inside a cast-iron SoHo building, up a staircase designed by Apple Store architect Peter Bohlin, you’ll find a bustling tech hub packed with busy young entrepreneurs preparing for their auditions. Many of them are developing and selling cybersecurity solutions, which are what just about…

Darktrace appoints Catherine Graham as CFO (Back End News) Cyber AI company Darktrace recently announced that Cathy Graham will join as its new chief financial officer (CFO) this month. Previously at 2U, an education technology firm, Graham has broad exper…

Terbium Labs Adds Industry Veteran Ayesha Prakash to Executive Team as Chief Revenue Officer (MarTechSeries) Prakash, an award-winning executive, will play key role as Terbium Labs enters its next stage of growth Terbium Labs, a leading digital risk protection company, announced that it has named Ayesha Prakash as Chief Revenue Officer (CRO). Prakash will be responsible for overseeing Terbium's revenue generation strategy and execution in order to increase the company's momentum and customer acquisition. Prakash comes to Terbium Labs from Flashpoint, a Business Risk Intelligence Company, where she was the Head of Worldwide Channels and Partnerships. She built and then spearheaded the 150% year-over-year growth of the organization's award-winning SPARK Partner Alliance program. Marketing Technology

Products, Services, and Solutions

Devo Technology Introduces Next-Gen Security Operations Platform to Transform the SOC and Scale Security Analyst Effectiveness | ( Advanced analytics and streamlined workflow amplify analyst knowledge, significantly reducing time between detection and response CAMBRIDGE, Mass.—February 12, 2020—Devo Technology today announced Devo Security Operations, … Devo Technology Introduces Next-Gen Security Operations Platform to Transform the SOC and Scale Security Analyst Effectiveness Read More »

iProov’s Cross-platform Biometric Technology Now Available Beyond Mobile (BusinessWire) iProov, a leading provider of biometric authentication technology, today announces that its Verifier product is now available to organisations needing

Thycotic Leads the Way for Cloud-Based Privileged Access Management (AiThority) Thycotic, provider of privileged access management solutions to more than 10,000 organizations, including 25 of the Fortune 100, announced its 2019

Bitdefender Joins ThreatConnect Developer Partner Program (Bitdefender) Bitdefender Advanced Threat Intelligence to be accessible via ThreatConnect platform

Spirent Expands CyberFlood Data Breach Assessment Solution with Even Greater Capabilities for Evaluating Network Security Attack Exposure (BusinessWire) Spirent expands CyberFlood Data Breach Assessment solution with even greater capabilities for evaluating network eSecurity attack exposure

Veracode Static Analysis Doubles Down on Developers’ Need for Speed with New Pipeline Scan (Veracode) Veracode Static Analysis meets the needs of DevSecOps programs with three scan types delivering fast, accurate results at all stages of the development lifecycle

Appdome Launches MobileTRUST Alliance to Find and Fix Vulnerabilities in Any Mobile App (PR Newswire) /PRNewswire/ -- Appdome, the industry defining, no-code mobile integration and solutions platform, today launched the MobileTRUST Alliance, a mobile app...

A10 Networks | A10 Networks Delivers Highest-Performance Virtual DDoS Defence Solution to Protect 5G and Cloud Infrastructures  (RealWire) Thunder Threat Protection System (TPS) Enables Service Providers to Build and Operate Elastic DDoS Defences with 100 Gbps in a Single Virtual Appliance

What Makes AMULET ™ Technology Unique and Different? (Cynapsis) Simple explainer on what makes our patented cybersecurity unique. The term "digital asset" is used in the video, but think of this as a file - which could be a Word doc, an image, an audio recording, etc.

Pulse Secure offers free remote access software to firms in midst of Coronavirus (Security Brief) Pulse Secure is offering organizations means to quickly obtain Free PCS software licenses for 90-day use by their Asia Pacific-based employees.

A10 Networks Unveils Thunder Threat Protection System (TPS) (Dark Reading) Virtual DDoS defense solution protects 5G and cloud infrastructures.

Microsoft to secure New Zealand’s democratic elections (Technology Record) Microsoft will provide all New Zealand political parties and non-governmental organisations that conduct political analysis or education with free access to its AccountGuard security service ahead of the country’s upcoming general elections.   The service helps customers engaged in the electoral process with threat detection and provides guidance on improving cybersecurity practices. AccountGuard was first deployed in the United States in 2018 to address the growing threats...

Signal Is Finally Bringing Its Secure Messaging to the Masses (Wired) The encryption app is putting a $50 million infusion from WhatsApp cofounder Brian Acton to good use, building out features to help it go mainstream.

Pan-European partnership to help beat telecoms and IoT security fraud threats launched in Belgium (Telemedia Online) Last year, telecoms fraud cost the industry €29 billion. In addition to that, cyber-attacks are increasingly targeting service providers and subscriber

New infosec products of the week: February 14, 2020 (Help Net Security) The featured products this week are from the following vendors: RSA, Farsight Security, Tufin, ZeroFOX and Devo Technology.

Technologies, Techniques, and Standards

Nevada’s Democrats Settle on a New System for Caucus Results After Iowa Debacle (Wall Street Journal) Nevada’s Democratic Party will use iPads and a Google web form to report results for next week’s caucuses, a system devised after the state party ditched an app similar to the one that failed in Iowa.

Nevada Democrats reveal Google Forms-based plan for transmitting early vote data, caucus results (Nevada Independent) A party official said Nevada Democrats consulted with Google on how they plan to use the company’s technology to carry out the caucus process and have been assured by them that it is a “secure process” and that the company is “comfortable” with it. The official added that Google did not specifically develop anything new for the caucus calculator and that it is “off the shelf technology.”

Ensuring cyber security during mergers and acquisitions (IT PRO) A lack of due diligence when bringing two companies together can lead to major IT and security issues down the line

GDPR Compliance: Should CISO Serve as DPO? (BankInfo Security) As organizations settle into the third year of enforcement of the EU’s General Data Protection Regulation, some are struggling to define and understand the role

Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems (Dark Reading) The new threat model hones in on ML security at the design state.

BIML Releases First Risk Framework for Securing Machine Learning Systems (BIML) The Berryville Institute of Machine Learning (BIML), a research think tank dedicated to safe, secure and ethical development of AI technologies, today released the first-ever risk framework to guide development of secure ML.

Is Perimeter-Based Network Security Dead? (Technology Solutions That Drive Business) Why modern businesses are exploring a zero-trust approach to security.

Design and Innovation

The World's Second Largest Wikipedia Is Written Almost Entirely by One Bot (Vice) 'Wikipedia consensus is that an unedited machine translation, left as a Wikipedia article, is worse than nothing.'

Research and Development

Facebook Delivers Long-Awaited Trove of Data to Outside Researchers (Wall Street Journal) After a series of delays, Facebook is allowing a select group of academics to study internal data about how content gets shared on its platform, which could lead to a better understanding of patterns in fake news, researchers say.


New Lab Opens at Purdue, Expands Capabilities (Inside INdiana Business) Purdue University’s CERIAS (Center for Education and Research in Information Assurance and Security the edition of a new laboratory. The new SOL4CE facility dramatically increases Purdue’s cyber-physi

Cybersecurity Professionals Help Scottish Teachers Deliver Cyber Lessons (Digit) The industry professionals will work with Skills Development Scotland to raise awareness of cybersecurity careers and develop children's cyber skills.

Legislation, Policy, and Regulation

On data protection, the UK says it will go it alone. It probably won't (ZDNet) The Prime Minister listed data protection as an area that the UK could legislate on following Brexit - but diverging from European Union rules on privacy would only complicate things.

Siemens, Allianz, Telekom: „Charter of Trust“ kämpft für mehr Cybersicherheit (Handelsblatt) Die Initiative von Siemens und der Münchner Sicherheitskonferenz nimmt weitere Mitglieder auf und gibt sich Regeln für die Sicherheit von neuen Produkten.

Why more research is needed to craft good cyber policy (Fifth Domain) How cyber operations pertain to geopolitical interaction and act as a tool of statecraft is still largely not understood despite decades of cyber activity, experts said Feb. 12.

To Bolster Cybersecurity, the US Should Look to Estonia (Wired) The tiny European nation has come a long way after crippling cyberattacks in 2007. Now, it offers key lessons in attracting tech talent and educating citizens.

Analysis | The Cybersecurity 202: The U.S. is going after Huawei, but it isn't changing allies' minds (Washington Post) New accusations and indictments this week aren't making an impact abroad

Trump wants US to be less reliant on GPS with new executive order (C4ISRNET) The federal government wants to ensure that critical infrastructure isn't vulnerable to any GPS outage.

Tech firms must do more on child abuse, European police chiefs say (Reuters) European police chiefs have thrown their support behind British demands for tech...

Sen. Gillibrand proposes a new government agency to protect privacy on the internet (CNBC) New York Democratic Sen. Kirsten Gillibrand's new privacy legislation would not preempt state laws, an idea opposed by many Republicans.

The U.S. Needs a Data Protection Agency (Medium) Companies and foreign adversaries want to exploit your data. Someone should be looking out for you.

Privacy Experts Skeptical of Proposed Data Protection Agency (Threatpost) A new Data Protection Agency would overhaul federal regulation efforts around data privacy – but experts are skeptical that the U.S. government can get it right.

Why aren’t presidential candidates talking about cybercrime? - CyberScoop (CyberScoop) Op-ed: The American electorate says reducing cybercrime is a top priority of theirs. It's time for the candidates to start talking about it.

New Senior Advisor for Cybersecurity Policy to the SEC Chairman (Cointelegraph) Nancy Sumption joins SEC Chairman Jay Clayton as his Senior Advisor for Cybersecurity Policy.

Litigation, Investigation, and Law Enforcement

China’s Huawei Charged With Racketeering, Stealing Trade Secrets (Wall Street Journal) Huawei Technologies and two of its U.S. subsidiaries were charged with racketeering conspiracy and conspiracy to steal trade secrets in a new federal indictment.

US charges Huawei with racketeering and conspiracy to steal trade secrets (ZDNet) US updates charges against Huawei, adds racketeering and IP theft allegations against the Chinese telco provider and its CFO.

The US is charging Huawei with racketeering (TechCrunch) Ratcheting up its pressure campaign against Huawei and its affiliates, the Department of Justice and the FBI announced today that it has brought 16 charges against Huawei in a sprawling case with major geopolitical implications (you can read the full 56-page indictment here). Huawei is being charge…

Looks Like Huawei Might Be Screwed This Time (Gizmodo) The Department of Justice announced on Thursday that it was unsealing a superseding indictment against Chinese tech giant Huawei, charging the company and several of its affiliates under a law traditionally used to take down sprawling criminal syndicates that operated under multiple layers of secrecy.

Analysis: Indictments in Equifax Hack (BankInfo Security) The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also

Twitter, Facebook fined for not moving user data to Russia (AP NEWS) A court in Moscow fined Twitter and Facebook 4 million rubles each Thursday for refusing to store the personal data of Russian citizens on servers in Russia, the largest penalties...

Justice Dept. Is Investigating C.I.A. Resistance to Sharing Russia Secrets (NYTimes) The prosecutor was assigned by the attorney general to scrutinize the agents and analysts who sought to understand Russia’s covert operation to help Donald J. Trump win the 2016 election.

Top Intel lawyer says Bolton subpoena decision likely coming in 'next couple of weeks' (POLITICO) “I suspect that there will be some resolution to that over the next couple of weeks," Daniel Goldman says.

Man who refused to decrypt hard drives is free after four years in jail (Ars Technica) Court holds that jail time to force decryption can't last more than 18 months.

DOJ charges Ohio man with laundering over $300 million via bitcoin (The Verge) Mixing, or tumbling, cryptocurrency is often done to hide illegal activity

United States of America v. Larry Dean Harmon (US District Court for the District of Columbia) 1. Defendant LARRY DEAN HARMON ("HARMON") was a resident of Ohio and Belize. 2. Starting in or about April 2014, HARMON owned and operated a Darknet search engine called Grams.

Call us immediately if your child uses Kali Linux, squawks West Mids Police (Register) Maybe stick to walking the beat instead of infosec advice, eh?

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

CyCon 3.0 (Sterling, Virginia, USA, February 15, 2020) Our 3rd Annual NOVA CyCon event in Loudoun has a full lineup of cybersecurity experts, speakers and federal contractors presenting on cutting-edge topics! Networking, free lunch and refreshments, door...

Insider Threat Program Management With Legal Guidance Training Course (College Park, Maryland, USA, February 19 - 20, 2020) This 2 day training course will ensure the Insider Threat Program (ITP) Manager, Insider Threat Analyst, FSO, and others who support the ITP (CSO, CIO, CISO, IT, Network Security, Human Resources, Etc.),...

The Human Hacking Conference 2020 (Lake Buena VIsta, Florida, USA, February 20 - 22, 2020) Once flagged by the FBI and the US banking industry as a potential national security threat, the Social Engineering Village (SEVillage) presents this unprecedented experience, The Human Hacking Conference,...

RSA Conference 2020 (San Francisco, California, USA, February 24 - 28, 2020) Be part of a conversation that has the power to change the world. Join top cybersecurity leaders and a dedicated community of peers as we exchange the biggest, boldest ideas that will help propel the industry...

ISSA Central MD Information Security Conference (Columbia, Maryland, USA, February 28, 2020) Information System Security Assocition's Central Maryland Chapter is hosting a day long cybersecurity conference spanning two tracks that'll include topics covering: Leadership in cybersecurity - why it...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.