Cyber Attacks, Threats, and Vulnerabilities
U.S. wages psychologicial war on Moscow - Russian defense adviser (Reuters) The United States and other Western countries are waging a psychological war on Russia to try to undermine President Vladimir Putin and state institutions, an adviser to Russia's defence minister said.
SolarWinds Attack Illustrates Evolving Russian Cyber Tactics (BankInfo Security) The SolarWinds supply chain attack demonstrates that Russian intelligence services have learned from previous operations and adjusted their tactics, says Dmitri
New 5G protocol vulnerabilities allow location tracking (The Record by Recorded Future) Security researchers have identified new vulnerabilities in the 5G protocol that could be abused to crash network segments and extract user data, such as location information.
CISA Adds Two Web Shells to Exchange Server Guidance (Dark Reading) Officials update mitigation steps to include two new Malware Analysis Reports identifying Web shells seen in Exchange Server attacks.
Credit Card Hacking Forum Gets Hacked, Exposing 300,000 Hackers’ Accounts (Vice) Credit card hacking forum Carding Mafia is the latest victim of the age-old hackers on hackers crime.
Data for 7.3 million Dutch car owners sold on hacking forum (The Record by Recorded Future) RDC, a Dutch company that provides garage and maintenance services to Dutch car owners, has confirmed a data breach earlier today after the personal and vehicle details of millions of Dutch car owners were posted for sale on a well-known cybercrime forum.
Ransomware gang leaks data from US military contractor the PDI Group (The Record by Recorded Future) A major supplier of military equipment to the US Air Force and militaries across the globe appears to have fallen victim to a ransomware attack.
Insurance giant CNA hit by new Phoenix CryptoLocker ransomware (BleepingComputer) Insurance giant CNA has suffered a ransomware attack using a new variant called Phoenix CryptoLocker that is possibly linked to the Evil Corp hacking group.
CNA Suffers “Sophisticated” Cyber-Attack (Infosecurity Magazine) Insurance giant’s website reduced to attack notice following Sunday cyber-strike
The Dark Web Is Teeming With Vaccine Listings Right Now (Wired) Vendors are cashing in on people desperate to leapfrog the line—or falsely certify that they got the shot.
Ransomware gang leaks data from US military contractor the PDI Group (The Record by Recorded Future) A major supplier of military equipment to the US Air Force and militaries across the globe appears to have fallen victim to a ransomware attack.
Hackers Start Exploiting Recent Vulnerabilities in Thrive Theme WordPress Plugins (SecurityWeek) The Thrive Theme vulnerabilities likely expose over 100,000 websites to attacks in which adversaries deploy backdoors.
Report: Call Center Provider Exposed Robocall Database (Website Planet) The Exposure Provides a Look Behind the Scenes of the Controversial Business of Autodialing.
1,481,280 calls made in 24 hours that included
This Malwarebytes scam wants to trick users into fake subscriptions (TechRadar) Always suspect anyone who requests remote access to your computer
Line data scandal highlights perils of storing information across borders (The Japan Times) Concerns over Japan’s national security have arisen because of the obligations of a Chinese affiliate under that country's National Intelligence Law.
How to Mitigate Low-Code Security Risks (DevOps.com) Low-code opens the door to more producers and citizen developers. But, does it also open the backdoor to security vulnerabilities, too?
Security Patches, Mitigations, and Software Updates
New Code Execution Flaws In Solarwinds Orion Platform (SecurityWeek) Solarwinds ships Orion Platform 2020.2.5to address four security flaws, one rated “critical” because of the risk of remote code execution attacks.
Philips Gemini PET/CT Family (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 2.4
ATTENTION: Low skill level to exploit
Vendor: Philips
Equipment: Gemini PET/CT Family
Vulnerability: Storage of Sensitive Data in a Mechanism Without Access Control
2. RISK EVALUATION
Successful exploitation of this vulnerability involving removable media could allow access to sensitive information (including patient information).
Severe vulnerabilities patched in Facebook for WordPress Plugin (ZDNet) The worst bug leads to remote code execution, if exploited.
OpenSSL 1.1.1k Patches Two High-Severity Vulnerabilities (SecurityWeek) OpenSSL 1.1.1k has patched two high-severity vulnerabilities: one related to verifying a certificate chain, and one that can lead to a server crash
Cyber Trends
Cyber Security Breaches Survey 2021 (GOV.UK) This sixth survey in the annual series continues to show that cyber security breaches are a serious threat to all types of businesses and charities. Among those identifying breaches or attacks, their frequency is undiminished, and phishing remains the most common threat vector.
New research shows shift to remote work has intensified data protection challenges (Barracuda) Global market report reveals struggle to protect the explosion of Office 365 data
New “CISO View” Survey on Zero Trust Highlights Credential Theft Trends for New Types of Identities (BusinessWire) A new survey released by CyberArk (NASDAQ: CYBR), the global leader in Identity Security, found that 97 percent of senior security executives say atta
New wave of ‘hacktivism’ adds twist to cybersecurity woes (Reuters) (Corrects spelling to Kottmann from Hottmann, paragraphs 3, 16, 18-25)
Four out of five companies say they've spotted this cyberattack. Plenty still fall victim to it (ZDNet) Two in five businesses say they've detected a cyberattack over the course of the past year as working from home increases cybersecurity risks for enterprises.
SANS survey finds firms continue to downplay cybersecurity awareness (SiliconANGLE) SANS survey finds firms continue to downplay cybersecurity awareness - SiliconANGLE
Neustar-Sponsored Study: Organizations View Threat Feeds as Essential to Cybersecurity Posture (ExecutiveBiz) A Neustar-sponsored study revealed that 79 percent of over 1,000 surveyed security professionals see
A Growing Number of Attacks Underlines the Need for Robust Cybersecurity Solutions (PR Newswire) Cybersecurity concerns remain at the center of attention as more attacks are being reported. Just yesterday, Unit 42, part of the Palo Alto...
5 reasons why financial companies (and others) struggle with cybersecurity (TechCentral) Promoted | Why do many organisations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber risks?
Marketplace
NIST seeks cybersecurity support (Intelligence Community News) The National Institute of Standards and Technology (NIST) posted a sources sought notice for Cybersecurity and Privacy Support Services (CAPSS).
Cybersecurity Startups Eye Improving The Health Of Hospitals As Attacks Increase (Crunchbase News) Even as health care systems and hospitals were facing a raging pandemic last year, they also faced another aggressive and relentless battle: cyberattacks
SolarWinds CEO details changes in boardroom, build process post hack (SC Media) Chief Executive Sudhakar Ramakrishna has discussed with government whether SolarWinds' efforts could serve as a model for other businesses.
Feedzai Lands $200M in Series C Funding (SecurityWeek) Feedzai lands $200 million in funding to build out its AI/ML-based fraud prevention tools for financial services firms. The round was led by KKR.
SRA Raises $4 Million in Capital to Accelerate Growth During First Round of Funding (GlobeNewswire) Hires Top Talent, Enhances Integrated Risk Management (IRM) Watchtower Capabilities and Invests in Advanced Data Analytics
Google's unusual move to shut down an active counterterrorism operation being conducted by a Western democracy (MIT Technology Review) A decision to shut down exploits being used by "friendly" hackers has caused controversy inside the company's security teams.
Will Cisco (or Someone Else) Scoop Up Traceable for Its Cloud Security Stack? (SDxCentral) Traceable founder and CEO Jyoti Bansal sees a $10 billion or more market opportunity for his API and application security company.
Salient CRGT Awarded $482M Contract for Department of Defense Information Networks Cyber and Engineering (Thomasnet) Salient CRGT Awarded 482M Contract for Department of Defense Information Networks Cyber and Engineering Services - Salient CRGT
Orange Life, Shinhan Life Insurance join campaign for cyber etiquette (Korea Times) Orange Life, Shinhan Life Insurance join campaign for cyber etiquette
Nexusguard Listed As A Representative Vendor In Gartner's 2020 Market Guide for DDoS Mitigation Services (PR Newswire) Nexusguard, a leading cloud-based security solutions provider, has been named as a Representative Vendor in Gartner's 2020 Market Guide for...
Waterfall Security Solutions to Expand into the United Arab Emirates (PR Newswire) Waterfall Security Solutions, the leader in OT cybersecurity, today announced an expansion into the United Arab Emirates with a Waterfall...
PKWARE Names Jason Dobbs Chief Technology Officer and Subra Ramesh Chief Product Officer (PKWARE) PKWARE announces it has named Jason Dobbs as chief technology officer and Subra Ramesh as chief product officer.
WatchGuard Appoints Miguel Carrero to Service Provider Go-To-Market Team (PCR) WatchGuard Technologies has appointed cybersecurity and service provider veteran, Miguel Carrero, as
WatchGuard names new ANZ regional director as Sinclair leaves industry (CRN Australia) Anthony Daniel moving into the role from SolarWinds.
Products, Services, and Solutions
SlashNext Launches Secure Risk Assessment to Detect Unseen Next Generation 2.0 Phishing Threats (PR Newswire) SlashNext, the phishing authority, today announced the launch of the cybersecurity industry's most accurate secure phishing risk assessment,...
Starting today, it only costs $1 to get started with Orchid (Privacy & VPN Blog - Orchid) It is now even easier to use Orchid’s distributed VPN service.
'Analysis Placebo' Is The Enemy Of True Cybersecurity: Vidit Baxi (Analytics India Magazine) Our platform SAFE offers a unique niche of AI-enabled, real-time and objective cyber risk assessment of the enterprise as a whole.
Bitdefender and Recorded Future Partner to Enhance Threat Detection Capabilities Through Shared Intelligence (PR Newswire) Bitdefender, a leading cybersecurity company protecting hundreds of millions of endpoints and systems worldwide, today announced a threat...
4 New IBM Security Launches Primed For ‘The Hybrid Cloud Era’ (CRN) IBM Security this week announced a number of updates for hybrid cloud and cloud security, including around cloud-native operations and container security.
General Dynamics Unveils New Suite of Information Security Products (ExecutiveBiz) General Dynamics' mission systems business will offer a new line of products designed to help us
Entrepreneur and Talent Agent LyNea "LB" Bell Makes Black History and Women's History with the Launch of New Search Engine - GOTCONN (PR Newswire) After celebrating the rich history and the significant accomplishments of many African Americans during Black History month, it's now Women's...
Exabeam Launches Alert Triage Application For Security Analysts To Manage Number Of Alerts Efficiently (Security Informed) Exabeam, the security analytics, and automation company announces Exabeam Alert Triage, a new cloud-native application that will help security analysts confidently wrangle the overwhelming number of...
TruSTAR Integrates With ServiceNow To Streamline Security Intelligence (MarTech Series) ServiceNow users can now benefit from TruSTAR's data-centric security intelligence management ecosystem to better inform incidents and improve response TruSTAR, a leader in data-centric intelligence automation and management, today announced TruSTAR for ServiceNow Security Incident Response (SIR).
RedSeal Delivers the Most Comprehensive Cloud Security Solution (MarTech Series) Integration with Oracle Cloud Infrastructure expands visibility to include majority of public and private clouds and on-premises network environments
Atomicorp Offers Free ModSecurity Rules to Help Organizations Combat Web Attacks (PR Newswire) Atomicorp today announced the availability of a free version of its next generation of open-source web application firewall rules, known as...
Technologies, Techniques, and Standards
Tracking risk to manage it: the 7th Annual Virtual Cybersecurity Conference for Executives. (The CyberWire) To manage risk, whether by mitigation, transfer, or acceptance, requires the ability to find and recognize it. The final session of the 7th Annual Virtual Cybersecurity Conference for Executives took up risk tracking.
When to accept risk: the 7th Annual Virtual Cybersecurity Conference for Executives. (The CyberWire) Accepting risk is the third thing you can do with risk, after mitigating and transferring it. The final session of the 7th Annual Virtual Cybersecurity Conference for Executives, hosted by Ankura and Johns Hopkins University Information Security Institute, took up how to know when acceptance is the best policy.
Security and privacy laws, regulations, and compliance: The complete guide (CSO Online) This handy directory provides summaries and links to the full text of each security or privacy law and regulation.
Challenges and benefits of using threat data feeds (Help Net Security) Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from Ponemon Institute.
Does it matter who the CISO reports to? (CSO Online) Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.
Design and Innovation
Scientists unlock the 'Cosmos' on the Antikythera Mechanism, the world's first computer (Space.com) Scientists may have finally made a complete digital model for the Cosmos panel of a 2,000-year-old mechanical device called the Antikythera mechanism that's believed to be the world's first computer.
Academia
Regis University to Host First Virtual Rocky Mountain Collegiate Cybersecurity Defense Competition (YourHub) Regis University will host the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) for eight teams this month to test their cybersecurity skills, knowledge and abilities under new conditions. For the first time in its 11 years, the competition will be conducted virtually.
Legislation, Policy, and Regulation
Iran: Supreme Leader Expresses His Concerns Over Cyberspace (Iran Focus) Iran's Supreme Leader Ali Khamenei
EU Council Adopts New Cybersecurity Strategy (GovInfo Security) The Council of the European Union has adopted a new cybersecurity strategy aimed at protecting EU citizens and businesses from cyberthreats by promoting best
Intensifying Negotiations on transatlantic Data Privacy Flows: A Joint Press Statement by European Commissioner for Justice Didier Reynders and U.S. Secretary of Commerce Gina Raimondo (European Commission - European Commission) Today, EU Commissioner for Justice, Didier Reynders, and U.S. Secretary of Commerce, Gina Raimondo, made the following statement regarding the negotiations on transatlantic data privacy flows:
Ukraine’s National Security and Defense Council ready for any scenario of conflict with Russia (Ukrinform) The National Security and Defense Council of Ukraine is ready for any scenario of conflict with the Russian Federation.
Senate Armed Services Committee: United States Special Operations Command and United States Cyber Command (Lawfare) On Thursday March 25, 2021 at 9:30 a.m., the Senate Committee on Armed Services will hold a hearing on the U.S. Special Operations Command and the U.S. Cyber Command in review of the Defense Authorization Request for Fiscal 2022 and the Future Years Defense Program. The committee will hear testimony from Christopher Maier, acting assistant secretary of defense for special operations and low-intensity conflict; Gen. Richard Clarke, commander of the U.S. Special Operations Command; and Gen. Paul Nakasone, commander of the U.S. Cyber Command and director of the National Security Agency.
US military conducted 2 dozen cyber operations to head off 2020 election meddling (C4ISRNET) Defending elections has become an enduring mission for the Department of Defense.
US Cyber Experts Conducted Operations to Safeguard Election (SecurityWeek) The U.S. Cyber Command conducted more than two dozen operations aimed at preventing interference in last November’s presidential election, Gen. Paul Nakasone said.
NSA Chief Says Recent Hacks Expose Limits of U.S. Cyber Protections (Wall Street Journal) Recent hacks that affected thousands of companies should prompt the U.S. to rethink how it responds to cyberattacks, the head of the country’s top digital spy agency said Thursday before a Senate committee.
Nakasone Warns Adversaries Hack Unseen In US (Breaking Defense) "We should understand what our adversaries are doing," Gen. Nakasone told Congress. "They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there's a blind spot for us not being able to see them."
NSA director says U.S. has a ‘blind spot’ for detecting attacks like SolarWinds, Microsoft Exchange (The Record by Recorded Future) General Nakasone told lawmakers on Thursday that the common failing with recent high-profile cyber attacks boils down to U.S. government agencies having a gap in visibility.
The Cybersecurity 202: NSA director says intelligence has a big blind spot: domestic Internet activity (Washington Post) National Security Agency Director Gen. Paul Nakasone stressed that foreign hackers are taking advantage of the intelligence community's “blind spot” – domestic Internet activity.
Cybercom's Partnership With NSA Helped Secure U.S. Elections, General Says (U.S. DEPARTMENT OF DEFENSE) Being both the commander of U.S. Cyber Command and director of the National Security Agency improves the ability to provide the nation with speed, agility and flexible responses to adversaries, the
Facebook, Google and Twitter CEOs grilled by US Congress over spread of disinformation (Computing) All three executives have declined to take responsibility for spreading misinformation that resulted in the Capitol riots earlier this year
Disinformation Nation: Social Media's Role in Promoting Extremism and Misinformation (YouTube) The Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce of the Committee on Energy and Commerce will hold ...
Jack Dorsey is leaving Mark Zuckerberg to fight Section 230 alone (Quartz) The Facebook CEO has a plan to reform a key internet law, but the heads of Google and Twitter want no part of it.
Groups Call for Ethical Guidelines on Location-Tracking Tech (Wired) The Locus Charter asks companies to commit to 10 principles, including minimizing data collection and actively seeking consent from users.
Exclusive: Software vendors would have to disclose breaches to U.S. government users under new order: draft (Reuters) A planned Biden administration executive order will require many software vendors to notify their federal government customers when the companies have a cybersecurity breach, according to a draft seen by Reuters.
Fed Breach Disclosure Rule Planned After SolarWinds Hack: Report (CRN) Software vendors and service providers will be required to notify their U.S. government clients if they experience a security breach, according to a Reuters report.
On Cyber Disclosures, Take 'Voluntary' Out of the Equation (The Cipher Brief) Rob Knake is a senior fellow at the Council on Foreign Relations and a non-resident fellow at Harvard’s Belfer Center for Science and International Affairs. He is also an advisor to SecurityScorecard. Knake served from 2011 to 2015 as Director for Cybersecurity Policy at the National Security Council. EXPERT PERSPECTIVE – Senator Mark Warner, the … Continue reading "On Cyber Disclosures, Take ‘Voluntary’ Out of the Equation"
Cybersecurity Compliance Bill Advances (CBIA) The Commerce Committee approved a measure incentivizing businesses to adopt recognized cybersecurity standards.
Why Is U.S. National Security Run by a Bunch of Benchwarmers? (Foreign Policy) Biden has named nominees for only 16 of over 300 top posts.
Litigation, Investigation, and Law Enforcement
Facebook sued in France over hate speech (Computing) The lawsuit is based on the French consumer code, which protects consumers from deceptive commercial practices
Judge Rejects Ex-CIA Worker's Try to Dismiss Hacking Charges (SecurityWeek) A judge says former CIA employee Joshua Schulte cannot get espionage charges against him dismissed on the grounds that there weren't enough Hispanic or Black individuals on the grand jury that indicted him.
Judge rejects ex-CIA worker’s try to dismiss hacking charges (Washington Post) A judge says a former CIA employee cannot get espionage charges against him dismissed on the grounds that there weren’t enough Hispanic or Black individuals on the grand jury that indicted him
Georgia Institute of Technology professor charged with Visa and wire fraud (US Department of Justice) Gee-Kung Chang has been arraigned on federal charges of conspiracy to commit visa fraud, conspiracy to commit wire fraud, and wire fraud. Chang and Jianjun Yu were indicted on March 18, 2021.
FBI Paid Anti-Child Predator Charity $250,000 for Hacking Tools (Vice) The records viewed by Motherboard provide more insight into how the FBI obtains at least some of its hacking tools, or network investigative techniques.
Engineer reports data leak to nonprofit, hears from the police (BleepingComputer) A security engineer and ex-contributor to the open systems non-profit organization, Apperta Foundation, recently reported a data leak to them. In return, he gets contacted by their lawyers and eventually the police.
'Convenient' Testimony Dooms 5 Finjan Patents In ESET Row (Law360) A California federal judge has invalidated five Finjan software patents that the patent-holding company asserted against ESET, finding they couldn't pass muster after Finjan's expert testimony at a trial derailed by COVID-19 suggested the patents were indefinite.