Cyber Attacks, Threats, and Vulnerabilities
Chechen Girls Troll ISIS With Fake Bride Scam (Daily Beast) These three young women from the Caucasus pulled a fast one on jihadis fishing for mail-order brides
Darkode is down again, don't call a Sp3cial1st! (Damballa: the Day Before Zero) The infamous web forum darkode is back up after being taken down by law enforcement
China-Tied Hackers That Hit U.S. Said to Breach United Airlines (Bloomberg) The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines
The suspected Chinese hack on United Airlines just made the CIA's job 'much more difficult' (Business Insider) The Chinese hackers that stole the personally identifying information of more than 20 million people from the Office of Personnel Management (OPM) last year also hacked into United Airlines, Bloomberg reports
What federal employees really need to worry about after the Chinese hack (Washington Post) A new government review of what the Chinese hack of sensitive security clearance files of 21 million people means for national security is in — and some of the implications are quite grave
OPM hackers are more likely to get counterintelligence action than criminal charges, report says (Washington Post) If you are one of the 20 million-plus people — including federal employees, contractors, job candidates and their family members — whose personal information was hacked and stolen from the Office of Personnel Management, you probably want the thieves captured and hauled off to prison. Don't hold your breath on that one
A veil of secrecy masks stepped-up cyberattacks in Asia (Chicago Tribune) Once a month, cybersecurity lawyer Paul Haswell gets a call from an Asian company with the same question: We've been hacked. Who do we need to tell?
Does the Kremlin Have a New Way of Hacking the West? (Foreign Policy) highly-capable Russian hacker group with links to Russian intelligence and that is known for going after high-profile foreign and corporate targets is deploying a powerful new data theft tool against Western systems, according to a new report by a prominent American cybersecurity firm
FireEye Releases Intelligence Report Highlighting the Clever Tactics of a Likely Kremlin-Backed Threat Actor (MarketWatch) APT29 combines steganography, cloud storage, and social media services to fly under the radar of network defenders
Moonpig warns of password breach — but it may be more than their users who are at risk (We Live Security) Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users' details were published online
Shellshock Flaw Still Actively Exploited: Solutionary (SecurityWeek) Shellshock, the Bash bug disclosed in September 2014, is still being exploited by threat actors, according to a report from Solutionary's Security Engineering Research Team (SERT)
Security Patches, Mitigations, and Software Updates
Xen fixes another "virtual machine escape" bug (Naked Security) The widely-used Xen hypervisor has just issued a rather important patch
Cyber Trends
Bromium Threat Report Identifies Security Risks of Popular Websites and Software ( Street Insider) News and entertainment websites unknowingly host more than 50 percent of malvertisements; Flash exploits increase 60 percent and ransomware increases 80 percent since 2014
Shocking? — Insurers Consider Potential Aggregate Risks from a Power Grid Attack (JDSupra) In the fast-developing cyber insurance marketplace, insurers have closely considered the possible risks and have analyzed the potential aggregation of such risks. While not the only topics of interest to insurers, these two are spotlighted in a new report which focuses on the hypothetical prospect of a cyber attack on the U.S. electric power grid and the potential type, volume, and geography of losses across multiple lines of insurance coverage
Banks And Insurance Companies Aware Of Cyber Risks: Opportunities Remain To Become More Resilient (Forbes) Cyberattacks and the damage they can cause are top of mind for the majority of business executives. Hardly a week, let alone a day, goes by without news of a breach or concerns about the risk of a cyber attack in one sector or another
The Evolution of Cybersecurity Requirements for the U.S. Financial Industry (Center for Strategic and International Studies) The U.S. financial sector is a major target for global cybercriminals. Cybercrime is a growing industry around the world imposing significant costs on firms that fail to implement adequate safeguards
Physical Security in Enterprise IT: A Renaissance for Cloud-Based Security (The VAR Guy) New means of physical surveillance are changing the way enterprises protect their assets. So how can channel partners get in on the ground floor of this growing industry and profit?
New Research Reveals More Than a Third of Employees Willing to Sell Private Company Data and Proprietary Information (BusinessWire) Clearswift survey confirms that organizations must have data protection policies in place that safeguard against both malicious and inadvertent insider threats
Sun Tzu 2.0: Is cyberwar the new warfare? (Help Net Security) For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks that provide users with a wealth of information, transactional services and the like have also been used as a battlefield to disrupt our everyday lifestyle. From obtaining general information to managing online financial portfolios to purchasing flight tickets, there has been a groundswell of disruption to access these channels
Marketplace
CGI exiting low-margin markets, eyes M&A in cybersecurity (Globe and Mail) CGI Group Inc., the information systems and management consultancy, said on Wednesday it would target acquisitions in cyber security while exiting some markets entirely, as it reported third-quarter profit and revenue that missed estimates
'Insane' acquisition spree and Blue Coat's renaissance (Digital News Asia) Believes it has shored up its capabilities to be able to offer the 'Blue Coat stack'. Claims 'incredible growth' in Asia, particularly excited by verticals such as telcos
5 Things to Watch When FireEye Reports Earnings (Motley Fool) Pertinent themes and trends to look for in the earnings report of this high-profile cybersecurity company, which is due to report after the markets close on Thursday
Hackers give up when they go up against this cybersecurity company (Fortune) In conversation with George Kurtz, CEO of CrowdStrike
Israeli cyber sector exports soar to $3 billion in 2014 (Globes) The Israel Export Institute estimates that the revenue of nearly 250 Israeli firms in the sector will increase at a rate of 10% per year
Leidos, Cerner win 'DHMSM', DoD's $11B electronic health record contract (FierceGovHealthIT) Contract will replace legacy health IT at DoD and advance interoperability with VA's health record
Security Startup Tanium Enters Partnership With PwC (re/code) Security and systems management startup Tanium said today that it has inked a strategic partnership with the consulting firm PwC that will combine their capabilities in helping companies secure their systems from cyber attacks and investigate attacks that have already happened
Security awareness to benefit from government incentives, says former GC of Verizon (Channelnomics) Pricey government fines will force management to think security
Fidelis Cybersecurity Appoints Industry Leader Michael Evans as Chief Marketing Officer (BusinessWire) Former Mandiant and FireEye executive to lead global marketing effort for leader in advanced threat defense
Products, Services, and Solutions
Trend Micro unveils Windows 10 security portfolio (Resellernews) "At the end of the day, we are committed to securing individuals' ability to do things online safely"
G DATA Sicherheitslösungen sind kompatibel mit Windows 10 (Pressebox) Kunden können den Umstieg auf das neue Betriebssystem ohne Probleme durchführen
Share files simply and securely in the cloud — Partner offering from Covata and T-Systems (Deutsche Telekom) Lists of customers, contract details, price calculations ? employees need secure and quick access to this kind of sensitive data. T-Systems and Australian data security specialist Covata are now offering a solution to this problem, from the cloud. The service is as simple to use as other file sharing offerings, but is based on enterprise grade security architecture and runs in a high-security data center operated by T-Systems in Germany. The Australian government, including the Australian Taxation Office, uses Covata to securely share information
TeleSign SDK streamlines verification on mobiles (Betanews) Many of the latest cyber attacks focus on mobile platforms as they're often seen as inherently less secure, particularly when handling account logins and important transactions
Guidance Software Becomes Founding Member of Blue Coat Endpoint Alliance Ecosystem (Marketwatch) Deep endpoint visibility delivered by EnCase® is crucial element of end-to-end security approach
Centripetal Networks Inc. Announces Strategic Partnership with iSIGHT Partners (Benzinga) Centripetal's high-performance RuleGate® appliance operationalizes cyber threat intelligence from iSIGHT's ThreatScape® services to deliver actionable threat intelligence
Fortinet launches Cyber Threat Assessment programme (Telecompaper) Fortinet unveiled its new Cyber Threat Assessment programme designed to provide organisations with a detailed look into the type and number of cyber threats posing risks to their networks, yet are going undetected by their existing security products
CyberX Launches its Industrial Threat Intelligence Platform (PRNewswire) The new initiative aim is to enhance secure adoption of the Industrial Internet by providing unprecedented insights of cyber security threats in operational networks
Darktrace: Enterprise Immune System technology (CTOVision) Darktrace is one of the world's fastest-growing cyber defense companies and the leader in Enterprise Immune System technology, a new category of cyber solutions based on pioneering Bayesian mathematics developed at the University of Cambridge
Rackspace cooking up security-secret-sharing cloud cabal (Register) Top-tier clouds invited into information-sharing club to speed defence deployment
Technologies, Techniques, and Standards
Can thinking like cyberattackers improve organizations' security? (TechTarget) Getting in the minds of cyberattackers can help organizations mount better defenses against attacks. Here are some ways to accomplish this
Keeping European datacentres safe from cyber attacks (ComputerWeekly) European datacentre operators must take a proactive approach to preventing cyber attacks as hackers increasingly target their facilities
The Future-Forward Cybersecurity Fix (Nextgov) Recent breaches to U.S. federal computer networks — such as the Office of Personnel Management hack — have catapulted the need for improved identity management and authenticated access to the top of the national agenda. The White House-mandated a 30-day call for action for all federal agencies: tighter control of privileged user access and multifactor authentication
Securing connected machines, what is there to know? (M2M Now) The ability to hook devices or machines up to the internet helps critical infrastructure providers speed up manual processes, increase productivity, and grow the business. However, connecting to the Internet eliminates the "air gap" that kept critical networks safe for years, placing them within reach of cyber attackers. The best protection against potential data theft or industrial sabotage is collective, actionable intelligence
Travel Security: It's a Tough World in the Competitive Trenches (IBM Security Intelligence) You are ultimately responsible for your travel security, be it physical or technical. But this is a tall order. You are most vulnerable when you move and travel because you operate outside of your daily pattern of life, including connecting to the Internet via a third-party service provider with which you may not be familiar
Applied Cyber Intelligence: A Theory on Intelligence Sharing (Dark Matters) There has been an identified need to share Cyber Intelligence. The history of the discussion dates back a number of years and the actual timeline is out of the scope of this study
10 Security Mistakes Nearly Everyone's Guilty Of (Information Security Buzz) When it comes to data security, attackers continue to exploit the biggest weakness of all — people. ESET Ireland looks at 10 security mistakes humans continue to make on a daily basis
A Security Awareness and Training Policy Checklist (Infosec Institute) Your organization may already have security training and awareness (STA) program, or (this is less likely nowadays) you may have to build one from scratch
Connecting the Cyber-Threat Dots Through Big Data (Smart Data Collective) The managed security services market has been in play for more than a decade. Not surprisingly, it continues to show vibrant growth, fueled in part by cloud-related factors. Research and Markets, in a January 2015 report, estimated that market growth will run from $14.3 billion in 2014 to $31.9 billion by 2019 (with a CAGR of 17.3%). Growth for security services touches just about every industry, and all sizes of organizations
Research and Development
Scientists in Greece Design Cryptographic E-Voting Platform (Wall Street Journal) 2,500 years after they first designed democracy's core operating system of one person one vote, the Greeks are giving it an upgrade
New Army cyber officers hack improvements into DARPA's 'Plan X' (Army News Service) "Do you have a map in your car? When was the last time you looked at a compass? Imagine a day when we don't have that technology such as the Global Positioning System, better known as GPS. These are the things we worry about," Capt. James McColl said
Legislation, Policy, and Regulation
Russia calls for global coordination to counter cyber terrorist activity (Xinhua) Security services worldwide must coordinate their efforts in cyberspace to prevent the Internet from becoming a weapon for terrorists, Russian Federal Security Service chief Alexander Bortnikov said Wednesday
How should the U.S. respond to state-sponsored cyberattacks? (CIO) A new poll suggests the general public views the growing threats from nation-states as significant, but they may be off base in terms of their prescriptions for how to respond
The US is rewriting its controversial zero-day export policy (The Verge) Experts say the rules would weaken defensive security tools
Senators wrap DHS cyber bills together in bid for floor time (The Hill) A Senate committee on Wednesday approved a cybersecurity bill that would give the Department of Homeland Security (DHS) considerable powers to defend government networks from hackers
Senators push bill to authorize EINSTEIN 3A, shore up 'insufficient cybersecurity practices' governmentwide (FierceGovernmentIT) Leaders of the Senate Homeland Security and Governmental Affairs Committee introduced Monday a bipartisan bill that would grant federal agencies clear legal authority in utilizing EINSTEIN, the Homeland Security Department's continuous diagnostics and monitoring system
White House Preps New Cyber Policy Dealing with Federal Contractors (Nextgov) The Obama administration is preparing to release a new policy to homogenize the way vendors secure agency data
EFF: War for Cryptography and Privacy is Raging (Hacked) The Electronic Frontier Foundation says that although the government is in many cases aware of the value of cryptography, they are opposing it. The UK government is an example they make frequent use of since the country is looking at banning cryptography that does not give the government a back door
Experts say tech industry has duty to counter extremism, but against imposing legal onus (FierceGovernmentIT) Former Homeland Security Secretary Michael Chertoff said social media companies may have a social obligation to suppress videos of beheadings by terrorist groups and report information to law enforcement that a user might commit a violent act, but he said he was "nervous" about imposing any legal duty or regulatory mechanism on companies to take such actions
Reform Defense acquisition to reflect cyber age (The Hill) Securing our nation from cyber threats requires identifying and addressing the root causes of our vulnerabilities. One such cause is the defense procurement process, which is hallmarked by delays and under inclusiveness. The Department of Defense and Congress must work together to speed up the process and allow additional players in the game in order to acquire advanced technology to effectively fight the digital war that is now upon us
National Guard Cyber Capability Grows Nationwide (DoD News) Just as the National Guard provides warfighting forces for the Army and Air Force and help during state and federal emergencies, Guardsmen now are ramping up their role in the nation's escalating cybersecurity fight, according to the chief of the National Guard Bureau
Litigation, Investigation, and Law Enforcement
Will the Real Victim Stand Up? (Digital Guardian) Class action suits over data breaches continue to be met with conflicting results — but what effect does this have on corporations' responsibility for consumer data protection?
Facebook ordered to allow pseudonyms by privacy watchdog (Naked Security) Good news for every Little Miss Hot Mess and Jemmaroid von Laalaa out there: a German privacy watchdog has ordered Facebook to allow users to take out accounts under pseudonyms
Five Suspects Reportedly Connected to the JPMorgan Chase Breach (Legaltech News) Reports said two of the men?s names were somehow mentioned in connection with an inquiry into the JPMorgan Chase breach
Investigation Follows Claims of Hacking at Planned Parenthood (Legaltech News) The cyber-attack comes soon after controversy erupted over Planned Parenthood statements recorded in edited undercover videos by The Center for Medical Progress
Why do email policies of local governments seem so sketchy? (FierceContentManagement) A new policy in St. Paul, Minnesota allows city employees to "delete [email messages] as soon as their purpose is served" or within six months. Messages moved to trash or junk folders will evaporate in a mere two weeks. In a not-at-all-shocking turn of events, public watchdog groups are voicing their concern