ISIS claims to have inspired Orlando massacre. India on alert for Chinese hacking, RoK claims massive DPRK cyber campaign prepared. Symantec buys Blue Coat, Microsoft acquires LinkedIn.
Saturday’s massacre at a gay nightclub in Orlando, Florida, is being claimed by ISIS. The shooter had apparently called 911 to identify himself and pledge fealty to ISIS shortly before opening fire. What ISIS inspiration contributed to the attack remains unclear, but the shooter’s casual jihadi contacts online had twice brought him to the FBI’s attention.
ISIS, al Qaeda, and the Taliban continue to post grisly inspiration to jihad. Anonymous has countered with low-grade defacements of jihadist Twitter accounts.
India, alarmed Chinese APT groups, brings itself to a higher level of cyber alert. Closer cooperation with the US in cyberspace is seen as a response to the perceived threat from China.
The Republic of Korea charges the Democratic Peoples Republic of Korea with battlespace preparation for a major cyber campaign. Such preparation dates, Seoul claims, to 2014; Pyongyang protests its innocence. Analysts revisit the Sony hack and suggest that its messy complexity (“a dog pile,” says one) makes attributing it solely to North Korea problematic.
Major social media platforms continue to remediate their credential issues. (Microsoft, undeterred by security worries, bought LinkedIn over the weekend for a reported $26.2 billion.) Among Twitter accounts recently compromised was one belonging to the US National Football League (NFL). The NFL Players Association hires K2 Intelligence to help with social media security.
Takedowns and new criminal techniques shift ransomware’s landscape. (Paying ransom didn’t work for the University of Calgary—it hasn’t got its files back, yet.)
Symantec will buy Blue Coat for $4.7 billion.
Notes.
Today's issue includes events affecting Australia, Bangladesh, China, France, India, Indonesia, Iraq, Ireland, Democratic Peoples Republic of Korea, Republic of Korea, Nepal, Pakistan, South Africa, Syria, United Kingdom, United States, and and Vietnam.
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll hear from our partners at Quintessence Labs, as John Leiseboer discusses the importance of key management in cryptography. (And we welcome iTunes reviews.)
Cyber Attacks, Threats, and Vulnerabilities
Defence forces on alert after Chinese cyber attack (New Indian Express) A cyber attack on government and commercial organisations in India by Chinese military’s western headquarters, which oversees India, has raised alarm bells in the corridors of South Block. An alert has been issued to the Indian Army, Navy and Air Force that a Chinese Advanced Persistent Threat (APT) group called Suckfly, based in Chengdu region, is targeting Indian organisations. India’s defence establishment is its prime target
Red alert issued on cyber threats from China (Times of India) Suckfly is an "advanced persistent threat" group which has stepped-up cyber espionage attempts against Indian security and commercial establishments. It has stolen certificated from South Korean software firms and is using these as a cover. India is yet to get a tri-Service Cyber Command, which deals with these threats in a unified manner
Red astroturf: Chinese government makes millions of fake social media posts (Ars Technica) "50-cent" posters aim to distract from dissent rather than confront it
North Korea mounts long-running hack of South Korea computers, says Seoul (Reuters) North Korea hacked into more than 140,000 computers at 160 South Korean firms and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber attack against its rival, police in the South said on Monday
Wake up to North Korea’s cyber-threats (NK Pro) Frequently discussed in South Korea, Pyongyang's cyber attacks only started to get attention elsewhere after Sony
A hacker explains why you shouldn't believe North Korea was behind the massive Sony hack (Tech Insider) It's been nearly two years since a massive cyberattack hit Sony Entertainment, resulting in the leaks of thousands of private emails, social security numbers, unreleased films, and a complete data wipe of half of the company's network
Bank security in danger as hackers attack accounts (VietNamNet Bridge) A series of attacks by hackers on banks occurred recently, showing that banks’ investments in security solutions are insufficient
When the Caliphate Crumbles: the Future of the Islamic State's Affiliates (War on the Rocks) Panic over which future Islamic State affiliate should be of chief concern rises each day as the Islamic State loses turf in Iraq and Syria and foreign fighters flee. This panic should be muted, though, as all Islamic State affiliates are not created equal. A scary jihad map from al Qaeda last decade looks remarkably similar to a scary Islamic State map today. The names change but the places largely remain the same
Afghanistan’s Taliban Push Into New Media (Wall Street Journal) Militants develop smartphone app, slick videos to promote insurgency
A young man is skinned alive. A sign of new Taliban brutality? (Washington Post) In a remote area of Afghanistan, where thousands of years of hardscrabble tribal culture increasingly mixes with a resurgent Taliban militancy, this is how Fazl Ahmad allegedly died
Al-Qaeda Leader Zawahri Pledges Allegiance to New Taliban Chief (VICE News and Reuters) Al-Qaeda leader Ayman al-Zwahari, in an online audio message, pledged allegiance to the new head of the Afghan Taliban, who was appointed last month after his predecessor was killed in a US drone strike
Anonymous Deface ISIS Twitter Accounts with Pornographic Content (HackRead) Reportedly, the Twitter handles of ISIS supporters have been receiving a massive number of pornographic posts. The reason? A hacker who seems to be associated with the world-famous hacktivist collective Anonymous has managed to take over Twitter accounts of ISIS supporters and extremists who propagate about the jihadist ideology of the terrorist organization using these accounts
Jailed Colombian hacker aiming at Islamic terrorists (CCTV-America) Colombian hacker Andres Sepulveda claims he rigged elections across Latin America for more than a decade. In a sit-down prison interview with CCTV America’s Michelle Begue, Sepulveda says who his next target will be-from behind bars
Twitter locks out users after nearly 33 million logins put up for sale (Naked Security) A hacker who reportedly has ties to the recent MySpace, LinkedIn and Tumblr data breaches is claiming to have another huge set of scalped logins: this time, for Twitter accounts
An Interview With the Hacker Probably Selling Your Password Right Now (Wired) For the last two weeks, the tech world’s security teams have been practically under siege. On an almost daily basis, new collections of data from hundreds of millions of stolen accounts have appeared on the dark web, ripped from major web firms and sold for as little as a few hundred dollars each worth of bitcoins. And behind each of those clearance sales has been one pseudonym: “Peace_of_mind"
DIY store’s poisoned search engine returns nasty results (Naked Security) Good luck searching for a nail on the website of Castorama, the French do-it-yourself retailer: as of Wednesday, the top search result concerned Christ’s cross and watching the burning of Satan’s ungodly glory. Or something like that
Thousands of websites exploited for illegal SEO tactics (Help Net Security) Imperva researchers discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase SEO results for illicit websites
@Deray’s Twitter Hack Reminds Us Even Two-Factor Isn’t Enough (Wired) This has been the week of Twitter hacks, from Mark Zuckerberg to a trove of millions of passwords dumped online to, most recently, Black Lives Matter activist DeRay McKesson
Zuckerberg, NFL Twitter Breaches Highlight Bad Password Hygiene (Investors Business Daily) Facebook (FB) CEO Mark Zuckerberg’s repetitive “dadada” LinkedIn (LNKD) password was his hacking downfall, KnowBe4.com CEO Stu Sjouwerman said Wednesday, a couple of days after Zuckerberg’s Twitter (TWTR) and Pinterest accounts were breached
$90K Windows Zero Day Gets a Price Cut (Threatpost) A Windows zero-day for sale on the black market for $90,000 just received a price drop. The flaw that allegedly leaves all versions of Windows users exposed to a local privilege escalation (LPE) vulnerability can now be snatched up for $85,000
All Clues Point to the Death of the Angler Exploit Kit (Softpedia) Angler EK spotted online for the last time on June 7
Goodbye #Dridex, good riddance #Locky (Bryan Campbell) We will no doubt shortly see some official word on the 'takedown' of Dridex and/or Locky, it has been widely reported that the lack of daily spam campaigns indicates its disappearance is linked to the FSB operation. Its widely known that the FSB only get involved in cyber criminal activity when there is significant international pressure to investigate
Ransomware targets Android smart TVs (Help Net Security) If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both Android-powered mobile devices and smart TVs
Meet the 'number one prevalent' new ransomware: Crysis (Healthcare IT News) The virus is able to access administrative features, allowing it to not only encrypt files, but send data to a command server
Ransomware Now Comes With Live Chat Support (Dark Reading) Victims of a new version of Jigsaw now have access to live chat operators to help them through the ransom payment process, Trend Micro says
Jigsaw ransomware uses live chat to relay payment instructions (Graham Cluley) Got a question? Ask a ransomware author!
Ransomware is malicious tech, but it’s also a business model (Globe and Mail) This week, the University of Calgary paid $20,000 to restore its e-mail services and other files after a ransomware attack. The ransom, paid to prevent the potential loss of valuable research, not only highlighted the vulnerability of Canadian communication and information technologies, but also showcased the latest trend in cybercrime: a new “business model” that leaves individuals and businesses fending for themselves or footing the bill
University of Calgary Systems Still Down After Paying Ransomware Fee (Bitcoins) The University of Calgary is the most recent victim of ransomware attacks, and the school paid CND$20,000 in Bitcoin to get rid of the malware
Let’s Encrypt CA inadvertently leaks users’ email addresses (Help Net Security) Let’s Encrypt, the non-profit Certificate Authority (CA) that helps website administrators switch from HTTP to HTTPS quickly and effortlessly, has accidentally leaked 7,618 email addresses of its users
Snowden Emails Reveal the NSA Used Notoriously Insecure Microsoft Word Macros (Motherboard) At the heart of the NSA’s intelligence reporting process are—or at least were, in 2012—some templates using Microsoft Word macros. That’s one of the unbelievable details revealed in a series of Edward Snowden’s emails to NSA’s SIGINT Oversight and Compliance Division released to VICE News in response to a FOIA request. The revelation comes amid renewed focus in the security community on hackers’ uses of Microsoft macros as a vector to launch malware
DDoS Attacks: When Servers Won’t Serve (Yaksas) DDoS stands for Distributed Denial of Service. DDoS is a type of attack in which multiple computers (for example a botnet) are used, to flood a single computer or a network with non-legitimate service requests to overload its resources. It is rare that a week goes by without news of some organization being impacted by a DDoS attack
Mitsubishi Outlander Just The Latest 'Smart' Car That's Trivial To Hack And Control (Tech Dirt) Yet another vehicle heavily advertised as being "smart" has proven to be notably less secure than its older, dumber counterparts. This week, researchers discovered that flaws in the Mitsubishi Outlander leave the vehicle's on-board network vulnerable to all manner of hacker attack, allowing an intruder to disable the alarm system, drain the car's battery, control multiple vehicle functions, and worse
Hackers threaten to hit the brakes on Prabhu express (New Indian Express) Railways Minister Suresh Prabhu is a worried man. Recent attempts by hackers to break into the Railways’ online system involving train operations and the reservation system is giving him sleepless nights. The organisation, which sees half of its total tickets booked online, has held meetings with National Technical Research Organisation (NTRO), a cyber security agency under the National Security Advisor, to come up with systems that will ensure its sites are not hacked
Preventing a Blackout by Taking the Power Grid Offline (Foreign Policy) What can stop hackers from turning off America’s lights? Old-school equipment that’s not connected to the web
Terrorists Are Close To Bringing Down Entire Cities With Cyber Attacks, Warns Top UK Spy (Daily Caller) Terrorist groups like al-Qaida and Islamic State are inching closer to having the cyber capability to electronically shut down entire cities
Wendy's lower after more restaurants linked to cyber attack (Seeking Alpha) Shares of Wendy's (NASDAQ:WEN) are lower in early trading after the company disclosed it found more malicious malware in its point-of-sales systems.The number of Wendy's locations that have been affected is now well over 300.WEN -1.84% premarket to $10.12. In the past, many retail stocks have recovered quickly from a breach report selloff
SABC restored after cyber attack (Times Live) The SABC’s websites were still down after 4pm on Sunday after the hacktivist group that launched a massive cyber attack on the national broadcaster‚ Anonymous Africa‚ said it had halted the attack‚ prompting it to tweet: “SABC are still offline. I think someone broke something trying to fix what was happening”
Cyber attack slows IIT servers on result day (Times of India) The over one lakh aspirants for sought-after Indian Institute of Technology (IIT) seats were not prepared for a cyber attack on the JEE (Advanced) results on Sunday
Security Patches, Mitigations, and Software Updates
Netgear Router Update Removes Hardcoded Crypto Keys (Threatpost) Netgear on Friday released firmware updates for two of its router products lines, patching vulnerabilities that were reported six months ago
Verizon Starts Rolling Out June Android Security Patch To Samsung Galaxy S7, S7 Edge (TechTimes) If you are on the U.S. network operator Verizon Wireless and own the latest flagship Samsung Galaxy S7 or Galaxy S7 edge smartphones, then you will be pleased to learn that the carrier is pushing out the June patch for the two handsets
Google to Remove Weak "Crypto" Provider in Android N (Softpedia) Developers should migrate to other Java encryption providers
Cyber Trends
The Explosion of Apps: 27% are Risky (CloudLock) New Shadow IT risk vectors are coming into play in the form of connected third-party apps. These apps are authorized using corporate credentials, demand extensive permission sets, and communicate with corporate SaaS platforms via OAuth connections. In this report, we take a deep dive into the risks associated with these apps
States seek solutions to deal with cyber threat (Straits Times) Singapore's impending move to delink civil service computers from the Internet has drawn flak, but is in fact a trend-setting move, as other governments mull over going back to typewriters and analogue systems to protect highly sensitive information
Why the NSA and other spies will love the Internet of Things (Recode) Hackers already love them, which means spies will, too
‘Nepal is Apac’s fourth malware-prone nation’ (Kathmandu Post) Nepal is the fourth most malware infection prone country in Asia Pacific region, according to a recent index compiled by Microsoft. Pakistan tops the list followed by Indonesia and Bangladesh
Marketplace
Online Fraud Detection Spend to Hit $9.2bn by 2020 as Fraudsters Target Mobile Transactions (Juniper Research) Biometric authentication key to increased payment security
Chief Security Officer May Be The Job Of The Future That No One Wants (Fast Company) The gold rush for top security leadership is anything but stable
NFL hires cybersecurity firm to teach players how to use social media (Digital Trends) The NFL has a social media problem that can only be fixed by professionals. Following a string of high-profile online mishaps and hacks, the National Football League Players Association (NFLPA) is reaching out to cybersecurity firm K2 Intelligence for help
The Chinese Hackers in the Back Office (New York Times) Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses
A Computer Security Start-Up Turns the Tables on Hackers (New York Times) Standing before a crowded room of entrepreneurs and investors at a conference in San Francisco last summer, former Vice President Al Gore described how climate change could be contained, possibly even reversed
Symantec to buy Blue Coat for $4.7 billion to boost enterprise unit (Reuters) Technology security firm Symantec Corp said it would buy privately held cyber security company Blue Coat for $4.65 billion in a cash deal that will ramp up Symantec's enterprise security business
Microsoft will acquire LinkedIn for $26.2B (Ars Technica) All-cash deal will see LinkedIn retain its distinct brand, independence, and CEO
Cybersecurity firm Interset lands 'strategic investment' from U.S.-based VC (Ottawa Business Journal) Just over a year after landing $10 million in venture capital funding, local cybersecurity firm Interset announced Thursday it has received a “strategic investment” from a venture capital firm that targets technology to support missions of the Central Intelligence Agency and the Federal Bureau of Investigation in the United States
This VC Is Investing in a Startup That Spies on Your Computer Use (Fortune) In-Q-Tel, the venture capital firm backed by the CIA and other stealthy “three-letter agencies” is investing in Interset, a specialist in user behavior analytics. That puts Interset into some pretty interesting company. In-Q-Tel has invested in Palantir, Mesosphere, Cliqr, and some 250 tech companies
Why Shares of Palo Alto Networks Inc Tumbled 13.5% in May (Motley Fool) Growing GAAP losses and so-so guidance sent the high-flying stock lower
Palo Alto: Negative Earnings, Strong Free Cash Flow Generation? (Seeking Alpha) Palo Alto Networks is one of the fastest-growing cyber-security companies. The firm's reach and potential upselling opportunities are tremendous. Estimates peg the cyber security market to surpass $150 billion by 2019 from under $100 billion in 2015. Palo Alto will have its hands in this large and growing pie. Unlike many of its emerging cyber-security rivals, Palo Alto is significantly free cash flow positive, and we think this makes the firm a much more palatable investment idea. Let's take a look at the firm's investment highlights as we walk through the valuation process and derive a fair value estimate for shares
The five-minute CIO: Greg Day, Palo Alto Networks (Silicon Republic) “The biggest challenge today is people. There are just not enough skilled IT security practitioners out there,” says Greg Day, VP and regional chief security officer (CSO) EMEA at Palo Alto Networks
A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet (New York Times) A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab’s Moscow headquarters, where a small television screen displays cyberthreats occurring in real time around the world — a blinking, spinning, color-coded globe brimming with suspicious emails, malware and evil botnets that could be infecting a computer near you
Why CyberArk Software Stock Jumped 11% in May (Motley Fool) The cybersecurity leader's surging share price may be a sign of even greater gains ahead
Dell to offload $3.25 billion in junk bonds to further fund EMC buyout (Computer Business Review) The offering is expected to close on or around 22 June 2016
Avast expands beyond security with new storage-optimizing app called Photo Space (TechCrunch) Avast is a company best known for its security software, but the days where everyone’s first download to their Windows PC is an anti-virus program are fading into the past
Exabeam Selected as a 2016 Red Herring Top 100 North America Winner (Marketwired) Exabeam, the leader in user and entity behavior analytics (UEBA) for security, has been named a winner of the Red Herring Top 100 North America Award -- a prestigious list honoring the year's most promising private technology ventures from the North American business region
Security startup confessions: Let’s talk about channel management (Help Net Security) My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices startups make when security matters. I will share experiences from my own startups (my first was in 1994), and things I have learned by watching and advising numerous other startups around the world
Dimension Data CEO Resigns, Succeeded By Operations Chief (CRN) The CEO of solution provider giant Data Dimension has stepped down after 12 years at the helm, the company said Friday
Products, Services, and Solutions
IRS Re-Enables ‘Get Transcript’ Feature (KrebsOnSecurity) The Internal Revenue Service has re-enabled a service on its Web site that allows taxpayers to get a copy of their previous year’s tax transcript. The renewed effort to beef up taxpayer authentication methods at irs.gov comes more than a year after the agency disabled the transcript service because tax refund fraudsters were using it to steal sensitive data on consumers
Northrop Grumman and NEC enter into cybersecurity collaboration agreement (Military Embedded Systems) NEC Corp. and Northrop Grumman have entered into a collaboration agreement to deliver the Japan-Cyber Operations Research, Training, and Experimentation (J-CORTEX) system, a cloud-based cyber range that emulates customer's environments for training and testing purpose
ESET a lightweight among internet security products (ChannelLife) ESET’s Smart Security 9 has received the highest score in AV-Comparatives’ latest independent performance test, which measure the impact of the product on a system
CipherCloud Honored as Best Cloud Computing Security Solution at SC Awards Europe 2016 (PRNewswire) CipherCloud, the leader in cloud visibility and data protection, today announced that its Cloud Access Security Broker (CASB) platform has been honored as the Best Cloud Computing Security Solution at the 2016 SC Awards gala on June 7 hosted in conjunction with InfoSecurity Europe 2016
EZShield Rated Best Identity Protection Leader for Third Year (Virtual Strategy) For the third time, EZShield receives top honors from Javelin Strategy & Research as the “2016 Javelin Best Overall Identity Protection Leader.” As part of Javelin’s annual scorecard, which “examines the health of the identity protection industry,” EZShield also placed first in the categories of prevention, detection and resolution
Google Denies Accusations It Manipulated Searches for Hillary Clinton (Wall Street Journal) News website alleges autocomplete service is biased in favor of Democratic presidential nominee
Developing Hashcat, a tool for advanced password recovery (Help Net Security) As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to understand the technology. He was on the lookout for a piece of software that could make use of high performance computing, something that will be helpful to many users
Technologies, Techniques, and Standards
7 Data Classification Tips (Dark Reading) Make data classification a part of your total security program
Centrify survey: Public believe government can handle cybersecurity issues (Public Technology) Most of the UK public say they trust that government would handle data security issues well, as CESG releases guidance on data protection for the public sector
Harnessing integrated security analytics (Help Net Security) Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a break-neck pace. Like all innovation, it solves an immediate need — but it’s difficult to see the new issues it will cause
Design and Innovation
How Apple Could Make Your iPhone and Mac Even More Secure (Wired) “At Apple, with every new release of hardware and software, we advance the safety, security, and data protection features in our products.” That’s Apple’s top lawyer Bruce Sewell, testifying before Congress in April, at the height of the company’s showdown with the FBI. With a new software release coming at WWDC on Monday, it’s time to take a look at what the future of Apple security might entail
IoT Security: Onus On Developers, Security Researchers (Dark Reading) Security teams and DevOps need to team up on 'lean security' processes that make safety a top priority before a product reaches the market
Microsegmentation: A new security paradigm? (GCN) Whether it’s protecting legacy systems, building new solutions or simply making sure sensitive data doesn’t fall into the wrong hands, billions of dollars have been spent on security in the last few years
Is a password-free future around the corner? Here’s all you need to know (Financial Express) From ear impressions to measuring a user’s gait for authentication, a password-free future is just around the corner
Are passwords passe? Facebook CEO Mark Zukerberg hack spotlights vulnerability (Financial Express) In a world where passwords are ubiquitous, can we dare to proclaim that they can be passé? Because the world is increasingly moving towards an era that has no place for passwords like ‘Dadada’, used by Mark Zuckerberg for his vulnerable social media
Academia
Texas A&M Cybersecurity Center receives recognition from NSA, Homeland Security (Eagle) The Texas A&M Cybersecurity Center has become the latest of the university system’s programs to receive national attention, earning a dual designation as a National Center for Academic Excellence from the National Security Agency and the Department of Homeland Security in education and research
Scholarships available for Ky. high school teachers to attend cyber security conference (Lane Report) Up to 20 scholarships available
Unique camp gives local students jump start on emerging technology (WJBF) As Augusta prepares to become the nation’s Cyber Command center, students from across the area got a sneak peek at the future at a unique camp hosted by Augusta University on Friday
Legislation, Policy, and Regulation
Australia knows it has a cyber security problem, but not the scale (ComputerWeekly) The Australian government is aware it has a cyber security challenge, but might not understand the size of the issue, according to experts
U.S.-India cyber agreement puts more pressure on China (FedScoop) The wide-ranging pact deepens the partnership on global cyber and tech issues
Govt Moves Quickly to Quell Diplomatic Spat with US Over Terror Alert (EWN) Yesterday Dirco & State Security accused the US of trying to interfere with SA’s efforts to combat terrorism.
Meet the Navy SEAL Leading the Fight Against ISIS Messaging (Defense One) Michael Lumpkin, who joined the State Department after serving as DoD's special-ops leader, believes he’s got a model for future efforts to counter extremism online in real time
Cyber Attack On Satellite Could Be Act Of War: HPSCI Ranking (Breaking Defense) In a rare public event, the No. 2 member of the House Permanent Select Intelligence Committee (HPSCI), Rep. Adam, said a cyber attack on a US satellite could be considered an act of war
Cyberterrorism and the role of Silicon Valley (TechCrunch) For the moment, at least, cyberterrorists have not harnessed the technology they would need to destroy Western civilization from a basement lab in some remote corner of the world
Cyber Deterrence “At Scale” (Lawfare) This week, Senator Sheldon Whitehouse called for the creation of a cybersecurity “militia” to strengthen US defense. He suggested reexamining a “militia model that lets ordinary citizens come to their country's aid". Whitehouse’s remarks represent a growing focus on exploring mechanisms to incorporate civilian involvement and “active defense” into traditional government activities. For example, at a recent Georgetown Cyber Policy Conference, nearly every panel turned to the conversation of “Cyber Letters of Marque” and active defense
House GOP security plan offers vague cyber strategy (FedScoop) House Speaker Paul Ryan proposed an outline framework for U.S. security posture in a post-Obama era
White House threatens to veto Senate NDAA (FCW) The White House has threatened to veto the Senate version of the annual defense policy bill, citing opposition to key provisions on acquisition and cybersecurity policy, among a litany of other objections
Carter Names Three to Innovation Board (Defense News) Secretary of Defense Ash Carter has announced three new members of his Defense Innovation Advisory Board
Litigation, Investigation, and Law Enforcement
The Orlando Massacre Shows How ISIS Outsources Terror (Wired) When faced with acts of unfathomable cruelty, humans instinctually seek out simple narratives that can help us cope with the existence of such evil
Was Orlando Shooter Really Acting for ISIS? For ISIS, It’s All the Same (New York Times) The revelation that the 29-year-old man who opened fire on Sunday in a gay nightclub had dedicated the killing to the Islamic State has prompted a now-familiar question: Was the killer truly acting under orders from the Islamic State, or just seeking publicity and the group’s approval for a personal act of hate?
Omar Mateen, Terrorist Who Attacked Orlando Gay Club, Had Been Investigated by FBI (Daily Beast) Mateen was a ‘known quantity’ to federal law enforcement before he killed at least 50 people in the worst mass shooting in U.S. history
Orlando nightclub shooter worked at one of the world’s largest security firms (Washington Post) G4S, the company that employed the man believed to have killed 50 people at a night club in Orlando is one of the world's largest security firms, with a workforce rivaling the population of Washington, D.C., that has worked with U.S. agents on border patrol, provided security to the London Olympics and responded to the recent wildfires in Canada
Omar Mateen: From Early Promise to F.B.I. Surveillance (New York Times) Omar Mateen’s life seemed to be on a successful trajectory a decade before he carried out one of the worst cases of mass murder in American history
In Orlando Massacre, a New Target for Islamist Lone Wolves: LGBT (Foreign Policy) A massacre that left at least 50 dead and 53 wounded Sunday at a packed gay nightclub in Orlando, Florida, is now the deadliest shooting in U.S. history. But the rampage may also have set another disturbing precedent, marking the first large-scale attack inspired by Islamist extremism that successfully targeted the LGBT community in a Western country
NSA: We couldn't have hacked the San Bernadino iPhone (The Hill) The National Security Agency would not have been able to open the iPhone at the center of a spat between Apple and the FBI, a top official said Friday
Despite Clinton claims, 2012 email had classified marking (Fox News) Hillary Clinton, from the moment her exclusive use of personal email for government business was exposed, has claimed nothing she sent or received was marked classified at the time
WikiLeaks to publish more Hillary Clinton emails - Julian Assange (Guardian) New release likely to fan controversy and provide further ammunition for Republican presidential rival Donald Trump
Did you know there's a mega cybercrime backlog in Ireland? Now you do (Register) Garda need 5 years to tackle it... and the help of the FBI
Google, Facebook, Microsoft start working with [Bangladesh] govt, claims Tarana (Prothom Alo) Alongside Google and Facebook, the government has also started working with Microsoft for ensuring cyber security in the country and preventing child pornography, claimed state minister for posts and telecommunications Tarana Halim
Revealing Lessons About Vulnerability Research (Dark Reading) It's not clear why a dozen FBI agents showed up at a security researcher's door last month but as cyber becomes more a factor in product safety, our judicial system needs to get a better grasp on who the real criminals are
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
Upcoming Events
SANSFIRE 2016 (Washington, DC, USA , Jun 11 - 18, 2016) For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2016 is our annual "ISC Powered" event. Evening talks tap into the expertise behind our daily postings, podcasts, and data collection efforts focusing on current trends and actual relevant threats. The strength of the Internet Storm Center is its group of handlers, who are cyber security practitioners tasked with securing real networks just like you. This is your chance to meet some of them in person.
4th International Conference on Cybercrime and Computer Forensics (ICCCF) (Vancouver, British Columbia, Canada, Jun 12 - 14, 2016) For the past four years, APATAS has organized the International Cybercrime and Computer Forensics conference at various locations throughout Asia. In 2016, our 4th annual ICCCF is moving for the first time to Simon Fraser University’s Harbour Centre campus and Centre for Dialogue at downtown Vancouver, Canada. North America has been a pioneer in cybercrime research, policy and practice since the mid-1980s. As expected, we have witnessed increasing technological developments in both personal computing and in smart-phone and wireless devices that have had an impact on how technology-enabled crimes have been committed in the Asia Pacific region and beyond. One of the key approaches to understanding such crime is through research and incorporating the outcome of research into policy and practice. The 4th Annual ICCCF 2016 Vancouver, BC, Canada therefore focuses its discussion on ‘Cybercrime: Linking Research, Policy, and Practice.’
Show Me Con (St. Charles, Missouri, USA, Jun 13 - 14, 2016) SHOWMECON. The name says it all. Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they are bringing you a one-of-a-kind event that will Show You the State of security from a unique perspective — the hacker?s viewpoint
CISO DC (Washington, DC, USA, Jun 14, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include panel discussions, think tanks, analyst Q&A sessions and much more.
Cyber Security Opportunities in Turkey Webinar (Online, Jun 14, 2016) As in other countries, Turkey is a target of high profile attacks in the public and private sectors. Instability from neighboring countries increases their risk. Since 2014 Turkey is working on a cyber security plan which includes not only government but private sector and NGOs as well. Per Cisco's 2014 Security Report, attacks occur in ICS-SCADA, web servers and malwares-6% respectively, applications-31%, infrastructure-18%, and end-users-9%.Topics include: industry drivers, trends, and key players. Open Q&A session at the conclusion of presentations. Confirmed speakers: Alper Cem Yilmaz, Founder, and Jade Y. Simsek, Mrktg Specialist, CrypTech. Learn about the Cyber Security Market in Turkey with the objective of finding sales opportunities. Turkey's Transportation, Maritime Affairs and Communications Ministry formed SOME (Cyber Incident Response Teams)for protection of cyber attacks.
The Security Culture Conference 2016 (Oslo, Norway, Jun 14 - 15, 2016) The Security Culture Conference 2016 is the leading, global conference discussing how to build, measure and maintain security culture in organizations. The conference is a part of the Security Culture Framework Community, and draws professionals from around the world to meet, share and learn about security culture.
TECHEXPO Top Secret Hiring Event (Baltimore, Maryland, USA, Jun 15, 2016) Security-cleared professionals are invited to interview for new career opportunities on Wednesday, June 15 at the BWI Marriott in Baltimore, MD. Hot job opportunities are available in Cyber Security, Intelligence, Defense and IT. Hiring managers will be onsite to fill open positions from companies including BAE Systems, CACI, Deloitte, CGI, Prosync, OnyxPoint, ShoreIT Solutions, Varen Technologies and many more.
2016 CyberWeek (Tel Aviv, Israel, Jun 19 - 23, 2016) The conference, held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), the Yuval Ne'eman Workshop for Science, Technology and Security, the Israeli National Cyber Bureau, Prime Minister's Office and Tel Aviv University, in collaboration with the Ministry of Foreign Affairs, will bring together high level international cyber experts, policy-makers, academia and researchers, security officials and foreign diplomats, attracting many participants from around the world for an exchange of knowledge, methods and ideas evolving field of cyber.
National Insider Threat Special Interest Group - South FL Chapter Kickoff Meeting (Palm Beach, Florida, USA, Jun 21, 2016) The National Insider Threat Special Interest Group (NITSIG) is excited to announce the establishment of a South Florida Chapter. Presentations and discussions will be provided by Insider Threat Defense, Inc. and the FBI. The meeting will focus on: how to recognize potential insider threat problems, employee behavioral indicators of concern, and strategies for insider threat risk mitigation.
Cyber Security for Critical Assets LATAM (Rio de Janeiro, Brazil, Jun 21 - 22, 2016) Cyber-attacks on critical infrastructure have become an increasing threat for Latin American governments and companies within the oil and gas, chemical and energy sectors. Although the attack frequency is increasing, companies are still reluctant to develop strategies to fight them. As cyber-attacks grow in sophistication, frequency and intensity, these companies are increasingly becoming high profile targets. The Cyber Security for Critical Assets LATAM Summit aims to bring together the key players involved in Cyber Security and defending critical infrastructure against the ever growing threat of attacks. The conference will connect process control and corporate IT senior level professionals, allowing them to discuss challenges, share experiences and investigate best practice guidelines. This in turn will lead to the building of robust policies and standards that will protect the future of LATAM’s critical assets.
Cyber 7.0 (Laurel, Maryland, USA, Jun 22, 2016) Cyber 7.0 delves into the cyber threat to the nation’s critical infrastructure—transportation, health care, utilities, and energy, to name a few. How can government and industry work together to battle the threats to personal and public safety? For the seventh year, regional cyber experts, small entrepreneurs, large businesses, and government organizations come together to discuss, connect, and strategize. Be a part of the solution. Sponsor, exhibit, attend.
Security of Things World (Berlin, Germany, Jun 27 - 28, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World in June in Berlin to tailor your proposition to respond to the security concerns that preoccupy enterprise customers today and find pragmatic solutions to the most common security threats.
SANS Salt Lake City 2016 (Salt Lake City, Utah, USA , Jun 27 - Jul 2, 2016) We are pleased to invite you to SANS Salt Lake City 2016, June 27-July 2. Are you ready to immerse yourself in the most intense cyber training experience available anywhere? Do you need to become a more effective leader when implementing security improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, hacker tools and incident handling, advanced digital forensics, defending web apps, or ISC/SCADA? This new event has been planned to meet your needs. Start making your plans now to attend SANS Salt Lake City 2016!
DC / Metro Cyber Security Summit (Washington, DC, USA, Jun 30, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
TECHEXPO Cyber Security Hiring Event (Tysons Corner, Virgina, USA, Jun 30, 2016) Cyber security professionals are invited to interview face-to-face with employers including The CIA, Deloitte, Intel Security, Northrop Grumman, Lockheed Martin, Deloitte, Vencore and many more. Hundreds of career opportunities are available in cyber security that need to be filled immediately. Bring copies of your resume with you and interview in person, representing yourself better than any online application ever could.