Furtim still looks like a state security tool. xDedic is back and Tor's got it. Stampado, Cerber, and Satana ransomware notes. HHS OCR clamping down on healthcare providers hit by ransomware? Patch Tuesday notes.
The energy sector cyber recon tool that SentinalOne found associated with “Furtim” on the dark web continues to look like the work of a state security service.
xDedic, the hacker server souk that vanished temporarily has resurfaced on a Tor domain, Digital Shadows reports. You can sign up for $50 (we recommend you don’t).
In the ransomware world, Heimdal outlines a newly discovered cheap-and-nasty, “Stampado,” noteworthy because it doesn’t need ransomware to operate. ThreatTrack has a detailed report on Cerber (recently active against Office 365 users), and Kaspersky reiterates warnings against Satana (which the researcher primly notes writes better Russian than it does English). Trend Micro claims to be enjoying success blocking ransomware in Asia; it’s also opened up a ransomware hotline for victims. In the US, the Office of Civil Rights at the Department of Health and Human Services releases new HIPAA guidance suggestive of a punitive approach to healthcare ransomware victims.
Yesterday was Patch Tuesday, and Microsoft issued fixes for eleven bugs, six of them “critical.” One closed a printer drive-by vulnerability, another closed the door to some Office security feature bypasses. Adobe and Drupal also patched.
Signs suggest ISIS is preparing for the loss of its territory. Inspiration and online presence will wax in importance as conventional training and command wane.
Russian security officials voice concerns similar to those heard in the West: understaffing, not enough resources, constant pressure of ongoing cyber attacks. They also deplore officialdom’s stubborn reliance on Western software: more autarky equals more security.
Notes.
Today's issue includes events affecting Australia, European Union, Germany, Indonesia, Iraq, Israel, Malaysia, Russia, Singapore, Syria, Ukraine, United Kingdom, and United States.
A note to our readers: we'll be up in New York tomorrow, covering SINET's 2016 Innovation Summit. Watch for live-Tweeting and a special issue featuring a comprehensive report on the conference.
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the University of Maryland's MC2, as Jonathan Katz tells us about "fansmitter" malware and their purported ability to exfiltrate data from air-gapped machines. We also have an interview with Scott Stables of Booz Allen Hamilton about BAH's recent report on industrial control system security. (Like the podcast? If you do, and if you'd care to review it, you can share your thoughts at iTunes.)
Cyber Attacks, Threats, and Vulnerabilities
Inside ISIS: Quietly preparing for the loss of the ‘caliphate’ (Washington Post) Even as it launches waves of terrorist attacks around the globe, the Islamic State is quietly preparing its followers for the eventual collapse of the caliphate it proclaimed with great fanfare two years ago
Russia reports increase in cyber-attacks by Western special services (SC Magazine) Just as Western governments are concerned about Chinese or Russian state hackers, the Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government
Researchers Found a Hacking Tool that Targets Energy Grids on the Dark Web (Motherboard) A sophisticated piece of government-made malware, designed to do reconnaissance on energy grid’s system ahead of an eventual cyberattack on critical infrastructure, was found on a dark web hacking forum
Nation-backed malware that infected energy firm is 1 of 2016’s sneakiest (Ars Technica) Tool only drops malware after painstakingly dismantling AV and other defenses
xDedic Hacked Server Market Resurfaces on Tor Domain (Threatpost) The xDedic market has resurfaced, this time on a Tor network domain and with the inclusion of a new $50 USD enrollment fee
An online market that offered cheap hacked servers returns (PC World) The xDedic site had been offering access to hacked servers across the world
Windows Print Spooler Flaws Lead to Code Execution (Threatpost) Networked printers have always posed an interesting attack vector, mostly for academics looking for vulnerabilities, and vandals sending garbage to the print bin
Critical printer vulnerability (CVE-2016-3238) discovered in Microsoft Windows (Vectra) The Vectra Threat Labs discovered a critical vulnerability that allows printer watering-hole attacks to spread malware
Little Snitch Bug Leaves Some Mac Systems Open to Attack (Threatpost) Trusted Mac OS X firewall Little Snitch is vulnerable to local privilege escalation attacks that could give criminals the ability plant rootkits and keyloggers on some El Capitan systems
Security Alert: New and Cheap Stampado Ransomware for Sale on the Dark Web (Heimdal Security) This cryptoware strain plays Russian roulette with your files. And doesn't need administrator privileges to encrypt your data
A Look at the Cerber Office 365 Ransomware (ThreatTrack Security Labs) Reports of a Zero-day attack affecting numerous Office 365 users emerged late last month (hat tip to the researchers at Avanan), and the culprit was a new variant of the Cerber ransomware discovered earlier this year. As with the other Zero-day threats that have been popping-up like mushrooms of late, the main methods of infection is through the use of Office macros
Petya clone Satana is the new Russian-linked 'ransomware from hell', says Kaspersky Lab (International Business Times) The ransomware not only encrypts files but also blocks Windows booting processes
10M Ransomware-Related Cyber Threats Detected, Blocked in Apac, Says Security Firm (CFO Innovation) More than ten million ransomware-related cyber threats have been detected and blocked in Asia Pacific (APAC) from January to May this year, while the total number of similar attacks exceeded 66 million globally, according to Trend Micro, Inc
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter (THREATgeek) With season two of Mr. Robot approaching, the storyline follows a hacker group that takes down an evil global corporation and collapses the financial market. Led by the mysterious Mr. Robot, the hackers use a variety of tricks to evade detection, and seem to cover their tracks at every turn. There are similarities shared by the show's hackers and real-life attackers
Healthcare Hacks Face Critical Condition (Dark Reading) It's not just SSNs and credit cards -- detailed patient records and full EHR databases are targeted by cybercriminals today
Healthcare Under Attack: Cybercrimials Target Medical Institutions (InfoArmor) In mid-May 2016, InfoArmor notified the National Healthcare and Public Health Information Sharing and Analysis Center (NH-ISAC), along with the appropriate parties concerning the incident, providing them with relevant information for further investigation and identification of the key bad actors
A ‘Pokémon Go’ Bug Is Reportedly Locking People Out of Their Accounts (Motherboard) The most stunning thing about Pokémon Go, Nintendo’s implausibly successful attempt at resuscitating itself, isn’t its popularity—instead, it’s the wide gulf between the fun factor of the game is and the shoddiness of the app
Fake Pokémon GO app watches you, tracks you, listens to your calls (Naked Security) Have you heard of Pokémon GO? If you haven’t, you probably will soon: it’s an online game for mobile phones, and it’s taken the world by storm
Some public places want more Pokémon Go—but the Holocaust Museum does not [Updated] (Ars Technica) Follows anecdotal police, medical reports of people using the app to their detriment
Google, Niantic to Limit Data Pokémon GO Collects (Threatpost) Niantic, Inc. – the company behind the ubiquitous, can’t-go-10-minutes-without-hearing-about-it Pokémon GO game – said Monday night it wasn’t the company’s intent to request full access permission of its users’ Google accounts
Sen. Al Franken questions Niantic over Poképrivacy policy (TechCrunch) Always with his finger on the pulse, Senator Al Franken (D-Minn.) today sent an official request to Niantic asking about particulars of the Pokémon Go privacy policy
Sicherheitstipps für Pokemon Go Spieler (Online PC) Pokémon Go: Android App-Version mit integrierter Hintertür aufgetaucht. Mit diesen Tipps sind Fans auf der Jagd nach Taubsi und Co. sicher unterwegs
UK Network Rail: British transport system had four cyberattacks in one year (International Business Times) Cyber criminals could access trains, computer networks or message boards
Hacked 3D printers could commit industrial sabotage (CSO) Hackers could introduce defects into printed products, researchers are warning
Cybersecurity risks in 3D printing (Help Net Security) 3D printing (i.e. additive manufacturing) is a $4 billion business set to quadruple by 2020
Comcast business phone service is down and small businesses are freaking out (TechCrunch) Comcast’s business phone service seems to be having a huge nationwide outage. While the company acknowledged that some customers may be experiencing problems with phone service, the issue seems to be pretty widespread, with reported outages in dozens of cities across the country
Seeking Alpha Mobile Financial App Forgoes Encryption (Threatpost) A popular mobile application that provides financial market research material operates without a measure of encryption, putting user information, including credentials and strategic financial interests at risk
IBM Discovers Vulnerability In MIUI; Fix Is Already Out (Android Headlines) The IBM X-Force Application Security Research Team recently revealed that it has discovered a vulnerability in Xiaomi’s MIUI operating system, which would technically allow for an attacker to execute code remotely on a device through man-in-the-middle attacks. The good news is that the vulnerability has been addressed by Xiaomi, and as a PSA, owners of Xiaomi smartphones are advised to update their devices to the latest available firmware
Inactive SingPass accounts a security risk? (Straits Times) About half of all 3.3 million account holders have not registered for SingPass' new two-factor authentication (2FA) feature when the July 4 sign-up deadline passed
Fortinet warns Malaysians about the Dark Web (MIS Asia) Prompted by a recent case of a British paedophile operating in Malaysia, networking security specialist Fortinet has issued an advisory warning Malaysians about the Dark Web where illicit videos and images were found posted
Security Patches, Mitigations, and Software Updates
Microsoft Patch Tuesday Summary for July 2016 (SANS Internet Storm Center) As usual for the second Tuesday fo the month, Microsoft today released its monthly security updates. Microsoft released a total of 11 bulletins. 6 are rated critical, and the remaining five are rated important
Adobe, Microsoft Patch Critical Security Bugs (KrebsOnSecurity) Adobe has pushed out a critical update to plug at least 52 security holes in its widely-used Flash Player browser plugin, and another update to patch holes in Adobe Reader. Separately, Microsoft released 11 security updates to fix vulnerabilities more than 40 flaws in Windows and related software
July 2016 Patch Tuesday: Microsoft releases 11 security updates, 6 rated critical (Network World) Lucky you, it's that time again. Happy patching!
Microsoft splats bug that turns printers into drive-by exploit kits (Help Net Security) In this month’s Patch Tuesday, Microsoft has released 11 sets of patches – 6 “critical” and 5 “important”
Microsoft Fixes Bypass of Critical Security Feature in Office Suite (Softpedia) Microsoft closes the door for macro-malware and OLE exploits
Adobe Patches 52 Vulnerabilities in Flash Player (TechCrunch) Adobe today pushed out an updated Flash Player that patched 52 vulnerabilities, most of which led to remote code execution on compromised machines
Pokémon Go updated to address privacy concerns (TechCrunch) After users and press noticed that Pokémon Go on iOS requested “full access” to a user’s Google account when signing up, Niantic promised an update to modify the permissions required. Now, less than 24 hours after Niantic made that promise, the update is live, and limits asked-for info to just “Know who you are on Google” and “View your email address”
Update Your Pokémon Go App Now to Fix That Privacy Mess (Wired) The game Pokémon Go is extraordinarily popular, with one extraordinarily unpopular drawback: Its iOS app has demanded full access to all of your Google account information. That means it could have potentially been able to “see and modify nearly all information in your Google Account,” according to Google, short of changing your password or tapping into Google Wallet. This is very bad! And now you can fix it
Drupal: Patch released today to fix a highly critical RCE in contributed modules (SANS Internet Storm Center) Drupal announced that they will release today (Wed July 13th 2016 16:00 UTC) a patch that will fix highly critical remote code execution vulnerabilities in contributed modules. Drupal core is not affected
Cyber Trends
Security vs. Privacy: Is there still a conflict? (The Hill) At a time of the global information security crisis, we often hear that in order to achieve stronger security against emerging threats, including terrorism and cyber attacks, we must accept less privacy. This should apply to our communications, financial transactions, and all other internet-powered activities. Many simply assume that more visibility and state control automatically translate into more safety
The explosive growth of the IoT security market (Help Net Security) The IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets
Opportunity knocks in cyberspace (Asia and the Pacific Policy Forum) Where prosperity and security are not so strange bedfellows
Advanced Persistent Threats Are The Next IT Security Battleground In UK Public Sector, Reveals Gigamon iGov Survey (RealWire) Study shows clear understanding of cyber risks, with 85 percent respondents reviewing security considerations
Marketplace
Bay Dynamics Announces $23 Million Series B Financing Round Led By Carrick Capital Partners (Bay Dynamics) Bay Dynamics®, a leader in cyber risk analytics, announced today that it has completed a $23 million Series B financing round led by Carrick Capital Partners, an investment firm focused on technology-enabled businesses including SaaS, Software, BPO and Transaction Processing. The round includes capital from Series A investor Comcast Ventures, the venture capital affiliate of Comcast Corporation
Imperva Q2 View May Lift Akamai, Proofpoint (Barron's) Strength for Imperva’s cloud-based security solutions is a positive read on Akamai and may be a positive for Proofpoint
Eisen bringing new technology to cybersecurity space (Phoenix Business Journal) Ori Eisen is a pioneer in the Valley’s world of cyber safety. His latest effort in providing online security is Scottsdale-based company Trusona
Portland startup sees security threats in everyday devices (Oregonian) The webcam baby monitor, the computer chips in an elevator panel, the circuitry inside medical devices: Portland startup Senrio sees these as the next frontier in online security
Paint it black: Revisiting the Blackphone and its cloudy future (Ars Technica) Layoffs, legal disputes, and a major OS update shuffle the deck for privacy-focused phone
The 'Pokémon Go' Endgame: Getting You to Walk Into Chipotle (Motherboard) Much of the news about the augmented reality smartphone game Pokémon Go currently focuses on how it's leading people out of their homes and into parks and to landmarks they might have otherwise avoided, but already there are signs of change
FCA offering hackers cash to identify security risks (Detroit News) Fiat Chrysler Automobiles NV is becoming the most recent automaker to turn to hackers and other software gurus outside the company to identify potential security issues with their vehicles and software systems
SWIFT makes big cybersecurity push following criticism over record-breaking cyber heist (CIO Dive) Dive Brief: Financial communications network SWIFT announced Monday it has hired BAE Systems and Fox-IT to help improve its own security and probe customer security incidents, according to a statement. SWIFT also recently created a dedicated internal Customer Security Intelligence team to bolster its customer information sharing initiative, which aims to help thwart cyberattacks across the network. Both efforts are part of the global financial messaging network’s recently launched Customer Security Programme, where SWIFT helps its "community" by offering "forensic investigations" related to its products and services
Pentagon punts propaganda contractor (USA Today) The Pentagon has severed its relationship with its longtime propaganda contractor in Afghanistan after spending more than $425 million on its pamphlets, broadcasts, websites and billboards
Fulcrum to Support SAIC in Cyber Operations Work With Cybercom (GovConWire) Science Applications International Corp. (NYSE: SAIC) has awarded Fulcrum a subcontract for technology and operations services in support of the former’s cyber operations contract with U.S. Cyber Command, ExecutiveBiz reported Monday
Symantec Name President and COO (Infosecurity Magazine) Symantec has announced that Michael Fey is to join the company as President and Chief Operating Officer
Forcepoint™ Solidifies Cyber Research & Innovation Leadership with Executive Appointments (PRNewswire) Team of Richard Ford, Kris Lamb and Brian Shirey position Forcepoint to help organizations solve the most advanced and evolving security threats
Products, Services, and Solutions
Trend Micro’s Free Hotline and Tools Help Consumers Combat Ransomware (Yahoo! Finance) Consumers worried about the extremely disruptive online threat called “ransomware” have a serious ally in Trend Micro (TYO: 4704; TSE: 4704), one of the world’s leading cybersecurity companies. To help U.S. consumers - whether they are Trend Micro customers or not - the company has set up a free hotline and ransomware resource center to provide education on what ransomware is and advice on how best to protect themselves against it or respond to an attack
SecureWorks Delivers Powerhouse of Security Intelligence and Threat Prevention with Palo Alto Networks Security Platform (Yahoo! Finance) SecureWorks Corp. (SCWX) today announced an integration which combines the high-fidelity portions of its proprietary Attacker Database with the Palo Alto Networks® Next-Generation Security Platform as part of the SecureWorks managed Palo Alto Next-Generation Firewall Service. This solution is designed to enhance security for organizations worldwide with additional threat intelligence
How ‘Cyber Guards’ Patrol Networks Looking For Hackers (Motherboard) Given the ever-increasing and seemingly unstoppable pervasiveness of hacks and cyber thefts, every year seems to be the year of the data breach
Cybersecurity Found Lacking in US Air Force's Troubled OCX Program (Defense News) During the eight years Raytheon developed a new GPS control station, the company fell prey to one of the pitfalls that have plagued many acquisition programs throughout history, a key Air Force official said Tuesday
Are You at Risk From Phishing Attacks? Try Phishing Yourself (eWeek) Duo Security launches a free phishing simulation tool that lets organizations test their readiness against phishing attacks
Technologies, Techniques, and Standards
CISSP certification: Are multiple choice tests the best way to hire infosec pros? (Ars Technica) Focus on skills instead of certifications like the CISSP, experts argue
Blog: The Virtual Cybersecurity Frontier (SIGNAL) It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The explosion of software defined network (SDN) concepts over the past few years brings great promise for new networking capabilities and increased economies of scale. The rapid adoption of SDN and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization. Additionally, SDN will bring many benefits to enterprise securities yet to be fully explored or imagined
Now it’s easy to see if leaked passwords work on other sites (Ars Technica) Freely available tool follows the release of more than 642 million account credentials
The Crooks Share Intel. So Should Your Company. (PaymentsSource) The Federal Financial Institutions Examinations Council (FFIEC) recently issued a warning for financial institutions to review their cybersecurity as it relates to fraudulent transfers and global payment networks
Keys to successful security vendor collaboration (Help Net Security) The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and general IT dynamics has, in turn, driven a near equal proliferation of products and services aimed at helping manage the associated risks. Keeping up with the categories of products and services that now make up the security vendor landscape is challenging enough, not to mention keeping abreast of the strengths and weaknesses of individual vendors
Power grid cyber deal between utility and National Guard hailed as model (FedScoop) The deal, under which Washington state's Air National Guard penetration tested the computer network of a state-owned utility, took two years to put together and could be replicated nationwide
Design and Innovation
IBM clocks up blockchain first in Singapore (IBS Intelligence) IBM is to open a blockchain innovation centre in Singapore. In conjunction with the Singapore Economic Development Board (EDB) and the Monetary Authority of Singapore (MAS), IBM will over the next three years work with government, industries and academia to develop applications and solutions which are based on enterprise blockchain, cyber security, and cognitive computing technologies. The centre will also engage with SMEs to create new applications and grow new markets in finance and trade
The hacker who makes sure 'Mr. Robot' gets it right (Christian Science Monitor Passcode) Cybersecurity researcher Marc Rogers is the principal hacking consultant on the hit TV show "Mr. Robot," which debuts its second season on the USA Network Wednesday
An interview with the anonymous founder of PostGhost (TechCrunch) PostGhost was a service that stored and displayed the deleted Tweets of celebrities and politicians. Created as a way to keep public discourse honest, Twitter shut it down with a cease and desist warning citing a failure to comply with API rules. The resulting brouhaha led me to track down the anonymous founder and ask him or her a few questions about what happened
Legislation, Policy, and Regulation
ASIO to swap spies with Indonesia to combat ISIS (Australian) Australia will exchange spies with Indonesia in a bid to confront the growing scourge of Islamic State-inspired terrorism in the region
Cyber Warfare Is Real — Should We Blame the U.S. and Israel For Starting It? (Forward) In late 2009, something almost laughably scary started happening at the Natanz nuclear facility in Iran: centrifuges — slim cylinders containing powerful rotors used to enrich uranium — began exploding
The EU-US Privacy Shield: what happens next? (Help Net Security) Yesterday the European Commission formally approved the EU-US Privacy Shield, making transfers of personal data to the US legal under European law for companies that have certified to the framework
EU’s General Data Protection Regulation Is Law: Now What? (Dark Reading) Organizations have two years to prepare to act as borrowers, not owners, of customer data. Here are seven provisions of the new GPDR you ignore at your peril
Influencers: Antihacking law obstructs security research (Christian Science Monitor Passcode) A strong 75 percent majority of Passcode’s Influencers said a US government law used to prosecute hackers overly restricts necessary security research
OCR’s HIPAA guidance on ransomware puts pressure on providers (Health Data Management) With the healthcare industry increasingly coming under attack from ransomware gambits, the Department of Health and Human Services’ Office for Civil Rights has released new HIPAA guidance on the risks of being victimized by file-encrypting malware
White House releases plan to boost cyber workforce (Federal Times) The cybersecurity challenge has a number of dimensions, not the least of which is finding enough qualified people who truly understand the problem and potential solutions. But the administration has a plan
DHS pushes for more cyber experts in the field (FCW) The Department of Homeland Security wants to expand a program that puts federal cyber and physical security experts on the ground in potentially vulnerable spots, officials told lawmakers
Army merging electronic warfare into new cyber directorate (C4ISRNET) The Army has disbanded its electronic warfare division, though this is not the end for its staff or electromagnetic spectrum capabilities. Instead, the Army will incorporate the EW division into a newly established cyber directorate at the Pentagon within the Army G-3/5/7, according to officials at Army headquarters
Energy Department Announces Up to $15 Million to Help Improve the Security and Resilience of the Nation’s Power Grid (Energy.gov) As part of the Obama Administration’s commitment to protecting America’s critical infrastructure, U.S. Deputy Energy Secretary Elizabeth Sherwood-Randall today announced new funding to strengthen and protect the nation’s electric grid from cyber and physical attacks. The Energy Department will provide up to $15 million, subject to congressional appropriations, to support efforts by the American Public Power Association (APPA) and the National Rural Electric Cooperative Association (NRECA) to further enhance the culture of security within their utility members’ organizations
Litigation, Investigation, and Law Enforcement
Senators ask FTC how it plans to stop click fraud (SC Magazine) In a letter sent yesterday to the Federal Trade Commission, U.S. Sens. Charles Schumer (D-N.Y.) and Mark Warner (D-Va.) requested that the agency turn its attention to digital ad fraud and its detrimental economic impact
Shifting the cost of security (Network World) Security teams fight a constant battle—and spends lots of money—preventing cyberattacks. We need to shift the burden and have prosecutors go after cyber criminals
For the first time, federal judge tosses evidence obtained via stingray (Ars Technica) Judge: "The Government may not turn a citizen’s cell phone into a tracking device"
FBI Agent: Decrypting Data ‘Fundamentally Alters’ Evidence (Motherboard) An FBI agent has brought up an interesting question about the nature of digital evidence: Does decrypting encrypted data “fundamentally alter” it, therefore contaminating it as forensic evidence?
TOS agreements require giving up first born—and users gladly consent (Ars Technica) Study says participants also agreed to allow data sharing with NSA and employers
AG Lynch stonewalls congressional hearing over Clinton e-mail scandal (Ars Technica) Attorney general testifies "it would be inappropriate for me to comment further"
Loretta Lynch Defends Her Decision on Hillary Clinton’s Emails (Time) "The matter was handled like any other matter"
Three takeaways from AG Loretta Lynch's testimony (Washington Examiner) 1. We learned nothing new
FBI to return thousands of recovered Clinton emails to State Department for potential release (Washington Post) The FBI said Tuesday that it will turn over to the State Department thousands of work-related emails recovered in the investigation into Hillary Clinton’s use of a personal email server while secretary that the State Department said it then will review for possible public release
Clinton legal team moves to block deposition in email lawsuit (Politico) Lawyers for Hillary Clinton are going to federal court for the first time to block efforts to force her to testify in a civil lawsuit related to her private email set-up
Senate investigation says top US diplomat deleted emails (McClatchyDC) A senior U.S. diplomat deleted an untold number of work emails, apparently unaware that even routine messages received and sent by a top government official should be saved, according to a Senate investigation released Tuesday
Whistle-Blower on N.S.A. Wiretapping Is Set to Keep Law License (New York Times) A District of Columbia bar committee has agreed to a deal that would let a former Justice Department lawyer keep his law license even though he said he was one of the sources for a 2005 article in The New York Times about the National Security Agency’s program of wiretapping without the court-approved warrants ordinarily required for domestic spying
Teenager admits Mumsnet password cyber attack charges (BBC) A teenager has pleaded guilty to a cyber attack on Mumsnet which caused the parenting site to reset the passwords of 7.7 million members
German Convicted of War Crime for Posing With Heads in Syria (ABC News) A German court has convicted a man of committing a war crime after he posed for photos with severed heads in Syria. The 21-year-old, a German with Iranian roots, was sentenced to two years in prison
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Secure Bermuda 2016 (Bermuda, Aug 10, 2016) Industry-leading intelligence from expert cybersecurity thought leaders and innovators. In addition to human capital shortages, the Bermudian cybersecurity industry faces an uphill battle to keep up with the acceleration of Internet-connected technology. Join us on August 10th at the Hamilton Princess Hotel for Secure Bermuda 2016. In just one day, the event will provide essential intelligence that enables Bermudian technology leaders to drive their cybersecurity strategy forward. The conference covers today's cybersecurity trends and threats as well as those of the future, equipping delegates with the tools needed to cope in an increasingly complex landscape.
SANS Alaska 2016 (Anchorage, Alaska, USA, Aug 22 - 27, 2016) SANS is bringing our renowned security training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great Alaskan wilderness. SANS Alaska will feature two hands-on, immersion-style security training courses taught by real-world practitioners August 22-27, 2016 in Anchorage.
Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, Sep 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential technological changes occurring around us, and the confidence to accelerate tangible next steps. Gigaom Change is designed to empower businesses of today to thrive in a world of tomorrow. Gigaom Change will focus on the seven most disruptive enterprise technologies that are widely known but little understood: Artificial Intelligence, Virtual Reality, Robotics, Nanotechnology, Cybersecurity, 3-D Printing, and Human-Machine Interface.
CSX 2016 North America (Las Vegas, Nevada, USA, Oct 17 - 19, 2016) Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2016 North America Conference. CSX 2016 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.
Upcoming Events
SINET Innovation Summit 2016 (New York, New York, USA, Jul 14, 2016) “Connecting Wall Street, Silicon Valley and the Beltway.“ SINET Innovation Summit connects America’s three most powerful epicenters and evangelizes the importance of industry, government and academic collaboration on joint research initiatives. The opportunity to bring practitioners and theory together to discuss fundamental Cybersecurity challenges is critical to the advancement of innovation in the Cybersecurity domain. This summit is designed to reinvigorate public-private partnership efforts and increase relationships that foster the sharing of information and joint collaboration on Cybersecurity research projects
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
cybergamut Technical Tuesday: The Importance of Managing Attribution Online by Dani Charles of Ntrepid Corporation (Elkridge and Calverton, Maryland, USA, Jul 19, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 19 July 2016 (1600 – 1730 East Coast Time). The importance of open-source intelligence (OSINT) has increased exponentially as more and more information has come available online. At the same time, the increased sophistication of websites and platforms means the content one sees can be easily blocked or manipulated based on one’s attribution to an organization, region, or country. This presentation focuses on the importance of Managed Attribution, detailing the technical methods employed by websites and platforms to determine attribution, and presenting solutions that allow users to manage their attribution in order to get access to the most authentic and accurate information.
CyberSec 2016 (New York, New York, USA, Jul 19, 2016) Ask any bank CEO in the U.S. what keeps them up at night and cybersecurity is bound to be in the top five. Maybe even no. 1. And while the threat matrix is evolving rapidly, along with the regulatory demands, so are the technology tools available to help meet them. This one-day conference will take a big-picture look at the threats facing banks today and tomorrow, and offer insights on how to combat them.
Nominations are now open: National Cyber Security Hall of Fame (Baltimore, Maryland, USA (nominations submitted online), Jul 20, 2016) The Cyber Security Hall of Fame "Respect the Past - Protect the Future" accepts nominations from companies and organizations that are engaged in, and committed to, the growth of the cyber security industry. Each of the nominators can submit nominations in the following categories or combination of categories: Technology, Policy, Public Awareness, Education, and Business.
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
Billington Global Automotive Cybersecurity Summit (Detroit, Michigan, USA, Jul 22, 2016) Billington Cybersecurity, an independent conference company focused exclusively on cybersecurity seminars, announces the first global summit that brings together the most senior government and industry experts to examine cyber security in the automotive industry. The Chairman and CEO of General Motors, Mary Barra, U.S. Transportation Secretary Anthony Foxx, U.S. Senator Gary C. Peters and Lyft CEO and Co-Founder Logan Green will discuss industry and government insights on automotive cybersecurity.
Community College Cyber Summit (3CS) (Pittsburgh, Pennsylvania, USA, Jul 22 - 24, 2016) The third annual Community College Cyber Summit (3CS) is organized and produced by six Advanced Technological Education (ATE) centers funded by the National Science Foundation (NSF) and involved in cybersecurity. 3CS meets the perceived need for a national academic conference that focuses exclusively on cybersecurity education at the community college level. Faculty, administrators, and other stakeholders in community college cybersecurity education are invited and encouraged to attend
SANS ICS Security Summit & Training — Houston 2016 (Houston, Texas, USA, Jul 25 - 30, 2016) SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses.
SANS San Jose 2016 (San Jose, California, USA , Jul 25 - 30, 2016) Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. We will see you at The Westin San Jose, located in the heart of downtown San Jose. Now is the time to improve your information security skills. SANS San Jose 2016 features comprehensive hands-on technical training from some of the best instructors in the industry and includes several courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans to attend now!
AfricaHackOn (Nairobi, Kenya, Jul 28 - 29, 2016) What began as a casual meet up for information security professionals has become one of the formidable forces in the profession. That group is the AfricaHackOn. Housed under its parent umbrella, Euclid Consultancy Ltd, AH as fondly known, has traversed all odds to becoming a leading venture in raising awareness on matters affecting cyber security and also grooming upcoming talent into the job market. We have been poised to becoming a one stop shop for talent and resources in a field greatly short staffed.