Cyber Attacks, Threats, and Vulnerabilities
Thousands of New Yorkers named as apparent Islamic State targets (Christian Science Monitor Passcode) An online group claiming Islamic State ties threatened 3,600 New Yorkers and distributed their personal information last week on a secure messaging app
ISIS hackers respond to US cyberattacks with threat (Vocativ via AOL) A group of pro-ISIS hackers known as the United Cyber Caliphate responded to cyber attacks mounted by the U.S. against the terror group with a threat
Pro-Daesh hackers: More bark than bite, lacking in skills and resources (CSO) Flashpoint report says ISIS hackers are a fragmented bunch, more propaganda than fight
Pro-ISIS Hacking Groups Growing, Unifying, But Still Unskilled (Dark Reading) Flashpoint report outlines the patchwork of hacking groups and the validity of their claims to fame
Why the U.S. is bragging about dropping 'cyberbombs' on ISIS (Mashable) The U.S. has started "dropping cyberbombs" on ISIS computer networks, according to a recent New York Times report
German nuclear plant suffers cyber attack designed to give hackers remote access (Telegraph) A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday
IoT attacks threaten national security, say cyber experts (Army News Service via DVIDS) Dams, the power grid and other such infrastructure were once closed network systems. Then they were added to the Internet
Anonymous Leaks 1TB of Data from Kenya’ Ministry of Foreign Affairs (Hack Read) The online hacktivist Anonymous has conducted a sophisticated cyber attack on the government of Kenya by breaching its Foreign ministry server, stealing a trove of data and ending up leaking some of it on the Dark Web. The cyber attack was conducted under the banner of operation OpAfrica which was launched last year against child abuse, child labour and corruption in the African countries
Malware ‘used as part of a wider toolkit’ in Bangladesh Bank attack (We Live Security) Malware used by cybercriminals to carry out one of the biggest cyberheists in history is thought to have been “part of a wider attack toolkit”, according to a BAE Systems’ security researcher
New malware targets Facebook users (Manilla Bulletin) IT security company ESET warned Facebook users on Wednesday (April 27, 2016) of another malware-spreading scam
New Attack Technique Hides Spread of RATs in Asia (TechNewsWorld) SentinelOne last week announced that it has detected a technique being used in Asia to infect systems with remote access Trojans that ensures that the payload remains in memory throughout its execution and doesn't touch the victim's computer disk in an unencrypted state
Platinum APT Group Abuses Windows Hotpatching (Threatpost) An obscure Windows feature known as hotpatching, missing in the OS since the introduction of Windows 8, is a preferred tool used by a resourced attack group called Platinum that was uncovered by Microsoft
Cyberespionage group abuses Windows hotpatching mechanism for malware stealth (IDG via CSO) The group has targeted Asian government organizations since 2009
Qatar National Bank Suffers Massive Breach (InfoRisk Today) Customer details, card data apparently leaked online
Examining the leaked passwords and PINs from Qatar National Bank (CSO) Those accused of being spies make common, careless password mistakes
Verizon: Sabotage incidents soar as workers strike (CNN Money) Cord-cutting has been taken to a new extreme at Verizon -- and the company is suggesting striking workers are to blame
7 million users affected by Minecraft community Lifeboat data breach (Help Net Security) Minecraft community fansite “Lifeboat” has admitted that it suffered a data breach in January, after security researcher Troy Hunt added some of the stolen data to his “Have I Been Pwned?” website
Hillary supporters accused of taking down Bernie FB pages in porn attack (The Hill) Multiple Facebook pages supporting Democratic presidential candidate Bernie Sanders were abruptly removed from the social media network late last night following a cyberattack
Security Patches, Mitigations, and Software Updates
Users are patching Windows, but QuickTime and Java vulnerabilities remain, says Secunia (ZDNet) Secunia's latest reports of software vulnerabilities on PCs running Microsoft Windows should prompt users to patch all their software, and uninstall both Apple QuickTime and Oracle Java
Cyber Trends
AppRiver Reports Q1 2016 Spam, Malware Traffic Eclipses 2015 Highs (Investing News) AppRiver, LLC, a leading provider of email messaging and Web security solutions, today confirmed that the levels of spam and malware email traffic it recorded during Q1 has already surpassed total levels documented during the whole of 2015, totaling at 2.3 billion malicious email messages, with 1.7 billion occurring in March alone
Whistleblower Snowden Gets Big Screen Treatment (Eyewitness News) The trailer for Oliver Stone’s ‘Snowden’ was released on Wednesday
Marketplace
'Made in India' Cybersecurity: Why Not? (InfoRisk Today) Here's how the nation can become a global information security powerhouse
Nasdaq CEO: Could've done better on SecureWorks, but at least IPOs are pricing (CNBC) Nasdaq CEO Bob Greifeld acknowledged on Wednesday that the initial public offering for information security firm SecureWorks could have gone better, but he pointed to a silver lining: at least IPOs are finally pricing
Has market consolidation killed VC investment in cyber security startups? (Computer Business Review) Industry experts weigh in on where the smart money is going in cyber security
BugCrowd's $15m fund win shows Oz infosec can score Series B: CEO (Register) Don't sit on your ideas, bug chief urges hackers
La startup SparkCognition lève 6M$ pour la maintenance prédictive (ObjetConnecte) SparkCognition, startup spécialisée dans l’intelligence artificielle et la cyber-sécurité, a clôturé une levée de fonds de 6 millions de dollars en série B auprès d’investisseurs comme Verizon Ventures et CME Ventures
2 Cybersecurity Buyouts to Watch for (Motley Fool) Will FireEye and CyberArk get bought out in a market-wide consolidation?
Is FireEye the Best Stock in Cyber Security Market? (GuruFocus) FireEye has risen at a rapid rate over the last few weeks
Makes Perfect Disruptive Stock Pair- Akamai Technologies (NASDAQ:AKAM), NIKE (NYSE:NKE), Sempra Energy (NYSE:SRE) (Seneca Globe) Akamai Technologies, Inc. (NASDAQ:AKAM) kept in active run as it closed at $52.66 by shows upbeat performance moving up 3.07% with session volume was recorded 3.72 Million.Akamai Technologies Inc, released that a improved than anticipated 7.8% rise in quarterly income, helped by higher demand for its cloud security services. Income from Akamai’s cloud security business, which protects websites and data centers from cyber attacks, surged 46 percent to $80.7 million for the first quarter
Lockheed Martin announces layoffs (WBNG) Military contractor Lockheed Martin is making cuts to its workforce
Hewlett Packard Enterprise: Wanna walk the plank voluntarily? You got it (Register) Either way, biz wants to cut 1,092 UK staffers from the wage bill
RiskIQ Selected as One of JMP Securities Fast 50 Hottest Privately Held Security Companies (Realwire) Builds on strong 2015 and consolidates leadership position as the external threat management platform of choice
Government and Industry Need to Clean Up Their Procurement Act (SIGNAL Magazine) Neither side is happy, but both agree current acquisition policies and cultures must change
Intelligence community launches classified marketplace for cloud technology (Federal News Radio) The U.S. intelligence community has just opened a new marketplace for cloud applications, the idea being to let analysts and developers test-drive thousands of commercial data analytic tools for a pittance and without waiting for their agencies to make large commitments of time and money via usual government procurement channels
Forcepoint Names Matthew P. Moynahan as CEO (PRNewswire) Industry leader tapped to drive security company forward
FireMon Delivers Record 2015 Revenue; Adds Security Industry Veteran as CMO in Q1 2016 (MarketWired) Former Juniper Networks and McAfee marketing executive Michael Callahan joins FireMon as the security management company builds on record revenue, bookings and customer growth
Do you have what it takes to be an independent security consultant? (Help Net Security) It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself
Products, Services, and Solutions
C3 Alliance is a Justice League for Privileged Account Protection (Infosecurity Magazine) CyberArk has launched the equivalent of a cyber Justice League: The C3 Alliance brings together a super-group of companies for the purpose of boosting privileged account security best practices
California Department of Water Resources Delivers Secure IT Services Using Arkin (BusinessWire) Enables fully operational cloud 3.0; next-gen, software-defined data center to improve multi-tenancy and aecurity
Allot Enables Mobile Service Providers to Extend Security Beyond Network Boundaries with Secure Dome (Consumer Electronics) Extending its SECaaS platform capabilities, Allot WebSafe Personal and WebSafe Business now protect broadband users from malware, ransomware and other online security threats anywhere, anytime
IT Weapons Partners with Thycotic to Reduce Cyber Risk for Global Client Base (PRNewswire) Partnership shatters security risks by arming global consultants with enterprise privileged account management
Death of the enterprise VPN - if remote access is not secure what comes next? (ComputerWorld) Enterprise VPNs are an idea out of time. Zscaler's Private Access wants to be what's next
Samsung moves Knox beyond security with business services push (Android Central) Samsung is expanding its Knox security platform with a new group of business-focused tools. The new Knox will move beyond not just mobile, but security as well, transforming into the platform on which Samsung's enterprise services are built
SentinelOne Certified for HIPAA and PCI DSS Compliance (BusinessWire) Security assessor report validates next-generation endpoint protection platform exceeds compliance requirements for replacing antivirus
DarkMatter and Symantec to Provide Next-generation Cyber Security Solutions and Services (PRNewswire) DarkMatter, an international cyber security firm headquartered in the United Arab Emirates (UAE), today announced it is entering a partnership arrangement with Symantec Corporation, (NASDAQ: SYMC), a global leader in information protection and security software, to provide security solutions and services to help customers navigate the complex world of threats and cyber-crime
High-Tech Bridge Launches Malicious Domain Discovery Service (Newswire Today) Following a very successful launch of SSL/TLS security and web server security testing services (over 500’000 servers tested in 6 months), High-Tech Bridge (htbridge.com) completes its portfolio of free web security services with domain security radar. The new service reveals various unethical, malicious or illegal activities with domain names, such as identity theft, brand and trade mark forgery, domain squatting, typosquatting and phishing
Arxan Honored for Mobile and Internet of Things Application Security (Mobile Marketing Watch) Arxan Technologies, a provider of application protection solutions, announced Tuesday that it has been named as Cybersecurity Product winner of the 2016 Cybersecurity Excellence Award in the Internet of things
Technologies, Techniques, and Standards
PCI DSS 3.2: 3 Things You Need to Know (Dark Reading) The latest round of upgrades are incremental yet necessary
Kaspersky Labs launches lifeline for CryptXXX ransomware victims (ZDNet) This ransomware is particularly nasty as it does not just lock your files, but also steals your data and any Bitcoin you have stored on your PC
Encryption Curveballs: Top 10 Things to Know Before Enabling ECC Ciphers (Information Security Buzz) Over the past two years, everyone has become much more acutely aware of not only encrypting all HTTP traffic, but also how that traffic is encrypted
4 Tips For Planning An Effective Security Budget (Dark Reading) Security budgets start with managers assessing all of their resources and measuring the effectiveness of their security programs for strengths and weaknesses
8 Signs Your Security Culture Lacks Consistency (Dark Reading) Organizations that practice what they preach and match their actions to their words do far better achieving their goals than those that do not. Here's why that matters
Design and Innovation
An Approach to James Comey's Technical Challenge (Lawfare) In 2014, at the very beginning of the “Going Dark debate,” FBI Director James Comey gave a challenge to the technical community. Is it possible to create a “front-door” that law enforcement can use to access encrypted devices that doesn’t put other users at risk?
The inherent problems of the detection paradigm (Help Net Security) An ongoing debate in the modern cybersecurity world is whether to detect or prevent cyberattacks. Although detection technologies are undoubtedly important tools in the defender arsenal, recent years show they have only limited effects when encountering certain types of cyberattacks
Legislation, Policy, and Regulation
Angela Merkel Abruptly Fires Germany’s Spy Chief (New York Times) Chancellor Angela Merkel on Wednesday replaced the chief of Germany’s foreign intelligence service. The move caught many by surprise as Europe faces growing pressure from Islamist terrorism and as the chancellor looks ahead to a general election next year
Germany Creates Cyber, IT Defense Branch (Defense News) German Defence Minister Ursula von der Leyen has unveiled plans to establish a new cyber force to enhance the defense effectiveness of the country's armed force
Japan's Achilles Heel: Cybersecurity (Diplomat) Japan is uniquely underprepared for the cyber challenges of the 21st century
New focus on air superiority must include ground, cyber and space assets, official warns (Air Force Times) If the Air Force wants to maintain air superiority in the future, it’s going to have to focus its attention on the ground, a British military officer said Tuesday
More money doesn’t guarantee success in cyber security race (The Conversation) Over the next four years, Australia’s federal government will invest more than A$230 million on cyber security. Put another way, A$57.5 million per annum will be taken from one part of the federal budget and spent instead on cyber security
In rare unanimous move, House passes bill to protect email and cloud privacy (CSO) The Email Privacy Act would require police to get warrants to search data stored in the cloud
Protecting physical infrastructure with cyber (FCW) The National Protections and Program Directorate's reorganization is still awaiting congressional approval, but the under secretary for the Department of Homeland Security's cyber division has a clear sense of mission, and a clear message to agencies and companies preparing for cyber threats: the way to minimize physical consequences to critical infrastructure is by prioritizing a "holistic" view of cybersecurity
David Johnson Named Associate Executive Assistant Director for the Criminal, Cyber, Response, and Services Branch (Federal Bureau of Investigation) FBI Director James B. Comey has named David Johnson as the associate executive assistant director of the Criminal, Cyber, Response, and Services Branch
Litigation, Investigation, and Law Enforcement
FBI will not share iPhone vulnerability in San Bernardino case (FCW) The FBI has opted not to submit the method used to unlock the Apple iPhone of one of the San Bernardino, Calif., shooters to an interagency review process for disclosing software vulnerabilities
Epic Systems vs. Tata: Key Security Questions (InfoRisk Today) Protecting trade secrets from unauthorized users
Sailor Accused of Spying for China Could Dodge Trial (Daily Beast) Navy officer Edward Lin is charged with sharing classified information with Taiwan and China—possibly in exchange for sex. But he may never see the inside of a courtroom
Sextortion, Cyber Stalking: U.S. Embassy Official Facing 4 Years in Prison (Hack Read) In 2015, Ford was charged with sextortion and cyber stalking scheme— now, he has been sent to prison for four years and nine months