Cyber Attacks, Threats, and Vulnerabilities
Recycled threat? ISIS publishes hit list of 3,600 New Yorkers (Arutz Sheva) FBI has reached out to targets, but not taking threats particularly seriously
Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations (Trend Micro) Cybercriminal activities have always involved the abuse of legitimate online tools and services
Trend Micro: 6 most popular homebrewed terrorist tools (Network World) Pre-packaged encryption, DDoS and news feed for tech-light jihadists
The Many Ways Terrorists Communicate Online (Fortune) Gmail and Yahoo Mail are surprisingly popular
Al Qaeda defector discusses group’s secrets in Islamic State magazine (Long War Journal) The man known as Abu Ubaydah Al Lubnani (“the Lebanese”) is one of the most senior al Qaeda leaders to defect to the Islamic State since the two jihadist organizations split in early 2014. Lubnani was once a top security official for al Qaeda in Afghanistan and Pakistan. But after being demoted from his sensitive post, he joined Abu Bakr al Baghdadi’s organization. Lubnani quickly became a thorn in al Qaeda’s side, revealing details about his former employer’s inner workings
QNB hackers to leak more data of another big bank soon (Gulf News) Attackers have Turkish roots and are known as Bozkurtlar, Kaspersky Lab says
ImageMagick vulnerabilities place countless websites at risk, active exploitation confirmed (CSO) Metasploit modules will be released on Wednesday
Ransomware enters companies through RDP servers (Help Net Security) Attackers wielding ransomware are targeting enterprises through an often-found hole in the corporate network: Internet facing, poorly secured remote desktop servers
A Glimpse at Petya Ransomware (ThreatTrack Labs) Ransomware has become an increasingly serious threat. Cryptowall, TeslasCrypt and Locky are just some of the ransomware variants that infected large numbers of victims. Petya is the newest strain and the most devious among them
Incidents of Ransomware on the Rise (FBI) Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them
Michigan electricity utility downed by ransomware attack (Register) Don't click on the links, don't click on the links, don't
FBI Reaffirms Stance Not to Pay Ransomware Attackers (Threatpost) The FBI has issued a warning to businesses about the relentless wave of ransomware. The bulletin includes preventative tips, and an affirmation of the bureau’s stance that companies affected by cryptoransomware attacks in particular should not succumb to temptation and pay their attackers off
Opportunistic cybercriminals tweaking old threats for new targets: Forcepoint (CSO) Medium-sized businesses face a surging threat from opportunistic cybercriminals who are changing their strategies as large enterprises become more complex to penetrate, a security-strategy director has warned as new figures correlate declines in spam email with a resurgence in time-honoured document-based macro malware
SophosLabs research finds “Designer” cyber threats on the rise (Albabwa) Sophos, a global leader in network and endpoint security, today revealed SophosLabs research that indicates a growing trend among cyber criminals to target and even filter out specific countries when designing ransomware and other malicious cyber attacks
Application-layer DDoS attacks will increase, Kaspersky Labs predicts (Network World) Cyber thugs are returning to application-layer attacks and using IT security firms as a test bed for attacks
Fraudsters Steal Tax, Salary Data From ADP (KrebsOnSecurity) Identity thieves stole tax and salary data from payroll giant ADP by registering accounts in the names of employees at more than a dozen customer firms, KrebsOnSecurity has learned. ADP says the incidents occurred because the victim companies all mistakenly published sensitive ADP account information online that made those firms easy targets for tax fraudsters
Cyber attack nabs 2015 W-2 forms of Mercury Marine workers (Fond du Lac Reporter) A computer phishing scam that netted personal information from Mercury Marine employees may have affected thousands of workers
How-To Info On Hacking Wireless Alarm Systems Readily Available Online (Security Sales and Integration) Wireless alarm systems are rife with vulnerabilities that could allow an intruder to gain entrance to a residence unnoticed, according to tech experts. That’s not new news but the specter of such a scenario continues to gain mainstream awareness
Unfunny wifi hotspots on a plane (CSO) News broke yesterday where a flight in Australia was delayed due to some intellectually challenged individual thought it would be funny to rename his/her wifi hotspot. But, before we dig into that I’ll share a personal story
Security Patches, Mitigations, and Software Updates
ImageMagick Security Issue (ImageMagick) We have recently received vulnerability reports for certain coders, they include possible remote code execution and ability to render files on the local system
Microsoft to change location of some security updates as of May Patch Tuesday (ZDNet) Microsoft will be excluding some, but not all, security updates from the Microsoft Download Center starting next week on Patch Tuesday
10-year-old Kid Hacks Instagram, Gets $10,000 Reward from Facebook (Hack Read) If a security researcher wants to take part in Facebook’s bug bounty program there is an age requirement but the 10-year-old Finish kid Jani ( the last name not revealed) hacked Instagram and reported it to the Facebook and got 10,000 USD as a reward
Cyber Trends
Enterprises Lack Top-Down Management Of Third-Party Risk (Dark Reading) New report finds there's not enough leadership in managing risks from business partners and vendors
Data breach trends 2016 – what Verizon's analysis of real breaches reveals (TechWorld) Data breaches just keep coming. We review Verizon's annual Data Breach Investigations Report covering 2015 incidents
Snowden cheers on increasing pace of government leaks (The Hill) Edward Snowden cheered on the increasingly swift pace of government leaks that are giving the public access to reams of official secrets
Social media scams are major online threats; PHL security deemed ‘minimal’ (Business World) Israeli cyber security firm CyberInt said the Philippines’ strong social media culture makes it particularly vulnerable to online threats, being the third-worst market in the Asia-Pacific for social media scams
Marketplace
What is cyber insurance and why you need it (CSO) Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur
Business interruption insurance moving into IT realm: NetDiligence Cyber Risk Summit speaker (Canadian Underwriter) More and more, the conversation surrounding business interruption (BI) is moving from the physical aspect of BI to the information technology side of things, attendees to the NetDiligence Cyber Risk Summit heard on Friday
DFLabs Secures $5.5M in Series A Funding Led by Evolution Equity Partners to Meet Demand for Automated Cyber Incident Response (Venture Beat) DFLabs positioned to accelerate growth as a leader in emerging automated cyber incident management and response market segment
Duo Security Snags $2.5M Grant, Will Hire Up to 300 (Xconomy) Ann Arbor, MI-based startup Duo Security announced that it has received a $2.5 million grant from the state’s Michigan Strategic Fund and, as a condition of the grant, plans to hire up to 300 new employees over the coming months. Economic development group Ann Arbor SPARK has pledged to assist Duo in its employee recruitment efforts
Ixia Announces Financial Results for 2016 First Quarter (BusinessWire) Ixia (Nasdaq: XXIA) today reported its financial results for the first quarter ended March 31, 2016
What to expect from FireEye’s results (MarketWatch) Shares have dropped, usually sharply, the day after eight of the 10 quarterly reports the company released since it went public
Partnership opportunities with one of the pioneers of antivirus protection (ChannelLife) ESET began life as a pioneer of antivirus protection, creating award-winning threat-detection software. If you don’t believe it, Lukas Raska, ESET COO for the APAC, recommends having a gander on Wikipedia
ESET evolving as end-to-end enterprise security company: Parvinder Walia (Computerworld) We have extended our technology expertise to emerge as the preferred security vendor for enterprises, says Parvinder Walia, APAC sales director, ESET
Siemens says it's investing "a lot" in cyber security (City A.M.) Siemens is investing “a lot” to bolster its defences against potential cyber attackers who may try to infiltrate its systems
Five Jobs Set to Grow in Oil, Gas: Cybersecurity (RigZone) After our first article on new job opportunities to come from the use of the Internet of Things and Big Data in oil and gas, here we look at how the oil and gas industry is set to employ further cybersecurity professionals as cyberattacks targeting the sector increase
DHS sweetens cyber workforce recruiting with new bonuses (Federal News Radio) In the intense competition to hire qualified cybersecurity professionals, the government’s advantage has always been its appeal to a sense of mission, not necessarily large salaries
What Shark Tank's Robert Herjavec Wants Every Aspiring Entrepreneur to Know (Fortune) His biggest regret? ‘I should have dreamed bigger’
Fortscale Bolsters Leadership Team and Expands Advisors (Press Release Rocket) Company Appoints David Somerville as SVP Worldwide Sales, DropBox’s Patrick Heim to Advisory Board, and Voltage Security’s Sathvik Krishnamurthy to Board of Directors
Products, Services, and Solutions
CyberPoint subsidiary wins contracts to participate in Department of Homeland Security pilot (Government Security News) CyberPoint International, LLC announced today that it has been awarded a fixed price contract by the Department of Homeland Security (DHS) Borders and Maritime Security Division (BMD) to participate in the Container Security Device Technology Demonstration for the US/EU Global Supply Chain Pilot Project. AKUA LLC, a subsidiary of CyberPoint, develops security solutions for customers in the logistics and supply chain markets
Skyhigh Networks Achieves FedRAMP Compliance (BusinessWire) Company is the first and only CASB to meet rigorous security requirements mandatory for all U.S. Federal agencies
Zimperium: Mobile Security Innovation at its Best (Silicon India) The use of mobile devices in the workplace continues to grow at an exponential pace with organizations embracing bring your own device(BYOD) and developing mobile applications to improve their business processes
Webroot Announces Integration with Citrix to Enhance Scalability and Security for Enterprise Customers Worldwide (PRNewswire) Integration of Webroot BrightCloud® IP Reputation Service with Citrix NetScaler to detect and block malicious incoming IPs
Lastline Enterprise Earns 2016 Cybersecurity Excellence Award for Advanced Persistent Threat Protection (MarketWired) Leader in advanced malware detection recognized for discovering and curtailing APTs and malware that others miss, while reducing false positives and non-correlated alerts vs. outdated security tools
Courion Releases Enhanced Identity and Access Intelligence Solution to Help Organizations Manage User Access (PRNewswire) Courion, the market leader in in Vulnerability and Access Risk Management solutions, today announced the release of Access Insight 9.0
Microsoft Azure receives security certification from Spain (WinBeta) Microsoft has just announced, via the Azure blog, a new security-related mark in the expansion of its cloud service brand in Europe, this time in Spain
Deloitte Teams up With Bloq to Build Blockchain Solutions (Blogchain News) Bloq announced that is working with Deloitte to build Blockchain software solutions for leading companies worldwide
Accenture and Splunk Team Up On Security and Analytics Offerings (Information Management) Consulting and outsourcing firm Accenture and operational intelligence platform provider Splunk Inc. have formed an alliance that integrates Splunk products and cloud services into Accenture’s application services, security and digital offerings
Creechurch Underwriters in Production with Oceanwide’s Cyber Risk Assessment Tool (BusinessWire) Oceanwide tool to empower Creechurch to better assess cyber risks for insureds
5 must listen to security podcasts (CSO) There are a lot of podcasts out there that you can listen to these days. Now, today I’m writing about 5 must listen security podcasts that you should start adding to your rotation yesterday. So, let’s be fair right out of the gate. This is not a definitive list by any stretch of the imagination and I will share more in a future post. So, if I have not added your podcast favourites have no fear as I will revisit this topic again
Technologies, Techniques, and Standards
Hidden in plain sight: Four signs your network might be under attack (Help Net Security) It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even years
The Operational And Cyber Security Benefits Of An IT-Centric Access Control Solution (Business Solutions) Ever since security systems and related peripheral devices made the jump to IP, there has been a desire to combine the two functions to derive greater intelligence and value from them. This has driven not just a technology convergence, but also a departmental convergence
Multi-layered security approach battles Ransomware (AVG.Now) From Locky to SamSam, JIGSAW to CryptoLocker, today’s ransomware variants can take down businesses with dramatic consequences. Ransomware will prevent file access, web browsers, applications, and entire operating systems
The Balancing Act: Government Security In The Cloud (Dark Reading) The cloud offers great opportunities and challenges to public sector security teams defending critical systems against advanced threats. These 7 strategies will help you avoid a worst-case scenario
Love Affairs with the Cloud Obscure Many Security Risks (Information Management) The Cloud Security Alliance (CSA) recently released “The Treacherous 12: Cloud Computing Top Threats in 2016,” which provided a run-down on the greatest security threats that organizations face with cloud computing
Moving Toward a Framework for Resilient Cybersecurity: Evaluating the Threat Landscape (CTOVision) In this previous post on The Need for a Framework for Resilient Cybersecurity we highlighted that the increasing diversity and sophistication of today's IT environments is driving a need for organizations to implement a framework for resilient cybersecurity. In this post we will focus on one of the critical components of this framework: Threat Intelligence
Yes, You Should Always Update Your Software (Center for Democracy and Technology) We have all received those annoying interruptions to our work — yes, the dreaded “update your software” message. Updates can be cumbersome — they can force you to stop what you’re doing, restart your computer, or change the interface you were working in upon the restart. But as unfun as they might be, they are an essential part of strong digital hygiene and one of the most important steps you can take to protect and secure your personal devices
Design and Innovation
The Essential Link between Privacy and Security: Optimizing for Both (Lawfare) As we explore how best to use data analytics to provide value for important social functions like healthcare, education, transportation and law enforcement, many people believe that the use of the data will necessarily erode privacy. I believe not merely that we can preserve privacy, but that data analytics can particularly serve privacy interests when we use data to increase security
Cyber experts pick holes in claims of Bitcoin 'creator' (Times of India) Australian businessman Craig Wright's claim to be Satoshi Nakamoto, the anonymous inventor of cryptocurrency Bitcoin, has led to a raging debate challenging its veracity. Cryptocurrency users and experts in the field have pointed to several loopholes in the digital proofs he has offered
Seven Questions to Make Sense of Craig Wright's Signature Proofs (Bitcoin Magazine) The Australian computer scientist Craig Steven Wright is sending shock waves throughout the Bitcoin world, as he once again claims to be the man who invented Bitcoin
Research and Development
Quantum computers pose a huge threat to security (IDG via CSO) An upcoming competition will invite the public to propose and test 'quantum-resistant' encryption schemes
Chemical key unlocks cryptography (Statesman) For centuries, codes and concealment have been the means to exchange secret information. A code that was difficult to crack, however, was difficult to compose and also to read
DHS S&T Awards Raytheon BBN Technologies $1.3M For Data Privacy Research (Homeland Security Today) The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded $1.3 million to a Raytheon subsidiary to develop technology to perform multiple online searches simultaneously in an effort to facilitate information sharing while preserving privacy
Academia
Northrop Grumman Hosts Second Annual Cyber Defense Competition at King Saud University (GlobeNewswire) CyberArabia participation doubles as program builds excitement among Saudi students for this critical, in-demand career field
Legislation, Policy, and Regulation
NSA to spy on its own staff off-the-clock: Official (PressTV) The US National Security Agency aims to keep a tab on its own staff and their personal computers when out of working hours to ensure they are not participating in illegal activities, including downloading child pornography, or leaking classified information
NSA to Spy On Own Employees Everywhere, All the Time © Flickr/ Dennis Skley (Sputnik) A National Security Agency official is seeking the ability to track employees on their personal computers, as well as at office workstations, to ensure they are not participating in illegal activities, including downloading child pornography, or leaking state secrets
US Army assesses cyber, electromagnetic spectrum’s role in the command post (DVIDS) The U.S. Army brought together operational forces and elements from the cyber, training and doctrine, research and development, and acquisition communities to further define how the Army operationally adapts to cyber and electromagnetic threats here April 18-29
Thales Partners With Netherlands’ Defense Forces to Open Cyber Training & Testing Facility (ExecutiveBiz) Thales and the Dutch armed forces’ defense cyber command formed an alliance to establish a new cyber training and testing facility
Litigation, Investigation, and Law Enforcement
Facebook CEO urges Brazilians to decry WhatsApp block (Reuters) Facebook Inc's (FB.O) Chief Executive Mark Zuckerberg called on Brazilians to demand his company's WhatsApp messaging service never be blocked again after an appeals court on Tuesday overturned the application's second suspension in five months
Navy sees increase in ‘sextortion’ cases; NCIS warns sailors about online behavior (New London Day) After a spike in reports of sexual extortion, or "sextortion," across the Navy, including at the Naval Submarine Base, the Naval Criminal Investigative Service is warning sailors not to engage in sexually explicit activities online
How the Kleptocrats’ $12 Trillion Heist Helps Keep Most of the World Impoverished (Daily Beast) An investigative economist has crunched 45 years of official statistics to discover just how much kleptocrats have plundered from 150 mostly poor nations
Noida cyber cell to launch on May 9 (Times of India) The cyber crime cell of Noida police is all set to begin operations on May 9 when Uttar Pradesh DGP Javeed Ahmad will inaugurate the hi-tech department, which has been set up at a cost of around Rs 1.25 crore
Wendy's Hit With Lawsuit Over Data Breach (Dark Reading) Fast-food chain accused of failing to protect customer credit card details