Cyber Attacks, Threats, and Vulnerabilities
Leaked NSA report says Russians tried to hack state election officials (Ars Technica) Alleged source of leak arrested by FBI after Intercept provided copy to NSA.
Report: Russia Launched Cyberattack On Voting Vendor Ahead Of Election (NPR) Russia's GRU intelligence agency targeted an American provider of election services, The Intercept says; a U.S. intelligence contractor was charged with revealing a secret report about the scheme.
VR Systems issued the following statement regarding recent security reports (VR Elections) “When a customer alerted us to an obviously fraudulent email purporting to come from VR Systems, we immediately notified all our customers and advised them not to click on the attachment. We are only aware of a handful of our customers who actually received the fraudulent email and of those, we have no indication that any of them clicked on the attachment or were compromised as a result.
Could Russia have tampered with the U.S. voting system? A new report is raising questions (Newsweek) The Intercept reported Monday that Russian military intelligence launched a cyberattack on a U.S. voting software supplier.
Bombshell intel leak reveals Russia cyber attack targeted voting software and election officials (Raw Story) According to a report at The Intercept, an internal document at the NSA shows that Russian military intelligence “executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election.”
NSA Document Alleges Russian Intelligence Launched Cyber Attack on Voting Machine Software Vendor (IJR - Independent Journal Review) "...executed cyber espionage operations..."
Report suggests Russia hackers breached voting software firm (Military Times) Russian hackers attacked at least one U.S. voting software supplier days before last year's presidential election, according to a government intelligence report leaked Monday that suggests election-related hacking penetrated further into U.S. voting systems than previously known.
What’s Inside Leaked NSA Report on Russian Election Hacking? (MSNBC) NBC’s Ken Dilanian breaks down the contents of a top-secret NSA document obtained by The Intercept detailing Russia’s hacking effort days before the 2016 election.
From Russia With Lulz (Recorded Future) Russian hackers are central players all over the news today. But what’s the real story? In this episode, we welcome back Andrei Barysevich to find out.
A TV Hack Appears to Have Sparked the Middle East's Diplomatic Crisis (Motherboard) Alleged hackers broke into a TV station to broadcast and tweet fake news, provoking a huge diplomatic incident.
Greek extremists go abroad for training in revolution (Deutsche Welle) From anarchists to nihilists, militant Greek youth are increasingly networking with other global forces of violence. Left unchecked, they risk turning into loose cannons, disregarding all costs, reports Anthee Carassava.
Islamic State video shows destruction of church in Marawi (FDD's Long War Journal) The Islamic State’s Amaq News Agency released a short video showing the destruction of a church inside Marawi city. This is the second video released by Amaq from the southern Philippines city.
More Payloads Appear for EternalBlue NSA Weapon (Infosecurity Magazine) It is likely that we will see yet more additional payloads for the tool.
WannaCry Exploit Could Infect Windows 10 (Dark Reading) The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.
'ExplodingCan' NSA exploit menaces thousands of servers (iTnews) Many vulnerable in Australia.
Punching down the Judy Android adware: a SophosLabs analysis (Naked Security) What’s going on under the hood of the Judy apps we wrote about last month? We had a look – and didn’t like what we found
Malware and XOR - Part 1 (SANS Internet Storm Center) Malware authors often encode their malicious payload, to avoid detection and make analysis more difficult.
40,000 Subdomains Tied to RIG Exploit Kit Shut Down (Threatpost) GoDaddy, along with researchers from RSA Security and other companies, shut down tens of thousands of illegal established subdomains tied to the RIG Exploit Kit.
Synopsys Research Highlights the Pervasive Use of Outdated and Insecure Third-Party Software Components (PRNewswire) Synopsys, Inc. (Nasdaq: SNPS) today released its report, "The...
Short, Stealthy, Sub-Saturating DDoS Attacks Pose Greatest Security Threat to Businesses (BusinessWire) New DDoS trends and analysis report warns of "Trojan Horse" DDoS attacks intended to disrupt and distract network operators from more dest
#Infosec17: Botnets & Their DDoS Attacks Are Our Collective Problem (Infosecurity Magazine) DDoS attacks are all too commonly thought of as “someone else’s” problem, but botnets are all too easily formed
53 Percent of Enterprise Flash Installs are Outdated (Threatpost) More than half of enterprises are exposing themselves to unnecessary risk by running out-of-date versions of Flash.
Developers Again Blamed for Cloud Back-End Security Vulnerabilities (ADTmag) Developers are once again being blamed for cloud security vulnerabilities, this time in a new report from Appthority, which found terabytes of enterprise data exposed on cloud back-ends, including personally identifiable information.
Application security trends: What you need to know (Help Net Security) High-Tech Bridge released a summary report on application security trends for Q1 – Q2 2017, which provides and extensive overview.
Hackers Ruin ABC TV Show Premiere, Leak First Eight Episodes on Torrent Site (BleepingComputer) The hacker group known as The Dark Overlord (TDO) leaked today the first eight episodes of an upcoming TV game show, set to premiere on ABC on Sunday, June 11.
ICO Audit: Met Police Use Of Windows XP Risks User Data Security (Silicon UK) A consensual audit has found 'considerable scope for improvement' in the Met Police Service's data protection arrangements
State of Cyber Security 2017 (ISACA) For the third year in a row, ISACA has surveyed security leaders worldwide to determine their insights and experiences with key cyber security issues, ranging from workforce challenges and opportunities to the emerging threat landscape.
Facebook safety check: telling loved ones you’re safe is a good thing (Naked Security) Our data may be currency to Facebook, but being able to let your loved ones know you’re safe is priceless
The transformational potential for GDPR (Computing) GDPR presents CIOs and IT directors with the leverage to enforce a culture of secure IT and data management, argues Gordon Morrison
GDPR spells the end of programmatic advertising as we know it (Computing) Mark Roy, chairman of REaD Group, believes that the new legislation will limit the use of AI, whatever Google, Facebook et al might try to do to stop it
Data sovereignty remains biggest enterprise GDPR fear (Computing) Cloud worries still prevalent as May 2018 approaches, finds research
Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021 (CSO Online) The cyber crime epidemic is expected to triple the number of open cybersecurity positions to 3.5 million over the next five years.
Armis Launches from Stealth to Eliminate IoT Security Blind Spot for Enterprises (Armis) Sequoia Capital and Tenaya Capital invest $17M to help enterprises gain visibility and control over threats created by the explosion of connected devices
Cloud security broker Netskope raises $100m more led by Lightspeed and Accel (TechCrunch) As enterprises continue to move more of their computing to the cloud, and across an ever-expanding range of devices from computers to phones and tablets and..
FireEye 2.0: Cyberhumans as a Service (CSO Online) FireEye CEO Kevin Mandia discusses the company's approach to cyber crime and cybersecurity.
Radware (RDWR) to Buyback $40.00 million in Outstanding Stock (Cerbat Gem) Radware (NASDAQ:RDWR) announced that its board has authorized a share repurchase plan, which permits the company to buyback $40.00 million in shares on Tuesday, April 25th, EventVestor reports.
NCI Awarded Prime Position on $37 Billion Multiple Award Contract with US Army (BusinessWire) NCI announced it won a prime position on the multiple award indefinite-delivery, indefinite-quantity U.S. Army Communications‒Electronics Comman
General Michael Hayden Joins root9B Advisory Board (PRNewswire) root9B, a root9B Holdings, Inc. (NASDAQ: RTNB) company and...
Forcepoint Names Praveen Asthana as Chief Marketing Officer (PRNewswire) Global cybersecurity leader Forcepoint™ today announced technology...
Leading Energy Sector Executive, Jason Few, Joins Verve Industrial Protection as Senior Advisor (PRNewswire) Verve Industrial Protection is pleased to announce the...
Products, Services, and Solutions
Qualys to Help Customers Worldwide Comply with European Union General Data Protection Regulation (GDPR) (Qualys) Qualys Cloud Platform out-of-the-box capabilities enable assessment and management of internal and third-party risk, and reporting on GDPR requirements
GlobalSCAPE, Inc. Delivers Enhanced Data Governance, Visibility and Intelligence with Release of EFT Insight (BusinessWire) Latest version features include modern interface, real-time data management analytics, automatic alerts and robust reporting.
Versasec and cryptovision Form Technology Partnership (Versasec) Smart Card Management Systems Company customizes its Credential Management System to Support the cryptovision ePKI Smart Card Applet and sc/interface middleware
Tenable Delivers the First Vulnerability Management Platform to Unify IT and OT Security for the Full Range of Traditional and Modern Assets (CSO) Expanded Tenable.io platform incorporates Nessus Network Monitor alongside new container and web application security products for improved discovery and vulnerability management of operational technology assets like ICS/SCADA
Blackberry signs up Optus Business and Briggs Communications for AtHoc partnership (CRN Australia) Telco and Briggs Communications to support new product.
Cloud Security Alliance Announces "Grand Opening" of Its New Third-Party Global Consultancy Program (PRNewswire) The Cloud Security Alliance (CSA), the world's leading organization...
Mimecast and PhishMe Collaborate to Improve Cyber Resilience - NASDAQ.com (NASDAQ.com) Organizations can now harness powerful security controls with impactful education from the cloud
A10 Networks Delivers Enhanced Solutions for Processing the Rising Tide of Encrypted Internet Traffic (BusinessWire) A10 Networks (NYSE: ATEN), a Secure Application Services™ company, today introduced third-generation SSL/TLS hardware solutions to help organiza
80% of NGFWs Fail to Detect Evasions (Infosecurity Magazine) In independent testing, the average security effectiveness rating was 67.3%.
Technologies, Techniques, and Standards
The Trouble if Security Awareness Training Is Mainly a Penalty (Government Technology) Every technology leader wants a security-aware, cyber-savvy enterprise culture. But what does that mean and how can we get there? There is an ongoing debate regarding security awareness training techniques, engagement and overall effectiveness. Let’s explore.
What can DoD, civilian cyber efforts learn from the Coast Guard approach to maritime security? (FederalNewsRadio.com) Sen. John McCain (R-Ariz.), chairman of the Armed Services Committee, asked whether a new approach to the tactical and operational aspects of federal cybersecurity could be a powerful tool for addressing gaps that impede existing organizational structures.
Why Two Factors are Better than One (Infosecurity Magazine) Two factors are better than one in the security authentication landscape.
Design and Innovation
The First Space-Based ‘Nation’ Wants to Store Data Off-Planet, Beyond the Law (Motherboard) 'Asgardia' plans to launch a data storage satellite beyond the reach of Earthly laws—an ambitious and problematic goal.
Legislation, Policy, and Regulation
Theresa May’s repeated calls to ban encryption still won’t work (New Scientist) After the latest terrorist attack in London, the Prime Minister has called for internet companies to stamp out safe spaces for terrorists – but this is unworkable
Blaming the Internet For Terrorism Misses The Point (WIRED) Governments need to focus on real-world solutions to terrorism.
5 Arab Nations Move to Isolate Qatar, Putting the U.S. in a Bind (New York Times) The feud among regional allies of Washington threatens to stress the American-led campaign against ISIS and complicate efforts to confront Iran.
Tillerson: Growing list of 'irritants' isolating Qatar (Washington Examiner) U.S. allies in the Persian Gulf are in a diplomatic kerfuffle
Qatar rift sets back Trump's 'Arab NATO' (Defense News) A diplomatic rift between Qatar and four Gulf neighbors shows why a military union to fight terrorism and push back against Iran is easier said than done.
Arab nations cut ties with Qatar, home to major US military base, in new Mideast crisis (Military Times) Saudi Arabia and other Arab powers severed diplomatic ties Monday with Qatar and moved to isolate the energy-rich nation that is home to a major U.S. military base, accusing it of supporting terrorist groups and backing Iran.
How the Gulf row is blocking China’s new Silk Road (South China Morning Post) Rift between Qatar and its neighbours could disrupt key projects in Beijing’s sprawling trade initiative
Why Did Several Arab Countries Suddenly Cut Ties With Qatar? (Foreign Policy) On the heels of Trump's visit to Saudi Arabia, that country and others cut Gulf ties.
Singapore, Australia forge cyber security ties (ComputerWeekly) The two countries will conduct joint cyber security exercises, among a raft of measures to secure critical infrastructure and bolster cyber security knowhow
NSA chief urges Israel US cyber security cooperation (Globes) Keith Alexander: These two countries realize that someone who can't wage physical war will try to fight in the cyber sphere.
Defying Russia, Montenegro Finally Joins NATO (VOA) Move by former Russia ally has infuriated Moscow which has sought to maintain strong influence in country it considers special zone of interest
Congress may go after software vulnerabilities, DHS's cyber role this summer (Washington Examiner) The WannaCry ransomware attack highlighted the absence of an effective integrated response process.
What is the NYDFS Cybersecurity Regulation? A New Cybersecurity Compliance Requirement for Financial Institutions (Digital Guardian) Learn about the new NYDFS Cybersecurity Regulation and its implications for financial institutions in Data Protection 101, our series on the fundamentals of information security.
The End of Net Neutrality Could Shackle the Internet of Things (WIRED) Fear the pay-per-device dystopia.
Litigation, Investigation, and Law Enforcement
Contractor charged in NSA document leak case (Washington Post) The charge against a 25-year-old woman is the first leak prosecution of the Trump administration.
Feds Charge NSA Contractor Accused of Exposing Russian Hacking (WIRED) The arrest of an alleged source of a classified leak to the Intercept offers a lesson in the risks of spilling secrets.
Federal Government Contractor in Georgia Charged With Removing and Mailing Classified Materials to a News Outlet (US Department of Justice) A criminal complaint was filed in the Southern District of Georgia today charging Reality Leigh Winner, 25, a federal contractor from Augusta, Georgia, with removing classified material from a government facility and mailing it to a news outlet, in violation of 18 U.S.C. Section 793(e).
How the New Suspected NSA Leaker Reality Winner Was Caught (Motherboard) From the characteristics of physical documents, to not using work computers, there’s plenty to learn from the recent bombshell leaking charge.
Putin dismisses US claims about Trump, Russia and elections (Military Times) Russian President Vladimir Putin is dismissing as "a load of nonsense" the idea that Russia has damaging information on President Donald Trump and denies having any relationship with him.
NSA Director Mike Rogers poised to ‘drop a bomb’ on Trump admin during Wednesday testimony: MSNBC (Raw Story) Atlantic magazine writer Steve Clemons said during a Saturday panel on MSNBC’s “The Point with Ari Melber” that National Security Agency (NSA) Director Michael Rogers “may have a bomb to drop” on the Trump administration.
The Man Who Made the Mistake of Trying to Help Wikileaks (Motherboard) In his first interview, former US government lab worker Jason Scott Katz tells Motherboard about how trying to decrypt one file led to an FBI raid, losing his job, moving to Iceland, and founding the Pirate Party there.
Fears over warning system as more known extremists slip through net (Times (London)) For the third time in three months, a terrorist attack has been carried out by people known to the police and intelligence services. Questions about the security services’ capacity to track...
Apple hints it’s handed over metadata on UK terror suspects (TechCrunch) Apple CEO Tim Cook has revealed the company has been co-operating with the UK government in handing over metadata in the wake of a series of terror attacks in..
London attacker Khuram Butt linked to 7/7 bombing suspect (Times (London)) One of the London Bridge attackers was free to carry out the atrocity despite working for a man accused of helping to train the July 7 bombing ringleader and being under investigation by police and...
Police say one of the London Bridge attackers was previously known to authorities (ABC News) One of the three men who were shot and killed by police following the terrorist attack that killed seven people on the London Bridge on Saturday night was previously known to authorities.
ISIS rock star Choudary extends Islamist influence – even from behind bars (Fox News) A jailed British hate preacher who’s become ISIS’ rock star radicalizer in the U.K. has been linked to one of the suspected jihadis behind Saturday’s van and knife attack in London – but it’s only the latest example of the Islamist leader’s tentacles touching ISIS plots in England.
Knifeman Rachid Redouane used a false name to leave Dublin for London (Times (London)) Rachid Redouane, one of the attackers shot dead by police in the London Bridge attack, was able to move from North Africa via Dublin to a tower block in Dagenham, east London, without officials...
‘I Trusted Him’: London Attacker Was Friendly With Neighbors (New York Times) The police identified two of the three suspects in Saturday’s attack, as Prime Minister Theresa May faced questions over her record on security.
There Is No Intelligence Solution to Britain’s Rivers of Blood (Observer) After three jihadist attacks in as many months, the United Kingdom is facing a protracted insurgency—not mere terrorism.
UK police arrest man via automatic face-recognition tech (Ars Technica) Camera-equipped van in South Wales apparently spotted man whose face was in database.
Police in Oklahoma Have Cracked Hundreds of People's Cell Phones (Motherboard) Usage logs obtained by Muckrock show departments are cracking phones hundreds of times a year
Following the Money Hobbled vDOS Attack-for-Hire Service (KrebsOnSecurity) A new report proves the value of following the money in the fight against dodgy cybercrime services known as “booters” or “stressers” — virtual hired muscle that can be rented to knock nearly any website offline
Woman Accused of Hacking Company and Redirecting Money to Her Bank Account (BleepingComputer) The Royal Canadian Mounted Police (RCMP) have arrested and charged a Canadian woman for hacking into the email of a local company's CEO and redirecting 52,000 Canadian dollars ($38,600) to her own bank account.
Sabre, Travelport Hacker Sentenced to Prison (Dark Reading) A West African man who stole airlines tickets from Global Distribution System companies via a phishing campaign and fraud operation was sentenced to prison for four years and 10 months.
Why ‘I forgot my password’ won’t go down well with a judge (Naked Security) Two cases in Florida suggest that claiming you can’t remember your phone’s password mean you could end up in even more trouble