Cyber Attacks, Threats, and Vulnerabilities
Researchers find link between cyber espionage group and Saudi hacking campaign - CyberScoop (Cyberscoop) Reports from Symantec suggest that a series of recent intrusions share some similarities with Shamoon, an infamous 2012 hacking operation.
Hacker Group Claims Responsibility for Lloyds Bank Outages, Ransom Demand (BleepingComputer) A group of at least two hackers has tried to extort a ransom payment from the Lloyds Banking Group according to a copy of an email the hackers sent to a high-ranking executive.
HummingBad malware returns; new variant hides in Google Play apps - SD Times (SD Times) Check Point Software discovered a new variant of the sophisticated malware known as HummingBad
A Whale of a Tale: HummingBad Returns | Check Point Blog (Check Point Blog) Check Point researchers have found a new variant of the HummingBad malware hidden in more than 20 apps on Google Play. The infected apps in this campaign were downloaded several million times by unsuspecting users. Check Point informed the Google Security team about the apps, which were then removed from Google Play. This new …
Was The Guardian’s WhatsApp reporting “irresponsible” or fake news? (The Conversation) The Guardian has drawn the ire of a large number of cryptography and security experts by publishing a story claiming that WhatsApp has a security backdoor that would allow it, or governments, to snoop…
Researchers predict upsurge of Android banking malware - Help Net Security (Help Net Security) Source code for creating a potent Android banking Trojan have been leaked, and researchers are expecting an onslaught of malware based on it.
UK Firms Warned of Fake Ransomware Scams (Infosecurity Magazine) UK Firms Warned of Fake Ransomware Scams. Citrix claims 40% have experienced ‘bluff’ ransomware, with many paying up
Report: Half of ransomware's SMB victims pay up (CSO Online) More than 50 percent of small and midsized businesses have fallen victim to ransomware, and, of those, 48 percent paid a ransom, according to a report released today by Ponemon Institute and Carbonite.
Three Medical Data Breaches Expose 242,600 Patients' PHI (eSecurity Planet) The exposed data includes names, Social Security numbers, birthdates, contact details, medical record numbers and/or clinical information.
ThePirateBay.org goes down; dark web domain is up and running (HackRead) You are not alone; the ThePirateBay.org (TPB) domain is offline worldwide. The reason for this outage is unclear, but the good news is that you can still a
Online Dating Fraud Hits Record High (Infosecurity Magazine) The number of people defrauded in the UK by online dating scams reached an all-time high in 2016
This ‘Yelp for Cybercrime’ Wants to Help Hackers Avoid Getting Scammed (Motherboard) There’s now a website where cybercriminals can name and shame other cybercriminals who have swindled them.
Why Dependence On Cloud Providers Could Come Back And Bite Us (Dark Reading) It's time to re-evaluate the cloud policies you have in place. And if you're not learning from the mistakes of others, you're doomed to repeat them.
Security Patches, Mitigations, and Software Updates
Apple Patches Critical Kernel Vulnerabilities (Threatpost | The first stop for security news) Apple released updates across its product lines, including iOS 10.2.1, patching a number of critical code execution vulnerabilities in the kernel, libarchive and WebKit.
Apple issues security patches for... just about everything (WeLiveSecurity) If you have a piece of Apple technology in your house or office, chances are that it's time you updated it.
Update Your iPhone Right Now (WIRED) Apple just released an iOS update full of security fixes that you need to jump on.
Widely used WebEx plugin for Chrome will execute attack code—patch now! (Ars Technica) Publicly known “magic string” lets any site run malicious code, no questions asked.
Symantec revokes faulty security certificates | ZDNet (ZDNet) The cybersecurity firm has once again been left red-faced after issuing insecure certificates.
Apps Carrying HummingBad Variant Booted From Google Play (Threatpost | The first stop for security news) Google has removed 20 apps from Google Play that were spreading a variant of the HummingBad Android malware called Hummingwhale.
Microsoft Reveals Windows Defender Security Center Scheduled for Creators Update (BleepingComputer) The Windows 10 Creators Update scheduled for launch later this year will include an upgrade of the default Windows Defender antivirus, which will feature a new settings panel named the Windows Defender Security Center.
The Rise of Ransomware (Carbonite) Small business owners have enough on their plates, such as wearing many different hats and managing the critical day-to-day elements of their businesses. Security can easily become a low priority. Many brush off high-profile cyber-attacks frequently reported in the media as they assume most are happening to large, global brands, governments or celebrities.
Zero Day Exploits Will Rise From Once per Week to Once Per Day in 2021 (Canadian Insider) New Cybersecurity Ventures report offers insight for CISOs and IT security teams
Privacy Is a Basic Human Right… and Good for Business, Too (Cisco Blogs) We humans love to share and communicate. From the beginning of recorded history, we’ve sought connection, culture, and commerce by sharing aspects of ourselves with others. But we also want to be left alone without undue interference to lead our lives. So how do we solve this dichotomy?
Hollywood cybersecurity vs. Vegas cybersecurity (The Christian Science Monitor) The cybersecurity we see in movies and TV often takes some creative license (we’re looking at you, CSI), but the stuff on stage in Vegas conferences can be just as far removed from the day-to-day practice of cybersecurity, too.
Enterprise Encryption and Authentication Usage (Echoworx) Osterman Research conducted a primary market research survey on behalf of Echoworx. The goal of the survey was to query encryption-focused decision makers and influencers in organizations of various sizes about their organizations’ plans for the deployment of encryption technologies, twofactor authentication and related issues.
One in Three Web Visitors is an Attack Bot (Infosecurity Magazine) One in Three Web Visitors is an Attack Bot. Report claims 94% of websites experienced an attack last year
The Rise of Cyber Threats (Norwich University) The Internet is a real entity but its intangible nature creates a big challenge for security experts. As they try to secure businesses and countries against threats to their cyber-safety, it is helpful to analyze data from the past, recent statistics, and to review forecasts regarding future threats.
Yahoo sale to Verizon delayed as data breaches investigated (Computing) Yahoo announces that its sale will be shifted into the second quarter.
Amid security questions, Yahoo says it's delaying merger with Verizon (NBC News) The Wall Street Journal reported that regulators are investigating whether Yahoo disclosed two massive breaches to its investors in a timely manner.
Avaya Bankruptcy Sends Clear Message to Legacy IT Makers (eWeek) Avaya's bankruptcy is significant news due to the fact Avaya is the world's largest and most widely installed legacy on-premises communications systems provider.
IBM Just Bought This Startup to Boost Cybersecurity (Fortune) A former IBM executive will rejoin the company.
LANDESK and HEAT Software Merge to Form Ivanti (Yahoo! Finance) Clearlake Capital Group, L.P. (together with its affiliates, "Clearlake") today announced it has completed the acquisition of LANDESK. In conjunction with the transaction close, LANDESK and HEAT Software announced the two.
QuintessenceLabs Sees Additional Investment from Westpac Group to Strengthen Partnership (Yahoo! Finance) QuintessenceLabs today confirmed it has received an additional capital investment from Westpac Group, increasing the company's stake from approximately 11 percent to 16 percent. QuintessenceLabs is expanding ...
Microsoft Ventures backs Illusive Networks, a cybersecurity firm that protects with deception (TechCrunch) Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building "deception" frameworks to identify and trap malicious..
US Army Bug Bounty Program Fixes 118 Flaws - Dark Reading (Dark Reading) The Hack the Army program, sponsored by the US Army, received 400 bug reports and paid more than $100,000 to hackers who found 118 unique bugs.
Root9B to Support Chiron on Cyber Operational Training for DoD Under $50M Contract (ExecutiveBiz) Root9B has partnered with Chiron Technology Services to deliver cyber operational training to the Defense Department under the team’s potential five-year, $50 million contract. Root9B will provide cyber operations, incident response, threat emulation and network defense training that will work to prepare cybersecurity teams to defend against evolving cyber threats, the Colorado Springs, Colorado-based firm said Thursday. The...
Microsoft mulls cutting UK datacenter investment amid Brexit concerns (Ars Technica) Company currently depends heavily on EU-assembled systems and EU-wide data sharing.
New Board Members of the Anti-Phishing Working Group Join the Fight Against Attacks on US Democracy and $3B in Internet Crime Business Losses (Yahoo! Finance) The Anti-Phishing Working Group is pleased to announce the appointment of three new members to its Board of Directors. Brad Wardman, PhD. of PayPal, Dave Piscitello of ICANN, and Pat Cain of The Cooper Cain Group have joined the APWG Board of Directors.
Products, Services, and Solutions
SndrBlock will let you send huge files and secure messages (VentureBeat) Secure messaging company Sndr is launching a crowdfunding campaign on Kickstarter today for SndrBlock, a palm-sized device that lets you share huge files in a secure way.
ThreatQuotient and Vandis Partner to Customize Threat Intelligence for Accelerated Detection and Response (BusinessWire) Partnership provides customers with best-in-class threat operations and management, better understanding of how attackers see their networks.
WatchGuard Threat Detection and Response Adds Complete Network and Endpoint Visibility to Total Security Suite (PRNewswire) WatchGuard® Technologies, a leader in advanced network security solutions,...
Bromium Mobilizes Army of Endpoints to Fight the Cyber Drug War (MarketWired) Bromium supports enterprise innovation by giving users their freedom back, through launch of new virtualization-based security platform.
Technologies, Techniques, and Standards
Effective ICS cyber defense methods - Help Net Security (Help Net Security) This article focuses on effective cyber defense methods which are capable protecting the ICS section by using proven IT defense technologies.
St Jude case highlights ongoing divide over ‘responsible bugs disclosure’ (Naked Security) Disclosing bugs and vulnerabilities is ‘the free market.
How to keep branch offices as secure as corporate HQ (CSO Online) Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.
Real-time network health management: Closing the gap between known and unknown threats - Help Net Security (Help Net Security) To create network situational awareness with visibility of IT assets, you need integrative capacity, scalability and real-time assessment capabilities.
Data Privacy Experts Reveal how to Comply with the EU General Data Protection Regulation (GDPR) (WALB) Anonos Inc. (Anonos), in partnership with the International Association of Privacy Professionals (IAPP), announces a timely webinar on the impact of the EU General Data Privacy Regulation (GDPR) on global data analytics and artificial intelligence (AI)
How Cybercriminals Hack Facebook, Instagram and Snapchat Passwords - Heimdal Security Blog (Heimdal Security Blog) Here are the methods cybercriminals use to hack your Instagram, Facebook or Snapchat password.
Social Media Offers Tools to Improve Mental Health, Reduce Suicide (DoD LIve) The Defense Department makes the total fitness of service members a top priority, and that includes mental health and suicide prevention. Military suicide is the culmination of complex interactions among biological, social, economic, cultural and psychological factors operating at the individual, community and societal levels.
Design and Innovation
Lavabit developer has a new encrypted, end-to-end email protocol (CSO Online) The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging.
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach - Dark Reading (Dark Reading) When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.
What’s next for blockchain and cryptocurrency (TechCrunch) In May of 2010, someone on a Bitcoin forum by the name of Lazlo claimed to have bought two pizzas for 10,000 bitcoins. It was the first time anyone had..
Video: How to create a secure password, as told by a 12 year old (The Christian Science Monitor) A young New Yorker started her own business to sell secure passwords.
Research and Development
Mental “vaccine” protects both parties from plague of fake news and lies (Ars Technica) Republican or Democrat, preemptive facts and info can thwart partisan tripe.
CyberPatriot Announces 2017 CyberCamp Program (Yahoo!) The Air Force Association's (AFA) CyberPatriot program will be hosting its third round of CyberCamps throughout the United States this summer. Registration will be open from March 1 through May 1, 2017. Closing with a record 85 camps in 2016
Legislation, Policy, and Regulation
Narrative, Cyberspace and the 21st Century Art of War (Fifth Domain | Cyber) In February 2013, an article insipidly entitled “The Value of Science in Prediction” appeared in the Russian publication Military-Industrial Courier. The article was penned by Valery Gerasimov, chi…
Russia, Hacking and Industry's "New" Normal | WashingtonExec (WashingtonExec) In today's interconnected society, it won't just be governments who are subjected to geopolitical cyberattacks: industries are targets too.
China announces mass shutdown of VPNs that bypass Great Firewall (Ars Technica) China says all VPN providers must get permission from government to operate.
Three Observations on China's Approach to State Action in Cyberspace (Lawfare) We just returned from 36 hours in Beijing as part of a small group of American academics and government representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.
Net PoliticsThe Continued Importance of the U.S.-China Cyber Dialogue - Net Politics (Council on Foreign Relations - Net Politics) During the second week of January, I was in Beijing for the tenth round of the Center for Strategic and ...
Turnbull declares cyber security 'the new frontier of warfare' (ABC News) Malcolm Turnbull declares cyber security the new frontier of warfare and espionage, while announcing new measures to protect Australian democracy from foreign interference.
Deloitte: Australia needs to beef up cyber-security - Manufacturers' Monthly (Manufacturers' Monthly) Financial services firm Deloitte has warned that Australian governments and businesses need to toughen their defences against cyber attacks, according to Sky News. Australia currently has the fifth highest level of cyber attacks in the world and Deloitte says that distributed denial of service attacks (DDOS) will become more sophisticated, harder to combat and more … Continue reading Deloitte: Australia needs to beef up cyber-security →
Labor accuses Malcolm Turnbull of putting politics ahead of cyber security (the Guardian) Prime minister says Labor, Nick Xenophon and Greens were all invited to a briefing, but they have no record of this and only found out through the media
The Knowns and Unknowns of Trump’s Cyber Plan (Defense One) Questions surround how the new president will tackle cybersecurity.
54% of Americans say existing cyber security laws aren't getting the job done - Help Net Security (Help Net Security) Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up efforts to combat cybercrime.
Senate confirms Trump's pick to run the CIA (Military Times) The Senate on Monday confirmed President Donald Trump's nominee to run the CIA despite some Democratic objections that Rep. Mike Pompeo has been less than transparent about his positions on torture, surveillance and Russia's meddling in the U.S. election.
Cyber Expert Named as DHS Chief of Staff (Meritalk) The Department of Homeland Security announced last week that Kirstjen Nielsen will serve as the agency’s new chief of staff.
Federal CISO Touhill Leaves Public Service with Appreciation, Advice (Fifth Domain | Cyber) The federal government should concentrate less on new policies and more on optimizing organizational architecture and culture to support what exists, recommends former Federal Chief Information Sec…
GCHQ director Robert Hannigan resigns (Infosecurity Magazine) GCHQ director Robert Hannigan resigns citing personal reasons
Litigation, Investigation, and Law Enforcement
FBI reviewed Flynn’s calls with Russian ambassador but found nothing illicit (Washington Post) The diplomat’s communications are routinely swept up by U.S. agents.
FBI found no wrongdoing in Flynn’s calls with Russia: report (TheHill) An FBI review of communications between Russia’s ambassador to the U.S. and President Trump’s national security advisor did not produce any incriminating evidence, The Washington Post reported Monday night.
Pune: Two more arrested in Quick Heal fraud case (The Indian Express) The incident has allegedly caused the firm a loss of about Rs 900 crore.
Inside Minnesota’s Risky Plan to Deradicalize Young ISIS Recruits (WIRED) A new program aims to transform homegrown ISIS recruits back into normal young Americans.
Man who spent $96k in stolen veterans funds on online porn gets prison (Ars Technica) Prosecutors said he “got ‘sucked in’ and continued to do it because it was fun.”