Washington, DC: final notes on the eighth annual Billington CyberSecurity Summit
Cyber strategy: an old story of competition transposed to a new domain. (The CyberWire) Director of National Intelligence Coats set the tone for the day's proceedings when he called out cyberthreats as one of the prime, enduring dangers the United States faces. He focused on the exposure of critical infrastructure and the fragility of public trust—how it might be fractured by disruption or disinformation.
Cyber operational art: where to reduce friction, and where to increase it. (The CyberWire) Rob Joyce, White House Cybersecurity Coordinator, said, "In an environment like the one we have, we're going to get hacked, and we need to be able to bounce back rapidly." And indeed resilience was a common theme, which suggested strongly how the traditional dilemma Clausewitz formulated—will you concentrate on reducing your own friction, or increasing that of the enemy—is resolved in current thinking.
Cyber tactics: risk, and how to manage it. (The CyberWire) What then, of tactics? The consensus among those who spoke at the Summit was that tactics in cyberspace had to be informed by sound, disciplined risk management. This seems as true of offense as it does of defense, especially given the "inherently dual-use" nature of cyber tools several panelists alluded to.
U.S. ‘incredibly lucky’ to have avoided cyber calamity this long (News & Observer) State hackers in China and Russia are capable of sabotaging critical U.S. utilities, experts say. But they don’t do so because it would be seen as act of war.
Federal CISOs want more education and training to help boost incident response (FCW) To get ahead of cyberthreats, agency CIOs and CISOs want to focus on reducing response times from weeks and months to minutes.
Cyber is being normalized with traditional military operations (Fifth Domain) Cyber effects are being normalized and integrated into traditional operations, especially in the Middle East, according to the region's top U.S. military commander.
Cyber Attacks, Threats, and Vulnerabilities
NSA once spied on your *NSYNC downloads from Kazaa (Engadget) Spies in the aughts were really into downloading, apparently.
Assange trolls ‘triggered’ Pompeo for ‘WikiLeaks an enemy of the US’ claim (RT International) WikiLeaks is an enemy of the US, according to CIA head Mike Pompeo, who was trolled mercilessly by Julian Assange and others unimpressed by his perceived hypocrisy.
Yet another trove of sensitive of US voter records has leaked (ZDNet) Each record contained details on voters, including names, addresses, dates of birth, their ethnic identity, whether an individual is married, and the individual's voting preferences.
Ministers on defensive as hackers target Holyrood (Times) Hackers have made repeated attempts to break into the Scottish government’s computer networks in the past two years, forcing ministers to spend £2 million of taxpayers’ money to protect the public.
Equifax confirms unpatched Apache Struts flaw was exploited in massive data breach (Computing) Apache Struts patch released two months before hackers struck
What We Know and Don’t Know About the Equifax Hack (New York Times) The credit reporting company says hackers exploited a bug in popular software for building websites. But the identity of the attackers remains a mystery.
The big data breach suffered by Equifax has alarming implications (The Economist) The financial industry worries about who is next
Equifax breach happened because of a missed patch (Help Net Security) The attackers who breached Equifax managed to do so by exploiting a vulnerability in its US website, the company has finally confirmed.
Equifax had patch 2 months before hack and didn’t install it, security group says (USA TODAY) Security workers discovered, and created a fix for, the flaw that allowed attackers into Equifax two months before the company was hit by hackers.
Equifax suffers fresh data breach (BBC News) Credit report firm is accused of using "admin" as a login and password for its Argentine business.
Experian Was Vulnerable to Equifax Breach Attack (Tom's Guide) Another major credit-reporting agency, Experian, may have been vulnerable to the same attack that led to the massive Equifax data breach.
Equifax Hack Could Lead to Phishing, Medical Fraud (Financial Advisor IQ) A recent hack at Equifax...
Your Equifax Credit Freeze May Not Be Secure (Bankrate) The credit bureau moved to fix weak PINs, but some consumers still have cause to worry.
Equifax data breach: I tried to freeze my credit. There were problems. (USA TODAY) We were told this is how to protect ourselves from identity thieves. Too bad we can't
Dark Web Markets, Equifax Breach Raise Authentication Concerns (SurfWatch Labs, Inc.) The recent Equifax breach once again has the whole nation talking about cybercrime — and the widespread fraud and identity theft likely to follow in the wake of 143 million compromised consum…
POS Attacks Possible as Different Types of Malware Infect 4,000 ElasticSearch Servers (Security Intelligence) Kromtech Security found different types of malware that infected more than 4,000 ElasticSearch servers. Other security experts found additional risks.
Bluetooth ache: Protocol's security not sufficiently researched, experts claim after 'BlueBorne' disclosure (SC Media US) The security community is still trying to wrap its collective head around the sheer magnitude and scope of BlueBorne, a series of vulnerabilities found in
Windows 10 security solutions powerless against 'bashware' (Security Brief) Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
New Reports: North Korean Interest in Cryptocurrency Rising (DCEBrief) As the United States and the international community continue their efforts to isolate North Korea by tightening the existing sanctions regime, recent reports suggest that the country’s government may be pursuing alternative means for financing its nuclear goals. CNBC and CNN recently reported on intelligence indicating that the rogue nation is increasingly focused on mining and stealing Bitcoin.
Bitcoin 'mining': A new way for North Korea to generate funds for the regime (CNBC) North Korea appears to be "mining" bitcoin to fund the regime.
TrickBot Banking Trojan Now Targets Coinbase Users (The Merkle) In the world of malicious software, banking Trojans are nothing new. In fact, this type of malware has been around for as long as most people can remember. What is rather peculiar is how the TrickBot
The hidden danger of cryptocurrency mining in the enterprise (SC Media UK) New research finds cryptocurrency mining software has already infected at least 1.65 million endpoints this year. Should the enterprise be worried?
Navy Deploys Cyber Security Team to Investigate USS John McCain Collision (Washington Free Beacon) The U.S. Navy has deployed a team of cyber security experts to join the military's ongoing investigation into the fatal collision of the USS John McCain.
ISIS Has an End-of-the-World Problem (Slate Magazine) Can ISIS survive its failed prophecies?
ISIS is near defeat in Iraq. Now comes the hard part. (Washington Post) A failure to manage the post-conflict landscape could tear the country apart again, perhaps before the militants have been fully vanquished.
Security Patches, Mitigations, and Software Updates
Malware Alerts Prompt Google to Purge Android Apps From Play Store (eWEEK) Google is again forced to purge malware-infected Apps from its Android store after Check Point Software and Trend Micro issue separated advisories about the malicious apps.
Microsoft patches second FinSpy zero-day exploit this year (Naked Security) This week saw a veritable patchwork quilt of updates to Microsoft products – including one zero-day
Google reveals formal plan to distrust Symantec certificates in 2018 (ZDNet) The shift will begin with a new version of the Chrome web browser.
Cyber Trends
User-targeted threats at all-time high despite rising education spend (Help Net Security) The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’
UK’s critical services ‘skipping cyber guidelines’ (Energy Live News) Up to 39% of critical infrastructure organisations in the UK, including energy firms, have not completed basic cyber security standards.
The Second Annual Ponemon Study - The Value of Threat Intelligence (Anomali) Today we released our findings from the Ponemon Study, “The Value of Threat Intelligence: The Second Annual Study of North American and United Kingdom Companies." The Ponemon Institute surveyed over a thousand IT security professionals on a range of threat intelligence topics. Results show that organizations are rapidly incorporating threat intelligence into their security programs, with 80% of North American respondents using threat intelligence (up from 65% in 2016). Whether or not their
Rapid7 CEO: Break the shackles of the past and master automation (Computer Business Review) The CEO of Rapid7 believes that organisations should learn from the past, but break from its shackles and focus on a new approach.
Marketplace
Kaspersky: You can trust us despite ban (BBC News) The Russian cyber-security firm's chief reacts to the US government dropping its products.
Exclusive: Eugene Kaspersky Says Company Unfairly Caught In Geopolitical Fight (Forbes) For nearly five years, Kaspersky Lab has been in the line of fire from a handful of sources, which falsely report that we have covert and unethical ties to government organizations, possibly pose a threat to U.S. national security and/or our U.S. business is failing.
Kaspersky Lab considers changes to US business amid accusation of Russian influence (CRN Australia) Still planning to open new offices next year.
Micro Focus updates its security portfolio after HPE merger (Software Development Times) When Micro Focus completed its spin-merger with Hewlett Packard Enterprise, the company claims it created the seventh-largest pure-play software company in the world. It also is now among the largest security companies. At its Protect 2017 user conference this week, Micro Focus is making a number of announcements regarding its security portfolio, to address security …
Leidos wins $684M DHS info sharing support order (Washington Technology) Leidos wins a potential six-year, $684 million task order to help operate and maintain a pair of Homeland Security Department networks in support of DHS' information sharing efforts.
NSA Quietly Awards a Classified $2.4B Tech Contract, With More to Come (Defense One) CSRA won the first of three NSA Groundbreaker contracts to upgrade parts of the intelligence community’s IT infrastructure.
Jobs boost for Malvern high-tech employer QinetiQ (Malvern Gazette) Technology company QinetiQ is set to create over 100 new high-tech jobs - with many of them likely to be in Malvern.
Cylance claims naming rights to 400 Spectrum skyscraper, now open for business (Orange County Register) The Irvine Co. unveiled its latest high-rise office tower at the Irvine Spectrum Wednesday, which together with its twin make up two of Orange County’s tallest buildings. The new 20-story 400…
"Unicorn" startup Tanium plans further secondary share sales before IPO (City A.M.) Tanium, the world’s most highly valued cyber security startup, is planning further secondary share sales signalling plans to go public are further on
'Cybersecurity' term might be scaring off young talent (Healthcare IT News) While 18- to 26-year-olds are showing interest in cybersecurity, there’s a disconnect in the language around the field, skills and opportunities.
CrowdStrike Expands Operations and Leadership Team in India and SAARC (World News) Company launches state-of-the-art Engineering and Operations Center; actively recruiting regional talent
JASK Looks To Disrupt Security Operations Centers With AI (Forbes) There's a new kid on the block, and this company is on a mission. JASK is on a mission to transform the traditional SOC (security operations center) through the use of machine learning (ML) and artificial intelligence (AI). To help out with that endeavor, the company announced that Stuart McClure, co-founder and CEO of Cylance, has joined the JASK board of directors.
The Top 10 Israeli Artificial Intelligence Startups (Nanalyze) Israel is a country full of smart people who build successful companies. Let's look at the top 10 Israeli artificial intelligence (AI) startups by funding.
Firm offers up to $1 million for Tor zero-day exploits - but who will they sell them to? (Graham Cluley) A company is offering up to one million dollars in bounties for anyone who finds and reports exploitable zero-day flaws in the Tor Browser.
Prevoty is Named 2018 TAG Cyber Distinguished Vendor (Marketwired) The maker of application security solutions is recognized for developing the world's first autonomous application protection technology that enables applications to defend themselves from threats in real-time.
Skyport Systems Named a 2018 TAG Cyber Distinguished Vendor (BusinessWire) Skyport Systems, a leading secure hyperconverged infrastructure provider for the hybrid enterprise is proud to announce its designation as a Distingui
ZeroFOX Recognized as a 2018 TAG Cyber Distinguished Innovator (Sys-Con Media) ZeroFOX, the innovator of social media and digital security, is proud to announce its designation as a Distinguished Vendor in the 2018 TAG Cyber Security Annual. The annual report is designed to serve as “structured learning for Chief Information Security Officers (CISOs)” and covers key technology vendors, industry trends and outlooks for 50 top security controls.
Products, Services, and Solutions
Wombat Security Reveals Product Updates to Provide Most Advanced and Effective Training Solution for Recognizing and Avoiding Cyber Attacks (KAVU Newscenter 25) Comprehensive additions include new training content and localized translations to advanced reporting features and end user phishing reporting features, and a new user interface.
Spirent Gives Customers a Head Start in Validating and Testing New Transport Layer Security (TLS 1.3) Infrastructure (BusinessWire) CyberFlood is the first security test product to support TLS 1.3, a new encryption protocol that improves Internet security and privacy for users.
Lockheed Martin Selects Blue Cedar to Secure Its Universal Communications Platform™ (UCP™) Communicator Mobile App (BusinessWire) Blue Cedar’s mobile security technology will be included in Lockheed Martin’s Universal Communications Platform (UCP) mobile app, or UCP C
Comodo and StackPath collaborate on security platform (Enterprise Times) Comodo and StackPath integrate some of their products into what they are calling a best-of-breed cybersecurity platform that both companies will sell
Iron Mountain Expands Partnership with Virtustream (Business Insider) Iron Mountain Incorporated® (NYSE: IRM), the global leader for storage and information management services, today announced that Virtustream, the enterprise-class cloud company and a Dell Technologies business, has chosen to expand its cloud footprint by locating in Iron Mountain's Northern Virginia data center (or "VA-1").
Ichidan Is a Shodan-Like Search Engine for the Dark Web (BleepingComputer) Two days ago, Bleeping Computer came across a new Dark Web portal that allows users to search Tor Onion sites in the same way users utilize Shodan to discover Internet-exposed services.
Microsoft teams with Intel on cloud-based security ‘black boxes’ (The Mercury News) Microsoft links up with Intel on new cloud-based security technology meant to keep hackers, and the government, out of companies’ “black boxes.”
enSilo Partners with Coalfire to Enhance PCI DSS and HIPAA Security Programs for Endpoint Security Platform (Business Insider) enSilo, the company that protects endpoints pre- and post-infection in real time, announced today that the enSilo Endpoint Security Platform had a technical controls review conducted by Coalfire, leading provider of independent, comprehensive cybersecurity advisory services, to deliver stringent security measures required under PCI DSS and HIPAA regulations.
Infoblox Enhances Partner Program to Expand Benefits for Valued Channel Partners (business Insider) Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced enhancements to its partner program, BuildingBLOX, to offer additional benefits and training for valued channel partners.
Inmarsat launches new cyber security management product (Marine Electronics & Communications) Mobile satellite company Inmarsat brought its new unified threat management (UTM) service to London International Shipping Week, promising shipowners ‘fully-managed’ protection from cyber attacks.
Elcomsoft Phone Breaker 8.0 Adds Forensic Support for iOS 11 and New Apple Devices (markets.businessinsider.com) Elcomsoft Co. Ltd. updates Elcomsoft Phone Breaker, the company's forensic extraction tool.
Technologies, Techniques, and Standards
US Military Preparing for Digital Arms Race (VOA) One intelligence agency is studying artificial intelligence: the ability of machines to think like human beings.
For DoD cyber warriors, offense and defense is interchangeable (Fifth Domain) Creating a cyber warrior class, the Department of Defense and Cyber Command sought offensive and defensive forces trained to the same joint standards, allowing them the ability to switch roles and to better understand each other.
If Russia started World War III, here’s how it would go down (Military Times) The U.S. and NATO forces on Europe's eastern border are vastly outnumbered by the Russian military and could be quickly overwhelmed if Moscow mounted an aggressive assault into the Baltic region.
Hey, Turn Bluetooth Off When You're Not Using It (WIRED) In light of the latest Bluetooth-related security meltdown, a friendly PSA.
How to: Protect Systems From BlueBorne Attacks? (Vulns) No matter what part of the world you live in, I’m sure that you must have at least heard about the latest Bluetooth attack making rounds - BlueBorne.
Attorney general offers consumers resources after Equifax security breach (AdVantageNEWS.com) Company says personal information may be compromised for 5.4 million Illinoisans.
Information security is not information technology (CSO Online) NSA and Cyber Command are finally splitting. The two organizations have always had very different goals and are even governed by different laws. It wouldn't have even made sense to combine them, except for an overlap of the skills and tools required. Businesses are making this same mistake.
Using External Intelligence to Uncover Insider Threats (Recorded Future) Insider threats are an increasing risk to companies. Addressing the problem requires a fusion of security teams, business operational teams, and technology.
How NYC fends off hackers (City amd State) In July, New York City Mayor Bill de Blasio signed an executive order establishing the New York City Cyber Command to lead city agencies in cyber defense and response. As chief information security officer at the city Department of Information Technology and Telecommunications, Geoff Brown was tapped to lead this new task force. Brown talked about the cybersecurity threats New York is facing, and how the city is working to mitigate these risks.
Organizations struggle to maximize the value of threat intelligence (Help Net Security) Many organizations struggle with threat data and lack of staff expertise, which diminish the effectiveness of their threat inteligence programs.
Design and Innovation
How Anonymous Zcash Cryptocurrency Actually Works (International Business Times) How zcash combines encryption with blockchain technology.
Top state officials join bipartisan fight against election hacking (POLITICO) The project is in part fueled by the presidential campaign experiences of former Clinton and Romney managers.
Why your security scars are the key to innovation (CSO Online) Ben Johnson lines up for a Security Slap Shot on driving innovation in security and business based on experience
How facial recognition systems will reshape your daily life (NBC News) New systems are expected to transform shopping, banking, travel, and more.
Research and Development
Toshiba Pushes Quantum Key Distribution Speed Beyond 10Mbps (BusinessWire) Toshiba and Toshiba Research Europe Limited have developed the world's fastest quantum key distribution device.
Nascent Quantum Computing Poses Threat to Cybersecurity (Wall Street Journal) The threat of a cyber attack by hackers or rogue nation states with access to quantum computers is becoming real enough that scientists and public officials are convening in London this week in part to urge companies to develop a plan for defense.
Academia
SFA’s College of Sciences and Mathematics to offer Master of Science in Cybersecurity (Gilmer Mirror) People wanting to earn a master’s degree in cybersecurity will soon have the opportunity to do so at Stephen F. Austin State University....
Former acting CIA director resigns from Harvard after Chelsea Manning named as visiting fellow (Military Times) Morell said he couldn't be part of an organization
Legislation, Policy, and Regulation
The Frontlines of Cyber Repression: the Venezuelan Digital Caudillo (Niskanen Center) To say that public discontent in Venezuela reached new heights over the past few months is an understatement. The state is on the verge of collapse and the internal response is to batten down the hatches with both violent reactions and online attacks.
Hacking for the government: Germany opens ZITiS cyber surveillance agency (Deutsche Welle) The German Interior Ministry has officially opened ZITiS, a surveillance agency independent of both the police and the secret service. Critics say anyone with a smartphone is now vulnerable to state snooping.
European Commission wants ENISA to introduce EU-wide cybersecurity certification scheme (Help Net Security) The European Union needs a strong cybersecurity agency, and the Commission proposed a regulation aimed at strengthening the role of ENISA.
Confusion and lack of preparation in the face of looming GDPR deadline (Help Net Security) With the GDPR deadline set for 25 May next year, many organisations are ill-prepared due to uncertainty about the criteria for compliance. 37 percent of re
The market can't - and won't - deal with IT security, it must be regulated, argues Bruce Schneier (Computing) Regulate the security practices of companies that store data, fine them if they fail to comply and let people sue if companies spill personal information, argues Schneier
Donald Trump blocks Chinese deal to buy U.S. chips with military uses (The Washington Times) President Trump blocked a Chinese firm from buying a U.S. computer chip maker Wednesday, demonstrating to Beijing that he will oppose its acquisition of technology with potential military applications.
Trump's Tech Crackdown on China Has Begun (Defense One) The White House just blocked a $1.3 billion plan to sell an Oregon-based semiconductor company to a Chinese equity firm, citing possible technology risks to national security.
ISPs claim a privacy law would weaken online security and increase pop-ups (Ars Technica) California to vote on privacy law opposed by AT&T, Comcast, Charter, and Verizon.
Admiral: US tolerated cyber 'acts of war' over last decade (Washington Examiner) 'The international community did not even really come out strongly and say, 'this is unacceptable, you cannot go after critical infrastructu...
Analysis: US Cyber Command matures steadily (Shephard) President Trump has elevated the status of the US Cyber Command (USCYBERCOM) to a unified combatant command it was announced in an August statement.
Litigation, Investigation, and Law Enforcement
The FTC is investigating the Equifax breach. Here’s why that’s a big deal. (Washington Post) It's rare for the FTC to disclose an ongoing probe.
Equifax CEO called to testify to Congress as the company is likened to Enron (Computing) Equifax facing multiple investigations
Top House Dem asks Equifax rivals about security measures after record breach (TheHill) A top Democrat on the House Financial Services Committee asked Equifax’s competitors on Wednesday whether they’ve taken steps to prevent a similar security breach.
Kaspersky boss Eugene Kaspersky accepts invitation to testify to US Congress (CRN Australia) Will address issues surrounding Russian espionage accusations.
Senators Want Answers From Equifax Over Its Massive Data Breach (Fortune) Just what data security processes and procedures did Equifax have in place anyway?
FBI reveals expanded use of grand jury subpoenas in Hillary Clinton email probe: Report (Washington Examiner) Grand jury subpoenas were used in the process of accessing Clinton's records from her accounts, and also those of people she communicated wi...
Opinion | Sessions wants a leak investigation rule-change. That could cripple the free press. (Washington Post) We wrote the current rules, and they work.
H.R. McMaster memo on stopping leaks gets leaked (Washington Examiner) Leaks have been a nagging issue impacting the Trump administration and its policy agency, prompting efforts to crack down.
US Homeland Security Sued Over Warrantless Search of Electronics (VOA) The lawsuit calls for stricter legal guidelines for searches of electronic devices
White House Press Secretary Says Comey Violated Privacy Act (New York Law Journal) The government could face an uphill fight pursuing Privacy Act violations against former FBI Director James Comey based on previous history.
Former Trump Campaign Adviser Page Sues Yahoo Parent Over Story on Russia Connections (New York Law Journal) Carter Page described a Sept. 23, 2016, story published by Yahoo as 'perhaps the most dangerous, reckless, irresponsible and historically-instrumental moment...