Cyber Attacks, Threats, and Vulnerabilities
Russia’s Hybrid Warriors Got the White House. Now They’re Coming for America’s Town Halls. (Foreign Policy) Moscow knows that activists, religious groups, and NGOs are democracy’s soft underbelly.
Facebook knew about Russian meddling well before the US election (Engadget) Facebook knew about Russian election meddling in June, 2016 and Obama warned Mark Zuckerberg to take it more seriously.
Leaked Descriptions Of Infamous "Russia Ads" Derail Collusion Narrative "They Showed Support For Clinton" (ZeroHedge) “I think the American people should see a representative sample of these ads to see how cynical the Russians were using these ads to sow division within our society,”
The Latest: Homeland Security says Wisconsin was target (News Tribune) The U.S. Department of Homeland Security is reiterating that it believes 21 states were the target of Russian government hackers seeking vulnerabilities and access to the U.S. election infrastructure.
WannaCry ransomware explained: What it is, how it infects, and who was responsible (CSO Online) Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.
WannaCry Some More? Cybercriminals Using NSA Hacking Tools to Attack Citizens (Sputnik) A cybersecurity firm has announced hacking tools linked to the US National Security Agency are being exploited by cybercriminals.
Suspected mass-spoofing of ships’ GPS in the Black Sea (Naked Security) One ship’s navigation system reported that it was actually on land
IS hackers have 'poor coding skills' (BBC News) Three attack tools created by one large IS hacker collective were "garbage", the researcher said.
SEC chair: No PII leaked in breach, still ‘concerns me deeply’ (Fifth Domain) Senators pressed Clayton for details about the 2016 cyberattack on the SEC, which was just disclosed last week, as well as the massive Equifax breach that was disclosed earlier this month.
Here's the Latest About What the SEC Hackers Stole (Fortune) Sensitive information.
SEC's Cyber Breach Report Too Little, Too Late, Experts Say (Legaltech News) 'What a doozy!' said one expert of the breach disclosed by the SEC this week.
Deloitte breach! All you need to know (Teiss) Deloitte, one of the world's leading accountancy firms, was hit by a destructive cyber-attack in November last year that compromised secret client emails and other records.
Sensitive client emails, usernames, passwords exposed in Deloitte hack (Register) Oops, did someone forget to turn on 2FA?
Updated: Government Agencies Not Compromised in Deloitte Breach (Nextgov) The breach affected an email system that included information from several markets.
The great Deloitte dumpster fire… (Teiss) Deloitte have been caught out. Caught out not practising what they preach. Caught out not following the steps they preach to their many clients, they charge mega bucks from.
Exposure of your sensitive data isn’t a bug, it’s a feature (TechCrunch) Another day, another breach. Equifax, SEC, Deloitte and the next one is coming soon. Nothing surprising there anymore, not for customers, not for the breached..
Mobile stock trading apps ignore critical flaw warnings (ZDNet) IOActive discovered vulnerabilities in today's 21 most popular trading apps -- but the vendors couldn't care less.
Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware (BleepingComputer) Earlier today, Avast published a full list of companies affected by the second-stage CCleaner malware, as part of its ongoing investigation into the CCleaner hack that took place last week.
Remote Wi-Fi Attack Backdoors iPhone 7 (Threatpost) Google’s Project Zero released an attack against a Wi-Fi firmware vulnerability in Broadcom chips that backdoors the iPhone 7. The flaw was patched in iOS 11.
Password-theft 0-day imperils users of High Sierra and earlier macOS versions (Ars Technica) Rogue apps can exfiltrate all plaintext passwords, no master password required.
Dirty Cow vulnerability discovered in Android malware campaign for the first time (ZDNet) The bug has been found in malware designed to root and install backdoors into Android handsets.
Banking trojan has resurfaced on Google Play once more (WeLiveSecurity) Banking trojan has returned to Google Play in a more stealthier guise as cybercriminals target users once more as they seek to access private data.
XPCTRA financial malware leaves no stone unturned (Help Net Security) A Trojan that has previously been only stealing users' banking credentials has been modified to go after digital wallet credentials.
What's causing so many data breaches and leaks? 7% of all Amazon S3 servers exposed online (International Business Times UK) Experts reportedly uncovered that 35% of all S3 buckets were unencrypted, potentially leaving data under risk of exposure.
An Elaborate ATM Threat Crops Up: Network-based ATM Malware Attacks (TrendLabs Security Intelligence Blog) Infecting automated teller machines (ATMs) with malware is nothing new. It’s concerning, yes. But new? Not really.
Insteon and Wink home hubs appear to have a problem with encryption (Register) Which is to say neither do it
Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards (KrebsOnSecurity) Sonic Drive-In, a fast-food chain with nearly 3,600 locations across 45 U.S. states, has acknowledged a breach affecting an unknown number of store payment systems.
Now weaponised, ransomware is a grave threat (Techgoondu) Just as criminals are getting smarter, enterprises have to get up to speed to counter new ransomware threats.
Shocker? Companies still unprepared to deal with ransomware (Help Net Security) In many respects, ransomware is a game changer. Many organizations are alarmingly unprepared for the ransomware onslaught.
Security Patches, Mitigations, and Software Updates
WordPress 4.8.2 is out, update your website now (Naked Security) The first rule of running WordPress is always use the latest version
Signal Has a Fix for Apps' Contact-Leaking Problem (WIRED) The private messenger is testing an Intel-chip feature that could let apps check your phone's contact list—and then provably forget it.
How the Value Outweighs the Cost of Security (Security Intelligence) Regardless of a company's size, the value of building a strong security posture will always outweigh the cost of security.
Netwrix Releases In-Depth Report on IT Risks Faced by Organizations of Various Sizes, Verticals and Regions (Netwrix) The report details how organizations prepare themselves for cyber risks depending on their size, industry and region.
In cloud computing, more data loss on the horizon (Raytheon) By now, it's a familiar story: A company puts massive amounts of data on a remote cloud server – then someone finds a way in, gaining access to sensitive business documents or the personal information of millions of people.
Healthcare sector reports greatest number of security incidents (Help Net Security) While healthcare security incidents are most likely the result of accidental disclosures and human error, cyberattacks on the sector continue to increase.
Cyber insurance an untapped opportunity, can help companies fortify data: Dell EMC (Moneycontrol) The explosion of data created by consumer and business apps is creating hundreds of terabytes of data, resulting in what Dell EMC’s global pre-sales leader PK Gupta calls “data fog."
Chinese takeover of Imagination Technologies raises national security concerns (Teiss) An impending Chinese takeover of Imagination Technologies may put the UK's military and national security at risk, experts warn.
Blockchain & cryptocurrencies: gungho or hell no? (Memeburn) Blockchain and cryptocurrency were previously met with heaps of scepticism from the tech community. But it's now slowly becoming more mainstream.
Like It or Not: Public Companies Are Feeling the Crypto Mining Boom (CoinDesk) Public companies like AMD and Nvidia are benefiting from a surge in cryptocurrency mining, but analysts say they may not be ready to commit long-term.
CyberArk: Breaking The Barrier Of Stagnation (Seeking Alpha) CyberArk's recent sell-off still provides little bargain opportunities. Its capped TAM continues to tilt risk/reward against a pressurized upside. CyberArk is a
FireEye (FEYE) Looks Promising: Should You Buy the Stock? (NASDAQ.com) Shares of FireEye Inc. 's FEYE have been on the rise since it reported splendid second-quarter 2017 results. The indicators of a stock's bullish run include a rise in its share price and strong fundamentals.
Sky and Space signs Check Point for satellite cybersecurity (ZDNet) Check Point has been signed on to provide cybersecurity services for nano-satellite telecommunications provider Sky and Space Global's space and ground communication platforms.
OWL Cybersecurity Announces Name Change to DarkOwl (WebWire) OWL Cybersecurity, a Denver-based cybersecurity company offering the worlds largest commercially available database of darknet content, today announced it is changing its name to DarkOwl. The new name better reflects its focus on darknet expertise...
Is Arizona becoming a leader and innovator in cybersecurity? (AZ Big Media) Cybersecurity is one of the fastest growing industries in the nation. Find out how Arizona companies and leaders are engaging with this industry.
Fortinet's Genevieve White resigns as channel chief (CRN Australia) Security vendor now in recruitment mode.
Avecto Expands Executive Team with Robin Saitz as CMO and Andrew Avanessian as COO (PRWeb) Key Marketing and Operations appointments extend Avecto's leadership position in privilege management
JASK Names J.J. Guy as Chief Technology Officer to Further its Mission of Improving Efficiency of Security Operations Teams Through Artificial Intelligence (Marketwired) Carbon Black founding team member and U.S. intelligence veteran to lead AI-driven product vision; company to open new Austin, Texas office
Products, Services, and Solutions
SecurityFirst™ DataKeep™ Protecting Data from Creation to Deletion (SecurityFirstCorp.com) Cost-effective, scalable and transparent data-centric protection for companies of any size
Venafi Trust Protection Platform Achieves Common Criteria Certification September 26, 2017 (Venafi) The Venafi Trust Protection Platform manages and secures the cryptographic keys and digital certificates that make up machine identities, delivering an enterprise-grade platform that provides in-depth security, operational efficiency and organizational compliance.
Read/write access to NTFS in macOS Sierra - Paragon NTFS for Mac® 15 (Paragon Software) Fast, seamless, easy to use. Mount, unmount, verify, format, or set any of your Windows NTFS volumes as a startup drive.
Comodo launches IoT security platform (BetaNews) We all know we need to protect our computer systems when they're connected to the internet, but there’s generally less awareness of the threat posed by the latest generation of Internet of Things devices.
Splunk Brings Machine Learning to Mainstream With New Solutions at .conf2017 (Splunk) Turn data into answers with Splunk Enterprise 7.0, Splunk ITSI 3.0, Splunk UBA 4.0 and Splunk Cloud.
Microsoft looks to the cloud to expand its security offerings (TechCrunch) Ignite is Microsoft's main annual conference for bringing together its enterprise users and IT community. It's no surprise then that security is one of the..
ThreatQuotient and Flashpoint Partner to Increase Data Enrichment (ThreatQuotient) The custom integration of the ThreatQ™ threat intelligence platform with Flashpoint API v4 will provide incident responders and defenders with a central...
A smartphone made in Russia claims to be "surveillance-proof" (Futurism) The company that designed the phone is on the US blacklist for links with Russian intelligence.
SonicWall Releases A Slew Of New Products (Storage Reviews) Today SonicWall announced several new products and services aimed at accelerating speed thresholds for its Automated Real-Time Breach Detection and Prevention Platform across wired, wireless and mobile networks.
Array Networks Partners With Webroot to Enhance APV Series Application Delivery Controller With Web Classification (BusinessWire) Array Networks partners with Webroot to enhance its APV Series application delivery controllers (ADCs) with web classification capabilities.
Ixia First to Deliver End-to-End Visibility for All Leading Public Cloud Platforms (BusinessWire) Ixia First to Deliver End-to-End Visibility for All Leading Public Cloud Platforms with CloudLens
Trustonic underpins Korean national certification platform (Finextra Research) As the means of authentication become more diverse and the need for more convenient financial services grows, the Korean Accredited Certification Authority (Koscom SignKorea) is building a ‘United Authentication Platform’...
Splunk expands machine learning capabilities across platform (TechCrunch) Splunk has always been data central for IT operations info, but as the logs fill up with ever-increasing amounts of data, it has become impossible for humans..
LightEdge Solutions Acquires Cabela’s Omaha Data Center (Lightedge) LightEdge Solutions announced today it is buying Cabela’s existing, state-of-the-art Omaha data center retrofitting it to support LightEdge
Technologies, Techniques, and Standards
Subpar IP Decisioning Data Can Drive Risky Security Decisions (CSO Online) Cyber threats have driven companies to invest heavily in security data, technologies and services.
How Network Visibility Enables the Detection and Response Mission (Masergy) Network Visibility provides a complete network activity and metadata history which improves alert validation and effective response to infections.
Which security investments make a difference? (Help Net Security) The costly consequences businesses are suffering highlights the growing importance of strategically planning and closely monitoring security investments.
Vulnerability vs. risk: Knowing the difference improves security (CSO Online) Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks.
Design and Innovation
Microsoft’s new coding language is made for quantum computers (Engadget) Microsoft has developed a language for quantum computers that don't exist yet.
New MIT Tool Automatically Rewrites Old Code for New Software (Motherboard) But take heart: It still requires human developers.
Caught In the Equifax Breach? Blockchain Startups Are Here to Help (HuffPost) The most significant data breach in United States history just occurred with the Equifax hack, exposing 143 Million Social Security Numbers and credit fi...
Lockheed Martin CEO donates $5 million to Culverhouse (The Crimson White) “Marillyn’s generosity to her alma mater will sustain and promote our rigorous data-science program, enabling us to give students critical skills that are in high-demand by industry and government.”
American Military University Continues Support of CyberPatriot (markets.businessinsider.com) The Air Force Association’s (AFA) CyberPatriot program announced today that American Military University (AMU) is continuing its support of the National Youth Cyber Education Program.
Call for Participation (Women in CyberSecurity) Submissions in all categories are now open throughout November 1st. Acceptance notifications will be sent December 1st.
Legislation, Policy, and Regulation
The Global Commons is a Great Good (The Cipher Brief) "However, that is not without some responsibility and accountability for individuals and nation-states who operate there."
US And Russia Quietly End Diplomatic Tailspin (BuzzFeed) A behind-the-scenes effort by US and Russian diplomats may have preempted a new wave of tit-for-tat retaliations.
Facebook Is a Broadcaster: Let's Regulate It Like One (Fortune) The new TV monopolist.
Feds want foreign surveillance authority renewed (Fifth Domain) Intelligence and law enforcement officials across the government lobbied Congress Monday to let them conduct broad surveillance on foreign targets in coming years, saying it helps prevent terrorist and cyberattacks on the United States.
NSA targeted 106,000 foreigners in past year's surveillance program soon up for renewal (The Japan Times) The U.S. National Security Agency conducted targeted surveillance over the past year against 106,000 foreigners suspected of being involved in terrorism an
SEC chairman: 'We want and need' IT modernization fund Trump admin wants to eliminate (FederalNewsRadio.com) SEC Chairman Jay Clayton told senators the agency needs to keep its long-term IT modernization fund in order to defend against future cyber breaches.
Litigation, Investigation, and Law Enforcement
Skynet in China: Real-time spying on citizens (CSO Online) AI married to CCTV surveillance in China uses facial recognition and GPS tracking to overlay personal identifying information on people and cars in real time.
WhatsApp service disrupted in China as censorship tightens (Fifth Domain) Chinese authorities are tightening controls on social media ahead of the party congress next month at which President Xi Jinping is due to be appointed to a second five-year term as leader.
Russia threatens to block Facebook over data storage (Fifth Domain) Alexander Zharov, chief of the Federal Communications Agency, told Russian news agencies on Tuesday that they will work to “make Facebook comply with the law” on personal data, which obliges foreign companies to store it in Russia.
What’s True, False And In-Between In The Trump Dossier? (The Daily Caller) The infamous Trump dossier: Democrats say key parts of it have been proved accurate and Republicans claim it has been debunked. But the truth about the salacious document, written last year by form
House Demands Details on White House Private Email Users (Infosecurity Magazine) House Demands Details on White House Private Email Users. Trump team accused of rank hypocrisy
U.S. Homeland Security to begin collecting immigrants’ social media info (The Daily Dot) The new policy affects green card holders and naturalized citizens.
Another thug learns that SWATting Brian Krebs is a bad idea (Naked Security) Things have not gone well for Krebs’ tormentors