Cyber Attacks, Threats, and Vulnerabilities
WikiLeaks says it will work with software vendors to fix CIA zero-day exploits... but when? (Graham Cluley) After the media hystericane, Julian Assange says he will help bugs get fixed.
WikiLeaks’ CIA document release will probably be traced back to private contractors (Vice News) It was probably a contractor. That’s what intelligence experts are saying about the source of the massive WikiLeaks dump of CIA documents this week. Though authorities don’t appear close to naming a suspect in the so-called Vault 7 leak, intelligence community sources VICE News spoke to agree that the leak…
Former CIA Deputy Director Mike Morell: CIA leak 'absolutely' an 'inside job' (Washington Examiner) Former CIA Deputy Director Mike Morell said on Saturday that the WikiLeaks' dump of documents it claims are from the top-secret CIA hacking program is absolutely an inside job.
What the WikiLeaks CIA Dump Says About the Weakness of Washington's Data Security (Fortune) The new WikiLeaks revelation of CIA hacking capabilities showed that Washington is still struggling to secure its data.
Cyber Expert: Haven't Seen CIA Hacking Tools on Black Market Yet (NBC News) Julian Assange says the CIA's hacking tools may now be available on the black market, but an expert said he hadn't seen them there yet.
Researcher Posts Hacking Tool Pulled From WikiLeaks CIA Release (NBC News) A cyber researcher has posted a malware component that was extracted from one of the documents released by WikiLeaks Tuesday.
Vault 7: Die Cyber-Waffen der CIA (APA OTS) Die Veröffentlichungen von vertraulichen CIA-Dokumenten auf der Enthüllungsplattform Wikileaks beleuchten deren Aktivitäten im Bereich Hacking von Hard- und Software in den Jahren 2013 bis 2016.
Wikileaks says CIA does CYA, reinvents the ‘Boss’ key from 1992 (Naked Security) Want to be a CIA field agent? It’s important to keep up appearances, just as you would at a fine dining restaurant.
Kaspersky Lab Comment On WikiLeaks Disclosure (Information Security Buzz) On Tuesday, 7th March, WikiLeaks published thousands of documents. The documents are alleged to show tactics and tools employed to, among other things, break into computer devices from leading manufacturers, to circumvent installed security solutions and even lay a trail of false flags. Kaspersky Lab believes, along with many of its colleagues across the security industry, …
Encrypted messaging through Signal and WhatsApp hasn't been compromised, despite what you've heard (Mic) At least that's not what we learned from WikiLeaks' CIA dump.
WikiLeaks Dump Adds to China’s Foreign-Tech Wariness (Netralnews.com -) The latest WikiLeaks trove hands fresh ammunition to China’s cyberspace hawks, already pushing to reduce dependence on foreign products that could be vulnerable to espionage, observers say.
We’re worrying too much about zero days (The Next Web) The bulk of media coverage after leaks like the recent ‘Vault 7’ release by WikiLeaks focussed on zero days, but known vulnerabilities are a bigger problem.
Apache Attack Traffic Dropping, Limited to Few Sources (Threatpost) While probes looking for vulnerable Apache Struts 2 deployments continue, malicious traffic has tapered off, researchers at Rapid7 said.
"Super Malware" Steals Encryption Keys from Intel SGX Enclaves (BleepingComputer) In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data from SGX enclaves, a secure environment created by Intel CPUs for storing sensitive information for each process, such as encryption keys, passwords, and other.
Security Flaws in MAC Address Randomization Technique makes iOS, Android Devices Vulnerable to Tracking (HackRead) Tracking mobile phones has become relatively easier since the advent of smartphones and wireless connectivity as these devices become traceable when they m
Malware found preinstalled on 38 Android phones used by 2 companies (Ars Technica) Malicious apps were surreptitiously added somewhere along the supply chain.
Android devices delivered to employees with pre-installed malware (Help Net Security) A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees.
Pre-installed malware stealing data from mobiles: Check Point (InfotechLead) Israel-based cyber security firm Check Point has detected a malware that is not downloaded due to users’ use but is already present in Android device. According to a company blog post last week, the pre-installed malware was detected in 38 Android devices, belonging to a large telecommunications company and a multinational technology company. “The malicious …
Credit Card Stealer Disguises as Google Chrome Browser (BleepingComputer) A new malicious application tries to disguise itself as the Google Chrome browser to fool victims into entering their payment card details. The app is still active at the time of writing and sends collected user details to an AOL email address.
Sticky Attacks: When the operating system turns against you (Panda Security Mediacenter) Pandalabs detects and neutralizes an attack that does not use any malware as such. The "Sticky Keys" become a corporate nightmare.
ISP Blocks TeamViewer Because of Tech Support Scammers (BleepingComputer) TalkTalk, a UK-based Internet service provider, has temporarily banned TeamViewer and other similar remote control software programs, citing security issues related to increased scam operations.
TeamViewer stopped working? Let me guess, your ISP is TalkTalk... (HOTforSecurity) If you have ever had to provide remote technical support to a less-nerdy friend or member of your family, you'll know just how hard it can be. Over the phone you're trying to get them to say what they can see on their PC screen, and attempting to describe the button... #remoteaccess #scam #talktalk
How online gamers use malware to cheat (Naked Security) As the sophistication of attacks to allow cheating have grown, so too have the defenses of the games industry
Computer ransomware that locks out users flourishes in pay-to-make-it-go-away Japan (The Japan Times) Companies and individuals in Japan are finding their computers are increasingly targeted by ransomware — programs that bar victims from accessing imp
Inadequate software beckons hackers (VietnamNet Bridge) A lack of adequate software is the reason many agencies and airports have become vulnerable to hackers, according to Viet Nam Computer Emergency Response Team (VNCERT).
A tale of two cyber bank heists that reveals their vulnerability (Financial Times) What attacks on Lloyds and Tesco Bank tell us about how online crime is evolving
How Tax Fraud Is Evolving In 2017 (PYMNTS.com) If there’s one thing that can be counted on to happen every year around tax season — besides the ongoing tax preparation service commercials — it’s fraud.
Law firms warned by regulator of new cyber-crime threat (Global Legal Post) Law firms have been put on high alert as the Solicitors Regulation Authority (SRA) warns of new threats impacting hundreds of firms.
#OpBlueWhale: "Anonymous" Urges Teens to Quit Playing Suicide Game (HackRead) A group of hacktivists connected to the online hacktivist group Anonymous is urging teens to quit taking part in a sinister game called Blue Whale.
Security Patches, Mitigations, and Software Updates
Google Chrome 57 Browser Update Patches ‘High’ Severity Flaws (Threatpost) Google paid out $38,000 in bounty rewards tied to flaws it fixed with a Chrome 57 browser update.
Dahua, Hikvision IoT Devices Under Siege (KrebsOnSecurity) Dahua, the world’s second-largest maker of “Internet of Things” devices like security cameras and digital video recorders (DVRs), has shipped a software update that closes a gaping security hole in a broad swath of its products.
ZTE Releases Security Patches and Bug Fixes to its 6 Phones (GoAndroid) ZTE today rolls out an update with latest Android Security Patch and bug Fixes to its 6 Phones. The phones are ZTE Blade V7, Blade V7 Lite, Blade A610 Plus
Most security pros expect increasing attacks on Industrial Internet of Things (Help Net Security) A new survey looked at the rise of Industrial Internet of Things deployment in organizations, and to what extent it is expected to cause security problems.
'Insecurity of IoT Devices' at Billington Int'l Cybersecurity Summit (Video) (American Security Today) Security experts point to the proliferation of smart, connected devices known as the Internet of Things and the growing cybersecurity threats they present. For example, last year’s Dyn attacks, initiated by about 100,000 endpoints using IOT devices, was viewed as the largest DDoS attack to date and interrupted service to a number of large websites. (The …
IoT DDoS Reaches Critical Mass (Infosecurity Magazine) There are roughly 3,700 DDoS attacks per day.
What Are The Consequences Of Cybersecurity Attacks for Marketing Leaders? (Forbes) As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing (see here for Part 1 and Part 2), I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business
Financial Institutions Less AppSec-Savvy Than You'd Think (Dark Reading) New study shows banks all have policies in place, but lack metrics and good third-party software controls.
Malwarebytes says in 2016 threat reality caught up with hype (iTWire) Malwarebytes' latest global state of malware report states, “2016 – the year threat reality caught up with the threat hype". To better und...
Exploring The Gap Between Cybersecurity Perception And Reality (Forbes) Most company executives and security professionals have a reasonable understanding of cybersecurity.
Quantum Cryptography: A Boon for Security (National Review) Quantum cryptography will revolutionize computing, making data immune from hackers.
Crash Report 2017 (CAST Software) Stack the software quality deck in your favor
Total security appliance market shows positive growth (Help Net Security) The total security appliance market showed positive growth in both vendor revenue and unit shipments for the fourth quarter of 2016, according to IDC.
Is cyber insurance really worth it? (CRN Australia) Legal and financial dangers lurk in the fine print.
Ignition warns resellers of shift away from appliance-based security (ChannelWeb) Ignition CSO Sean Remnant tells partners to focus on software-based tech as the distributor showcases its vendors at The Shard in London.
The need for cyber security during an M&A (IT Pro Portal) Due diligence is an absolute must when it comes to cyber security checks during mergers and acquisitions.
Comcast acquires Icontrol Networks' IoT home security platform and expertise (Internet of Business) Comcast Cable Communications has acquired smart home platform provider Icontrol Networks' Converge IoT business.
KeyW buys national security firm Sotera from Ares Mgmt (Mergers & Acquisitions) The deal comes as the FBI opens an investigation into Wikileaks documents that claim to reveal CIA cyberespionage capabilities.
RiskSense Raises $14 Million for Intelligent Vulnerability Management (eSecurity Planet) The company's machine-learning technology helps enterprises focus their security efforts on high-priority threats.
FireEye Has Not Bottomed Yet (Yahoo! Finance) Lack of growth and profitability will continue hurting FireEye
Palo Alto Networks: Lofty Expectations Baked Into Valuation (Seeking Alpha) From mid 2014 to mid 2015, the cyber security industry was the “hot buy.”. However, the fundamentals of the business make it hard to imagine a scenario where th
Why Palo Alto Networks Left Investors Unimpressed -- The Motley Fool (The Motley Fool) The cybersecurity specialist produced record revenue last quarter, but investors want more.
Cisco: An Unusual Puzzle (Seeking Alpha) Cisco recently reported the results of its fiscal Q2. Results were mixed - the company lost ground as expected in switching and routing, but enjoyed a strong qu
IBM's position on Security Analytics and Operations (SOAPA) (Network World) Marc van Zadelhoff, general manager of IBM’s security division, talks SOAPA market demand and evolution
Air Force awards information security contract (C4ISRNET) The Air Force has awarded a $50 million information contract to five companies.
Virtru Named to CNBC's Global List of Top 25 Startups (Businesswire) Virtru today announced it has been named to CNBC’s inaugural Upstart 25, CNBC’s list of promising young startups.
Target Security Chief Joins Booz Allen Hamilton (Wall Street Journal) Brad Maiorino, former information security chief at Target Corp., has joined Booz Allen Hamilton as an executive vice president responsible for growing the defense contractor’s U.S. commercial business.
Products, Services, and Solutions
IT Service Providers Scramble to Protect Customers After CIA Cyberweapons Leak (Talkin' CLoud) Needless to say, it was a busy week at managed security services provider (MSSP) Digital Guardian.
Thales leverages principles of evolution for cyber defence (IHS Jane's 360) Thales is working to defend security systems against cyber threats through the use of 'genetic behavioural algorithms', with the concept already deployed and being tested on a number of customers' networks.
More than 600 Visitors Across a Dozen Industries Have Trained for Cyber Attacks at IBM Security's Cyber Range (PRNewswire) IBM Security (NYSE: IBM) today announced that more than 600...
American National Bank Selects Skyport Systems to Secure Their Critical Infrastructure (Businesswire) Skyport Systems, a leading secure hyper-converged infrastructure provider for the hybrid enterprise, today announced that it has been selected by Amer
EIT Digital to provide key to secure IoT systems (SAT PR News) The complex and dynamic nature of Internet-of-Things (IoT) systems requires cryptographic key management services to ensure IoT units operate at high speed and are reliable and scalable.
ZeroFOX Safeguards Modern Businesses against Latest Social and Digital Risks with a New Comprehensive Brand Protection Offering (Yahoo! Finance) ZeroFOX, the innovator of social media and digital security, today unveiled its latest security offering, ZeroFOX Brand Protection, enabling businesses to protect their online brand identity, reputation and security across all digital channels for only $200 per month.
This VR Tool Lets a Company Police Its Networks Like Neo (Bloomberg) Virtual-reality software from ProtectWise sees the massive blur of data for what it is: a matrix.
Amnesty International and ProtonMail join forces to fight cyber censorship (Amnesty International) The internet is a powerful tool for free speech and activism, but in the wrong hands it can also be a tool for repression.
CyberArk announces support for Amazon Inspector for enhanced cloud security (ITWeb) CyberArk's integration with Amazon Inspector simplifies discovery and prioritisation of privileged account risk; enhanced AWS access key protection further reduces exposure to advanced threats.
How secure is WhatsApp? (CSO) WhatsApp has introduced end-to-end encryption, and now changes to its terms and conditions in order to share your data with its parent company Facebook. But how secure is WhatsApp? We break down what is WhatsApp encryption, and what it means for you - and whether WhatsApp is being totally honest.
Outcomex installs Cisco security suite Umbrella to secure the College of Law network (CRN Australia) Outcomex installs advanced malware protection.
Technologies, Techniques, and Standards
Industry calls for more cyber threat context from DHS (FCW) The Department of Homeland Security is not providing enough context around the cyber threat indicators it shares with the private sector for firms to use the data effectively, say industry leaders.
Industry Bodies Align to Standardize On-Device NFC Service Management (Global Platform) Collaboration ensures predictable behavior of an NFC service regardless of where it is hosted and other services being delivered.
Training an Army of Cyber Defenders: The Case for Simulation (Infosecurity Magazine) Cultivating security experience through a framework of simulation training
Invest now to protect your industrial control systems from cyber attacks (Engineer Live) Phil Neray explains why the threat of cyber attacks on industrial control systems can no longer be dismissed by the 'it’s never happened before' argument.
Secure operations automation: Close the gap between security and operations teams (Help Net Security) The goal of secure operations automation is to improve processes and technology to unite IT security and IT operations teams with a focus on collaboration.
Why your company is one click away from a cyber attack (Baltimore Business Journal) One wrong click could be the start of a major cyber breach. Here’s how to protect your company’s data.
Disaster recovery: How is your business set up to survive an outage? (CSO Online) Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.
WatchGuard reveals why defence is never enough in the fight against ransomware (Security Brief) Ransomware. It is a deadly form of computer malware that can cripple your systems, drain your bank accounts and wipe all your critical business data.
Remove the Simolesr.com Home Page Hijack (Removal Guide) (BleepingComputer) The Simolesr.com Homepage Hijack is a potentially unwanted program that configures your browsers to automatically open the simolesr.com web page when you launch them.
Remove the Hijacker Searpages.com Redirect (Removal Guide) (BleepingComputer) The Searpages.com Homepage Hijack is a potentially unwanted program that configures your browsers to automatically open the searpages.com web page when you launch them.
Cylance Talks Third-Party Testing - Dark Reading (Dark Reading) At the RSA Conference, Chad Skipper, vice president of industry relations and product testing for Cylance, discusses the customs and controversies of third-party testing and verification of security products.
Design and Innovation
Bittercoin: true blockchain believers vs. the trough of disillusionment (TechCrunch) The last 12 months have seemed an annus horribilis in the cryptocurrency world. The Bitcoin community is still fighting its years-old esoteric-to-an-outsider..
Here’s what’s next for bitcoin after the SEC killed the Winklevoss Bitcoin Trust (MarketWatch) The Securities and Exchange Commission rejects a proposed rule change that would’ve allowed for the creation of the first bitcoin exchange-traded fund—a decision that has followers of the world’s largest cryptocurrency wondering what happens next.
Bitcoin’s Very Important Day Has Turned Into a Shitshow (Motherboard) An investment fund was denied, and price is plummeting.
Research and Development
New Machine Learning Framework Uncovers Twitter's Vast Bot Population (Motherboard) Up to 15 percent of Twitter accounts are likely bots.
Baltimore's historically black colleges have a new cybersecurity training program - Technical.ly Baltimore (Technical.ly Baltimore) Digit All City, Northrop Grumman and the U.S. Department of Defense are behind the program at Morgan State and Coppin State.
Bipartisan bill would increase cybersecurity scholarships (TheHill) Sens. Mike Rounds (R-S.D.) and Tim Kaine (D-Va.) introduced a bill to revive and expand a Department of Defense scholarship fund for cybersecurity.
Cyber Innovation Center wants to weave cybersecurity into K-12 STEM instruction (EdScoop) Cyber Innovation Center outreach director Kevin Nolten hopes schools will infuse instructional resources into classes as part of a long-term, Department of Homeland Security-supported effort to build a cybersecurity workforce.
Legislation, Policy, and Regulation
GCHQ: Russian cyber‑threat to British elections (Times of London) Spies at GCHQ have called an emergency summit with Britain’s political parties after warning them that they are at risk of Russian cyber-attacks disrupting the next general election. Security...
GCHQ Warns Over Russia Threat to UK Elections (Infosecurity Magazine) Russian hacking of US election could happen here, spy agency boss warns UK politicians
Pentagon: Russia, China Able to Launch Catastrophic Cyber Attacks on U.S. Infrastructure for Next 10 Years (Washington Free Beacon) Critical American infrastructure like the electric grid will remain vulnerable to catastrophic cyber attacks from Russia and China for at least 10 years, according to a Pentagon study. A report by
Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back (The Hacker News) Proposed 'Active Defense' Bill Would Legally Allows Victims to Hack Back Hackers and Cyber Criminals
[DISCUSSION DRAFT] FEBRUARY 23, 2017 115TH CONGRESS 1ST SESSION H. R. ll (US House of Representatives) To amend title 18, United States Code, to provide a defense to prosecution for fraud and related activity in connection with computers for persons defending against unauthorized intrusions into their computers, and for other purposes.
FTC Guidance for Handling Phishing Scams that Falsely Invoke Your Business's Name (The National Law Review) It seems to be a daily occurrence that we receive an e-mail from a company we generally recognize, requesting that we respond with personal information, including passwords, account numbers, etc. Hope
Palantir's Man In The Pentagon (BuzzFeed) A former Palantir “evangelist” has taken a top job at the Defense Department, after spending years lobbying the Pentagon on behalf of the Silicon Valley company.
Litigation, Investigation, and Law Enforcement
Russian Espionage Piggybacks on a Cybercriminal’s Hacking (New York Times) It appears that the Russian authorities, leaning on the work of a hacker, grafted an intelligence operation onto a far-reaching cybercriminal scheme.
White House report finds cybersecurity gaps at federal agencies (Stars and Stripes) As the government increasingly relies on technology to create, collect, maintain and dispose of personal information, “federal agencies must continue taking steps to analyze and address privacy risks,” the report said.
Lawyers ask Canada to grant asylum to families who sheltered Edward Snowden (CTVNews) Lawyers for three families who sheltered Edward Snowden in Hong Kong say they have formally asked the Canadian government to grant them asylum.
Australian government has no issue with agencies demanding telco data outside metadata laws (ZDNet) The Attorney-General's Department does not consider agencies using their own statutes to demand data from telcos as a loophole.
Can your smart home be used against you in court? (TechCrunch) First responders found a body floating in a hot tub. The home’s resident, James Andrew Bates, told authorities he’d found the body of Victor Collins dead..
IoT & Liability: How Organizations Can Hold Themselves Accountable (Dark Reading) To avoid a lawsuit, your company needs to better understand the state of your infrastructure and the devices and applications within it. Here are five areas on which to focus.
Three Important Lessons to Be Learned from the $1.2 Billion ZTE Settlements (JD Supra) On March 7, we learned that Zhongxing Telecommunications Equipment Corporation (ZTE) concluded 3 settlement agreements that could result in penalties...
Time for Journalists to Encrypt Everything (WIRED) Opinion: Journalists must embrace encryption to protect themselves and their sources.