Cyber Attacks, Threats, and Vulnerabilities
Israel braces for annual cyber attack by Anonymous-led hackers (Jerusalem Post) Friday’s offensive is no serious threat, provides great learning opportunity, tech expert says.
Operation TradeSecret: Cyber Espionage at the Heart of Global Trade (Fidelis Cybersecurity) The Fidelis Threat Research Team issued important findings around an observed attack targeting a prominent U.S. lobbying group, the National Foreign Trade Council (NFTC).
UK and Swedish Watchdogs Warn of International Cyber Attack (US News and World Report) A large-scale cyber attack from a group targeting organizations in Japan, the United States, Sweden and many other European countries through IT services providers has been uncovered, the Swedish computer security watchdog said on Wednesday.
The Hunt For The Dawn Of APTs: A 20 Year-Old Attack That Remains Relevant To A Modern APT (Information Security Buzz) Kaspersky Lab and Kings College London researchers, looking for a link between a modern threat actor and the Moonlight Maze attacks that targeted the Pentagon, NASA and more in the late 1990s, have unearthed samples, logs and artefacts belonging to the ancient APT. The findings show that a backdoor used in 1998 by Moonlight Maze to tunnel information …
The North Korea worry you haven't heard of: Cyber bank robbers (McClatchy DC) The scale of North Korean hacking operations against banks and casinos is “shocking,” a report by cybersecurity giant Kaspersky Lab says. Another firm, Symantec, says a North Korean hacker group is targeting banks in 31 countries.
Matching Wits with a North Korea-Linked Hacking Group (Dark Reading) Skilled 'Bluenoroff' arm of infamous Lazarus hacking team behind Bangladesh Bank heist and Sony attacks actively resists investigators on its trail, Kaspersky Lab says.
Politics of cyber attribution pose risk for private industry (SearchSecurity) Why cyber attribution plays a big part in the federal government's willingness to share cyberthreat intelligence data with private industry.
Risk of cyberattack on US power grid ‘palpable,’ experts tell Congress (Fifth Domain | Cyber) A warning issued during a Senate Energy and Natural Resources Committee hearing on Tuesday said the potential for a major cyberattack against the nation’s power grid is “at an all time high.”
IoT Security Is a Top Federal Tech Concern (SIGNAL Magazine) As the IoT migrates from fantasy to reality, cybersecurity challenges posed by billions of connected devices are a leading concern for federal technologists.
Critical Xen hypervisor flaw endangers virtualized environments (CSO Online) A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.
Appsession: Is Our Appetite for Mobile Apps Putting Us at Risk? (RiskIQ) Mobile devices have become the undisputed internet platform of choice for consumers, with mobile apps the preferred method of interaction. According to the latest App Annie¹ figures, the number of worldwide app downloads in 2016 increased by 15% to 90 billion and the time spent in mobile apps grew by 25% to 900 billion hours.
Scottrade admits server snafu blabbed 20,000 customer files to world (Register) Not hacking, just an inept IT bod unable to secure a database, apparently
Malware Scanning Services Containers for Sensitive Business Information (Threatpost) At the Kaspersky Lab Security Analyst Summit, one researcher shared how he was able to find corporate emails, confidential business plans and classified FBI flash alerts.
Java Struts2 Vulnerability Used To Install Cerber Crypto Ransomware (SANS Internet Storm Center) Since about a month, we are tracking numerous attempts to exploit the Java Struts2 vulnerability (CVE 2017-5638). Typically, the exploits targeted Unix systems with simple Perl backdoors and bots. But recently, I saw a number of exploit attempts targeting Windows systems using a variant of the Cerber ransomware.
Phishing scammers exploit Wix web hosting (InfoWorld) Criminals flock to free web services to establish their attack infrastructure. The latest example: A group using free website host Wix for its phishing pages
“iCloud Mail” phishing emails doing rounds (Help Net Security) The email bids targets welcome to iCloud Mail, but warns that Apple has been unable to confirm their account info, and that it has been suspended.
When scams know too much… [VIDEO] (Naked Security) Watch our Facebook Live video to learn how to defend against scams where the crooks are threatening you with stolen data they already have.
Mena companies’ cybersecurity is in the mail (The National) Email is the predominant source of malware attacks according to Microsoft, which says the UAE has work to do to tackle the issue. So what are big companies, such as Emirates Group, doing to educate their employees about cybersecurity?
Android devices can be fatally hacked by malicious Wi-Fi networks (Ars Technica) Broadcom chips allow rogue Wi-Fi signals to execute code of attacker's choosing.
Massive DDoS Attack On U.S. College Throws IoT Security Into The Spotlight -- Again (CRN) Web application security company Incapsula reports that the unnamed college's network was affected by a massive attack for '54 hours straight.'
Businesses Hit by More W-2 Fraud as Cybercriminals Shift Tax Season Targets (Dark Reading) Businesses, not individuals, are more frequently targeted with scams as cybercriminals try to cash in on tax season.
Brazilian bank customers targeted after hackers compromise all of the bank's domains (Computing) Let's Encrypt accused of issuing the digital certificates that helped the hackers
How an Unprecedented Heist Hijacked a Bank’s Entire Online Operation (WIRED) Researchers at Kaspersky say a Brazilian bank's entire online footprint was commandeered in a five-hour heist.
Self-Deleting Malware Makes ATMs Spit out Cash (BleepingComputer) Security researchers have uncovered one of the most sophisticated ATM heists to date, involving a group of cyber criminals specialized in hacking bank networks using fileless malware, and ATM malware that spits out cash and then self-deletes.
Security Patches, Mitigations, and Software Updates
Google and Apple Issue Security Updates for Critical Broadcom WiFi Vulnerabilities (BleepingComputer) Owners of Android and iOS devices should pay special attention to security updates released by Google and Apple on Monday, as they contain fixes for a series of critical bugs affecting their phone's WiFi component.
An unprecedented amount of records were exposed last year. (Infosecurity Magazine) With over 4 billion records leaked last year, 2016 was a record-breaking year for data security.
One New Cyber-threat Discovered Every Three Seconds in Q4 (Infosecurity Magazine) One New Cyber-threat Discovered Every Three Seconds in Q4. Threat volumes high but slowing
Venafi Survey: 23% of Security Professionals Don’t Know How Their Organization Is Addressing Threats Hiding in Encryption (Venafi) Nearly a quarter of the survey respondents (23%) have no idea how much of their encrypted traffic is decrypted and inspected.
Defining and Addressing the Growing Cyber Insider Threat (Alien Vault) The Cyber Insider Threat is one of the most difficult challenges for companies, organizations, and countries. It is often difficult to discover, defend and remediate because such threats can involve a combination of human behavioral elements and hardware and software technologies. Many of the threat actors are tech-savvy and are becoming increasingly sophisticated in their methods of infiltration.
Poll: Americans more favorable on China except when it comes to cyberattacks (Fifth Domain | Cyber) Concerns about Chinese cyberattacks have risen from 55 percent, from last year’s report of 50 percent.
Biggest risk to a company’s cyber security is worker complacency (Financial Times) Survey finds UK employees are among the worst at protecting data
Is this the new normal? Bay Area startup fundings hit 6-year low in Q1 (Silicon Valley Business Journal) Venture industry leaders say their world continued to "normalize" in the first quarter of this year as the gap between the haves and have-nots of the startup world widened.
Cyber security bosses predict vulnerability among UK firms (Acumin Recruitment, London) National Cyber Security Centre Director Ciaran Martin told attendees of the recent CyberUK conference that businesses need to prepare for increasing threat.
F-Secure buys Little Flocker to upgrade its Mac security play (TechCrunch) Security researcher Jonathan Zdziarski revealed he was joining Apple earlier this month, and now it turns out his Mac security app, Little Flocker, has gone..
KEYW Wraps Up $235M Sotera Purchase (GovCon Wire) KEYW Corp. (Nasdaq: KEYW) has wrapped up its $235 million cash acquisition of Herndon, Virginia-base
McAfee Is Banking on Brand Nostalgia for New Notoriety (Fortune) New glory days in cybersecurity ahead for antivirus pioneer?
Sophos boosted by higher demand for cyber security services (Financial Times) UK group upgrades full-year profit forecasts after companies strengthen defences
CyberArk: Can One Buy The Dip? Or Is This A Roller Coaster? (Seeking Alpha) CyberArk's shares continue to suffer from the disappointing quarterly guidance the company gave at the time of its last conference call. The company has a long
Palo Alto Hits a New 52-Week Low: What's Dragging it Down? (Yahoo! Finance) Shares of Palo Alto Networks Inc. (PANW) touched a new 52-week low of $111.79 on Apr 4, and eventually closed at $109.82.
Leidos reports $395M DHS cyber contract win (Washington Technology) Leidos will help run a Department of Homeland Security center responsible for cyber intrusion detection work under a potential seven-year, $395 million contract.
Online Trust Alliance Merges into Internet Society (Infosecurity Magazine) Online Trust Alliance Merges into Internet Society. Non-profits combine forces
vArmour Appoints Michael Chertoff to its Advisory Board (Yahoo! Finance) vArmour, the leading data center and cloud security company, today announced that Michael Chertoff has joined its Advisory Board. As the former United States Secretary of Homeland Security, and the co-founder ...
Products, Services, and Solutions
Infoblox Advanced DNS Protection Helps Enterprises Mitigate Against Crippling DDoS Attacks (Infoblox) Protects networks against the widest range of external and internal DNS-based attacks
Darktrace Antigena Launched: New Era as Cyber AI Fights Back (Darktrace) Customers harness AI to autonomously fight back against in-progress threats
LockPath and SecurityScorecard Partner to Advance Vendor Risk Management (Yahoo! Finance) LockPath, a leading provider of governance, risk management and compliance solutions, and SecurityScorecard, the leading security rating platform, today announced a new partnership to streamline and strengthen ...
Yet another bank chooses a secure future (PRLog) Together with our partner company Lydsec, Keypasco are pleased to welcome our new customer - Agricultural Bank of Taiwan. The 17th customer to use the Keypasco Solution to provide state-of-the-art authentication to enhance their online security.
Forcepoint Adds Advanced Malware Detection to Next Generation Firewalls (PRNewswire) Global cybersecurity leader Forcepoint™ announced immediate availability...
Intercede and Centrify Partner to Streamline Secure Mobile Access for Highly Regulated Enterprises (Yahoo! Finance) Today, cybersecurity and identity management expert Intercede announces a partnership with Centrify, the leader in securing hybrid enterprises through the power of identity, to secure and manage mobile access in highly regulated industries who must comply with Homeland Security Presidential Directive
ThreatMetrix Spring '17 Release Unveils Major Enhancements to Dynamic Decision Platform: Case Management, Digital Identity Verification and Strong Customer Authentication (MarketWired) New release extends leadership in next generation identity and fraud management and supports PSD2 requirements
There’s an App for Spies Now—But You Can’t Use It (WIRED) Chris Rasmussen is on a mission, which makes sense, since he's a spy. But this mission isn't spooky. It's geeky.
NeuVector and Rancher Labs Partner on Container Security (eSecurity Planet) The companies team up to head off the inevitable rise in security threats targeting application container environments.
Kaspersky Lab Launches New Partner Program for MSPs, VARs (VAR Guy) The program is aimed at IT services providers and resellers who already provide security services or want to add security offerings.
Verizon to offer GSMA-certified security for eSims (Telecompaper) Verizon announced an agreement with the GSMA to provide security accreditation for embedded Sims.
Honeywell launches industrial cyber security solution (Trade Arabia) Honeywell, a global technology leader, has launched a new cyber security solution facilities that protects against USB-borne threats, without the need for complex procedures that impact operations or industrial personnel.
Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities (Yahoo! Finance) John Maddison, senior vice president of products and solutions at Fortinet“ Increasing adoption of public cloud requires Wide Area Networking infrastructures that can ...
New Metadefender Cloud Outbreak Report Demonstrates Need for Data Sanitization (PRWeb) OPSWAT has announced the release of its new Outbreak Report, which demonstrates the efficiency of individual Metadefender and Metadefender Cloud packages in detecting malware outbreaks.
Testing of comms management tool shows positive results (C4ISRNET) In independent third-party testing, sponsored by PacStar, researchers found that automated systems management delivers a higher rate of productivity that the previous manual processes.
Technologies, Techniques, and Standards
Banks Must Focus More on Cyber-Risk (Dark Reading) Recent guidelines from the Federal Reserve are aimed at stemming the tide of successful exploits.
GDPR Doesn't Need to be GDP-Argh! (Dark Reading) These 10 steps will ease the pain of compliance with the General Data Protection Regulation, the EU's new privacy law that goes into effect in a little over a year.
7 (Samurai) Cyber Insights from the Former NSA Hacker Advising the White House (GovTechWorks) Rob Joyce, White House Cybersecurity Coordinator, brings to the job years of experience with the National Security Agency and its Tailored Access Operations unit. In an unusual public appearance at USENIX 2016 last August, he described how institutions can best protect their networks from attack.
Get smart about IIoT security risks in manufacturing (SearchManufacturingERP) IIoT security risks must be addressed so that companies can take full advantage of smart manufacturing. Here's what you should know.
Searching for a New DLP System? (Symantec) Insist on these seven core capabilities
Design and Innovation
Swiss system ups security and reliability of finger-based biometrics (TechCrunch) Biometrics may not be the perfect solution for security, but they can be useful — as long as they're robust and well thought out. TouchID is all well and..
Yul Williams on fostering innovation at the NSA (Standard-Examiner) Special to The Washington Post. Yul Williams is the technical director for the National Security Agency/Central Security Service, working with computer scientists, mathematicians and engineers to...
DISA wants industry insights on national background check system (Federal Times) The defense IT agency is looking for a mix of commercial solutions to help handle background investigations.
Research and Development
Identifying Faces in Video Images is Major Challenge, NIST Report Shows (NIST) In movies and television, computers can quickly identify a person in a crowded arena from tiny, grainy video images. But that is often not the reality when it comes to identifying bank robbery perpetrators from security camera video, detecting terrorism suspects in a crowded railway station, or finding desired individuals when searching video archives. To advance video facial identification for these and other applications, the National Institute of Standards and Technology (NIST) conducted a large public test known as the Face in Video Evaluation (FIVE).
Tim Teitelbaum of Grammatech talks DARPA’s Cyber Grand Challenge (Fedscoop) Grammatech’s Chairman, CEO, and Co-Founder Dr. Tim Teitelbaum speaks with host Kevin Greene about DARPA’s Cyber Grand Challenge (CGC), the world’s first all-machine hacking challenge. Grammatech was one of the finalists in CGC and Tim discusses some insights and lessons learned from the challenge. Tim also share his insights on why Grammatech has been very …
Legislation, Policy, and Regulation
Nation states are becoming bolder in cyberspace, says US cyber commander (C4ISRNET) Nation states are employing more coordinated campaigns in cyberspace as opposed to unorganized, haphazard intrusions.
German cyber command becomes official military branch as MPs demand accountability (RT International) The German military has officially inaugurated a 260-strong cyber command which will become a fifth branch of the Bundeswehr. Meanwhile, MPs demand that every attack on enemy computer networks be specifically approved by the parliament.
Tenth Fleet Looks to Deploy New Teams, Faces Challenges from Variety of Adversaries (Seapower) Comparing the standing up of cyber capabilities to the beginnings of developing an aircraft carrier, the U.S. Tenth Fleet chief of staff expressed optimism about the Navy’s ability to dominate the cyber sphere against a wide range of adversaries. Capt. James H. Mills provided a 10th fleet update April 5 at the Navy’s Information Warfare Pavilion on Sea-Air-Space show floor.
Marines look to dominate in information environment (C4ISRNET) The Marine Corps must position itself to compete in futuristic operating environments.
Officials hope Trump cyber order is worth the wait (E&E News) The extended wait for President Trump's cybersecurity executive order may signal a welcomed deeper dive into the challenges, a Department of Homeland Security official said yesterday.
Trump boots Steve Bannon from National Security Council (New York Post) Top presidential strategist Steve Bannon was booted from the National Security Council amid a reshuffling of the key panel, a new report said Wednesday.
Bannon’s Out. But Did H.R. McMaster Win? (New York Times) Trump’s decision to remove his chief strategist still leaves the National Security Council as weak and dysfunctional as ever.
US says laptop ban may expand to more airports (CSO Online) The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East.
Washington state asks: What comes after a cyber attack? (Herald Sun) Federal and the state governments should emphasize planning for recovering after a cyberattack and not just preventing one, the commander of Washington National Guard’s cyber unit has told a Senate committee.
Litigation, Investigation, and Law Enforcement
Lawmakers say intel agencies stonewalling on surveillance probe (Fox News) Lawmakers probing the surveillance of key officials in the Trump campaign and administration say the intelligence agencies now nominally under the president’s control are stonewalling efforts to get to the bottom of who revealed names and leaked protected information to the press.
Elijah Cummings: White House involvement in Russia probe is ‘highly unusual’ (The Washington Times) Rep. Elijah Cummings of Maryland on Tuesday said the level of White House involvement into the congressional probe of potential contacts between Russia and the Trump campaign is “highly unusual.”
6 questions raised by the report Susan Rice 'unmasked' names of Trump advisers (Washington Examiner) The report that Susan Rice was involved in the "unmasking" of Trump officials caught up in surveillance gives new credence to the possibility that Obama administration members were involved in some kind of surveillance of the Trump team.
On Susan Rice, the Issue Is Abuse of Power, Not Criminality (National Review) Susan Rice’s apparent involvement in the intelligence unmasking controversy was not illegal but an abuse of power.
The Obama Administration Allegedly Spied on Pro-Israel Activists. Did They Do the Same to Trump? (Tablet Magazine) One clue: The Russia story is a replay of how the former White House smeared pro-Israel activists in the lead-up to the Iran Deal
Reports in unmasking controversy were detailed, had info about 'everyday lives' (Fox News) The intelligence reports at the center of the Susan Rice unmasking controversy were detailed, and almost resembled a private investigator’s file, according to a Republican congressman familiar with the documents.
DOJ, DHS could do better at sharing terror info (FCW) Although the DOJ and DHS are sharing domestic counterterror information, they need to tweak some access and coordination issues, according to a joint oversight report from the agencies' inspectors general.
Geek Squad under fire for ‘cozy’ and ‘extensive’ links to FBI (Naked Security) Best Buy refutes accusation of overly close links to investigators as questions are raised over admissibility of evidence in a child abuse case
Blizzard Beats "Cheat" Maker, Wins $8.5 Million Copyright Damages (TorrentFreak) Blizzard Entertainment has won a copyright infringement case against the developer of several popular game cheats and hacks. In a default judgment, the court ordered the German company Bossland to pay over $8.5 million in damages. In addition, the cheat maker is prohibited from marketing or selling its products in the United States.
Blizzard just won an $8.6 million lawsuit against Overwatch hackers (Critical Hit) $8.7 million is the first of hopefully many wins against Bossland, a hacking service which serves over 260,000 subscription based users.
Wife of Pulse gunman to be extradited to Florida (KOCO) She will be brought back to Orlando to face charges of obstructing justice and providing support to a terrorist.
Lawyers win again in latest privacy class-action settlement (Ars Technica) iOS address book deal, if split evenly among class members, pays 53 cents each.