Cyber Attacks, Threats, and Vulnerabilities
China Is the Top Long-Term Threat in Cyberspace (Nextgov.com) Here’s what we can do about it.
What is the GRU? (Meduza) Who gets recruited to be a spy? Why are they exposed so often? Here are the most important things you should know about Russia’s intelligence community
Evolving Menace: Iran’s Use of Cyber-Enabled Economic Warfare (Foundation for Defense of Democracies) In 2016, the industrial computer security firm MalCrawler conducted an experiment: It created an elaborate network to observe the actions and gauge the intentions of malicious cyber operators.
Cyber criminals are targeting energy firms’ enterprise networks (New Statesman Tech) Most cyber attacks on energy and utilities firms take place within enterprise IT networks rather than industrial control systems, new research has revealed. In a new report, researchers at security ve
Facebook ties newly suspended accounts to the Kremlin: A ‘timely reminder’ of election meddling threat (Washington Post) Facebook said Tuesday it had “concerns” the more than 100 accounts it suspended days before the 2018 midterms were linked to the same Russian agents that spread disinformation online during the U.S. presidential race two years earlier.
Facebook connects Russia to 100+ accounts it removed ahead of mid-terms (TechCrunch) The 115 accounts Facebook took down yesterday for inauthentic behavior ahead of the mid-term elections may indeed have been linked to the Russia-based Internet Research Agency, according to a new statement from the company. It says that a site claiming association with the IRA today posted a list o…
Analysis | The Cybersecurity 202: Foreign adversaries will 'continue to push misinformation' after Election Day, official says (Washington Post) The government is tracking it.
No Significant Foreign Interference Seen on Midterm Vote (Wall Street Journal) U.S. security officials and social media firms said Tuesday they spotted a limited amount of disinformation that was deliberately disseminated.
Midterms Security Watch: Quiet Election Day early sign of cyber policy success (Fifth Domain) Fifth Domain is live-blogging security updates before, during and after the Nov. 6 midterms. Follow our tally of the Department of Homeland Security and other efforts to ensure election day integrity.
Unlike in 2016, there was no spike in misinformation this election cycle (The Conversation) The Iffy Quotient measured misinformation on social media in the run-up to the recent elections. Facebook has gotten better at combating untrustworthy links, but Twitter still struggles.
Facebook admits not doing enough to prevent Myanmar violence (AP NEWS) Facebook is admitting that it didn't do enough to prevent its services from being used to incite violence and spread hate in Myanmar.
Where’s the accountability Facebook? (TechCrunch) Facebook has yet again declined an invitation for its founder and CEO Mark Zuckerberg to answer international politicians’ questions about how disinformation spreads on his platform and undermines democratic processes. But policymakers aren’t giving up — and have upped the ante by…
Apache Struts 2.3.x vulnerable to two year old RCE flaw (Help Net Security) The Apache Software Foundation is urging users that run Apache Struts 2.3.26 to update the Commons FileUpload library to close a serious RCE flaw.
Struts 2.3 Vulnerable to Two Year old File Upload Flaw (SANS Internet Storm Center) Apache today released an advisory, urging users who run Apache Struts 2.3.x to update the commons-fileupload component...
WhatsApp ‘martinelli’ warning is a hoax, don’t forward it (Naked Security) A WhatsApp chain letter is warning of a malware-packing video called “martinelli”, and selling its lie with a grain of truth.
Fake Banking App Found on Google Play Used in SMiShing Scheme (TrendLabs Security Intelligence Blog) We found a malicious app on Google Play called Movil Secure on October 22, as part of a SMiShing scheme targeting Spanish-speaking users.
StatCounter web analytics script poisoned to steal Bitcoins (Graham Cluley) Malicious third-party script hijacked Bitcoin transactions.
Busting SIM Swappers and SIM Swap Myths (KrebsOnSecurity) KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.
Bluetooth Chip Bugs Affect Enterprise Wi-Fi, as Hackers Exploit Cisco 0-Day (Qualys Blog) In this latest roundup of cyber security news, we look at serious Bluetooth bugs, a zero-day vulnerability on Cisco software, a raft of Apple security fixes and a massive customer data breach at…
U-Boot's Trusted Boot Validation Bypassed (BleepingComputer) Memory handling issues in U-Boot open-source bootloader for embedded devices make possible multiple exploitation techniques that lead to arbitrary code execution.
Self-encrypting SSDs vulnerable to encryption bypass attacks (Help Net Security) Researchers have discovered security holes in the hardware encryption implementation of SSDs manufactured by Crucial and Samsung.
Attackers breached Statcounter to steal cryptocurrency from gate.io users (Help Net Security) Statcounter and gate.io have been compromised in a supply-chain attack, which resulted in gate.io customers getting their cryptocurrency stolen.
Pakistani banks hit by biggest cyber attack in country’s history (Samaa TV) Data of 19,864 cards from 22 banks dumped for sale on the dark web
Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day (BleepingComputer) A widespread scam pretending to be from Elon Musk and utilizing a stream of hacked Twitter accounts and fake giveaway sites has earned scammers over 28 bitcoins or approximately $180,000 in a single day.
ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers (Threatpost) One-third of respondents in a new poll said that have been a victim of fraud or identity theft in the past.
Security Patches, Mitigations, and Software Updates
Serious XSS flaw discovered in Evernote for Windows, update now! (Naked Security) Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.
Android November update fixes flaws galore (Naked Security) Android’s November security bulletin is here and there’s more to patch, and more urgency about applying them.
Cyber Trends
Enterprise Sinking Under 100+ Critical Flaws Each Day (Infosecurity Magazine) Prioritizing patches is getting tougher, says Tenable
Alcide Report Finds 75% Will Increase the Number of Cloud Security Tools They Rely On Over the Next 12 Months (GlobeNewswire News Room) As Hybrid Cloud and Serverless Continue to Gain Ground, Organizations Rush to Keep Up; Fewer than Half Have Dedicated Cloud Security Teams
Consumers can't shake risky security habits (Help Net Security) Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent
Marketplace
Cybersecurity Supply And Demand Heat Map (CyberSeek) A granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels
Former House Intel chief urges review of Huawei, ZTE role in Sprint (Seeking Alpha) Former House Intelligence Chairrman Mike Rogers -- speaking on a call set by the group Protect America's Wireless -- has called for close scrutiny of how Huawei and ZTE (ZTCOY -0.9%) would relate to a combination of Sprint (S +1%) and T-Mobile (TMUS +1.3%), Bloomberg reports.
Opponents to the T-Mobile, Sprint Merger Raise Security Concerns (SDxCentral) The AFLCIO and the Communications Workers of America filed arguments against the merger of T-Mobile and Sprint, citing security concerns.
Anti-fraud startup Fraugster score $14M Series B (TechCrunch) Fraugster, the Berlin-based startup that uses artificial intelligence to prevent fraud for online retailers, has raised $14 million in a Series B funding. The round is led by CommerzVentures, the venture capital subsidiary of Commerzbank, alongside early Fraugster investors Earlybird, Speedinvest, …
IBM chief Ginni Rometty bought US$3 million in company stock before Red Hat deal (CRN Australia) Show of confidence before mega-merger.
Symantec approached about takeover by Thoma Bravo: report (CRN Australia) Private equity giant Thoma Bravo makes its move.
Products, Services, and Solutions
FHOOSH Debuts Secure Mobile Data Live Streaming at Verizon and Nokia Operation Convergent Response Event (PRWeb) Cybersecurity innovator FHOOSH™, Inc. has teamed with Verizon to showcase extremely fast data protection solutions at the Verizon and Nokia-
BehavioSec Announces More Continuous Authentication Features and Patents Powering the Industry’s Strongest Behavioral Biometrics Platform (BusinessWire) BehavioSec, the first vendor to pioneer behavioral biometrics, today announced a series of new features to its BehavioSec Behavioral Biometrics Platfo
Login VSI announces Release 3 of Login PI for proactive monitoring (Help Net Security) Login PI R3 introduces a new concept named Deep Application Performance Testing, providing a view of application end-user experience.
Okta unveils identity capabilities to better secure the digital workspace (Help Net Security) Okta Identity Cloud to improve security for Workspace ONE customers adopting cloud technologies, while minimizing friction for end users and administrators.
Nitrokey FIDO U2F Available (UNITED NEWS NETWORK GmbH) Nitrokey's new USB key for secure two-factor authentication using FIDO U2F is now available
Best Anonymization Tools and Techniques for 2019 (HackRead) Follow us on Twitter @HackRead
Technologies, Techniques, and Standards
Experience an RDP attack? It’s your fault, not Microsoft’s (CSO Online) Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.
Most CISOs just don't understand the hacker mentality says security chief (Computing) R Brown's Mike Koss says CISOs need to spend more time on the front line
5 security frameworks hospitals are adopting (Becker's Hospital Review) The NIST Cybersecurity Framework — a computer security guidance developed by the National Institute of Standards and Technology at the U.S. Department of Commerce — is the most commonly used security framework at hospitals today, according to the 2018 HealthCare's Most Wired survey
7 Simple but Effective Threat Hunting Tips from a Veteran Threat Hunter (Bricata) Threat hunting is the process of looking for malicious activities that have evaded existing detection measures; these threat hunting tips will improve your process. #bro #soc #threathunting
AI cybersecurity tools help spot threats before they cause harm (SearchEnterpriseAI) Hackers are utilizing AI tools, and security threats are proliferating. But security pros are turning these tools against attackers with their own AI cybersecurity strategies.
This is what the cyber security will look like once attackers weaponise AI (Computing) Artificial intelligence will enable threats to learn as they go, remaining undetected for longer
Enterprises Need to Stop Playing Catch-Me-If-You-Can With Their Containers (Infosecurity Magazine) Many enterprises aren’t even aware that they have deployed containers and orchestrated containerization.
Design and Innovation
Chinese surveillance grows stronger with technology that can recognise people from how they walk (The Telegraph) Chinese cities are rolling out a new “gait recognition” software that identifies people using their silhouettes and how they walk, even if their faces are obscured, in the latest tightening of the country's security.
This MIT PhD Wants to Replace America's Broken Voting Machines with Open Source Software, Chromebooks, and iPads (Motherboard) In 2006, Ben Adida wrote a 254-page PhD dissertation on "cryptographic voting systems." Now, he wants to fix America's broken voting machines.
Here’s Why All the Voting Machines Are Broken and the Lines Are Extremely Long (Motherboard) Voting machines are breaking down across the country and America’s voting technology is in desperate need of a complete overhaul.
Legislation, Policy, and Regulation
European Commission emphasises importance of working together to support cyber defence (Computing) Differences in cyber preparedness between EU members could put cross-region systems at risk
In Cyberwar, There Are Some (Unspoken) Rules (Foreign Policy) A recent article argues that the lack of legal norms invites cyberconflict. But governments know the price of overreach and are refraining from unleashing their…
What Happens When the US Starts to ‘Defend Forward’ in Cyberspace? (Defense One) The author of DoD’s 2015 cyber strategy takes a look at the 2018 version.
How cyberspace makes the DoD think differently (Fifth Domain) Key Pentagon leaders assert nontraditional partnerships are critical in competing against top threats.
UK Regulator Calls for Tougher Rules on Personal Data Use (SecurityWeek) Britain's data commissioner warned that democracy is under threat because behavioral targeting techniques developed to sell products are now being used to promote political campaigns and candidates.
Litigation, Investigation, and Law Enforcement
Two more associates of Roger Stone testify before Mueller grand jury (Washington Post) Filmmaker David Lugo and attorney Tyler Nixon both told The Post last month that comedian Randy Credico acknowledged being the source of material for Stone’s statements about WikiLeaks.
Lawyer: My client didn’t steal 5,000 bitcoins, “Period” (Ars Technica) Charlie Shrem's attorney hits back in lawsuit brought by Winklevoss Capital Fund.
Police crack encrypted chat service IronChat and read 258,000 messages from suspected criminals (HOTforSecurity) Dutch police have revealed that they were able to spy on the communications of more than 100 suspected criminals, watching live as over a quarter of a million chat messages were exchanged. The encrypted messages were sent using IronChat, a supposedly...
AT&T Will Kick Internet Users Offline for Piracy (Motherboard) But critics say losing access to an essential utility is a problematic over-reaction to copyright infringement.