Cyber Attacks, Threats, and Vulnerabilities
German ministries hit 'by Russian hackers' (BBC News) Unconfirmed reports link the malware attack to a Russian hacking group known as Fancy Bear.
Secret German Government Network Attacked (Infosecurity Magazine) Secret German Government Network Attacked. Reports suggest hackers may have had access for a year
Germany admits hackers infiltrated federal ministries, Russian group suspected (Deutsche Welle) German security services have admitted they uncovered a cyberattack on the government in December. Sources say the malware had been planted up to a year earlier and could be the work of a notorious Russian hacking group.
[Added 3.3.19] UpGuard silent on why it pulled Capital One breach claims (iTWire) Security firm UpGuard is remaining silent about the removal of a blog post from its website wherein it was claimed that a cloud-based data storage rep...
Unprotected AWS Bucket Exposes 50.4 GB of Financial Giant's Data (HackRead) [Note, 3.3.18: See the article from ITWire, above, for updated information on this story. There appears to have been no breach.] Another day, another AWS Bucket exposed to the public - This time the AWS Bucket belonged to Birst, a Cloud Business Intelligence (BI) and Analytics firm.
Researchers Warn of RedDrop Blackmail Malware (Infosecurity Magazine) Researchers Warn of RedDrop Blackmail Malware. RedDrop spyware records victims for later use, says Wandera
New Android malware record voice calls for extortion & blackmailing (HackRead) The RedDrop malware steals personal data from Android devices, recording live calls and in order to blackmail the victim.
Consumers Falling for Fake Mobile Banking Apps (Infosecurity Magazine) More than one in three consumers are fooled by fraudulent versions of banking apps.
Mobile bankers beware: Sophisticated hacks soar (CBS News) Malware now so seamlessly appears to be your own bank's app that it can easily fool even savvy users
XM-Hell strikes single-sign-on systems: Bugs allow miscreants to masquerade as others (Register) Yeah, I’m so totally Sarah from accounts…
Zero-Day Attacks Major Concern in Hybrid Cloud (Dark Reading) Hybrid cloud environments are particularly vulnerable to zero-day exploits, according to a new study.
There is still a lack of cyber resiliency of the electric grid (Control Global) October 10, 2016, I wrote a blog: “The NERC CIPs continue to expose the grid to significant cyber vulnerabilities even after the Ukrainian hack” This was because NERC, DOE, and DHS had effectively ignored the 2015 attack as it was against the distribution system. Ironically, two months later, the second Ukrainian cyberattack was against the transmission system. In both cases, the attack was step 1 of the 2 steps of Aurora. Enclosed are examples of what is not happening.
Phillips clinical imaging solution plagued by vulnerabilities (Help Net Security) Phillips is developing a software update to mitigate 35 CVE-numbered vulnerabilities in the Philips IntelliSpace Portal (ISP), a clinical imaging visualization and analysis solution that is used by healthcare and public health organizations around the world.
Kaspersky Lab denies reports about making part of its anti-virus code accessible online (TASS) Kaspersky Lab constantly monitors the network for the presence of code samples
Spy games: Is buying a Chinese smartphone risky? (USA TODAY) The CIA, FBI, NSA, and other intelligence heads are all warning against using Huawei and ZTE phones for risk of being spied upon.
What is a botnet? And why they aren't going away anytime soon (CSO Online) Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
What Is A Botnet & How Does It Work? (Pwnie Express) Learn what botnets are, how they are created, and how they carry out DDoS attacks. You can also discover ways to prevent a botnet attack from affecting you.
Security Patches, Mitigations, and Software Updates
Intel Releases Updated Spectre Fixes For Broadwell and Haswell Chips (Threatpost) Intel has issued stable microcode to help protect its Broadwell and Haswell chips from the Spectre Variant 2 security exploits.
SSL Snafu Ends in 23,000 Revoked Certs (Infosecurity Magazine) SSL Snafu Ends in 23,000 Revoked Certs. DigiCert and Trustico feud hits UK websites
Editorial: If No One Will Listen About Cybersecurity (Infosecurity Magazine) Editorial: If No One Will Listen About Cybersecurity
The State of Application Penetration Testing (Dark Reading) Data from real-world pen tests shows configuration errors and cross-site scripting are the most commonly found vulnerabilities.
IoT Rewards to Outweigh Risks for NSA (SIGNAL) The Internet of Things both requires and enhances cybersecurity.
KnowBe4 Issues 2018 Threat Impact and Endpoint Protection Report (ResponseSource Press Release Wire) KnowBe4, the world's largest provider of security awareness training and simulated phishing, today rel...
Nearly half of security pros rarely change their security strategy, even after a cyber attack (Help Net Security) Nearly half (46 percent) of IT security pros rarely change their security strategy substantially – even after experiencing a cyber attack.
3 Emerging Healthcare Security Challenges (Bricata) Security professionals in health care face a difficult challenge: protecting an aging infrastructure with unique requirements of PII even as threats multiply and budgets remain flat. A renewed focus on some of the basics could reverse the trend.
Cybersecurity pros don't feel equipped to stop insider attacks (Help Net Security) One consistent message we heard in all of these interviews was that cybersecurity professionals don't feel equipped to stop insider attacks, despite an increase in funding.
Beyond the Password Era: Changing Consumer Habits Signal the End Is Near (Security Intelligence) A recent IBM Security study found that consumers, especially millennials, are beginning to embrace alternatives to password protection, such as biometric authentication.
Exclusive: Public wants Big Tech regulated (Axios) A new Axios-SurveyMonkey poll finds a seismic shift in the public's perception of Silicon Valley over a short period of time.
Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples (Dark Reading) From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.
Contractors gripe about DHS clearance woes (FCW) Varied and uneven security clearance processes for contractors across DHS components are leading to confusion and problems for vendors, industry experts told a congressional panel.
Pentagon’s $1 Billion Cloud Deal May Signal New Era in Government Buying (Nextgov.com) Congress wants the Defense Department to buy technology faster. Now it's beginning to do just that.
How agencies can request funds to replace legacy IT systems (Federal Times) Though the fund established by the Modernizing Government Technology Act is currently empty, the White House is encouraging agencies to begin submitting project proposals that could use the money.
What employers need to know about cybersecurity jobseekers (Help Net Security) An ISC2 study sheds light on what motivates cybersecurity jobseekers and what’s most important to them for professional and personal fulfillment. Armed with this insight, employers can do a much better job appealing to top cybersecurity professionals.
Want a well-paid job in the channel? Then work in cybersecurity (CRN) Average wages among top cybersecurity MSSPs, resellers and consultancies spike by 10 per cent to top £60,000, CRN Cybersecurity Provider Report finds
Northrop Grumman awarded $95M OBIM contract (BiometricUpdate) Northrop Grumman has been awarded a 42-month, $95 million contract by the DHS Office of Biometric Identity Management (OBIM) to develop the first two stages of the Homeland Advanced Recognition Tec…
Kratos Executes Definitive Agreement to Sell Public Safety & Security Division to Securitas Electronic Security, Inc. for Expected Net Proceeds of Approximately $70 Million (GlobeNewswire News Room) After Transaction Close, Kratos Will Have Successfully Transformed Into a Pure Play Defense Products, Systems and Technology Company
Virginia Cybersecurity Startup CounterFlow AI Inc. closes $2.7M Seed Round (California Newswire) Cybersecurity startup CounterFlow AI announced last week that it has raised $2.7 million in seed funding from Osage University Partners, the Charlottesville Angel Network, and a number of individual investors who also supported the founders' previous venture, nPulse Technologies (acquired by FireEye in 2014).
Cyber Insurer Coalition Raises $10 Million to Solve Cyber Risk for SMBs (Coalition) Coalition Inc., the first technology-enabled cyber insurance solution, announced today that it raised $10 million in Series A funding from leading technology investors including Vy Capital, Ribbit Capital, Valor Equity Partners, Sam Altman (President, Y Combinator), and Deep Nishar (Senior Managing Director, Softbank Vision Fund).
Amazon Acquires Ring to Bolster Home Security Portfolio (Yahoo) Amazon's (AMZN) acquisition of Ring expands the company's footprint in the home security market and enables it to improvise in-house delivery services.
By Light acquires Axom for intell footprint (Washington Technology) By Light Professional IT Services acquires Axom Technologies to gain a new footprint in the intelligence community, a highly-sought after customer base in recent deal activity.
CNBC Exclusive: CNBC Transcript: Palantir Technologies Co-Founder & CEO Alex Karp Joins CNBC's Josh Lipton for Rare Interview Airing Today (CNBC) Following is the unofficial transcript of the full CNBC EXCLUSIVE interview with Palantir Co-founder & CEO Alex Karp and CNBC's Josh Lipton, airing today Wednesday, February 28 at 11am ET.
Qualys Hires Bill Solms To Head US Federal Division (WashingtonExec) Solms, who brings 30 years of experience, will help drive government IT initiatives to aid agencies maintain visibility and control of their complex networks and secure their digital transformations.
Howard Edelstein Appointed CEO of BioCatch (BusinessWire) BioCatch, the global leader in behavioral biometrics, announced today that it has appointed FinTech industry luminary Howard Edelstein as CEO. Edelste
Carbon Black Strengthens Executive Team with Kane Lightowler’s Promotion to Senior Vice President of Americas Field Sales (BusinessWire) Lightowler moving from APAC region to take over NA field sales; MobileIron veteran Matt Bennett takes helm in Asia Pacific & Japan (APJ)
Products, Services, and Solutions
Cylance and ConnectWise Partner to Provide AI-Driven Cybersecurity Prevention to More Than 21,000 Global MSPs (BusinessWire) Cylance® Inc., the company that revolutionized the antivirus and endpoint protection industry with true AI-powered prevention that blocks malware, fil
Egnyte Connect for Google Hangouts Chat Lets Users Securely Share Content in Real-Time (Benzinga) New Integration Enables Seamless Collaboration and Increased Productivity in the Digital Workplace
MOUNTAIN VIEW, Calif. (PRWEB) February 28, 2018
Egnyte, a leading cloud...
QBE North America launches online cyber response tool (Business Insurance) QBE North America, an operating division of Australia’s QBE Insurance Group Ltd., will include an online cyber response tool with all its cyber policies, the insurer said in a statement Wednesday.
Joseph Greenwald & Laake adding cybersecurity practice (Maryland Daily Record) Joseph Greenwald & Laake P.A. has recently added a new practice area in data privacy and cybersecurity, with a focus on compliance, government investigations and enforcement actions, data priva…
Fortinet Expands its Ecosystem of Fabric-Ready Partners to Advance Security Visibility and Automated Response for Digital Business (GlobeNewswire News Room) New Fabric-Ready Program partners extend Security Fabric automation, visibility and management into IT and security workflows, multi-cloud and virtualized networks
The enSilo platform traps threats that bypass other endpoint defenses (CSO Online) The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to investigate.
Data I/O Wins Best of Show with Embedded Award for the SentriX Security Provisioning Platform (Marketwire) Data I/O Corporation (NASDAQ: DAIO), the leading global provider of advanced data and security programming solutions for flash, flash-memory based intelligent devices and microcontrollers, announces that it has been awarded a 2018 Embedded Award in the category of Tools for its SentriX Security...
Bitdefender Announces GravityZone Security for VMware Cloud on AWS (Bitdefender) GravityZone provides VMware customers with award-winning, next-generation security that facilitates management efficiency and infrastructure performance across the hybrid datacenter
Bitdefender BOX 2 Becomes Available in Europe starting next month (Bitdefender) Next-generation security hub protects entire households
Bill Gates says cryptocurrencies have “caused deaths in a fairly direct way” (Ars Technica) Gates says cryptocurrencies’ main feature is anonymity.
Technologies, Techniques, and Standards
How to Fight Mobile Number Port-out Scams (KrebsOnSecurity) T-Mobile, AT&T and other mobile carriers are reminding customers to take advantage of free services that can block identity thieves from easily “porting” your mobile number out to another provider, which allows crooks to intercept your calls and messages while your phone goes dark.
How to Turn Off Facebook's Face Recognition Features (WIRED) Facebook recently expanded its face recognition features—and you may have opted in without even realizing it.
For Hackers, Uniformity Is Path of Least Resistance (SIGNAL) Standardizing network components creates more problems than it solves.
Research Finds No Guidance Results in Weak Passwords (Infosecurity Magazine) 75% choose
Why Do Enterprises Need a Software Security Program? (Infosecurity Magazine) Enterprises cannot expect a collection of independent activities to consistently result in secure software.
Why Salesforce customers should think about GDPR best practices (SearchSalesforce) Companies trafficking in customer data should start looking at GDPR best practices ahead of the May 25 implementation date.
How to Defend Servers Against Cryptojacking (eSecurity Planet) Here are some steps you can take to reduce the risk of becoming an unwitting accomplice to cryptojacking attacks.
Why Cryptocurrencies Are Dangerous for Enterprises (Dark Reading) When employees mine coins with work computers, much can go wrong. But there are some ways to stay safe.
Design and Innovation
CoinDesk's Head of Research On What's Next For Cryptocurrency (Forbes) If you have ever researched bitcoin or blockchain, chances are you found yourself on CoinDesk’s homepage. Since 2013, CoinDesk has been the leader in blockchain news.
Don’t Call Zcash A Privacy Coin, Cryptocurrency Founder Says (International Business Times) Privacy can be a security feature.
Legislation, Policy, and Regulation
GDPR: Will We Get Back Control of our Data? (Infosecurity Magazine) Will the GDPR make us the masters of our own personal data?
Top intel official: US must do more to stop Russian meddling (Boston Herald) The U.S. response to Russian meddling and disinformation campaigns has not been strong enough to deter Moscow's activities, a top intelligence official said Tuesday.
Cyber Command granted new, expanded authorities (Fifth Domain) With the elevation of Cyber Command comes additional authorities for its commander, such as the ability to synchronize forces globally.
Senate DHS Reauthorization Bill Likely to Streamline Oversight, Include Election Security (Nextgov.com) Senators also aim to limit partisan amendments to the bill that would reauthorize DHS for the first time in 15 years.
Canada adds new cybersecurity center, hikes funding for electronic spy agency (Fifth Domain) The Canadian government will significantly improve its cyber security capabilities with funding increases to the Department of National Defence’s electronic spy agency and with the creation of a new cyber security center.
Liberals pitch $500 million cyber security plan (Toronto Star) Canada's electronic spy agency takes a central role in new cyber security strategy, will see budget boosts.
The NIS Directive: A path to cyber resilience or a simple ‘tick-box’ exercise? (VanillaPlus) Back in March 2017, the UK Government launched its long-awaited Digital Strategy, which promised to make “the UK the safest place in the world to live and
House passes sex trafficking bill that could limit free speech online (Ars Technica) A bipartisan bill would enable states to prosecute sites like Backpage.
Defying Pai’s FCC, Washington state passes law protecting net neutrality (Ars Technica) Washington may be the first state to impose net neutrality rules on all ISPs.
Fleet Cyber Command to get new leader (Fifth Domain) Rear Adm. Timothy White has been nominated to serve as the next commander of Fleet Cyber Command/Tenth Fleet, as well as a third star.
Litigation, Investigation, and Law Enforcement
Judge to rule whether to suppress accused leaker's statement (Fifth Domain) Defense attorney Matthew Chester says the statement from Reality Winner, accused of leaking National Security Agency secrets, should be suppressed because federal agents intentionally chose not to read her Miranda rights out of fear that she would not talk if they did.
VA inspector general finds no evidence of computer hacking in travel scandal (Military Times) Investigators have uncovered no evidence of Veterans Affairs Secretary David Shulkin’s claims that email hacking may have contributed to a series of ethics violations during an overseas trip last year.
Security clearance shakeup wreaks havoc in executive branch (Federal Times) An ongoing security clearance debacle that has reached into the highest levels of the Trump administration since Day One has now claimed victims.
UPDATED: Homeland security says no sign Alaska vote tallies were tampered with (KTUU) Federal officials say an NBC report that said Alaska is one of seven states to have had election information compromised in 2016 is 'not accurate' and 'misleading.'
The SEC is reportedly investigating a number of ICOs (TechCrunch) The SEC is getting up close and personal with companies that have raised ICOs, according to a new report. Citing sources, the Wall Street Journal is..
FTC Settles with Venmo on Security Allegations (Dark Reading) Proposed settlement addresses complaints that Venmo misrepresented its security and privacy features.
New Orleans alleged to have secretly used Palantir predictive policing (CSO Online) The New Orleans Police Department is accused of secretly using Palantir's predictive policing technology to predict who would cause a crime or be a victim of it.
The Future of Policing Is Being Hashed Out in Secret (Bloomberg) Maybe prediction algorithms will be a great stride for justice. Secret experiments definitely aren't.
Fake Prn Makers Are Worried About Accidentally Making Child Prn (Motherboard) Images of celebrities as minors are showing up in datasets used in making AI-generated fake prn.
YouTube Bans Channel of American Neo-Nazi Extremist Group Atomwaffen Division (Motherboard) YouTube's removal only comes after a media flurry around the platform's inaction on neo-Nazi content.
Anti-Defamation League: YouTube Should Delete Neo-Nazi Videos 'Immediately' (Motherboard) The ADL says these videos are 'disgusting racist content that has no place in our society.'
YouTube's New Moderators Mistakenly Pull Right-Wing Channels (Bloomberg) YouTube’s new moderators, brought in to spot fake, misleading and extreme videos, stumbled in one of their first major tests, mistakenly removing some clips and channels in the midst of a nationwide debate on gun control.
This is weird: Securities class action defendant wants to block... (Reuters) We’ve become inured to squabbles among plaintiffs' lawyers who want to be appointed to lead juicy securities class actions.
Man involved in shooting cop and was found via stingray given 20 years (Ars Technica) Purvis Ellis, of Oakland, tells judge: “I just hope not to be defined by this.”
Instagram image of Lego assault rifle, threat lead to 14-year-old’s arrest (Ars Technica) San Diego County teen wrote Tuesday evening: "Don’t come to school tomorrow."