Cyber Attacks, Threats, and Vulnerabilities
Ecuador cuts off Julian Assange's internet access at London embassy (the Guardian) Government accuses WikiLeaks founder of putting international ties at risk by failing to abide by deal not to interfere in other countries
The Infiltration of U.S. Control Systems (Automation World) CERT Alert TA18-074A removed any doubts that hostile nation states are actively targeting U.S. industrial control systems.
Here Are The Clever Means Russia Used To Hack The Energy Industry (Forbes) Last July, officials from the Federal Bureau of Investigation and the Department of Homeland Security revealed that Russian hackers were behind cyber intrusions into the U.S. energy power grid.
Boeing hit by WannaCry virus, but says attack caused little damage (The Seattle Times) Though news of the attack by the WannaCry virus triggered widespread alarm within Boeing and among airline customers during the day Wednesday, by evening the company was calling for calm.
Mysterious 'MuslimCrypt' App Helps Jihadists Send Covert Messages (WIRED) The unfortunately named MuslimCrypt uses steganography to pass discreet messages through images online.
Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives (Cybereason) Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.
ChessMaster Adds Updated Tools to Its Arsenal (TrendLabs Security Intelligence Blog) In this blog post, we analyze ChessMaster's current status, including the updated tools in its arsenal — with a particular focus on the evolution of ANEL and how it is used in the campaign.
Hajime Botnet Makes a Comeback With Massive Scan for MikroTik Routers (BleepingComputer) If you've been following the infosec Twitter community for the last few days, you couldn't ignore the constant talk about the massive scans currently taking place online, carried out by a Hajime IoT botnet looking to mass-infect unpatched MikroTik devices.
3-month old flaw in iPhone camera app takes users to phishing sites (HackRead) The bug in iPhone camera app’s QR code scanning system takes users to phishing sites that can result in malware and credentials stealing attacks.
HiddenMiner Android Monero Mining Malware Cause Device Failure (HackRead) This time, the malware not only comes with Monero mining capabilities but its continuous mining process drains the targeted device.
University Networks Become Fertile Ground for Cryptomining (Dark Reading) Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks.
The Tesla Hack is a Serious Cryptojacking Warning (Infosecurity Magazine) The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.
Enterprises wear large targets in cloud cryptomining hacks (SearchAWS) Cloud cryptomining attacks are on the rise. As cryptojackers target vulnerable permissions, learn what you need to do to protect cloud resources.
Yet another Apple password leak – how to avoid it (Naked Security) Passwords in plaintext – again! Here’s Apple’s latest macOS password bug – plus a handy workaround to deal with it.
Security flaws in gay dating app Grindr expose users’ location data (NBC News) The availability of users' location data, experts say, could lead to increased harassment — especially in places where homosexuality is criminalized.
Atlanta Ransomware Attack Shows Cities Not Prepared for Long-Term Security Breaches (Observer) Atlanta is being held hostage by hackers.
Commentary: Atlanta’s Cyber Attack Shows the New Security Risks the U.S. Needs to Address—and Fast (Fortune) Cyber hackers too often appear to be one step ahead of the rest of us.
Only 26% of US companies that paid ransomware attackers had files unlocked (TechRepublic) The average estimated business cost of a ransomware attack is more than $900,000, according to a SentinelOne report.
Omitting the “o” in .com Could Be Costly (KrebsOnSecurity) Take care when typing a domain name into a browser address bar, because it’s far too easy to fat-finger a key and wind up somewhere you don’t want to go.
Thousands of B[*]stiality Users Exposed in Hack (Motherboard) In a sign of just how hackers can obtain really sensitive data, image boards are circulating email addresses and other alleged account details on users...
Security Patches, Mitigations, and Software Updates
Cisco Patches Two Critical RCE Bugs in IOS XE Software (Threatpost) Cisco releases 22 patches as part of its semiannual Cisco IOS and IOS XE software security advisory.
Drupalgeddon: Critical Flaw Exposes Million Drupal Websites to Attacks (SecurityWeek) Drupal patches highly critical remote code execution vulnerability that allows hackers to easily hijack websites. Over one million sites affected and exploits could be created any minute
Microsoft Patches for Meltdown Introduced Severe Flaw: Researcher (SecurityWeek) The Meltdown patches released by Microsoft in January and February for Windows 7 and Windows Server 2008 introduced an even bigger vulnerability, researcher warns
Facebook Reveals the "Access Your Information" Data Tool and New Privacy Shortcuts (BleepingComputer) In its first step to try and restore confidence in its platform after the Cambridge Analytica fiasco, Facebook has unveiled more organized privacy settings and a new data management tool called "Access Your Information".
Facebook is cutting third-party data providers out of ad targeting to clean up its act (Recode) Facebook says it’s going to stop using data from third-party data providers like Experian and Acxiom.
Facebook is rushing out a new design for privacy settings (Quartz) Facebook hopes the new settings will make you less mad at it.
The Facebook Privacy Setting That Doesn’t Do Anything at All (WIRED) For years, Facebook has left a privacy setting on its site that addresses a problem that no longer exists.
Cyber Trends
2018 Attacker Behavior Industry Report (Vectra) The Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments.
Businesses suspect their mobile workers are being hacked (Help Net Security) Most organisations are concerned their growing mobile workforce presents an increasing number of mobile security challenges. Overall, 81% of respondents said they had seen Wi-Fi related security incidents in the last 12 months.
No Room For Cyber-Complacency (Information Security Buzz) No Room for Cyber-Complacency: a Quarter of DDoS Attacks Claim Unintended Victims Over a quarter of businesses that have been hit by a Distributed Denial of Service (DDoS) attack don’t think they were the intended target, highlighting that businesses can’t afford to be complacent when it comes to today’s threat landscape. According to research from …
Compliance functions make a turn towards innovation-fueled strategies (Help Net Security) Accenture has conducted the Compliance Risk Study every year since 2013. Over that time, compliance functions have made a dramatic turn towards innovation-fueled strategies, as they seek to deliver the risk management outcomes required in an era of digital transformation.
Know Your Data: 2nd Annual GDPR Readiness Report Reveals That 60% of Organizations Are in the Dark (PRWeb) AvePoint, an industry leader in data protection solutions, and the Centre for Information Policy Leadership (CIPL), a global privacy and cybersecurity thi
Report: Macro-less Word Document Attacks on the Rise, Zero Day Malware Variants Jump 167 Percent (PR Newswire) WatchGuard® Technologies, a leader in advanced network security solutions,...
WatchGuard’s Threat Lab Analyzes the Latest Malware and Internet Attacks (WatchGuard) The Threat Lab team analyzes data from WatchGuard’s Firebox Feed, internal and partner threat intelligence, and a research honeynet, to provide insightful analysis about the top threats on the Internet. Their smart, practical security advice contained in the Internet Security Report will enable you to better protect your organization in the ever-changing threat landscape.
Cybersecurity Awareness Doesn’t Fuel Better Preparation: Report (Infosecurity Magazine) Businesses still lack the knowhow and resources to defend against data breaches
Cyberattacks Now #1 Threat To Swiss Banks (Information Security Buzz) It has been reported that cyber-attacks pose the biggest threat to the Swiss financial system with risks from hacking incursions on the rise, watchdog FINMA warned on Tuesday, calling on Switzerland to step up its national defences against the menace. FINMA said on the whole Swiss banks seemed aware of the risks and were well equipped…
Marketplace
Innovation in the Old Line State: the Maryland Cybersecurity Awards (The CyberWire) On Tuesday, March 27th, 2018, the Cybersecurity Association of Maryland met for its second annual awards celebration. Convening again at Baltimore's Visionary Art Museum at Federal Hill beside the Inner Harbor, Maryland Cybersecurity celebrated some of the state's leading innovators and practitioners in information security.
VMware buys E8 Security to bolster AI-assisted security tools (ZDNet) VMware plans to integrate E8's technology into its Workspace ONE platform.
Aella Data Emerges from Stealth Mode Ahead of RSA® Conference 2018, Unveils Industry’s First AI-Driven Pervasive Breach Detection System (BusinessWire) Aella Data, a leading innovator in AI-driven cybersecurity solutions, officially exits stealth mode today with the launch of Starlight™ Pervasive Brea
Investment firm ESW Acquires Business Unit from Mobile Forensics Company Cellebrite (CTECH) Israel-based Cellebrite, whose core clientele are law enforcement agencies, offloads a business unit that focuses on commercial customers
Israeli Surveillance Company Verint Considers an IPO for its Security Intelligence Division (CTECH) After a failed attempt to sell the division, Verint mulls an IPO of the sub-unit according to a market value of $800 million
Here's what a Tenable IPO could mean for Maryland's cyber market (Baltimore Business Journal) Analysts and investors hope a high-profile IPO by Tenable Inc. could provide a needed "shot in the arm" for Maryland's cyber industry.
Why's Symantec Stock Reacting Poorly? (Seeking Alpha) The market is currently not happy with Symantec's revenue miss and lowered forecast. Increasing competition and consolidation also have affected the stock. What
Here are 5 Atlanta Companies Making Money Moves with Blockchain (AtlantaInno) The words “blockchain” and “cryptocurrency” are hitting headlines left and right, and the country’s Southern FinTech hub has taken the moment to cash in on the trend.
Forcepoint hunts new breed of partner for human-centric security shift (CRN) Rise of user and entity-based behaviour analytics calls for partners that can sell to the C-suite, Forcepoint's Neil Lillywhite tells CRN
Tim Cook says Apple’s customers are not its product, unlike Facebook (Ars Technica) "The truth is, we could make a ton of money if we monetized our customer."
Apple's Position on Privacy Is Paying Off (Motherboard) Silicon Valley is reeling with algorithmic and privacy-related controversies. Meanwhile, Apple is laughing.
Corelight Welcomes Seasoned Security Executive to Lead Product Strategy (Globe Newswire) Brian Dye Joins from McAfee; Brings Years of Product Leadership to the Company’s Executive Bench
Mike Ruettgers Joins Virsec Board of Directors (GlobeNewswire News Room) Virsec, a cybersecurity company delivering a radically new approach to protect against advanced attacks, today announced that Mike Ruettgers has joined its Board of Directors.
Fortinet Australia promotes new channel chief to replace Genevieve White (CRN Australia) Replacing Genevieve White.
Equifax taps Mark Begor as CEO following cyber attack that exposed data for 148M consumers (USA TODAY) Mark Begor takes Equifax's top executive job as the embattled credit reporting giant faces class-action lawsuit and other fallout from the cyber breach disclosed last year.
Appointment of Chief Executive Officer (Regulatory News, RNS - London South East) The Board of Blancco Technology Group plc is delighted to announce that, following an extensive selection process, Matt Jones is joining the Company today as Chief Executive Officer and Board Director.
Crypto Expert Kathryn Haun Joins Board of HackerOne (Fortune) Bridging crypto and cybersecurity
Products, Services, and Solutions
STEALTHbits Strengthens Real-Time Threat Analytics and Alerting Platform with Enhancements to StealthDEFEND (GlobeNewswire News Room) Purpose-Built User Behavior Analytics (UBA) for Unstructured Data
Skybox Security and Jirasek Security Announce New Partnership to Support Deployment of the Skybox Security Suite (GlobeNewswire News Room) Jirasek delivers services wrapped around Skybox’s security management platform
Carbon Black Unveils Cb Integration Network, Delivering Stronger Cybersecurity via Open APIs (BusinessWire) Carbon Black, a leader in next-generation endpoint security, today unveiled the Carbon Black Integration Network (CbIN), a technology partner program
Yubico and Duo Security Accelerate Federal Cybersecurity Modernization and Smart Card Replacement (GlobeNewswire News Room) Revisions to federal cybersecurity requirements open door for transition to modern and more effective methods to secure government data
Pulse Secure NAC Integrates with Fortinet Security Fabric to Enrich Endpoint Intelligence and Automate Threat Response (GlobeNewswire News Room) Pulse Policy Secure (NAC) and Fortinet FortiGate (NGFW) interoperability enhances perimeter controls and reduces threat mitigation time for non-compliant and malicious devices
Endgame 2.6 Achieves Unprecedented Stopping Power with 99.5% Prevention Efficacy, 85% MITRE ATT&CK™ Coverage, First and Only Security Chatbot Interface (PR Newswire) Endgame, the leader in endpoint protection against targeted attacks,...
Unisys Leverages Cylance’s Advanced Endpoint Protection Solution (Security Boulevard) The new Unisys Advanced Endpoint Protection Solution incorporates Unisys consulting and managed security services as well as Cylance advanced threat prevention technology to leverage artificial intelligence and machine learning to prevent malware attacks on endpoints.
How SentinelOne Ensures Unparalleled Next-Gen Security Through Its Endpoint Protection Platform (Forbes) SentinelOne is a next-gen cybersecurity company focused on protecting the enterprise through the endpoint.
Verizon Talks Up Private Core as AT&T Launches FirstNet (Express Newsline) AT&T said FirstNet has gone live, timed to the one-year anniversary of the telco securing the contract for the public-private interactive broadband emergency communications network funded with FCC auction proceeds.
CensorNet Launches New Platform to Consolidate Sophisticated Protection against Web, Email and Cloud Application Threats (BusinessWire) CensorNet launches new platform to consolidate sophisticated protection against web, email and cloud application threats
Sports world adapts to growing cybersecurity threats (Sportsnet.ca) Imagine the fallout if the NHL was hacked and its star players -- think Sidney Crosby, Auston Matthews and Connor McDavid -- had their home addresses, phone numbers and other personal information made accessible online.
Technologies, Techniques, and Standards
There is no way to fix Facebook. So how do we protect ourselves from it? (NBC News) Last week’s Cambridge Analytica revelations have ignited a torrent of outrage at Facebook and the company’s data practices. Siva Vaidhyanathan, professor of media studies at the University of Virginia, weighs in on what he thinks the public’s next steps should be.
Should Listed Companies Provide More Cyber Risk Testing Info? (Computer Business Review) IBM Security’s GM emphasised an effective response to a cyber incident requires the training & rehearsal you'd get in a hospital preparing for emergencies.
Here’s What a Company’s Data Breach Game Plan Looks Like (Nextgov.com) Companies should know who to call in law enforcement and which data is most valuable before a breach occurs, the Chamber of Commerce says.
Risky Business: The Fifth Element (SecurityWeek) While security-as-a-service for functions like WAF and DDoS protection are well-established, they are just the beginning of a new industry that is emerging around consumption-based security models.
IT Modernization is a Road Trip - Don’t Forget to Pack Your Security (The Duo Security Bulletin) On the journey toward IT modernization, what kind of security technology can make agency life a lot easier as they move forward? Here's our recommendations to enable agency agility, as well as better management and security.
Design and Innovation
The Blockchain Solution to Our Deepfake Problems (WIRED) Technology to hack videos will only keep getting better. A decentralized ledger might help us know when we're seeing the truth.
Public Key Decryption (Medium) Offering an algorithm forcing authorities to reach out to the public to read encrypted messages.
Research and Development
Reverse engineering consciousness: Is the brain a quantum computer? (The Next Web) Sir Roger Penrose believes consciousness comes from quantum processes deep inside the human brain. If our brains are quantum systems we're gonna have to change the way we approach artificial intelligence.
Legislation, Policy, and Regulation
Russia 'will definitely retaliate' against the West over diplomatic expulsions (CNBC) Russia will definitely retaliate for the expulsions of Russian diplomats by multiple Western and east European governments, Kremlin Spokesman Dmitry Peskov said Wednesday.
Russia and NATO: Talking Their Way Out of Another Cold War (Bloomberg Quint) Top NATO and Russian military commanders have agreed to meet. Here’s what they need to discuss.
How Will Trump Punish Russia Next? (POLITICO Magazine) When it comes to sending diplomatic messages, presidents have a standard bag of tricks to choose from.
Turkey's internet censorship is not only censorship (Ahval) Censoring the internet is a game of cat-and-mouse, and the ease with which blocks can be circumvented makes many people happier to find ways to get around the problem than discuss it.
Push for legal mandate to unlock phones revived by DOJ (Naked Security) The Feds have been meeting with security researchers who are working on “a safe enough way” to unlock data on encrypted phones.
GOP chair urges passage of Homeland Security cyber legislation (TheHill) Bill would reorganize, rename office tasked with securing critical infrastructure from cyberattacks.
An important first step to protect our elections (TheHill) The omnibus spending bill allocates $380 million to shore up our voting system, and states now have important choices to prepare against threats to the system.
Litigation, Investigation, and Law Enforcement
Why are Russia and the West allowed to spy on each other? (Deutsche Welle) The expulsion of Russian diplomats from the UK, US and several other NATO states has cast a light on the world of espionage. DW looks at why spies are allowed to even operate in a targeted country in the first place.
Nerve agent was left on front door of Sergei Skripal’s home (Times) A deadly nerve agent that poisoned a former Russian double agent and his daughter in Salisbury was left on the front door of his home, police revealed last night. Scotland Yard said that Sergei and...
Ukrainian Police Bust Online Market For Military Equipment (RadioFreeEurope/RadioLiberty) Amphibious armored-personnel carriers and infantry fighting vehicles, off-road transport trucks, tanker trucks, and trailers were among some 200 objects that have been seized by Ukrainian police after being offered for sale online.
Judge Denies Mueller Request for Protective Order (Courthouse News) A federal judge has denied Special Counsel Robert Mueller’s request for a protective order for materials gathered during discovery for the upcoming trial of former Trump campaign manager Paul…
Ex-Skadden Associate Charged in Mueller's Russia Probe Seeks Nonjail Sentence (New York Law Journal) Alex van der Zwaan told a federal judge that his career is destroyed and that his extended stay in the U.S. has essentially been the equivalent to serving time. The Justice Department counters that he presents a scarcity of mitigating factors and several aggravating circumstances.
Documents suggest possible coordination between CIA, FBI, Obama WH and Dem officials early in Trump-Russia probe: investigators (Fox News) Newly uncovered text messages between FBI officials Peter Strzok and Lisa Page suggest a possible coordination between high ranking officials at the Obama White House, CIA, FBI, Justice Department and former Senate Democratic Leadership in the early stages of the investigation into alleged collusion between the Trump campaign and Russia, according to GOP congressional investigators.
Did Facebook’s ‘favors’ for the Obama campaign constitute a violation of federal law? (Fox News) Controversy continues to swirl around how the consulting firm Cambridge Analytica obtained personal data from over 50 million Facebook users without their knowledge and used it to target ads to individuals in an effort to help Donald Trump be elected president in 2016.
20 hackers arrested in EUR 1 million banking phishing scam (Help Net Security) 9 individuals in Romania and 11 in Italy remain in custody over a banking fraud netted EUR 1 million from hundreds of customers of 2 major banking institutions.
Lizard Squad member found guilty of offering DDoS-for-hire and jailed (WeLiveSecurity) A member of the notorious group Lizard Squad, known for their distributed denial-of-service (DDoS) attacks against websites, has been jailed for three months after being described as providing a "hacker-for-hire" service.
Cyber crook must pay £69,000 or face another two-year prison sentence after selling hacking tool (Computing) Mudd could face an extended jail term if he fails to cough up cash.