Cyber Attacks, Threats, and Vulnerabilities
An Amazon Phishing Scam Hits Just in Time For Prime Day (WIRED) Some deals are too good to be true, even on the most made-up holiday of all.
iOS URL Scheme Susceptible to Hijacking (TrendLabs Security Intelligence Blog) Abuse of the iOS URL Scheme can potentially result in the loss of privacy, bill fraud, exposure to pop-up ads, and more.
Sea Turtle DNS Hijackers Go After More Victims (Infosecurity Magazine) Sea Turtle DNS Hijackers Go After More Victims. Cisco Talos reveals new targets and techniques in ongoing campaign
Windows Zero-Day Used by Buhtrap Group For Cyber-Espionage (BleepingComputer) The Buhtrap hacking group has switched its targets from Rusian financial businesses and institutions since December 2015 when it moved into cyber-espionage operations, culminating with the use of a recently patched Windows zero-day during June 2019.
Buhtrap Group Using Zero-Day Attack in Windows (Infosecurity Magazine) Researchers discover zero-day used in targeted attacks in Eastern Europe.
Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks (WeLiveSecurity) ESET research uncovers a zero-day exploit that leverages a vulnerability in Windows and that has been deployed for a surgically targeted attack.
2020 election a target of foreign threats, lawmakers briefed on election security agree (The Washington Times) Lawmakers briefed on election security by top administration officials acknowledged ongoing threats to the 2020 presidential race Thursday.
Wannacry ransomware attack: Industry experts offer their tips for prevention (TechRepublic) Wannacry remains a significant threat for companies. Learn how your organization can guard against it.
Agent Smith: A New Species of Mobile Malware (Check Point Research) Research by: Aviran Hazum, Feixiang He, Inbal Marom, Bogdan Melnykov, Andrey Polkovnichenko Check Point Researchers recently discovered a new variant of mobile malware that quietly infected around 25 million devices, while the user remains completely unaware. Disguised as Google related app, the core part of malware exploits various known Android vulnerabilities and automatically... Click to Read More
Chinese Cloud Hopper Operation Targets Top Tech Providers in World (CPO Magazine) It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.
AVEVA Vijeo Citect and Citect SCADA Floating License Manager (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: AVEVA
Equipment: Vijeo Citect and Citect SCADA Floating License Manager
Vulnerabilities: Improper Input Validation, Memory Corruption
2. RISK EVALUATION
These vulnerabilities could allow an attacker to deny the acquisition of a valid license for legal use of the product.
Philips Holter 2010 Plus (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 1.9
Vendor: Philips
Equipment: Philips Holter 2010
Vulnerability: Use of Obsolete Function
2. RISK EVALUATION
Successful exploitation of this vulnerability under certain conditions can lead to a product feature escalation.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Holter 2010 Plus, a 12-lead EKG analysis software program, are affected:
Siemens TIA Administrator (TIA Portal) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 8.0
ATTENTION: Low skill level to exploit
Vendor: Siemens
Equipment: TIA Administrator (TIA Portal)
Vulnerability: Improper Access Control
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an execution of some commands without proper authentication.
Siemens SIMATIC RF6XXR (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 5.9
ATTENTION: Exploitable remotely/public exploits are available
Vendor: Siemens
Equipment: SIMATIC RF6XXR
Vulnerabilities: Improper Input Validation, Cryptographic Issues
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow access to sensitive information.
Siemens SIMATIC WinCC and PCS7 (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.2
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC WinCC and SIMATIC PCS7
Vulnerability: Unrestricted Upload of File with Dangerous Type
2. RISK EVALUATION
Successful exploitation of this vulnerability could cause a denial-of-service condition on the affected service or device.
Delta Industrial Automation CNCSoft ScreenEditor (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Delta Electronics
Equipment: CNCSoft ScreenEditor
Vulnerabilities: Heap-based Buffer Overflow, Out-of-Bounds Read
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could cause buffer overflow conditions that may allow information disclosure, remote code execution, or crash the application.
Schneider Electric Interactive Graphical SCADA System (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.0
Vendor: Schneider Electric
Equipment: Interactive Graphical SCADA System (IGSS)
Vulnerability: Out-of-Bounds Write
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution or crash the software.
Schneider Electric Floating License Manager (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Schneider Electric
Equipment: Floating License Manager
Vulnerabilities: Improper Input Validation, Memory Corruption
2. RISK EVALUATION
These vulnerabilities could allow an attacker to deny the acquisition of a valid license for legal use of the product.
EXCLUSIVE: Monroe College hacked, $2 million in Bitcoin demanded as ransom (New York Daily News) The attack was reported to the NYPD Tuesday, shortly after the hacker crippled the Bronx-based school’s computer system by encrypting its files remotely.
Cyberattack lands ship in hot water (Naked Security) Less than two months after warning of cybersecurity problems on ships, the US Coast Guard has revealed that a large international vessel has suffered a cyberattack.
More information about our processes to safeguard speech data (Google) We’re focused on building products that work for everyone, and as part of this, we invest significant resources to ensure that our speech technology works for a wide variety of languages, accents and dialects.
Google workers listen to your “OK Google” queries—one of them leaked recordings (Ars Technica) News service identified Google users by listening to 1,000 leaked recordings.
Who’s Listening When You Talk to Your Google Assistant? (WIRED) A Belgian broadcaster obtained recordings of more than 1,000 conversations with Google's automated assistant, some including personal details and medical information.
Google Home Silently Captures Recordings of Domestic Violence and More (Threatpost) Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used.
Twitter goes down during White House social media summit (The Verge) When in doubt, ban yourself.
It wasn't a cyber attack, Telstra says of five-hour failure (Australian Financial Review) Telstra has blamed a surge in network traffic for its five-hour service outage on Thursday afternoon that cost retailers an estimated $100 million in lost trade.
Cyber Trends
Nearly 60% of us fear using digital assistants – have you secured yours? (WRAL TechWire) Amazon Prime Day – which is actually "a two-day parade of epic deals" – is just around the corner. And more than half of Americans – are planning on or considering buying a digital assistant during this global online shopping event. But remember to take security precautions when using one.
Five things I learned at IBM Security (LinkedIn) Earlier this week I resigned from IBM … more on that and my future plans in the coming days. It has been the highlight of my career to lead and grow the IBM X-Force into what is today one of the largest incident response and intelligence teams in the industry.
Marketplace
CIA Remains Tied to the Industry (SIGNAL Magazine) The intelligence agency continues to turn to the private sector for help solving complex problems.
Verizon CEO: We're doing just fine without using any equipment from Chinese tech giant Huawei (CNBC) Verizon has no reliance on China, says CEO Hans Vestberg. "We are executing our strategy with our Western European vendors."
How U.S. Tech Giants Are Helping to Build China’s Surveillance State (The Intercept) A nonprofit led by Google and IBM executives is working with Semptian, whose technology is monitoring the internet activity of 200 million people in China.
ZTE opens European cybersecurity lab (PCR) ZTE Corporation has opened up a European cybersecurity lab in Brussels. Located in the administrativ
Privacy Startup OneTrust Reaches $1.3 Billion Valuation From Its First Funding Round (Forbes) OneTrust is a unicorn after a $200 million Series A funding round. The enterprise tech startup helps companies navigate privacy laws, like the EU's GDPR.
McAfee Value Could Be $5 Billion in IPO Later This Year (Channel Futures) Increasing cash flow under McAfee CEO Chris Young reportedly has prompted the plan to return to the public market The IPO could come this year and could raise at least $1 billion, and value McAfee at more than $5 billion, it said.
Motorola Solutions Acquires WatchGuard, Inc., Leader in Mobile Video for Public Safety (Yahoo) Motorola Solutions, Inc. (MSI) today announced it has acquired WatchGuard, Inc., a U.S. leader in mobile video solutions. WatchGuard designs and manufactures in-car video systems, body-worn cameras, evidence management systems and software. “An integrated, secure mobile video solution can enhance safety
7 recent acquisitions in the IT security space — and why they happened (TechGenix) Companies that have proven cybersecurity tools and solutions are hot commodities, as these seven IT security acquisitions clearly show.
Breaking Down 3 Of The Year's Most Intriguing Cybersecurity Stocks (MarketWatch) The state of the cybersecurity industry remains as intriguing and dire as ever. Between the threat of hacking and digital espionage from foreign actors,...
HackerOne’s greatest hack? Pay transparency for gig workers (Quartz at Work) It is one of the rare gig-economy companies that doesn't take a cut from workers' pay.
Products, Services, and Solutions
Trend Micro to Deliver Transparent, Inline Network Security with Amazon Web Services Transit Gateway (Trend Micro Newsroom) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced the extension of its industry leading network protection to the cloud, now available on Amazon Web Services (AWS) Marketplace.
EnGenius SkyKey Puts Cloud Accessible Networks in the Palm of Your Hand (Morningstar) EnGenius SkyKey Puts Cloud Accessible Networks in the Palm of Your Hand, Read most current stock market news, Get stock, fund, etf analyst reports from an independent source you can trust – Morningstar
enSilo Unveils Advanced Platform Capabilities, Announces Strong Growth and New Investment (Yahoo) Demand for more capable endpoint security defenses automating protection and constraining security costs drives enSilo's growth and momentum
Bitdefender Expands Sandbox Workflows and Use-Cases with On-Prem Deployment (Bitdefender) Bitdefender announces controlled availability release of GravityZone Sandbox Analyzer On-Premises. Improves targeted attack detection across multiple vectors with enhanced data security and privacy. Integrates with Bitdefender and third-party solutions for complex workflows and automated response.
Company to get $1.3 million for school safety tool (WOFL) The Florida Department of Education will pay nearly $1.3 million to a company that will revise a tool used by all public schools to identify threats and vulnerabilities on campuses.
Technologies, Techniques, and Standards
Inside the NIST team working to make cybersecurity more user-friendly (Help Net Security) NIST has a team of researchers working on projects aimed at improving the usability of cybersecurity software, hardware, systems, and processes.
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide (Yahoo) Resource Helps Organizations Implement CIS Sub-Controls in Windows 10 EAST GREENBUSH, N.Y. , July 11, 2019 /PRNewswire/ --The Center for Internet Security, Inc. (CIS ® ) launches the CIS Controls Microsoft ...
How to Catch a Phish: Where Employee Awareness Falls Short (Dark Reading) Advanced phishing techniques and poor user behaviors that exacerbate the threat of successful attacks.
Exploring the Dark Net - Behind Enemy Lines (Infosecurity Magazine) A strong understanding of operational security and acceptance of the risks associated with this type of research is key
Design and Innovation
Blockchain has Numerous Applications for Cybersecurity (CoinIdol) Blockchain Technology applications in cyber security range from data protection, decentralization, resistance to attacks among others. General digitization is associated with a heap of risks that developers and entrepreneurs need to be aware of. Although the full potential of the technology is yet to be explored, it is already preventing many cyber crimes across the world.
The top 8 problems with blockchain (Computerworld) While blockchain holds the promise for reinventing business processes, it is still a developing technology with few production systems in place, not to mention governance issues and vulnerabilities that must be understood.
Delivering AI we can trust (Government News) The G20 Declaration is a timely reminder that emerging technologies such as artificial intelligence (AI) are critical to the nation’s future.
On TikTok, Teens Meme the Safety App Ruining Their Summer (WIRED) Parents can use Life360 to track their teen’s location in real time. The company can use that data to sell car insurance.
Research and Development
The Navy Kicks off Artificial Intelligence Cybersecurity Prize Challenge (SIGNAL Magazine) The $100,000 contest is especially looking for nontraditional partners to submit solutions.
DARPA funding brings machine learning to BAE Systems’ Signals Intelligence capabilities (Intelligent Aerospace) BAE Systems has been awarded funding from the Defense Advanced Research Projects Agency (DARPA) to integrate machine-learning technology into platforms that decipher radio frequency signals.
Academia
Northeastern University joins with universities from US, UK, and Japan to tackle international cybersecurity challenges (Northeastern University) Northeastern has joined with five universities from the United States, the United Kingdom, and Japan to establish a new consortium to tackle the growing international…
Legislation, Policy, and Regulation
What Really Happened in the Cyber Command Action Against Iran? (Lawfare) A careful reading of the reporting suggests that the U.S. response consisted of three distinct operations.
Langevin presses Trump for details on cyber ops (FCW) The Trump administration has yet to brief Congress on new rules governing offensive cyber operations, and some on the Hill are getting impatient.
America is woefully unprepared for cyber-warfare (Roll Call) War in cyberspace is fully on, and the United States is losing it, according to about two dozen national security experts.
Cyberspace administration releases new rules on security assessment of cross-border transfers of personal information (International Law Office) The Cyberspace Administration of China recently released the Measures on Security Assessment of Cross-Border Transfer of Personal Information (Draft for Comment). According to the draft, network operators must apply to the provincial-level cyberspace administration for a security assessment before conducting cross-border transfers. Further, network operators must record all cross-border transfers and retain the records for at least five years.
Mnuchin urges US suppliers to seek approval to resume selling to blacklisted Huawei, new report claims (INSIDER) Trump met with Chinese President Xi Jinping on the sidelines of the G20 summit last month and promised to ease certain restrictions off Huawei.
Former heads of DHS and NSA explain how the U.S. can keep Huawei at bay (CNBC) Former DHS secretary Michael Chertoff and former NSA head Mike McConnell write for CNBC that Wednesday's FCC spectrum upgrades are a positive step in 5G support, and bring us another step closer to a more connected internet of things.
Britain set for clash with US on digital tax (Times) Britain is on course for another trade showdown with President Trump after deciding to forge ahead with a special tax on Amazon, Google and other big technology companies. The Treasury said...
FEC says political campaigns can now get discounted cybersecurity help (TechCrunch) In a long awaited decision, the Federal Elections Commission will now allow political campaigns to appoint cybersecurity helpers to protect political campaigns from cyberthreats and malicious attackers. The FEC, which regulates political campaigns and contributions, was initially poised to block th…
F.E.C. Allows Security Company to Help 2020 Candidates Defend Campaigns (New York Times) Federal lawyers previously advised the commission to block the company, Area 1, from providing services to presidential candidates at a discount.
FEC: Campaigns Can Use Discounted Cybersecurity Services (KrebsOnSecurity) The U.S. Federal Election Commission (FEC) said today political campaigns can accept discounted cybersecurity services from companies without running afoul of existing campaign finance laws, provided those companies already do the same for other non-political entities.
Joint Chiefs nominee wants to boost information warfare (C4ISRNET) In a pre-hearing questionnaire, the nominee to be the next chairman of the Joint Chiefs of Staff addressed questions on a range of information warfare-related capabilities.
Navy nominee brings cyber experience to top echelons of Pentagon leadership (Fifth Domain) Vice Adm. Michael Gilday, who formerly commanded Fleet Cyber Command, has been nominated to be the Navy's top officer.
Litigation, Investigation, and Law Enforcement
GDPR superpowers lead to whopper ICO fines for BA, Marriott (Naked Security) The ICO isn’t pulling its punches: The penalty for BA’s data breach is about 367 times higher than the previous record-setting fine.
Will BA, Marriott Have to Pay UK ICO’s Huge Breach Fines? We Look at What’s Next. (Cooley) The UK Information Commissioner’s Office (ICO) has issued Notices of Intent (NOI) to fine British Airways (for £183m) and US hotel group Marriott (for £99m) for breaches of the EU General Data Prot…
How GDPR mega-fines could be a cybersecurity game changer (CRN) As both British Airways and Marriott hotel group face mammoth penalties for data breaches, CRN asks how large may change their approach to cybersecurity
Supreme Court limits First Amendment exposure of social media giants (Silicon Valley Business Journal) Exclusive guest viewpoint: While the Trump White House convenes a summit to complain about perceived bias on the part of Silicon Valley social media giants, a recent Supreme Court decision reinforced a key aspect of the First Amendment, protecting private entities such as Twitter, Facebook, and YouTube.
Lawsuit claims FedEx misled investors after cyber attack (https://www.wmcactionnews5.com) A lawsuit claims FedEx violated federal securities laws after a cyber attack.