Cyber Attacks, Threats, and Vulnerabilities
Leak of papers before UK election raises 'specter of foreign influence': experts (Reuters) The leak and distribution of classified British-U.S. trade documents online rese...
Vulnerability in fully patched Android phones under active attack by bank thieves (Ars Technica) "StrandHogg" spoofing flaw exploited by 36 apps, including bank trojans.
A bug in Microsoft’s login system put users at risk of account hijacks (TechCrunch) Microsoft has fixed a vulnerability in its login system, which security researchers say could have been used to trick unsuspecting victims into giving over complete access to their online accounts. The bug allowed attackers to quietly steal account tokens, which websites and apps use to grant users…
This trojan malware is being used to steal passwords and spread ransomware (ZDNet) PyXie RAT capabilities include keylogging, stealing login credentials and recording videos, warn researchers at BlackBerry Cylance - who also say the trojan can be used to distribute other attacks, including ransomware.
Meet PyXie: A Nefarious New Python RAT (Threat Vector) Introducing PyXie - a new Python RAT observed by our researchers delivering ransomware targeting the healthcare and education industries.
Quantum Dragon Report (Strider) Utilizing Strider’s technology platform and proprietary datasets, Quantum Dragon reveals how China leveraged foreign quantum science labs and government talent recruitment programs to advance its military quantum program.
Trend Micro Security 16 - DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628) (Safe Breach) Trend Micro Security 16 - DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628)
December 2nd, 2019
Peleg Hadar
Security Researcher, SafeBreach Labs
Introduction
SafeBreach Labs di…
Autodesk Desktop Application - Privilege Escalation to SYSTEM (CVE-2019-7365) (Safe Breach) Autodesk Desktop Application - Privilege Escalation to SYSTEM (CVE-2019-7365)
December 2nd, 2019
Peleg Hadar
Security Researcher, SafeBreach Labs
Introduction
SafeBreach Labs discovered a ne…
Kaspersky Secure Connection - DLL Preloading and Potential Abuses (CVE-2019-15689) (Safe Breach) Kaspersky Secure Connection - DLL Preloading and Potential Abuses (CVE-2019-15689)
December 2nd, 2019
Peleg Hadar
Security Researcher, SafeBreach Labs
Introduction
SafeBreach Labs discovered…
Exposed Firebase databases hidden by Google search (SearchSecurity) A security researcher found that exposed Firebase databases are searchable in most search engines but claimed Google is scrubbing such search results to hide databases that are publicly accessible.
Tuft & Needle exposed 236,400 customer shipping labels (TechCrunch) Another day, another server without a password.
Smith & Wesson Web Site Hacked to Steal Customer Payment Info (BleepingComputer) American gun manufacturer Smith & Wesson's online store has been compromised by attackers who have injected a malicious script that attempts to steal customer's payment information.
Ransomware infects NYPD’s fingerprint database, Accidentally! (CISO MAG) NYPD’s fingerprint database was shut down for a few hours when an accidental ransomware infected nearly 23 machines linked to the department’s LiveScan fingerprint-tracking system.
Securing Smart TVs (Oregon FBI Tech Tuesday) In this week's FBI Tech Tuesday segment, we look at ways to protect your smart TV from being accessed by bad cyber actors.
'You feel violated,' says Cornwall, Ont., woman who lost life savings to SIN identity fraud scam (CBC) A Cornwall, Ont., woman has lost all her money after falling victim to a scam the RCMP are calling the top identity fraud in Canada.
Vulnerability Summary for the Week of November 25, 2019 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Security Patches, Mitigations, and Software Updates
Avast Firefox Extensions Removed Possibly Due to Browsing Data Collection (Softpedia) Browser extensions not fully banned yet though
Cyber Trends
Unprecedented Leaks Underscore The Deep Discontent Inside China (The Federalist) While the world was still digesting the Xinjiang Papers, two more China-related intelligence information bombs were dropped last weekend.
Most Brazilians believe companies don't protect their personal data (ZDNet) A new study has found consumers in the Latin country are dissatisfied with the way their data is handled as another major leak exposes information of 1,4 million people.
With Brits Used to Surveillance, More Companies Try Tracking Faces (Wall Street Journal) The U.K. has more surveillance cameras per capita than any other country in the West. But it is private companies’ cameras, not the government’s, that are starting to worry activists and regulators.
10 Predictions How AI Will Improve Cybersecurity In 2020 (Enterprise Irregulars) Cybersecurity is at an inflection point entering 2020. Advances in AI and machine learning are accelerating its technological progress. Real-time data and analytics are making it possible to build stronger business cases, driving higher adoption. Cybersecurity spending has rarely been linked to increasing revenues or reducing costs, but that’s about to change in 2020. What …
Experian Predicts the Top Data Breach Trends for 2020 (PR Newswire) As we look to 2020 and a new decade, cybersecurity will continue to be a top priority for businesses and consumers alike. To help organizations...
Report: 'Smishing,' Deepfakes to Continue to Rise in 2020 (Nextgov.com) Drones may also be more widely weaponized to steal consumer data from public Wi-Fi networks, according to a new report on 2020 data breach trend predictions.
Cliff Notes to 5 Studies about the State of Cybersecurity in Healthcare (Bricata) The volume and severity of cyber threats and attacks have grown in healthcare. Here's a look at several studies that describe the state of cybersecurity for the industry.
Marketplace
DHS Seeks Feedback on Cyber Talent Personnel System (MeriTalk) The Department of Homeland Security (DHS) is seeking feedback on program objectives for implementation of a new cybersecurity-focused personnel system.
Small Contractors Struggle to Meet Cyber Security Standards, Pentagon Finds (Defense One) Even large companies aren’t doing as well as they think they are, the assistant acquisition chief said Monday.
Top Israeli VC talks cybersecurity, diversity and ‘no go’ investments (TechCrunch) Jerusalem Venture Partners has raised more than $1.4 billion raised over two decades, powering some of Israel's largest cybersecurity startups.
()
Chris Cuomo Fact-Checks GOP Lawmaker: CrowdStrike’s Not Owned by a Ukrainian (The Daily Beast) “The man is American-born of Russian descent. He’s not Ukrainian. Even if he were, that’s what you’re going to hang it on?”
Ability Inc. Announces Entry into New Contracts (West) Ability Inc. (Nasdaq: ABIL) (the “Company”), a leading provider of innovative tactical and strategic communications intelligence solutions, today announced that on November 29, 2019, it has entered into, through its wholly-owned subsidiary Ability Computers and Software Industries Ltd. (“ACSI”), into new contracts for selling its strategic interception solutions. According to the contracts, ACSI is expected to receive fees in the aggregate amount of up to $9.0 million, subject to certain approvals from local authorities and systems acceptances.
Lucideus Bags $7 Mn Funding To Become India’s Most Valuable Cybersecurity Startup (Inc42 Media) Cybersecurity startup Lucideus has raked in $7 Mn in a fresh round of funding led by MS&AD Ventures, the venture capital arm of one of Japan’s leading insurance companies.
Detectify Secures $23 Mn Plans to Deliver Secure Internet Services (Tech) Detectify secured $23 Mn in Series B round led by venture capital firm Balderton Capital, and supported by existing investors Paua Ventures, Inventure and Insight Partners.
HelpSystems Announces Clearswift Acquisition to Expand Cybersecurity Portfolio (West) HelpSystems announced today that it will acquire Clearswift, a UK-based content threat protection software company.
Cyber giant Check Point acquires Jerusalem start-up Protego (The Jerusalem Post) "On their journey to cloud transformation, organizations require a new security paradigm to protect against 5th and 6th generation of cyber attacks."
()
NortonLifeLock: A Leaner, Meaner Symantec (Seeking Alpha) After selling its stressed enterprise business division to Broadcom, a leaner NortonLifeLock (Symantec) plans to market its consumer cybersecurity business globally.
Cipherloc Appoints Andrew Borene as CEO (Yahoo) Borene brings deep domain expertise across both the public and private sectors to the CipherLoc team. "I look forward to hitting the ground running with the team at CipherLoc," said Andrew Borene, newly appointed CEO. "We are excited to welcome Andrew to CipherLoc," said Tom Wilkinson
Juniper CTO Bikash Koley Calls It Quits (SDX Central) Juniper Networks former Chief Technology Officer Bikash Koley is out, and the company hired Raj Yavatkar as the new CTO.
Products, Services, and Solutions
AlgoSec Appoints Chief Revenue Officer & Chief Financial Officer to Manage Growth Acceleration (West) Leading network security management solution provider appoints two industry veterans to drive expansion fuelled by multiple growth avenues and new revenue initiatives
SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform, is Now Available (West) Allows on-demand API access to turnkey cyberthreat expertise
TrueFort Unveils Industry-First Application Detection and Response Platform to Secure Applications and Cloud Workloads (BusinessWire) Fortress XDR provides end-to-end visibility into application behaviors in context and in real-time to detect anomalies and protect workloads.
The Digital Guardian Data Protection Platform is Now Available in AWS Marketplace (Digital Guardian) Digital Guardian today announced that its award winning Data Protection Platform is now available in AWS Marketplace.
Cryptomathic Signer Achieves Early Common Criteria Certification to New eIDAS Protection Profile for QSCD Products to Deliver Qualified Electronic Signatures (Cryptomathic) Cryptomathic, announces that its popular e-signature solution, Signer, has received Common Criteria certification to the new eIDAS protection profile 419 241-2 for remote Qualified Electronic Signatures.
OPTOLANE Chooses Trustonic to Protect New Connected Medical Diagnostic Devices (Global Security Mag Online) Trustonic announces that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities.
LiveTiles and Nucleus Cyber Announce Solution to Govern and Secure Mic (PRWeb) LiveTiles Limited (ASX: LVT), a global software company that empowers its users to create their own intelligent workplace experiences, announced the release of
Alert Logic Enhances its Threat Detection and Response Solution Leveraging Amazon Web Services to Improve Customer Security Posture in Cloud Environments (Yahoo) Alert Logic, a leader in managed threat detection and response, announced today at AWS re:Invent 2019 in Las Vegas, the first of several planned integrations with newly-launched AWS Identity and Access Management (IAM) Access Analyzer. Alert Logic's initial integration with AWS IAM Access Analyzer
Acronis SCS Releases Hardened Backup Solution Purpose Built for Air Gapped Networks (PR Newswire) Over the weekend, Acronis SCS – a trusted American edge data security company dedicated to the US public sector – added an additional backup...
Elcomsoft Extracts Data from Locked iPhones with Unpatchable checkra1n Jailbreak (PR Newswire) Elcomsoft Co. Ltd. releases a major update of iOS Forensic Toolkit, the company's mobile forensic tool for extracting data from a range of...
Tehama Achieves Amazon Web Services End User Computing Competency (BusinessWire) Tehama Achieves Amazon Web Services End User Computing Competency
SageSure Insurance Managers Partners with Quantemplate for Data Management (West) Through Quantemplate’s platform for data preparation, storage and business intelligence, SageSure is able to support business strategy and growth initiatives
IGEL Enhances the Security Capabilities of UD7 Endpoints (IGEL) IGEL, provider of the next-gen edge OS for cloud workspaces, today announced that it has integrated the AMD Secure Processor on IGEL UD7 endpoints, effectively creating a dedicated ‘chain of trust’ security system that further strengthens IGEL’s security posture. IGEL UD7 featuring the integrated AMD Secure… Read More »
Design and Innovation
How Auschwitz-themed Christmas ornaments ended up on Amazon (The Telegraph) It takes about 10 seconds to find an antisemitic product for sale on Amazon.
Research and Development
Only 9% of 15-year-olds can tell the difference between fact and opinion (Quartz) That's according to the latest results of PISA, an international test of math, science and reading administered by the OECD every three years.
How to tell the difference between persuasion and manipulation (Aeon) We influence each other in many ways besides pure reason. What’s the moral difference between persuasion and manipulation?
This Is Your Brain on Terrorism (Foreign Affairs) The science behind a death wish.
Do Cultural Differences Account for Global Gap in Online Regulation? (Security Magazine) Differences in cultural values have led some countries to tackle cyber attacks with increased internet regulation, while others have taken a ‘hands-off’ approach to online security.
Legislation, Policy, and Regulation
The priorities of cyber diplomacy in the Rouhani’s government (Modern Diplomacy) Technological growth and its breakthrough advances, along with their advantages, also have disadvantages, which are obvious examples of communication equipment. In fact, today, the Internet, telephones, cell phones and other communication devices can be described as a double-edged sword used to facilitate communications on the one hand and to spy on and monitor information. The […]
China Uses DNA to Map Faces, With Help From the West (New York Times) Beijing’s pursuit of control over a Muslim ethnic group pushes the rules of science and raises questions about consent.
UN Facial ID Tenets Framed By China (PYMNTS.com) Technology firms in China are framing facial recognition policies at the UN. Standards established in the ITU are often used as doctrine by emerging nations.
Can New Norms of Behavior Extend the Rules-Based Order Into Cyberspace? (World Politics Review) <p>Although the benefits of cyberspace are undeniable, malicious state and criminal actors often use it for nefarious ends, and at times endanger its digital infrastructure. A recently issued report by the Global Commission on the Stability of Cyberspace is a first step toward protecting this vulnerable domain.</p>
Why there cannot be any national security without individual privacy | Analysis (Hindustan Times) NSO-Pegasus case: Set up an independent inquiry panel and conduct its proceedings transparently
Europe must put security first with 5G (POLITICO) US message to EU allies: Don’t trust Chinese firms with critical networks.
Are Russia and China Really Forming an Alliance? (Foreign Affairs) The evidence is less than impressive.
Cyberspace Solarium Commission to Study DoD’s Defend Forward Concept (Executive Gov) The Congress-created Cyberspace Solarium Commission is working to determine ways the Department of D
MinDef seeks allocation to face cyber threats (The Edge Markets) The Ministry of Defence (MinDef) is seeking an additional allocation to face a new threat, namely, cyber attacks as stated in the Defence White Paper (KPP), said its Minister Mohamad Sabu.He said the ministry endeavoured to obtain more funds and found that Members of Parliament including from the opposition wanted the ministry to boost the acquisition of assets specifically in facing the threat of cyber attacks."Yes, they (government and opposition Members of Parliament) are of
US cyber commander in Seoul for ‘important, timely’ discussion (Korea Herald) Paul Nakasone, US director of the National Security Agency, has arrived in South Korea to discuss the two countries’ alliance and cyber cooperation, government officials here confirmed Tuesday. On Tuesday morning, Nakasone, who is also the commander of the US Cyber Command, met with Chun Jung-soo, commander for Korea’s Cyber Operations Command, to discuss reinforcing cooperation in the area of cybersecuri...
GOP criticizes Pelosi for sidelining election security for impeachment (TheHill) House Republicans are criticizing Speaker Nancy Pelosi (D-Calif.) for "sidelining" election security for impeachment. In
Air Force detachment activated for cyber testing (Antelope Valley Press) Detachment 1, 47th Cyberspace Test Squadron, 96th Cyberspace Test Group, 96th Test Wing, was officially activated during a ceremony at Edwards Air Force Base on Nov. 19.
Litigation, Investigation, and Law Enforcement
Cyber Attack Has Louisiana State Lawmakers Asking Questions (Red River Radio) The ransom-ware cyberattack that occurred two weeks ago on Louisiana’s state government computer servers disrupted
FBI Says Russian FaceApp Is 'Potential Counterintelligence Threat' (New York Times) The Federal Bureau of Investigation considers any mobile app developed in Russia to be a "potential counterintelligence threat," it said on Monday, responding to a U.S. lawmaker's query about face-editing photo app FaceApp.
FBI Letter to Senator Schumer re: FaceApp (Federal Bureau of Investigation) Dear Senator Schumer: On behalf of the Federal Bureau of Investigation (FBI), this responds to your letter, dated July 17, 2019, to the FBI and the Federal Trade Commission (FTC) regarding the mobile software application FaceApp.
Poland’s Internal Security Service is critical to hunting down spies (Defense News) Poland’s counterintelligence service has been hard at work. Faced with an evolving espionage threat, it has developed a toolkit to push back against those who want to steal state secrets.
Analysis | The Cybersecurity 202: Activist wants court to name and shame electric utilities for violating cybersecurity rules (Washington Post) Regulators have withheld names of utilities that paid millions in fines.
US says cryptocurrency expert violated NKorea sanctions (Fifth Domain) At the conference, Virgil Griffith talked about how North Korea could use cryptocurrency to
TikTok accused in California lawsuit of sending user data to China (Reuters) A California college student has accused popular video-sharing app TikTok in a...
Google in firing line again over data collection (CRN) European Commission confirms further investigation into Google's data-gathering conduct
()
IG: OPM could put up a better defense against cyber attacks (Federal News Network) In today’s Federal Newscast, a new audit by the inspector general found the Office of Personnel Management’s financial management systems lack some basic cybersecurity protections.
Former Franklin Regional student pleads guilty in 2016 cyber attack case (TribLIVE.com) A former Franklin Regional High School student pleaded guilty Monday to launching a cyber attack on the school’s computer network that disrupted servers at more than a dozen other local school districts and government offices. Police said Michaela G. King, 21, of Murrysville, was a high school senior in November