Cyber Attacks, Threats, and Vulnerabilities
Fusion Center Report: Situational Awareness Ukraine Elections (EclecticIQ) EclecticIQ is a leader in collaborative Threat Intelligence Management. Empowering the Threat Analyst. Exchange intelligence based on STIX and TAXII.
Fake News Runs Wild on WhatsApp as India Elections Loom (Wall Street Journal) Viral fake news is lighting up Facebook’s WhatsApp messaging app as the world’s biggest democracy prepares for national elections in the coming weeks.
Exodus Android Spyware With Possible Links to Italian Government Analyzed (SecurityWeek) Android spyware known as Exodus has been found in more than 20 apps on Google Play Store. The malware is believed to have been developed by the Italian firm eSurv, which has commercial connections to the Italian government.
Google Play Italian Spyware Apps Infected Hundreds (Trheatpost) Google Play has removed 25 malicious apps that were downloading spyware, dubbed Exodus, onto victims' phones.
Netanyahu says ‘bots’ are real after news report finds campaign used social network to sway election (Washington Post) A nonprofit watchdog said hundreds of real and fake social media accounts were deployed to boost Israeli Prime Minister Benjamin Netanyahu’s election chances.
Israel Expected to be Hit by Annual Cyber Attack Next Week (Algemeiner.com) A keyboard. Photo: Wikimedia Commons. A major cyber attack on Israel is expected to take place on Sunday, April 7. …
Former NSA spies hacked BBC host, Al Jazeera chairman for UAE (Reuters) A team of former NSA cyber spies helped the United Arab Emirates break into the iPhones of at least 10 media figures, Reuters finds
Disrupt and discredit: Russia still has Ukrainian elections in sights (KyivPost) Exit polls from the first round of Ukraine’s presidential election, released late on March 31, seem to confirm what has long been believed: that no openly pro-Russian candidate has a chance to secure this Ukrainian presidency. But it doesn’t seem that will stop the Kremlin from having its voice heard, or from trying to have …
Kremlin Says Would Like to See Party of Peace in Power in Ukraine (Sputnik) Kremlin believes it is yet too early to comment on the results of the Ukrainian presidential election or congratulate any of the candidates on getting into the second round of the race, Kremlin Spokesman Dmitry Peskov said Monday.
Russia may not recognize Ukrainian presidential election results — senator (TASS) The final decision is to be made by Russian President Vladimir Putin
The big loser in Ukraine’s presidential election? Vladimir Putin (Los Angeles Times) Russian President Vladimir Putin wasn’t running in the Ukrainian presidential election. But he was by far the biggest loser of the night.
Russia accused of massive GPS spoofing campaign (Naked Security) Russia has been hijacking signals sent by Global Navigation Satellite Systems (GNSS) systems such as GPS, researchers claim.
Iran continues to be a major cyber threat to the Middle East (The National) Iranian hackers are linked to cyber attacks that targeted thousands of people at more than 200 companies globally
vxCrypter Is the First Ransomware to Delete Duplicate Files (BleepingComputer) The vxCrypter Ransomware could be the first ransomware infection that not only encrypts a victim's data, but also tidy's up their computer by deleting duplicate files.
vxCrypter Is the First Ransomware to Delete Duplicate Files (KnowBe4) vxCrypter Is the First Ransomware to Delete Duplicate Files
Cyber criminals using tactic to spread to other connected networks, research finds (TheHill) Cyber criminals who have infiltrated one group’s networks are increasingly using a tactic known as “island hopping” to enter other connected networks, security researchers warned Tuesday.
Attackers Store Malware in Hidden Directories of Compromised HTTPS Sites (SecurityWeek) Cybercriminals are utilizing hidden “well-known” directories of HTTPS sites to store and serve malicious payloads, Zscaler security researchers have discovered.
Serious Path Traversal Flaw Found in Kubernetes (SecurityWeek) Kubernetes vulnerability allows attackers to steal sensitive information from a user’s workstation or execute arbitrary code. Flaw exists due to an incomplete patch released last year.
Critical Flaw Allows Hackers to Take Control of PowerFlex AC Drives (SecurityWeek) Rockwell Automation’s Allen Bradley PowerFlex 525 AC drives are affected by a critical DoS vulnerability that allows hackers to gain control of devices.
Vulnerability Summary for the Week of March 25, 2019 (US-CERT) The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Android app warning over dodgy virus detectors that DON'T work – uninstall these apps now (The Sun) ANDROID phone owners are being warned to stay well away from a set of popular apps on the Google Play Store. Hundreds of dodgy antivirus apps have been flagged for providing a shocking lack of prot…
Full extent of cyberattack remains unknown for City of Albany (WTEN) The Mayor of Albany held a press conference Monday afternoon to discuss the ransomware cyberattack that hit the city over the weekend.
New York Albany Capital Hit by Ransomware Attack (BleepingComputer) The City of Albany, the capital of the U.S. state of New York, was hit by a ransomware attack on March 30, with city officials working over the weekend to respond to the incident.
Security Patches, Mitigations, and Software Updates
VMware Patches Flaws Disclosed at Pwn2Own 2019 (SecurityWeek) Security updates released by VMware for its vCloud Director, ESXi, Workstation and Fusion products patch several vulnerabilities, including flaws disclosed recently at Pwn2Own 2019.
Boeing's software fix for the 737 Max needs more time (Quartz) The Federal Aviation Administration had originally said it would mandate airlines to deploy the software fix no later than April.
Cyber Trends
The Vulnerability Epidemic in Financial Services Mobile Apps
(Arxan) Request a copy of "In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps" - new research by Aite Group on the state of financial services mobile app security.
Digital Enterprise Report: The How the World’s Largest Organizations Are Evolving with Technology (Okta) Welcome to Okta’s first Digital Enterprise Report, a survey of IT, Security, and Engineering decision makers from the world’s largest businesses.
The 2019 Data Privacy Maturity Study (Integris) How does your data privacy management program compare to top US enterprises?
Marketplace
CIA plans multibillion cloud buy for intelligence community (FCW) Six years after their initial cloud infrastructure push, the CIA is leading a multivendor expansion of cloud services for the entire intelligence community, with awards expected in 2021.
Mark Zuckerberg says Facebook may pay publishers to put their stuff in a dedicated news section (Recode) The Facebook CEO floated a "news tab to surface more high-quality news," and said he’s willing to write checks to support it.
The world's largest cybersecurity vendors ranked (CRN) Canalys says the cybersecurity industry was worth $37bn last year
Proxy Emerges From Stealth with $13.6 Million in Funding (SecurityWeek) Universal identity provider Proxy emerged from stealth with $13.6 million in Series A funding, which brings the company’s total funding to $16.6M to date.
Sqreen Closes $14 Million Series A Funding Round Led by Greylock Partners (West) Pioneer of Application Security Management (ASM), founded by Apple security veterans, already protects 500 companies
Jersey-based MSP acquires in Canada (CRN) Calligo makes third Canadian takeover
Renesas completes $6.7B acquisition of San Jose chipmaker IDT, installs new CEO (Silicon Valley Business Journal) The Japanese chip giant Renesas completed its $6.7 billion acquisition of San Jose-based Integrated Device Technology on Saturday, extending its reach into self-driving car chips.
Tokio Marine HCC Acquires Cyber Specialist NAS in California (Insurance Journal) Tokio Marine HCC has acquired in Encino, Calif.-based NAS Insurance Services LLC. Terms of the deal were not disclosed. The acquisition of NAS represents
Symantec demotes Ingram Micro from distie lineup (CRN Australia) Dicker Data and Arrow get the heavy lifting from now on, Ingram retains cloud.
ISACA Names David Samuelson CEO (ISACA) Technology, learning and media veteran to focus on growth, innovation and business execution at global association marking its 50th anniversary.
Gartner Analyst Deborah Kish Joins Fasoo Team (PR Newswire) Fasoo, a leader in data-centric security, announced today that Deborah Kish, former Senior Principal Analyst with...
Delve Labs Names Chief Operating Officer, Expands US Operations (Benzinga) Delve Labs, the pioneer in AI-Based vulnerability assessment and prioritization, today announced that Norman Menz has joined...
AIG Names Baich, Formerly with Wells Fargo and NSA, as Information Security Officer (Insurance Journal) American International Group announced that Rich Baich will join the company as senior vice president, chief information security officer, effective April
Products, Services, and Solutions
Okta Launches New Advanced Server Access Product to Bring Secure Access to Critical Infrastructure (Okta) New product delivers pervasive security for Amazon Web Services, Google Cloud Platform and Microsoft Azure
Sentryo Adds Cybersecurity Features to Ruggedcom Industrial Network Platform from Siemens (Global Security Mag Online) At the Hannover Messe, the world’s leading trade fair for industrial technology, SENTRYO announced availability of its industrial cybersecurity solution on the Ruggedcom Multi-Service Platform from Siemens AG.
PwC Netherlands Join Efforts with High-Tech Bridge to Provide DevSecOps and CI/CD Application Security Testing (AP NEWS) PwC Netherlands and High-Tech Bridge announce a strategic partnership and joint solution for rapid, cost-efficient and DevSecOps-enabled application penetration testing.
Wandera integrates with Microsoft Enterprise Mobility + Security to deliver robust security for the mobile-enabled workforce (West) Wandera, the leader in mobile security, has announced integrations within Microsoft’s Enterprise Mobility + Security suite to provide advanced mobile threat defense to security conscious enterprises.
Kingston Digital Introduces New High Endurance microSD Cards (BusinessWire) Kingston introduces its new High Endurance microSD card especially designed for write-intensive application such as home security and dash cams.
New Shodan Service Keeps Track of Internet-Exposed Systems (SecurityWeek) Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet.
Renaissance, one of Ireland's Premier Value-Added Distributors and Cyber Security Service Providers Adds CyGlass' Network Defense as a Service (NDaaS) to its Portfolio (PR Newswire) CyGlass, a SaaS AI-driven network-centric threat detection solution, and Renaissance, a leader in...
Verve Industrial Protection - Announces Release of Version 7.0 The Next Phase in the Evolution of Operational Technology Systems Management (OTSM) (PR Newswire) Verve Industrial Protection, the global leader in operational technology (OT) cybersecurity, today announced the release ...
Someone’s listening: The real reasons you need to encrypt your calls and texts | WTOP (WTOP) This content is sponsored by Blackberry In the movies, it’s easy: the federal agent answers his phone and receives a tip, then calls his wife and apologizes for missing dinner, then dials his boss and…
ZNet Technologies signs distribution agreement with GlobalSign for PKI solutions (CRN - India) ZNet Technologies (a subsidiary of RP tech India) has announced that it has entered into IT security services distribution business by joining hands with GMO GlobalSign. GlobalSign is a leading provider of trusted identity and security solutions for the enterprises and one of the longest established Certificate Authority (CA) in the world. Becoming a distributor …
Phishing Wand soll Mitarbeiter für Cybergefahren sensibilisieren Fertigungsindustrie im Visier der Cyberkriminellen (Computerwelt) Ein neues Feature für die Businesslösungen von G Data überwacht den Umgang von Mitarbeitern mit Cybergefahren und zeigt, wer noch Nachholbedarf hat.
Technologies, Techniques, and Standards
Hackathons and Cash for Hackers: What the AV Industry Needs - Commercial Integrator (Commercial Integrator) AV, IoT and automation manufacturers need to better understand zero-day vulnerability. Trade show hackathons and cash for hackers should be considered.
How military hacking can improve (Fifth Domain) An Australian official details an offensive cyber operation undertaken against the Islamic State.
The Navy Is Assembling a Hacker Team to Fight Off Small Drones (Defense One) Engineers, researchers, and hackers will seek ways to protect warships and bases from hobby-type drones modified to kill.
How the Army will sustain its tactical network of the future (C4ISRNET) The rapid insertion of commercial off-the-shelf systems looks to revolutionize the Army's next-generation tactical network, but it also brings challenges for the sustainment community.
Design and Innovation
It's Time to Yap! Yappa Debuts First Audio/Video Social Commenting Tool to Encourage Less Toxic Online Interactions (PR Newswire) Toxic commentary, online bullying and anonymous web trolling may no longer be the plague that discourages ...
Google's AI Ethics Council faces staff opposition over Heritage Foundation member (Computing) 'Googlers Against Transphobia' demand removal of Heritage Foundation president from Google's newly established AI Ethics Council
Research and Development
Peter Cochrane: Quantum computing - a return to analogue computers? (Computing) Quantum computers are neither stable enough nor powerful enough to achieve very much at all at the moment, warns Professor Peter Cochrane
Legislation, Policy, and Regulation
Analysis | The Cybersecurity 202: This is Washington's Plan B as Huawei poised to gain major stake in 5G networks (Washington Post) Government seeks ways to work around "technology that we can't trust."
Politicians mistakenly vote the wrong way in controversial internet law (Naked Security) Members of the European Parliament appear to have materially affected the future of the internet by mistakenly voting the wrong way.
Zuckerberg’s call to regulate Facebook explained (Silicon Valley Business Journal) In an op-ed over the weekend, Facebook CEO Mark Zuckerberg laid out a case for how he believes his company should be treated and discussed four policy areas which he said the government should focus attention on. Here’s an annotated analysis of Zuckerberg’s post and what he is seeking to do with each area.
Don’t fall for Mark Zuckerberg’s talk about regulation (Times) The hermit of Knightsbridge, otherwise known as Julian Assange, has a great analogy for state intervention in cyberspace. “It’s like having a tank in your bedroom,” he once wrote. Which is a...
Big Tech vs Congress: the issues Facebook, Google and Amazon lobby most (VPNMentor) Detailed analysis of the $500m Big Tech have spent lobbying the US government. Discover which issues matter most to Amazon, Apple, Facebook, Google and Microsoft.
Trump’s next Secretary of Defense needs to have these 10 things (Fox News) The increasing complexity of the national security landscape, coupled with the readiness challenge that still remains, underscores that the appointment of the right Secretary of Defense will be President Trump’s most important appointment for the remainder of his first term.
Litigation, Investigation, and Law Enforcement
Prosecutors Launch Investigation Into Company That Put Malware on Google Play Store (Motherboard) Italian government authorities have launched an inquiry into eSurv, a company that made spyware apps that it concealed as legitimate and innocuous-looking apps on the Google Play Store.
Investigator Says Amazon Chief's Phone Hacked by Saudis (SecurityWeek) The investigator hired to look into the release of intimate images of Jeff Bezos said he has concluded that Saudi Arabian authorities hacked the Amazon chief's phone to access his personal data.
NSO Group Says It Didn’t Hack Jeff Bezos On Behalf of Saudi Arabia (Motherboard) Spyware Vendor Denies Hacking Jeff Bezos On Behalf of Saudi Arabia
Taibbi: On Russiagate and Our Refusal to Face Why Trump Won (Rolling Stone) Faulty coverage of Donald Trump’s 2016 campaign later made foreign espionage a more plausible explanation for his ascent to power
Lindsey Graham Reveals AG Bill Barr 'Pretty Upset' Over Hillary Investigation And What He May Do About It (Daily Wire) Senate Judiciary Committee Chairman Lindsey Graham (R-SC) revealed during an interview on Sunday that Attorney General William Barr is "pretty upset" over the way the criminal investigation into Hillary Clinton was handled and that he hopes "there's a special counsel appointed to look at DOJ corr
Here's Why I Didn't Fall For The Russia-Trump Conspiracy (The Federalist) Media outlets regurgitated leaks from politicized intelligence officials to fuel the Russia-Trump conspiracy. They should have been far more skeptical.
Trump team overruled 25 clearance denials, official says (AP NEWS) A career official in the White House security office says dozens of people in President Donald Trump's administration were granted security clearances despite "disqualifying...
Audit of the Federal Bureau of Investigation's Cyber Victim Notification Process (Office of the Inspector General U.S. Department of Justice) The objective of this audit was to evaruata the Federal Bureau of Invastrgatlon's (FBI) processueand practices for notifying and engaging with victims of cyber Intrusions. Speclftcally, we examined the FBI's adherence to Executive Order 13636, Improving crttlcal Infrastructure Cybersecurlty, and the FBI Cyber Dlvlston Policy Guida 0853PG as well as other related polldes.
HP CEO Leo Apotheker didn't even read Autonomy's accounts before acquisition (Computing) Apotheker claims he didn't have time to read Autonomy's accounts prior to $11bn acquisition
Opinion | New York Launches a Cybercrime Brigade (Wall Street Journal) A new citywide initiative aims to coordinate digital law-enforcement efforts.