Cyber Attacks, Threats, and Vulnerabilities
SectorB06 using Mongolian language in lure document (Threat Recon) SectorB06 is a state sponsored threat actor group active especially within Asia. They have been exploiting vulnerabilities in Microsoft Office’s Equation Editor which Microsoft removed in Jan…
Pompeo predicts Russia will be election threat for decades (TheHill) Secretary of State Mike Pompeo said Monday he expects Russia will try to interfere in U.S. elections for decades to come, describing Moscow as having long presented a threat to American elections — not just in 2016.
Isis leader Abu Bakr al‑Baghdadi calls for new attacks on the West (Times) The leader of Islamic State last night threatened a wave of attacks worldwide in revenge for the defeat of his militant group in its Iraq and Syria heartlands. Abu Bakr al-Baghdadi, 47, hailed the...
ISIS leader al-Baghdadi pictured for first time since 2014, intel group says (Fox News) Islamic State leader Abu Bakr al-Baghdadi was pictured in a new video for the first time since July 2014, SITE Intelligence Group said Monday.
Active Exploitation of Confluence Vulnerability CVE-2019-3396 Dropping Gandcrab Ransomware (Alert Logic) Alert Logic security researchers share details of active exploit of Confluence vulnerability being used to spread Gandcrab ransomware.
Microsoft Outlook Email Breach Targeted Cryptocurrency Users (Motherboard) Earlier this month, Motherboard revealed that contents of Microsoft's email services were compromised. Multiple victims now say that hackers stole their cryptocurrency.
Docker Hub Breach Can Have a Long Reach (Decipher) Docker revoked tokens linking GitHub and Bitbucket with Docker Hub accounts after discovering “unauthorized access” in its Hub database. Developers should check their code to ensure no unauthorized changes have been made.
Piracy streaming apps are stuffed with malware (Naked Security) Researchers have found that hackers are exploiting vulnerable piracy streaming devices to steal credit card data or rope them into botnets.
Unknown US security breach exposes data of 80 million households (Computing) Twenty-four gigabyte database includes full names, marital status, age and incomes
Mystery data breach reportedly exposes 80 million names, addresses, and income info in U.S. (PCWorld) A new data break has reportedly exposed personal data for up to 80 million U.S. households—and no one has any idea where it came from.
Report: Unknown Data Breach Exposes 80 Million US Households (vpnMentor) vpnMentor’s research team discovered a hack affecting 80 million American households. Known hacktivists Noam Rotem and Ran Locar discovered an unprotected ...
Electrum Wallet Botnet Infects 150,000 Machines, Steals $4.6 Million in User Funds - NullTX (NullTX) A botnet that has been targeting Electrum users just won’t quit. If anything, it seems to be picking up more hosts along the way and getting stronger. In the past month, the number of infected hosts has averaged 100,000. On April 24, the number went up to 152,000 according to a report by security firm …
Vodafone Found Hidden Backdoors in Huawei Equipment (Bloomberg) While the carrier says the issues found in 2011 and 2012 were resolved at the time, the revelation may further damage the reputation of a Chinese powerhouse.
Huawei denies existence of ‘backdoors’ in Vodafone networking equipment (ZDNet) The ‘hidden backdoors” reportedly could have been used to spy on Vodafone’s infrastructure. Huawei says otherwise.
Vulnerability in Tommy Hilfiger Japan DB Exposes Hundreds of Thousands of Customers to Data Theft (Safety Detective) Hacker-activists Noam Rotem and Ran L from Safety Detective’s research lab recently revealed a significant security breach in the Tommy Hilfiger Japan client database – leaving the private and personal details of hundreds of thousands of customers up for grabs.
Credential Stuffing Costs Firms $4m Each Year (Infosecurity Magazine) Credential Stuffing Costs Firms $4m Each Year. Akamai study finds companies suffer 11 attacks each month
UPDATE 1-Norsk Hydro expects cyber attack costs of nearly $52 mln... (Reuters) Norsk Hydro said the March cyber attack that paralysed its computer networks would cost the aluminium maker up to 450 million Norwegian crowns ($52 million) in the first quarter.
$1.75 Million Stolen by Crooks in Church BEC Attack (BleepingComputer) Hackers have stolen $1.75 million from the Saint Ambrose Catholic Parish following a successful BEC (Business Email Compromise) attack which was discovered on April 17 after payments related to the church's Vision 2020 project were not received by a contractor.
Consumer cryptomining has ‘gone the way of the dodo’, MalwareBytes (Yahoo) Consumer cryptomining – aka cryptojacking – “is essentially extinct,” according to a report released by cybersecurity company MalwareBytes. “Marked by the popular drive-by mining company CoinHive shutting down operations in early March, consumer cryptomining seems to have gone the way of the dodo. Detections
Vulnerability Summary for the Week of April 22, 2019 (US-CERT) The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Cyber Trends
Synopsys Report Finds that Open Source Risk Management is Improving, but Still a Challenge for Most Organizations (PR Newswire) Synopsys, Inc. (Nasdaq: SNPS) today released the 2019 Open Source Security and Risk Analysis (OSSRA)...
Study Highlights Cloud Security Considerations as Hybrid Environments Add Complexity (Bricata) Enterprises are increasingly adopting the cloud, yet this is introducing new challenges including confusion about security responsibilities and the visibility necessary to protect both the cloud and hybrid environments.
Report: Nearly half of U.S.-based Employees Unfamiliar with California Consumer Privacy Act (CCPA) (MediaPRO) A lack of awareness of the looming California Consumer Privacy Act (CCPA) is just one finding of MediaPRO's 2019 Eye on Privacy Report.
2019 Eye on Privacy Report (MediaPRO) Our 2019 Eye on Privacy Report analyzes the knowledge and opinions of 1,000 U.S. employees on data privacy best practices and provides advice on building a risk-aware culture through privacy awareness training.
The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage (Help Net Security) Cyber security leaders are overwhelmed by a perfect storm of regulation, increased threats and technological complexity, reveals new research from Symantec.
Marketplace
What to Expect From F8 After Facebook's Very Bad Year (WIRED) Facebook's annual developer conference is Tuesday. Expect news on VR, privacy, and yet another promise to "do better."
Zuckerberg to explain how Facebook gets ‘privacy focused’ (Washington Post) Facebook is kicking off its annual conference for developers on Tuesday with a keynote from CEO Mark Zuckerberg expected to share more details about his new, “privacy-focused” vision for the social network.
Google Shows First Cracks in Years (Wall Street Journal) Google’s once-untouchable online-advertising operation took a body blow, hurt by mounting competition and struggles within its increasingly high-profile YouTube unit.
Products, Services, and Solutions
Waratek Sets New Standard in Enterprise Application Security (Waratek) Announcing the ARMR Security Management Platform and Next Generation Web Application Firewall as well as a slate of new partners
Blue Cedar Accelerates Adoption of Secure BlackBerry Apps with its No-Code Mobile App Security Integration Platform (Yahoo) Blue Cedar, the company that provides rapid, no-code mobile app security integration to enterprises & ISVs, today announced the Blue Cedar Accelerator for BlackBerry, which enables organizations to quickly, easily and continuously integrate the BlackBerry
Votiro Partners with Box to Prevent Content-Based Attacks and Zero-Day Exploits (BusinessWire) Votiro announces its partnership with Box to bring secure, centralized and cloud-native content services to organizations worldwide.
‘Reputation’ Update from NetMotion: A Huge Boost for the Security and Productivity of Mobile Workers (AP NEWS) NetMotion ® Software, the leader in mobile enterprise productivity solutions, today announced NetMotion Reputation, a new subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains.
Mocana and RTI Partner to Deliver Connectivity Solutions for Mission-Critical Industrial IoT Systems (West) Integration of Mocana IoT Device Security Platform and RTI Connext® Databus Provides the Performance and Security for the Most Demanding Industrial Systems
BioCatch Digital Identity Solution Based on AI-Driven Behavioral Biometrics Now Available on ForgeRock Marketplace (Yahoo) BioCatch, the global leader in AI-driven behavioral biometrics, announced today at the annual ForgeRock Identity Summit Americas that its behavioral biometrics-based digital identity solution is now available on the ForgeRock Marketplace. Combining BioCatch’s industry-leading solution with ForgeRock
CUJO AI Partners with Avira to Optimize and Provide Premium Security for Network Operators Worldwide (PR Newswire) CUJO AI, a network intelligence company that provides AI-driven protection and device management...
Trustwave Brings Powerful Database Security Scanning and Testing to the Cloud (Yahoo) New Software Addresses Sophisticated Threats, User Access Control Issues and Increasing Regulatory Challenges Surrounding Data Security in the Cloud
Secureworks Goes Beyond Managed Services With New Analytics Tool (CRN) Secureworks has launched its first product that can be procured outside a managed services bundle to help more mature enterprises detect and respond to threats.
Technologies, Techniques, and Standards
NIST tool boosts chances of finding dangerous software flaws (Naked Security) NIST thinks it has reached an important milestone in complex software testing with something called Combinatorial Coverage Measurement (CCM).
FedEx CIO Looks to Industry Collaboration to Scale Blockchain (Wall Street Journal) Blockchain is expected within a few years to become an “inevitable and essential” tool in tracking goods and reducing fraud in the supply chain, said FedEx’s CIO—but collaboration will be needed for the technology to really take off.
Why marketing teams are critical to successful cybersecurity efforts (TechRepublic) Marketers often focus on cybersecurity best practices after there is an incident, though experts say that needs to change to improve a company's chances of surviving a cyberattack.
3 Questions OEMs Should Ask About Cyber Security (Arilou) Trust and reliability in a cyber security solution are vital. What questions should OEMs be asking when assessing a solution? Ayal Lichtblau, VP of Sales at Arilou, answers the 3 most common questions.
Virus-hit boxship takes centre stage at Singapore cyber wargame (Hellenic Shipping News) A container ship whose power management system had been shut down by a long dormant virus was the focus of a UK maritime industry cyber wargame hosted during
Port of Los Angeles calls for Cyber Resilience Center (Supply Chain Dive) The center would help to improve information sharing between supply chain partners including the port, terminal operators and freight companies.
Design and Innovation
Okta: single sign-on and the future of identity (TechRadar) Is your digital identity secure?
Research and Development
Programmers solve MIT’s 20-year-old cryptographic puzzle
(MIT CSAIL) This week MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) announced that a 20-year-old cryptographic puzzle was just solved by a self-taught programmer from Belgium, 15 years earlier than MIT scientists expected.
Legislation, Policy, and Regulation
U.S. Would Rethink Intelligence Ties if Allies Use Huawei Technology (Wall Street Journal) The U.S. ratcheted up pressure on its European allies to ban Chinese-made gear from their telecom networks, asserting such equipment could be a shared national-security threat to the West and could compromise intelligence sharing.
Ditch Huawei or we may stop sharing intelligence, US warns (Times) The United States will review its intelligence sharing with Britain if Theresa May does not reverse her decision to allow Huawei’s equipment in the 5G network, a senior official warned. A State...
DFA denies warning gov't over partnering with Huawei (Philippine Star) In a supposed memo dated January 25, the DFA advised security agencies that the Czech Republic and France issued orders to limit the use of Huawei products.
Huawei 5G Bans Highlight Network Confusion (Light Reading) Muddled thinking about the core and the edge is shaping government policy toward Huawei in some parts of the world.
Analysis | The Cybersecurity 202: Here are the 55 things the U.S. government most needs to protect against cyberattacks (Washington Post) It's everything from electricity to elections and community health.
DHS critical functions list (Washington Post) National Critical Functions: The functions of government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
Rod Rosenstein, Face Of Russia Probe, To Step Down As Deputy Attorney General (NPR) The departure of the Justice Department's number two leader has been expected for months. Rosenstein has described himself as someone dealt a bad hand, one he played the best he could.
DOD Steps Up Supply Chain Security Programs for Smaller Contractors (FedTech) With tens of thousands of suppliers involved in the Pentagon supply chain, visibility is vital.
NSA's 'Russia Small Group' made permanent (CyberScoop) The “Russia Small Group” — whose existence NSA Director Paul Nakasone announced in July of last year — will thwart Russian influence and cyberattacks.
Litigation, Investigation, and Law Enforcement
China’s Tinder removed from app stores amid government crackdown (South China Morning Post) Tantan, owned by Beijing-based Momo, was suspended from multiple app stores in the country.
GE trade secret theft case demonstrates need for document behavior monitoring (Help Net Security) Behaviors such as suddenly downloading an unusually high number of documents, outside the scope of their daily work, are telltale signs.
Cryptocurrency giants in $850m fraud allegations (Naked Security) The New York Attorney General has accused major cryptocurrency exchange Bitfinex and cryptocurrency Tether of an $850m fraud.
Alleged Vault 7 leaker says he's been tortured and is owed $50 billion (CyberScoop) Joshua Schulte, a former CIA software engineer, said the government has caused him to lose more than $50 billion in a complaint filed in April 2019.
Cops need warrant for both location history and phone pinging, says judge (Naked Security) It’s one of the first location data privacy cases to grapple with the warrant and surveillance implications of the Carpenter decision.