We continue our coverage of last week’s Global Cyber Innovation Summit with two pieces, linked below. One describes the symposiasts’ views on two families of emerging technologies: quantum computing and artificial intelligence. And we also have an account of seven of the companies selected as the Disrupt 8. (The eighth one was equally interesting, but their presentation was off the record.)
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
There's been another exposure of Iranian hacking operations. Last month an unknown actor going by "Lab Dookhtegam" dumped code and other information belonging to the OilRig APT. This week another actor, perhaps independently, but more probably acting in coordination with the earlier leakers, dropped information via Telegram and various websites that describe other Iranian cyber operations.
This new group calls itself, ZDNet says, the "Green Leakers." The material released includes information on other Iranian cyber operators, specifically the MuddyWater APT and the Rana Institute. The latter has not hitherto been connected to Iranian hacking operations. This material doesn't, as the earlier leaks did, include source code, but it does contain screen shots and some information about the threat actors and their victims.
According to TechCrunch, Samsung engineers inadvertently exposed code from sensitive internal projects on GitLab.
Bloomberg reports that Amazon has filed a suit in a British court seeking redress for hacking that compromised about a hundred seller accounts, diverting funds from loans and sales to the hackers' accounts.
The US Justice Department has indicted two Israeli nationals on charges connected with operating the DeepDotWeb, a general directory that linked prospective buyers with dark web sites dealing in contraband, some of it lethal.
Clippy, the irritating anthropomorphic paperclip that cumbered Microsoft products in the 1990s, is back in an undead form. But it's proof-of-concept from Dutch cybersecurity consultancy Outflank, so no harm, no foul. Evil Clippy uses VBA stomping to prevent most antivirus tools from detecting the macros it's compromised.
Today's issue includes events affecting Canada, China, European Union, India, Iran, Ireland, Israel, Macedonia, Montenegro, Russia, Singapore, Ukraine, United Kingdom, and United States.
Bring your own context.
"Coordinated inauthenticity," Facebook calls it. It's how information operators use bots in social media to go after human opinion. If you wanted to tell the bots from the authentic people, what might you do?
"It requires that, if you see something clickbaity and exciting, that you actually check other sources to see if it's true. Look at the account itself. Look at when it was created. Look out for signs that it looks a bit suspicious, like having published tens of thousands of tweets. Or scroll down its timeline. See if it's all just retweets. There are lots of ways of just eyeballing an account and sort of getting an idea of how valid it is, how real it is. And the problem is that a vast majority of the accounts you'll find on the platform are a little bit dodgy looking." Andy Patel, from F-Secure, on Hacking Humans, 5.2.19.
Dodgy is as dodgy does. And practiced eyes get good at recognizing bots.
By now, we are all too aware of the consequences of a data breach: brand damage, loss of customer confidence, potentially costly litigation, regulatory fines, and more. But most organizations aren’t as familiar with how to prevent these attacks. This guide highlights 11 data security best practices to minimize risk and protect your data.
In today's podcast, out later this afternoon, we hear from our partners at Accenture, as Justin Harvey provides an overview of cyber insurance. Our guest, Mariah Kenny, was captain of the University of Virginia's winning team at the Raytheon-sponsored National Collegiate Cyber Defense Competition (NCCDC). She discusses the competition and the work that led up to it.
Hacking Humans is also up. In this episode, Joe describes a church scammed out of millions of dollars. Dave shares good news about a group of scammers being apprehended and arrested. The catch of the day involves a Vietnamese investment offer that's almost too good to pass up on. Finally, Dave speaks with Dr. Richard Ford from Forcepoint about the models of trust.
And some of our correspondents are down in Florida this week for KB4-Con. Stand by for notes in our social media channels (Twitter, Instagram, or Facebook), and for special editions of Hacking Humans.