Our new subscription program, CyberWire Pro, will be available in less than three weeks. Designed for cyber security professionals and others who want to stay abreast of our rapidly evolving industry, CyberWire Pro is a premium news service that will save you time and keep you informed. Learn more and sign up to get launch updates here.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
US jitters about the possibility of Iranian cyberattacks persist. While many of the warnings (and Space Daily has a useful collection) are founded largely on a priori probability, Cyberint reminds all that Iran does have a track record in cyberspace. During heightened periods of tension misdirection is often successful, and Fortune cites experts who caution against jumping to conclusions: false flags are always a possibility, and Russia has flown an Iranian false flag in the past.
Reuters reports that Ukrainian authorities have asked for FBI assistance in investigating the alleged Burisma hack and related matters. The news service also says US President Trump may raise the Burisma affair with Russian President Putin.
A report by the Federal Reserve Bank of New York concludes that a cyber attack on a small number of banks could propagate rapidly through the US financial system through the wholesale payments network. It's not necessarily that the malware itself would spread, but rather the way an attack's effects would be amplified by practices like liquidity hoarding, creating a virtual run-on-the-bank. The Fed glumly calls the study a "pre-mortem analysis," which seems more pessimistic than alternatives like "assessment," "diagnosis," or "prognosis."
US authorities have seized WeLeakInfo's domain as part of an international law enforcement operation against the online souk that dealt in compromised credentials. Two men associated with WeLeakInfo have been arrested, according to Computing and others: one in Northern Ireland, the other in the Netherlands.
Bravo, Bitdefender: the company has released a decryptor for Paradise ransomware.
Today's issue includes events affecting China, Estonia, European Union, Germany, Iran, Ireland, Israel, Italy, Netherlands, Russia, Ukraine, United Kingdom, United States
Bring your own context.
Hey, we hear that some people are just whistling past the privacy graveyard. What's up with that?
"One-third is just winging it - stone-cold crazy, doing nothing. I've got nothing to hide. And I'm praying to God I'm not going to get any sort of fine or legislation against me. So those guys I kind of discount because you really can't help them out of the well, right? You can help their customers educate themselves to protect themselves as much as possible. But you really don't know. There are hospitals out there with no privacy program. So it's hard to say who's who in the zoo. So that's the one that's kind of - it doesn't keep me up at night because I would never sleep. But I ignore that bunch."
—Michelle Dennedy, CEO of DrumWave, on the CyberWire's Caveat podcast, 1.15.20.
The other two-thirds are a mix of people concerned about compliance, of the worried but unsure, of the knowledgeable but underfunded, and so on.
And a quick note to our readers...
Monday is Martin Luther King Jr. Day, and we'll take a break from publication and podcasting while we observe the Federal holiday. We'll be back to our usual schedule on Tuesday.
Looking to advance your cybersecurity career? Check out Georgetown University's graduate program in Cybersecurity Risk Management. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. You'll leave the program with the expertise you need to effectively manage risks and navigate today’s increasingly complex cyber threats. Learn more.