Cyber Attacks, Threats, and Vulnerabilities
Attack On Iran’s Natanz Nuclear Facility Not A Cyber Attack, But A Bomb Blast – Reports (EurAsian Times) The recent explosion at Natanz nuclear facility in Iran has set back its nuclear program by more than a year. Natanz nuclear facility was used for enriching uranium and was vital to Iran’s nuclear program and its destruction is being viewed as a major setback for Tehran. India or China: Whom Did Israel Support During […]
Experts: Natanz explosion set back Iran’s nuclear program by more than a year (Haaretz) It's unclear if the explosion and other incidents that occurred in Iran over the past week were connected, but there is pressure mounting on Iran to respond. In the meantime, Israel is keeping quiet on whether it was responsible
Mexico’s Central Bank Thwarts Cyber Attack on Its Website (Bloomberg Law) Mexico’s central bank said it thwarted a cyberattack on its website Tuesday, although its web page had intermittent service for half an hour.
EDP Renewables North America Discloses Data Breach (SecurityWeek) EDP Renewables North America has admitted that a recent cyberattack aimed at its parent company, which involved ransomware, also resulted in hackers accessing its own systems
15 Billion Credentials Currently Up for Grabs on Hacker Forums (Threatpost) Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web.
FBI reports on spike in fraudulent unemployment claims involving stolen identities (Augusta Free Press) The FBI has seen a spike in fraudulent unemployment insurance claims complaints involving the use of stolen personally identifiable information (PII).
Google removes 25 apps from Play Store for allegedly stealing users’ Facebook data (The Financial Express) Google pulled the apps earlier this month, after checking the results of the French security company. Many of the applications had been on the Play Store for more than a year before being dropped.
MongoDB is subject to continual attacks when exposed to the internet (Help Net Security) REsearchers planted honeypots to find out how MongoDB attacks happen, where the threats are coming from, and how fast it takes place.
ThiefQuest ransomware found to be hiding a keylogger and more (htxt.africa) While ThiefQuest will still encrypt your data, there are a few concerning features of the malware researchers have uncovered.
Fake emails about fake money from a fake COVID-19 fund (The Herald-Dispatch) The Federal Trade Commission (FTC) is warning of a phishing scheme where the con artists are pretending to be government officials and in this case, the FTC.
Home security cameras can tell burglars when you're not in (CNN) Some popular home security cameras could allow would-be burglars to work out when you've left the building, according to a study published Monday.
Today is the Day I have Dreaded for the Last 5 Years (Medium) September 2015 is when it all started. At the time I was working at PhishMe (now Cofense), and our CFO received a shady looking email…
Knoxville, TN data published online after ransomware attack (Smart Cities Dive) Hackers published information and data in a bid to extract a ransom payment and "shame victims," a city spokeswoman told Smart Cities Dive.
Grundfos CIM 500 (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Grundfos Pumps Corporation
Equipment: CIM 500
Vulnerabilities: Missing Authentication for Critical Function, Unprotected Storage of Credentials
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow access to cleartext credential data.
Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L and FX Series CPU Modules (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Mitsubishi Electric
Equipment: MELSEC
Vulnerability: Cleartext Transmission of Sensitive Information
2.
Mitsubishi Electric GOT2000 Series (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Mitsubishi Electric
Equipment: GOT2000 Series
Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, Resource Management Errors
Treck TCP/IP Stack (Update C) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely
Vendor: Treck Inc.
Equipment: TCP/IP
Vulnerabilities: Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or Wraparound, Improper Null Termination, Improper Access Control
CISA is aware of a public report, known as “Ripple20” that details vulnerabilities found in the Treck TCP/IP stack. CISA is issuing this advisory to provide early notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
How to tell the difference between legitimate contact tracers and scammers (ABC11 Raleigh-Durham) Scammers are taking advantage of the COVID-19 pandemic by posing as contact tracers.
Security Patches, Mitigations, and Software Updates
New round of bugs found in Citrix software, but this time a patch is ready (CyberScoop) On Tuesday, Citrix revealed 11 new vulnerabilities in its cloud-based and remote access products, ADC and NetScaler.
Citrix tells everyone not to worry too much over its latest security patches. NSA's former top hacker disagrees (Register) Eleven flaws cleaned up including one that may be exploited to sling malware downloads
Mozilla turns off “Firefox Send” following malware abuse reports (Naked Security) Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks.
Brace Yourself for the July 14th Fujiwhara Vulnerability Effect (RBS) 2020 hasn’t exactly been a walk in the park for security teams around the world, and things are about to get even more challenging. On July 14th, IT organizations around the world will face the Vulnerability Fujiwhara Effect for the third (and thankfully final) time this year.
The Fujiwhara Effec
Cyber Trends
Bitglass 2020 BYOD Report: Increased Remote Work Drives BYOD, but Security is Not Keeping Pace (BusinessWire) Bitglass, the Total Cloud Security company, has released its 2020 BYOD Report, which analyzes enterprise use of bring your own device (BYOD) as well a
M&D Report (Sikich LLP) M&D Report 2019 Sikich’s fifth Manufacturing & Distribution survey was recently completed—and the results are in. transformingfor tomorrow Download the report findings Summary Automation most companies reported employing automation, although only approximately one-third or fewer use automation extensively the future 27% of executives expect a U.S. Recession within the next 12 months cyber security half […]
Physical stress to phishing: Real challenges of virtual gaming and how to counter them (Firstpost) The rapidly-growing Esports industry has its own issues that manifest in the form of various risks associated with online gaming. Here's a look at some with their possible remedies.
Marketplace
Tech Startups Hemorrhaging Jobs During Pandemic (Channel Futures) A new BuyShares report shows tech startups have been heavily impacted by the COVID-19 pandemic, with more than 69,000 workers losing their jobs.
Thoma Bravo acquires Exostar (PE Hub) Thoma Bravo has acquired Exostar LLC, a provider of secure business collaboration solutions.
QOMPLX announces plans for US insurance subsidiary RubiQon Risk/RubiQon Re (PR Newswire) QOMPLX™, an intelligent decision platform provider, today announced the launch of a US-based subsidiary Managing General Agency RubiQon Risk &...
US Tech Giant Palantir Files to Go Public (Voice of America) Silicon Valley startup Palantir Technologies announced Monday it had confidentially filed with the Securities and Exchange Commission to go public, creating one of the most valued and anticipated public listings of a technology company since Uber’s initial public offering in 2019.
As Palantir preps IPO, a look back at its growth history (TechCrunch) Yesterday evening Palantir, the quasi-secretive data mining and analysis firm, publicly announced that it has privately filed to go public. The disclosure came in the wake of Palantir raising new capital, taking on hundreds of millions of dollars before its planned public offering. According to Cru…
Snow Software Surpasses $100 Million in Annual Recurring Revenue (BusinessWire) Snow Software surpassed $100 million in annual recurring revenue, fueled by skyrocketing cloud adoption and need to optimize IT budgets.
Forescout Technologies Announces Preliminary Second Quarter 2020 Revenue (GlobeNewswire) Total Revenue expected to be in the range of $78 - $82 million, up 40% quarter-over-quarter at the midpoint of range
How to Invest in Cybersecurity (Morningstar UK) The threat of cyber-attacks on companies and individuals has ramped up exponentially in recent years. That's good news for the businesses promising to provide protection
Companies Boycotting Facebook Continue to Advertise on Russian Social Media Platform (Washington Free Beacon) Advertisers that are now boycotting Facebook to protest “hate speech” have spent years running ads and marketing campaigns on a Russian social media platform that bans gay rights groups and is known as a haven for white supremacists.
Beyond Identity Joins FIDO Alliance (Beyond Identity) Passwordless Identity Management Pioneer to Help Advance the Alliance’s Mission of Strengthening Authentication by Eliminating Passwords
ClassNK joins maritime cyber risk management group MTS-ISAC (Marine Log) ClassNK has joined the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC). Set up in February this year, MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training and collaboration efforts
Wickr Awarded Multi Million Dollar U.S. Air Force Contract to Extend Secure Communication Services Across All Major Department of Defense Agencies (PR Newswire) Wickr, Inc., the secure collaboration platform known for its robust end-to-end encryption and the ability to securely operate on Zero Trust...
Researchers earn $2.5k bug bounty after exposing credentials in Iranian app Cafe Bazaar (The Daily Swig) SSRF vulnerability led to plain text information dump
Cato Doubles Down on the Channel with First Accreditation for SASE Technical Support and Expanded Leadership Team (Cato Networks) Anthony D’Angelo to serve as vice president of global channel sales and business development. New program accredits partners to deliver technical support services.
Qualys Appoints Ben Carr as Chief Information Security Officer (Security Boulevard) Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security and compliance
Gigamon promotes Larissa Crandall to Vice President of Worldwide Channels and Alliances (Help Net Security) Gigamon, provider of network visibility and analytics, announced the promotion of Larissa Crandall to Vice President of Worldwide Channels and Alliances.
Ronald Gembarosky joins LinQuest as Chief Security Officer (Security Magazine) LinQuest Corporation announced the appointment of Ronald Gembarosky as Senior Vice President, Chief Security Officer (CSO). Gembarosky was most recently served as CSO at Science Applications International Corporation (SAIC).
Parsons Hires Michael McKloskey as VP of BD for Cyber, Intel Market (WashingtonExec) Parsons Corp. has added Michael McKloskey as vice president of business development for the cyber and intelligence market. McKloskey joins from Booz Allen
Kasada Expands Advisory Board with Industry Luminaries (PR Newswire) Kasada, a leading web traffic integrity solution and services provider, today announced the appointment of three new members to the company's...
CUJO AI Appoints Jeremy Otis as General Counsel (WFMZ) CUJO AI, the global leader in the development and application of artificial intelligence to improve the security, control, and privacy of connected
Products, Services, and Solutions
iProov Provides Online Biometric Safeguarding for Intergenerational Mentoring Platform, bloomd (BusinessWire) iProov, world-leaders in spoof-resistant biometric authentication technology, is continuing to provide services free of charge to start-ups supporting
Bricata Partners with Elastic to Deliver Comprehensive Network Securit (PRWeb) Bricata, Inc., a leading provider of comprehensive network protection, today announced a technology partnership with Elastic, the company behind Elasticsearch
New F5 Solution Defends Customers’ Websites through Protection against Bots and Credential Stuffing (BusinessWire) F5 (NASDAQ: FFIV) today unveiled Silverline Shape Defense, a security solution that protects websites from the rising tide of fake internet traffic. W
Bitdefender GravityZoneAdds Human Risk Analytics to Bolster Defense Against User Error, Malice (Bitdefender) Bitdefender, a leading global cybersecurity company protecting over 500 million systems worldwide, is excited to announce Human Risk Analytics, an innovative addition to GravityZone that bolsters the weakest link in any organization’s defense – the human element.
Waterfall to Protect Israel's Largest Wastewater Treatment Plant (PR Newswire) Waterfall Security Solutions, the OT security company, today announced the successful deployment of its Unidirectional Security Gateways to...
Darktrace’s cybercrime warning over compromised devices as offices reopen (Cambridge Independent) The Cambridge company has extended its Enterprise Immune System to protect dynamic workforces.
Axio Announces Partnership with Archer to Provide Real-Time Visibility into Cyber Risk Management for Critical Infrastructure (BusinessWire) Axio, a leading cyber risk management Software-as-a-Service company, today announced a strategic partnership with cybersecurity consulting firm Archer
()
MobileIron Offers Complete Mobile Phishing Protection to Secure the Everywhere Enterprise | Mobileiron.com (MobileIron) MobileIron Threat Defense includes multi-vector threat detection and remediation to protect iOS and Android devices from phishing attacks waged at the device, network and application level
K2 Cyber Security Partners with GuardSight to Secure Critical Web Applications and Container Workloads (BusinessWire) K2 and GuardSight partner to secure customers' web applications and container workloads against sophisticated attacks, including OWASP Top 10
Technologies, Techniques, and Standards
Cyber Command will get a new version of its training platform this fall (C4ISRNET) The Persistent Cyber Training Environment is slated to deliver its second version to the cyber mission force by this fall.
Marine Corps activates new battalion to fight in cyberspace (Camp Lejeune Globe) An impactful change to Marine Corps cyberspace and information technology modernization occurred June 4 on Marine Corps Base Camp Pendleton, California, with the activation of 1st Network Battalion, which marked
Adopt These Video Conferencing Security Best Practices to Strengthen Your Digital Security (Security Intelligence) Video conferencing use spiked during COVID-19 due to remote work, but security risks were likely overlooked. Read why it's key to secure your video data.
Design and Innovation
Scrutiny is key to the success of digital immunity passports (Computing) Is the convenience of a digital coronavirus immunity document worth the privacy concerns and investment, asks Emma Wright of law firm Kemp Little
Hardware enclaves - the next frontier in enterprise application security (diginomica) Hardware enclaves - security's next big thing.
Research and Development
Ben-Gurion University researchers determine how to accurately pinpoint malicious drone operators (EurekAlert!) When tested in simulated drone paths, the model was able to predict the operator location with 78% accuracy. The next step in the project would be to repeat this experiment with data captured from real drones.
Academia
NSA designates Wright State center for cyber defense education (Dayton Daily News) Wright State University has won a federal designation as a go-to center for cyber defense education.
Legislation, Policy, and Regulation
China’s Second Wave of Coronavirus Censorship Is Here (Foreign Policy) After a brief period of praising whistleblowers, Beijing is targeting medical staff and COVID-19 victims again.
In Hong Kong National Security Law, Echoes of China's Own Cyber Crackdown (New York Times) Hong Kong's new National Security Law will shake up digital surveillance in the city, with strict new company compliance measures that echo the mainland's years-long crackdown on anti-government content.
China aims to dominate everything from 5G to AI (CNET) Generation China is a CNET series looking at how the country is staking out positions in the biggest areas of tech with players like Huawei and ByteDance's TikTok.
FBI director says China aims to become "world's only superpower" (Axios) China's increasingly aggressive behavior is ringing alarm bells in the U.S.
()
FBI Opens a New China-Related Counterintelligence Investigation Every 10 Hours, Director Says (Nextgov.com) China is ramping up illegal activity to subvert the U.S. during the pandemic, according to FBI Director Chris Wray.
France Begins to Sideline Huawei from its Mobile Networks (Bloomberg) Cyber security agency to impose timed waivers on mobile gear. Measure seen cutting Huawei market share to as little as 13%.
Huawei says U.S. pressure on Brazil threatens long delays in 5G rollout (Reuters) A Huawei Technologies executive warned that Brazil could suffer years of delay in deploying a 5G telecoms network and higher costs if it succumbs to mounting U.S. pressure to snub the Chinese equipment supplier.
Huawei is in Trouble in the United States (Security Today) It’s no secret that Huawei is in trouble because of U.S. sanctions. The Chinese tech company's access to vital American technology is at greater risk than ever before.
India's TikTok Ban Dispels the Myth of the 'China Bogeyman' (Wired) Mark Zuckerberg and US tech giants argue that regulation will allow China to dominate. But in reality, the global market rejects unregulated, invasive tech.
Hamdan bin Mohammed launches the Dubai Cyber Index (Gulf News) The Index will support government efforts to ensure a safe cyberspace
Securing Industrial Control Systems (CISA) The Cybersecurity and Infrastructure Security Agency Industrial Control Systems (ICS) strategy, Securing Industrial Control Systems: A Unified Initiative, is a multi-year, focused approach to improve CISA’s ability to anticipate, prioritize, and manage national-level ICS risk. Through this “One CISA” initiative, CISA will work with critical infrastructure (CI) owners and operators to build ICS security capabilities that directly empower ICS stakeholders to secure their operations against ICS threats.
DHS’s cyber wing pledges to invest more in industrial control systems security (CyberScoop) DHS's cybersecurity division, CISA, unveiled a strategy Tuesday to help protect industrial control systems from being hacked.
()
Kinda sorta weakened version of EARN IT Act creeps closer (Naked Security) Critics say the amended bill that’s headed for a full Senate hearing still threatens encryption, albeit less blatantly.
Cybersecurity Experts Take Aim at Senators Over Encryption (Wall Street Journal) The Lawful Access to Encrypted Data Act, unveiled last month by three Republican senators, is intended to help authorities track criminals using their communications. But cybersecurity professionals warn it could further imperil organizations across health care, finance and other industries that have shifted to remote work during the coronavirus pandemic.
House's DHS funding bill would create public-private cyber center (FCW) The legislation would give $2.25 billion to DHS' cyber wing and set up an integrated cybersecurity center with other agencies, state and local governments and private industry.
House Democrats include $500M for election security in annual appropriations bill (TheHill) Democrats on a House Appropriations Committee panel included $500 million to boost election security as part of their version of an annual funding bill introduced Tuesday.
Litigation, Investigation, and Law Enforcement
Exclusive: U.S. probing allegations TikTok violated children's privacy - sources (Reuters) The Federal Trade Commission and the U.S. Justice Department are looking into allegations that popular app TikTok failed to live up to a 2019 agreement aimed at protecting children's privacy, according to two people interviewed by the agencies.
Russia Arrests Space Agency Official, Accusing Him of Treason (New York Times) The detention of Ivan Safronov, a former journalist who had been working as an adviser at Roscosmos, took many by surprise. He was accused of passing secrets to an unnamed NATO country.
Lawmakers paralyzed over response to Russian bounty intel (POLITICO) Trump has called initial reporting on the bounties a hoax.
Microsoft takes down domains used in COVID-19-related cybercrime (BleepingComputer) Microsoft took control of domains used by cybercriminals as part of the infrastructure needed to launch phishing attacks designed to exploit vulnerabilities and public fear resulting from the COVID-19 pandemic.
Microsoft takes legal action against COVID-19-related cybercrime - Microsoft on the Issues (Microsoft on the Issues) Today, a U.S. court unsealed detaiils of Microsoft’s work disrupting cybercriminals that were taking advantage of the COVID-19 pandemic in an attempt to defraud customers around the world. Our civil case has resulted in a court order allowing Microsoft to seize control of key domains so they can no longer be used to execute cyberattacks.
Fxmsp hacker indicted by feds for selling backdoor access to hundreds of companies (ZDNet) Backdoors into government networks and corporations were allegedly sold to other criminal enterprises.
Judge in trial of alleged LinkedIn hacker Yevgeniy Nikulin questions evidence (CyberScoop) Judge William Alsup doesn't seem convinced that the government had proved its case against the alleged Russian hacker, who is on trial for a LinkedIn hack.
Alsup Slams Feds' 'Stunts' In Trial Of Alleged Russian Hacker (Law360) U.S. District Judge William Alsup criticized a prosecutor Tuesday for presenting "obviously prejudicial" jailhouse phone records instead of "real evidence" against a Russian national on trial in California for allegedly hacking into LinkedIn and Dropbox, saying, "You may end up losing this case because of stunts like that."
Maine Fends Off Challenge Against Internet Privacy Law (Law360) Maine notched a significant victory Tuesday after a federal judge rejected internet service providers' bid to overturn the state's new landmark online privacy statute on First Amendment grounds and ruled that the law limiting the use of customers' personal data is not preempted by federal law.
Trend Micro Defends Patent Office Win Before Federal Circuit (Bloomberg Law) Trend Micro Inc. told the Federal Circuit on Tuesday an internet security technology patent it had been accused of infringing was properly invalidated.
Police Are Buying Access to Hacked Website Data (Vice) The sale is “an end-run around the usual legal processes.”
Another Former eBay Worker Is Accused of Cyberstalking (Wall Street Journal) A retired police captain who oversaw security at eBay’s European and Asian offices has been charged in a cyberstalking campaign that targeted a couple whom eBay executives viewed as critical of the company.
Morocco to prosecute journalist for 'drunkenness, insults' (Macau Business) Moroccan authorities released a journalist detained for drinking in public but said he will still be prosecuted, his lawyer announced