Cyber Attacks, Threats, and Vulnerabilities
SEC Warning: Ransomware Targets Financial Networks (MSSP Alert) Cybercriminals increasingly use phishing & ransomware to attack financial institution networks, the U.S. Securities & Exchange Commission (SEC) reports.
Collabera hacked: IT staffing'n'services giant hit by ransomware, employee personal data stolen (Register) Crooks made off with everything needed for ID theft
Threat Alert: Attacker Building Malicious Images Directly on Your Host (Aqua Security) New attack exploits a misconfigured Docker API port to build and run a malicious container image on the host, rather than pull it from a public registry.
Wattpad data breach exposes account info for millions of users (BleepingComputer) An allegedly stolen Wattpad database containing 270 million records were being sold in private sales for over $100,000. Now it is being offered for free on hacker forums.
Report: No-Log VPNs Exposed Users’ Logs and Personal Details for All to See (vpnMentor) A group of free VPN (virtual private network) apps left their server completely open and accessible, exposing private user data for anyone to see. This lack of
RATicate malware gang goes commercial (Naked Security) O, what tangled code we weave, when first we practise to deceive!
Check Point unearths critical SigRed bug in Windows DNS (ComputerWeekly) SigRed vulnerability is highly dangerous, but is being fixed as part of the July 2020 Patch Tuesday update.
Media Industry Full of Credential Stuffing Attacks: Akamai | Akamai (Akamai) Twenty percent of credential stuffing attacks directed toward media companies according to
E-gift Card Bot Attacks - A Deep Dive (PerimeterX) E-gift card bot attacks - deep dive. Learn about tools and techniques that are used for these attacks, real attack examples, and how to protect from these attacks.
New Mirai Variant Surfaces with Exploits for 9 Vulnerabilities Products (Dark Reading) Impacted products include routers, IP cameras, DVRs, and smart TVs.
‘Name-and-shame’ ransomware attacks increasing in prevalence (ComputerWeekly) Since emerging at the tail-end of 2019, double extortion, or exfiltration and encryption, ransomware attacks have become highly popular, and now account for a significant number of incidents, according to Emsisoft research.
More Malware Found Hidden in Chinese Tax Software (Infosecurity Magazine) More Malware Found Hidden in Chinese Tax Software. Firms doing business in China urged to be on high alert
Chinese banks require clients to use tax programs laced with backdoors, report says (CyberScoop) A Chinese bank required a company to use a tax software for local tax purposes, but the software quietly deployed a backdoor, Trustwave researchers say.
Brazilian cybercriminals take the next generation of banking malware global (Finextra Research) Brazilian cybercriminals, long regarded as some of the most creative malware creators, have begun to take their original malicious programmes outside the country. According to Kaspersky researchers, four advanced banking families—Guildma, Javali, Melcoz and Grandoreiro—have begun targeting users in North America, Europe, and Latin America.
Advantech iView (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Advantech
Equipment: iView
Vulnerabilities: SQL Injection, Path Traversal, Command Injection, Improper Input Validation, Missing Authentication for Critical Function, Improper Access Control
2.
Moxa EDR-G902 and EDR-G903 Series Routers (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Moxa
Equipment: EDR-G902 and EDR-G903 Series Routers
Vulnerability: Stack-based Buffer Overflow
2. RISK EVALUATION
Successful exploitation of this vulnerability could crash the device being accessed; a buffer overflow condition may allow remote code execution.
Capsule Technologies SmartLinx Neuron 2 (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.6
ATTENTION: Low skill level to exploit/public exploits are available
Vendor: Capsule Technologies
Equipment: SmartLinx Neuron 2
Vulnerability: Protection Mechanism Failure
2. RISK EVALUATION
Successful exploitation of this vulnerability could provide an attacker with full control of a trusted device on a hospital’s internal network.
Baxter PrismaFlex and PrisMax (Update B) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.6
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Baxter
Equipment: PrismaFlex and PrisMax
Vulnerabilities: Cleartext Transmission of Sensitive Information, Improper Authentication, Use of Hard-Coded Password
2.
Treck TCP/IP Stack (Update D) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely
Vendor: Treck Inc.
Equipment: TCP/IP
Vulnerabilities: Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or Wraparound, Improper Null Termination, Improper Access Control
CISA is aware of a public report, known as “Ripple20” that details vulnerabilities found in the Treck TCP/IP stack. CISA is issuing this advisory to provide early notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
Siemens LOGO! Web Server (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: LOGO! Web Server
Vulnerability: Classic Buffer Overflow
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow remote code execution.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of LOGO! Web Server are affected:
Siemens Opcenter Execution Core (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 8.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: Opcenter Execution Core
Vulnerabilities: Cross-site Scripting, SQL Injection, Improper Access Control
2.
Siemens UMC Stack (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.7
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: UMC Stack
Vulnerabilities: Unquoted Search Path or Element, Uncontrolled Resource Consumption, Improper Input Validation
2.
Siemens SICAM MMU, SICAM T, and SICAM SGU (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SICAM MMU, SICAM T and SICAM SGU
Vulnerabilities: Out-of-bounds Read, Missing Authentication for Critical Function, Missing Encryption of Sensitive Data, Use of Password Hash with Insufficient Computational Effort, Cross-site Scripting, Classic Buffer Overflow, Basic XSS, Authentication Bypass by Capture-replay
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to affect the availability, read sensitive data, and gain remote code execution on the affected devices.
Siemens Industrial Products SNMP Vulnerabilities (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: Various SCALANCE, SIMATIC, SIPLUS products
Vulnerabilities: Data Processing Errors, NULL Pointer Dereference
2.
Siemens SIMATIC HMI Panels (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 5.7
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC HMI Panels
Vulnerability: Cleartext Transmission of Sensitive Information
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to access sensitive information under certain circumstances.
Siemens SIMATIC, SINAMICS (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.8
ATTENTION: Low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC, SINAMICS
Vulnerabilities: Uncontrolled Search Path Element, Heap-based Buffer Overflow
2. UPDATE INFORMATION
This updated advisory is a follow-up to the original advisory titled ICSA-20-161-05 Siemens SIMATIC, SINAMICS that was published June 9, 2020, on the ICS webpage on us-cert.gov.
Siemens SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.7
ATTENTION: Low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK
Vulnerability: Unquoted Search Path or Element
2.
Siemens SIMATIC PCS 7, SIMATIC WinCC, and SIMATIC NET PC (Update D) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC PCS 7, SIMATIC WinCC, SIMATIC NET PC
Vulnerability: Incorrect Calculation of Buffer Size
2.
Siemens SIMATIC S7-300 CPUs and SINUMERIK Controller over Profinet (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC S7-300 CPUs and SINUMERIK Controller over Profinet
Vulnerability: Uncontrolled Resource Consumption
2.
Siemens S7-1200 and S7-200 SMART CPUs (Update B) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.8
ATTENTION: Low skill level to exploit
Vendor: Siemens
Equipment: S7-1200 CPU family (including SIPLUS variants); S7-200 SMART CPU family
Vulnerability: Exposed Dangerous Method or Function
2.
Siemens SIMATIC S7-200 SMART CPU Family (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SIMATIC S7-200 SMART CPU family
Vulnerability: Uncontrolled Resource Consumption
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.
Siemens SCALANCE Products (Update A) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.6
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: SCALANCE Products
Vulnerabilities: Improper Adherence to Coding Standards
2. UPDATE INFORMATION
This updated advisory is a follow-up to the original advisory titled ICSA-19-227-03 Siemens SCALANCE Products that was published August 15, 2019, to the ICS webpage on us-cert.gov.
Siemens Industrial Products (Update O) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Remotely exploitable/low skill level to exploit
Vendor: Siemens
Equipment: Industrial Products
Vulnerability: Improper Input Validation
2. UPDATE INFORMATION
This updated advisory is a follow-up to the updated advisory titled ICSA-17-339-01 Siemens Industrial Products (Update N) published October 8, 2019, on the ICS webpage on us-cert.gov.
Siemens PROFINET Devices (Update F) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Siemens
Equipment: PROFINET Devices
Vulnerability: Uncontrolled Resource Consumption
2. UPDATE INFORMATION
This updated advisory is a follow-up to the advisory update titled ICSA-19-283-02 Siemens PROFINET Devices (Update E) that was published April 14, 2020, to the ICS webpage on us-cert.gov.
Siemens devices using the PROFINET Discovery and Configuration Protocol (Update Q) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.5
ATTENTION: Exploitable from an adjacent network/low skill level to exploit.
Vendor: Siemens
Equipment: Devices using the PROFINET Discovery and Configuration Protocol (DCP)
Vulnerabilities: Improper Input Validation
2.
Police investigation launched after possible hacking, data breach at Kiwi company (Newshub) "We are working to understand the scope of the hack and the potential impact of any security breaches."
Multiple fraud complaints filed after strange unemployment claims sent to Nevada companies (KTNV) Nevada's troubled unemployment benefit system is facing new concerns and criticism after multiple people are coming forward with letters that indicate unemployment benefits have been filed and paid for individuals who never filed for assistance.
()
Data breach at ambulance service (Kent Online) A server containing employees' medical details was accessible to other staff members during a data breach.
Newington Temple Endures Anti-Semitic ‘Zoom Bomb' During Online Service (NBC Connecticut) Pictures of swastikas and other anti-Semitic imagery flooded a Newington temple’s online service Friday. Right now, police are looking to find who created the disturbing, so-called “Zoom bomb” disruption during the Temple Sinai’s Shabbat. “They put up a caricature of the Jew with a big nose. It was just so upsetting,” said Temple Sinai Rabbi Jeffrey Bennett, describing just…
Online Troy meeting interrupted with profanity by hackers (Dayton Daily News) A Troy City Council work session being conducted via Zoom was interrupted briefly Monday by unidenti...
Malware of the Day - Fiesta (Active Countermeasures) What is Malware of the Day? Malware of the Day: FIESTA Lab Setup Malware: Fiesta AKA: Fiesta Exploit Kit, Fiesta EK. […]
Conspiracy Theory Extremism: When Viral Claims Turn Dangerous (Homeland Security Today) If Wayfair was brick-and-mortar, the conspiracy theory could put the retailer at the same risk as Comet Ping Pong.
Security Patches, Mitigations, and Software Updates
Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical! (BleepingComputer) Today is Microsoft's July 2020 Patch Tuesday, and if you see Windows administrators cursing for no reason, now you know why! With the July 2020 Patch Tuesday security updates release, Microsoft has released one advisory for a tampering vulnerability in IIS and fixes for 123 vulnerabilities in Microsoft products.
Microsoft issues patch for wormable Windows DNS Server flaw (CyberScoop) Microsoft is issuing a patch for a severe Windows DNS vulnerability that could allow attackers to gain control of targets' entire IT infrastructure.
‘Wormable’ Flaw Leads July Microsoft Patches (KrebsOnSecurity) Microsoft today released updates to plug a whopping 123 security holes in Windows and related software, including fixes for a critical, "wormable" flaw in Windows Server versions that Microsoft says is likely to be exploited soon. While this particular weakness mainly affects enterprises, July's care package from Redmond has a little something for everyone. So…
Zoom patches zero‑day flaw in Windows client (WeLiveSecurity) The Zoom videoconferencing platform has issued a patch for a zero-day flaw that exposed the platform’s users running Windows 7 and earlier versions to attacks.
Chrome 84 released with important security enhancements (BleepingComputer) Google has released Chrome 84 today, July 14th, 2020, to the Stable desktop channel, and it includes numerous security enhancements and new APIs for developers.
Adobe Discloses Critical Code-Execution Bugs in July Update (Threatpost) The software giant released patches for four critical vulnerabilities and five different platforms.
Rust programming language: Crates package API tokens revoked over serious security flaw (ZDNet) Rust's crates package API keys were not randomly generated and were being stored in plain text.
Nokia 7.2 is receiving July security patch now (Nokiamob) Users of the Nokia 7.2 around the globe started reporting that the July security patch is available for their devices. I can confirm that since the update is available for our 7.2.
Chinese developer fixes security flaw in smartwatch tracker SETracker app (Business Today) The software's source code was also found by the researchers to be accidentally made publicly available via a compiled node file hosted online as a backup without protection. Passwords, email, SMS, photos and credentials were available to view
Cyber Trends
GreatHorn Annual Survey Report, 2020 (GreatHorn) Email Impersonations Are Bombarding Inboxes, Targeting an Increasingly Distracted and Dispersed Workforce New research from GreatHorn details a sharp spike in the need for remediation, with over a third of respondents seeing email-based attacks land in their inbox on a daily basis
Email impersonations becoming pervasive, preying on a distracted and dispersed workforce (Help Net Security) Impersonations have become pervasive, and are by far the most prevalent type of email-based attack ending up in business’s inboxes.
Q2 2020 KnowBe4 Finds Coronavirus-Related Phishing Email Attacks Spike (Yahoo) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, revealed the results of its Q2 2020 top-clicked phishing report.
Fingerprints - Biometrics: How Changing Behaviors are Shaping Tomorrow’s Solutions (Fingerprints) Amid worldwide lockdowns and unprecedented social distancing measures, it’s safe to say the first half of 2020 has unfolded in an unexpected way.
VMware Releases Cybersecurity Threat Survey Report Detailing Increased Attack Volume and Breach Levels in the United States (BusinessWire) VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today released the results of its first U.S.-focused cybersecurity threat report
Kaspersky: Covid-19 has created a "perfect storm" for cybercriminals (Verdict) The Covid-19 pandemic has created a "perfect storm" for scammers and hackers, experts from cybersecurity company Kaspersky have warned.
Cybersecurity market generated 2x bigger revenue than TikTok in 2020, Q1 (Atlas VPN) The cybersecurity industry continues to grow, surpassing the most popular applications or services. According to data analyzed by Atlas VPN, the total…
Marketplace
AI Cyber Attack Prediction Platform CYR3CON Secures $8.2 Million in Financing (Security Boulevard) Pivotal Group and Trumpf Ventures lead significant investment in AI cybersecurity prediction platform Tempe, Ariz. (July 14, 2020) – CYR3CON, the highly
CYSEC SA raises 500'000 Swiss francs from FIT for its cybersecurity solution (Cysec Systems) CYSEC SA has developed a highly innovative cybersecurity risks mitigation solution which aims at making accessible cybersecurity to all organizations. CYSEC is a member of the Confidential Computing Consortium to which it expects to contribute with leadership and significant value through its cybersecurity expertise and experience.
Calian Grows Cyber Team with Acquisition of Boutique Emissions Security Consultancy (GlobeNewswire) Calian Group Ltd. (TSX: CGY) has acquired EMSEC Solutions Inc. (EMSEC), a boutique firm specializing in radio frequency (RF) emission security and technical surveillance countermeasures.
Forescout and Advent International Reach Amended Merger Agreement (GlobeNewswire) Forescout Shareholders to Receive $29.00 Per Share. Advent to Commence Tender Offer; Forescout Board Unanimously Recommends that all Shareholders Tender Their Shares in Support of the Transaction. Agreement Provides Immediate and Certain Value.
Jyoti Bansal's studio Big Labs launches Traceable with $20M from Unusual Ventures (Pitchbook) Jyoti Bansal unveiled Traceable, an app-security specialist that is the second company to come out of startup studio Big Labs, launched with $20 million in a Series A from Unusual Ventures.
Malwarebytes Reports Record Growth in Annual Recurring Revenue, Expanding Customer-Focused Product Portfolio in 2020 Fiscal Year (Malwarebytes) Leader in advanced endpoint protection & remediation solutions accelerates growth with cloud advancements, managed service partner engagement, new products, and industry integrations
CyberSeek™ Data Confirms the Ever-Present Need to Expand Cybersecurity Talent Pipeline (Comptia) New industry-specific information available in 2020 update of platform
New research shows US cybersecurity talent shortage (Security Magazine) New research released by Emsi reveals that the US has less than half of the cybersecurity candidates it needs to keep up with ever-intensifying demand. The research says the answer to this challenge is a Build (Don’t Buy) strategy.
Make $100,000/Year By Filling The Cyber Skills Gap (Forbes) The United States has less than half the cybersecurity candidates that it needs to handle increasing demand. Organizations should build, rather than buy, talent by cultivating what they already have within through increased educational and training opportunities.
Deloitte still hiring amid mass firing (Australian Financial Review) Even financially constrained organisations need to fill the roles they can't do without.
Google Steers Users to YouTube Over Rivals (Wall Street Journal) Facebook and other competitors host the same videos, but engineers have made changes that effectively preference YouTube—owned by Google—over other video sources. Journal tests show YouTube usually ends up first and takes most of the slots in Google Search video carousels, prime results real estate.
CyberProof Joins Microsoft Intelligent Security Association for Cyber Security Industry Leaders (PR Newswire) CyberProof Inc., a UST Global company, has become an official member of the Microsoft Intelligent Security Association – an organization of...
Exabeam Appoints Security Industry Veteran Adam Geller as Chief Product Officer (BusinessWire) Exabeam today announced the appointment of Adam Geller to chief product officer.
Security vendor Thycotic appoints new APAC channel chief (CRN Australia) Kris Hansen shifts from global role.
VMware Carbon Black Exec Jumps To Park Place Technologies (CRN) VMware Carbon Black security leader John Parlee joins Park Place Technologies as its new Chief Information Security Officer, CISO.
USMC IT Vet Allen Harper Appointed T-Rex Cybersecurity EVP (GovCon Wire) Allen Harper, a former U.S. Marine Corps information technology officer, has joined T-Rex Solutions
NortonLifeLock Completes New Leadership Team With Two Seasoned Consumer Tech Leaders (BusinessWire) NortonLifeLock (NASDAQ: NLOK), the global leader in consumer Cyber Safety, today announced the addition of Robert Clarkson, in the newly created role
Centrify Announces Flint Brenton as Chief Executive Officer (PRWeb) Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced the hiring of Flint Brenton as Chief Executive
Products, Services, and Solutions
NSS Labs Announces New Web Browser Security Test Results (PR Newswire) NSS Labs, Inc., a global leader and trusted source for independent cybersecurity product testing, today announced the results of its 2020 Web...
Offensive Security Expands Advanced Web Attacks and Exploitation Cybersecurity Training and Certification (BusinessWire) Offensive Security, the leading provider of online hands-on training and certification for information security professionals, today announced a signi
Free VPN Accounts for Digital Rights Activists (The TunnelBear Blog) TunnelBear has so far given away 20,000 free VPN accounts to digital rights defenders.
Portshift Strengthens Kubernetes Protection with K8SHIELD Framework an (PRWeb) Portshift, a leader in Kubernetes-native solutions, today announced the company's new K8SHIELD™ Framework and the introduction of context aware security pol
StorCentric’s Nexsan Launches Unity™ Third Generation 3300 and 7900 Enterprise-Class Unified Storage – The Industry’s Most Powerful Solution for Mixed Workloads (Nexsan) Unbreakable Backup Mitigates Ransomware Attacks While Data Migration and Cloud Connector Modules Streamline Unity Implementations
DefenTec Uses Keeper to Secure Its Clients’ Passwords & Generate Additional Revenue (Keeper Blog) At one time, the line between managed service providers (MSPs) and managed security service providers (MSSPs) was distinct. Businesses hired MSPs to keep their IT infrastructure up and running, and they hired MSSPs to keep their systems secure. However, as cyberattacks grew more frequent, costly, and complex, businesses began demanding …
Instructure | Bugcrowd (Bugcrowd) Learn why Instructure switched from traditional penetration testing to an on-demand bug bounty program for their Annual Security Audit.
McAfee Introduces Cloud-based SIEM Solution (MSSP Alert) McAfee releases Enterprise Security Manager (ESM) Cloud, a security information & event management (SIEM) solution to help organizations address cyberattacks.
Echosec Systems Launches Platform API for Threat Intelligence (PR Newswire) Echosec Systems has launched an API, providing direct access to previously unavailable data feeds from fringe social, deep, and dark web sources....
Thycotic Extends Secrets Management Reach to Kubernetes (Container Journal) Thycotic, a provider of privileged access management (PAM) platform, today announced its support for Kubernetes. The company currently provides two types
Vectra Expands Intelligent Response Capabilities (PR Newswire) Vectra AI, a leader in network threat detection and response (NDR), today announced expanded response capabilities for its flagship product,...
Fortinet Tackles Multi-Cloud Security, SD-WAN Challenges (Channel Partners) Fortinet unveiled Secure SD-WAN for Multi-Cloud, a networking and security solution that enables SD-WAN over multiple public cloud platforms.
Prevailion’s New Hacker Intelligence Service Provides Full Transparency on Undisclosed Corporate Breaches for Compliance and Auditing Professionals (BusinessWire) Prevailion launches new program for compliance industry, with exclusive intel on over 19,000 data breaches, many of which have never been disclosed.
Q6 Cyber and Coalition Partner to Revolutionize Cyber Insurance and Risk Management (Yahoo) Q6 Cyber, a leading provider of e-crime intelligence, and Coalition, a leading cyber insurance provider, announced that they have partnered to revolutionize cyber insurance and risk management. Q6 Cyber's proprietary threat intelligence – used to prevent fraud and cyber-attacks – will be utilized
NeoSystems and TIP Technologies Extend Partnership to Deliver Flexible SaaS Solutions to Meet Growing Enterprise Demand (PR Newswire) To meet the rapidly increasing demand for SaaS solutions, NeoSystems, a provider of managed strategic back office services, and TIP...
Digital Shadows launches validation for exposed credentials alerting, enabling organizations to find out instantly if breached login details are a current risk (PR Newswire) Digital Shadows, the leader in digital risk protection, has today announced new capabilities within its SearchLight™ solution to enable...
Technologies, Techniques, and Standards
The Cybersecurity 202: DNC’s email voting plan limits hacking risk but can’t eliminate it (Washington Post) The Democratic National Committee’s virtual convention next month will mark a major test for whether Internet-based voting can be done safely and securely.
Cyber Polygon looks at ways to forge a secure digital future (euronews) The outbreak of the Covid-19 pandemic caused an irrevocable shift in working practices around the globe. Companies were forced to rethink and restructure, creating new strategies to avoid disruption to their day-to-day interactions.
Remote working: This free tool tests how good your security really is (ZDNet) The NCSC's Exercise in a Box toolset has been updated to help organisations keep their employees safe while working from home.
Industrial Internet Consortium Track & Trace Testbed Helps Define New IIoT Standard from Object Management Group | Industrial Internet Consortium (Industrial Internet Consortium) IIoT standard reduces complexity of interpreting data from sensors.
Object Management Group Ratifies Simple Electronic Notation for Sensor Reporting Specification as OMG Standard | Object Management Group (Object Management Group) Press Release: Industrial Internet Consortium Track & Trace Testbed Helps Define New IIoT Standard from Object Management Group.
Improving Packet Capture Performance - 1 of 3 (Active Countermeasures) Intro Packet capture tools regularly have problems with performance. The three tasks of reading packets from network interfaces, doing any needed processing, and […]
()
Fidelis Cybersecurity on winning the cyber battle (TahawulTech) Rawad Darwich, regional sales manager, Fidelis Cybersecurity, discusses why it’s time to re-imagine the security stack.
Remote Work Is a Security Nightmare. How Do We Fix It? (Dice Insights) When organizations made the decision earlier this year that work-from-home was the new norm during the COVID-19 pandemic, it appears that many
Security Current Releases CISO-Authored Research Report on Third Party Risk Management (PR Newswire) Security Current announced today the release of its CISO-authored report, CISOs Investigate: Third Party Risk Management (TPRM). As part of the...
Design and Innovation
Michael Kratsios named Acting Under Secretary of Defense for Research and Engineering (Intelligence Community News) On July 13, Johns Hopkins Applied Physics Laboratory (APL) announced that APL and the Department of Homeland Security's Cybersecurity and Infrastructure
()
()
Research and Development
The ambitious plan to make Huawei equipment obsolete (The Telegraph) The Government is backing development of open-source software as a way to wean its networks off Huawei
Academia
KNOWBE4 to offer a scholarship for Black Americans pursuing cybersecurity careers (St Pete Catalyst) Clearwater-based security awareness training and simulated phishing platform KnowBe4 has partnered with the Center for Cyber Safety and Education to launch the KnowBe4 Scholarship for Black Americans in Cybersecurity. The International Consortium of Minority Cybersecurity Professionals reports that only 6 percent of African Americans work in STEM compared to an overall 11 Sept. 14, 2020. [...]
Google offers certificate courses to help Americans seek better jobs (The National) The company announces three online certificates, which will be treated on par with four-year degrees
Cyber Patriot is virtual and national this year (WJBF) Cyber Patriot camp started Monday in Augusta, but there are some changes this year. It’s online to allow the competition to expand. Middle and high school students…
Legislation, Policy, and Regulation
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks (Yahoo News) The Central Intelligence Agency has conducted a series of covert cyber operations against Iran and other targets since winning a secret victory in 2018 when President Trump signed what amounts to a sweeping authorization for such activities, according to former U.S. officials with direct knowledge of
China Is Done Biding Its Time (Foreign Affairs) The End of Beijing’s Foreign Policy Restraint?
China Is Deliberating the Data Security Law Draft (JD Supra) On 28 June 2020, a draft on the Data Security Law of China (“Draft DSL”) was tabled for discussion at the National People’s Congress (“NPC”) Standing...
India facing more cyber attacks from China and Pakistan since nationwide lockdown (The Economic Times) "Because of the pandemic, healthcare services and academia are the new spaces which are emerging as targets for malicious cyber actors, while the usual areas such as critical infrastructure, government, financial services, continue to be on their radar,” Bahl said.
Telecom department to review Huawei, ZTE participation in 5G trials: Report (ETTelecom.com) India’s 5G trials were first scheduled to take place earlier this year but got stuck on modalities such as pricing and trial tenure.
UK should face 'public and painful' retaliation over Huawei decision, Chinese state media urges (CNBC) The U.K. will ban operators from buying new Huawei 5G equipment after Dec. 31 and carriers will have to strip out existing 5G gear from the Chinese firm by the end of 2027.
UK bans Huawei from its 5G network: reaction (Reuters) Prime Minister Boris Johnson has ordered Huawei equipment to be purged completely from Britain's 5G network by 2027, risking the ire of China by signalling that the world's biggest telecoms equipment maker is no longer welcome in the West.
Huawei 5G ban: The questions that still need to be answered (The Telegraph) The Government has said it will be banning Huawei from the UK's telecoms network - but some uncertainty still remains
Huawei's UK ban is a blow for its ambitions - but it is far from over (The Telegraph) If the Government is really serious about pushing Huawei out of Britain entirely, it has much further to go
The NCSC advice over Huawei is convoluted but ultimately makes sense (Telecoms.com) A closer look at the advice on which the UK based its decision to ban Huawei from its 5G networks reveals a mixture of rigour and improvisation.
U.S.-Huawei Divorce to Cost $11 Billion up Front, More Down the Line (Meritalk) A rule change prohibiting Federal use of telecommunications services and equipment from companies that pose national security risks – such as China-based Huawei and ZTE – will cost $11 billion to implement and $2 billion each subsequent year, according to a July 14 Federal Register announcement from the Department of Defense (DoD), General Services Administration (GSA), and NASA.
Huawei, 5G networks and security: How did we end up here? (ZDNet) The row over Huawei's role in 5G networks is longstanding and complicated. Here's what you need to know.
FAR Council Releases Interim Rule Prohibiting Contracts With Entities That Use Equipment Made By Huawei, ZTE, And Others (JD Supra) On July 10, 2020, the Federal Acquisition Regulatory (“FAR”) Council released a prepublication version of an interim rule, FAR Case 2019-009 (the...
TikTok, Bracing for Scrutiny in Australia, Seeks to Reassure Lawmakers (Wall Street Journal) TikTok, the embattled short-video app run by Chinese technology giant Bytedance, has written to Australian politicians to reassure them about the safety of user data and its independence, as concerns about its Chinese ties grow.
Analysis: Here's how Trump could go after TikTok (The Hour) The Trump administration's calls to ban the video-streaming app TikTok are intensifying.
NDAA process is now loaded with Solarium cyber amendments (FCW) Much of the Cyberspace Solarium Commission's agenda is being pushed into this year's defense authorization process, including its crown jewel idea of a national cyber director.
House Appropriations Advances Defense Spending Bill (Nextgov.com) Areas of concern for cybersecurity include building the workforce and 5G development.
()
The case for a National Cyber Director (CyberScoop) Although the aftershocks of COVID-19 will last for years, one result is already clear — shifting more activity online has increased our society’s digital dependence even faster than expected.
Investors, lawmakers say HR data should be public (SearchHRSoftware) Large investors and U.S. lawmakers want public firms to disclose more of its HR data, including gender and racial makeup, turnover rates and even engagement scores. Human capital is critical to understanding a firm's health, proponents said.
Time running out to protect US November elections (CSO Online) Experts say it's too late for significant legislative action to better protect voting this fall, but meaningful changes are still possible.
House leaders back bill to send all RI voters mail ballot applications (WPRI) The decision marks a new development in the State House tug-of-war over how to conduct the upcoming primary and general elections.
Louisiana voters claim they did not receive mail-in ballots they requested; LDP planning legal action (WAFB) Nearly 100,000 voters mailed in their choices on Saturday, July 11.
Litigation, Investigation, and Law Enforcement
Companies Worry EU Court Ruling Could Disrupt Global Data Transfers (Wall Street Journal) The European Union’s highest court will decide Thursday whether a widely used tool for moving data from within the bloc to outside countries is legal.
GDPR Fines Totalling €158 Million Issued in 340 Cases, Study by PrivacyAffairs Finds (Yahoo) Since rolling out in May 2018, there have been 340 GDPR fines issued by European data protection authorities. Every one of the 28 EU nations, plus the United Kingdom, has issued at least one GDPR fine.
()
US, UK, Interpol give Ghana phone hacking tools, raising journalist concerns on safety and confidentiality (Committee to Protect Journalists) In May 2019, senior members of Ghana’s law enforcement posed for photos with the U.S. ambassador to their country at a ceremony in the capital, Accra. Between them they held boxes and bags, gifts from the U.S. government to Ghana which, according to one of the recipients, contained Israeli phone hacking technology. That recipient was...
Boies Schiller Files New Privacy Suit Against 'Voyeur' Google (Law360) Mobile app users, represented by Boies Schiller Flexner LLP, filed a putative class action in California federal court Tuesday calling Google LLC a "voyeur extraordinaire" that lulls them into a false sense of privacy before ripping off their data and selling it.