Cyber Attacks, Threats, and Vulnerabilities
CISA, DOD, FBI expose new Chinese malware strain named Taidoor (ZDNet) US government agencies say the Taidoor remote access trojan (RAT) has been used as far back as 2008.
DOD, FBI, DHS release info on malware used in Chinese government-led hacking campaigns (CyberScoop) The Chinese government has been using Taidoor to target government agencies, entities in the private sector, and think tanks since 2008.
US govt exposes Chinese espionage malware secretly used since 2008 (BleepingComputer) The U.S. government today released information on a malware variant used by Chinese government-sponsored hackers in cyber espionage campaigns targeting governments, corporations, and think tanks.
DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat (Dark Reading) Taidoor is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.
Now Operational, BeiDou Could Conceal Cybersecurity Threat (Inside GNSS) As the final BeiDou satellite reaches geostationary orbit, experts in the satnav community worry about security implications of the now officially operational C
Exclusive: Papers leaked before UK election in suspected Russian operation were hacked from ex-trade minister - sources (Reuters) Classified U.S.-UK trade documents leaked ahead of Britain's 2019 election were stolen from the email account of former trade minister Liam Fox by suspected Russian hackers, two sources with direct knowledge of the matter told Reuters.
Russian hackers stole papers from Liam Fox email (BBC News) Documents on UK-US trade negotiations were leaked in the run-up to the 2019 general election.
Religious, political leaders in Togo allegedly targeted with NSO Group spyware (CyberScoop) Religious and political opposition leaders in Togo were targeted last year with spyware developed by NSO Group, according to Citizen Lab.
Nothing Sacred: Religious and Secular Voices for Reform in Togo Targeted with NSO Spyware (The Citizen Lab) Amidst calls for reform in Togo, NSO Group's spyware was used to target voices for change including a bishop, priest, and opposition politicians.
NSO Spyware Was Used to Hack Clergy in Togo (Vice) Citizen Lab reveals that a Catholic bishop, a priest, and two politicians were targets of hackers leveraging a WhatsApp vulnerability.
Operation North Star attackers appear to be Hidden Cobra (SC Media) A phishing lure disguised as a legitimate inquiry by a recruiter for a new job opportunity inserts a malicious template into an attached Word document,
DJI Pilot Android Application Security Analysis (Synacktiv) In our previous analysis, we studied the DJI GO 4 application 1 , dedicated to the consumer grade drones.
Tandon team shines light on roiling
market for stolen debit and credit cards
(Newswise) Damon McCoy and colleagues at the NYU Tandon School of Engineering analyzed multi-year data extracted from BriansClub, an underground bazaar for buying stolen a
Vulnerability In KDE Archive Tool Could Allow Linux Account Takeovers (Latest Hacking News) Ark archive tool by KDE had a path traversal vulnerability that could allow remote code execution, account takeover via malicious archives. Patch released.
New bot malware leaves financial apps dangerously exposed
(PaymentsSource) EventBot is a particularly frightening development since it hides in an altered version of an app that seems legitimate and steals unprotected information in banking, wallet, payment and cryptocurrency mobile apps, says Appdome's Tom Tovar.
Mirai botnet is targeting RCE vulnerability in F5 BIG-IP software (Computing) The bug could enable an attacker to create or delete files, intercept information and otherwise compromise the system
Robocall Legal Advocate Leaks Customer Data (KrebsOnSecurity) A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.
What Is Broken Link Hijacking (Acunetix) Broken link hijacking (BLH) lets attackers exploits invalid external links to perform defacement, impersonation, or even cross-site scripting attacks.
Hackers Could Target Organizations via Flaws in Mitsubishi Factory Automation Products (SecurityWeek) High-severity vulnerabilities found in Mitsubishi Electric factory automation products can be exploited to remotely attack industrial organizations
FBI Sees Rise In Online Shopping Scams (Internet Crime Complaint Center (IC3)) An increasing number of victims are being directed to fraudulent websites via social media platforms and popular online search engines.
Hackers Steal Over $1.3M from European Crypto Trading Platform (Cointelegraph) 2gether’s servers were attacked by unknown actors who managed to steal over $1.39 million from crypto-investment accounts
Newsletter plugin bugs let hackers inject backdoors on 300K sites (BleepingComputer) Owners of WordPress sites who use the Newsletter plugin are advised to update their installations to block attacks that could use a fixed vulnerability allowing hackers to inject backdoors, create rogue admins, and potentially take over their websites.
Garmin outage: what's next for Garmin Connect after the ransomware attack? (T3) With Garmin Connect back online, what does the future hold for the running watch manufacturer?
Meetup Security Flaws Exposed 44 Million Members To Data Loss And Payment Threat (Forbes) A popular community-building events platform was left open to attacks that could have resulted in data loss and, ultimately, the redirection of payments.
Hackers could have stolen PayPal funds from Meetup users (BleepingComputer) Researchers analyzing the Meetup platform for organizing free and paid group events discovered high-severity vulnerabilities that allowed attackers to become co-organizers or steal funds.
CoinDesk warns that cryptocurrency scammers are using its name to send phishing emails (TokenPost) Cryptocurrency and blockchain-focused news site CoinDesk issued a warning to the public about scammers who are trying to use the publications name when sending fake emails. The warning comes after hackers hijacked Twitter...
Maze Ransomware operators published data from LG and Xerox (Security Affairs) Maze ransomware operators published internal data from LG and Xerox after the company did not pay the ransom. Ransomware crews are very active during these months, Maze ransomware operators have published tens of GB of internal data allegedly stolen from IT giants LG and Xerox following failed extortion attempts. Maze ransomware operators published 50.2 GB […]
NetWalker ransomware gang has made $25 million since March 2020 (ZDNet) The NetWalker gang has established itself as one of the most dangerous ransomware groups out there.
Election experts more concerned about ransomware attacks than altering of votes (WPTV) The FBI and Department of Homeland Security are warning local governments about possible ransomware attacks. Experts think that is more of a likely scenario than altering actual votes.
Australian aged care provider Regis hit by Windows Maze ransomware (iTWire) Publicly-listed aged care provider Regis Healthcare has been hit by a gang using the Windows Maze ransomware, the company says in a note to the Australian Stock Exchange. The company has not apparently agreed to pay the ransom demanded by the attackers because they have put up data stolen during the...
Pivot Technology Solutions Disclose Ransomware Attack And Data Breach (Latest Hacking News) Canadian MSP Pivot Technology Solutions thwarted a ransomware attack. However, the attackers still extracted some of the data.
Lithium-ion battery maker comes under attack from NetWalker ransomware (ITWire) A gang of malicious attackers appears to have used the Windows NetWalker ransomware to stage a raid on the infrastructure of Forsee Power, a company that designs and manufactures smart lithium-ion battery systems for electro-mobility markets. The company says it is able to mitigate climate change wi...
Regis targeted in cyber attack (Australian Ageing Agenda) Personal information has been published following a ransomware attack on publicly listed aged care provider Regis Healthcare, prompting a warning to all providers from the Federal Government.
CSU system investigating wide-reaching Blackbaud cyberattack (EdScoop) A spokesperson for the CSU Chancellor’s Office told EdScoop that all 23 of its campuses use software from Blackbaud, which recently paid its cyberattckers to delete stolen customer data.
UT warns donors, contacts possibly affected by May ransomware attack (Statesman) The University of Texas officials recently learned of a security breach that affected some of the school’s donors and fundraising contacts, university officials said Monday.
Blackbaud hackers accessed info of thousands of Labour Party donors (teiss) The ransomware attack targeting software provider Blackbaud resulted in hackers accessing information about thousands of donors of the Labour Party.
Exclusive: More than 30 UK charities affected by Blackbaud cyber attack (Third Sector) Charities are advised to strengthen their defences as the scale of the breach becomes clear
OU alumni, donor information exposed in ransomware attack (KFOR) Officials with the University of Oklahoma say some alumni and donor information was accessed following a cyberattack on a third -party provider.
Oversharing on social media, a security risk (Telangana Today) Every behavioural aspect of individuals is being monitored, documented and harvested
Over-75s warned of rise in TV Licence 'phishing' fraud (The Telegraph) Pensioners awaiting a letter from TV Licensing after the BBC cancelled the over-75s scheme are being duped by scam emails
Zello resets all user passwords after data breach (BleepingComputer) The push-to-talk app, Zello, has disclosed a data breach that revealed user's email addresses and hashed passwords after discovering unauthorized activity on their systems.
Logistics startup iVoy experiences data breach (Contxto) iVoy confirmed the data breach via a statement but said that “users’ personal data was safe.”
Data breach impacts 306 North Dakotans (Bismarck Tribune) The Seattle-based Fred Hutchinson Cancer Research Center is notifying its donors of a data security breach experienced by technology vendor Blackbaud Inc.
Bus-sharing service users data hit by security breach (Dawn) Company says it has secured the vulnerability in the system and “is confident” that the customer data is now safe.
DXC Technology Update on Xchanging Ransomware Attack (Yahoo) DXC Technology Update on Xchanging Ransomware Attack
How much is your personal data worth on the dark web? (WeLiveSecurity) Have you ever wondered how much your personal information goes for on the dark web? Researchers at Privacy Affairs recently sifted through the listings in the internet’s seedy underbelly and created an overview of the average going prices of stolen personal data.
Vulnerability Summary for the Week of July 27, 2020 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Security Patches, Mitigations, and Software Updates
Meetup fixes security flaws which could have allowed hackers to take over groups (ZDNet) Researchers at Checkmarx detail "Holy Grail" of two vulnerabilities, now patched.
Dell EMC Patched High-Severity Vulnerability In iDRAC Controller (Latest Hacking News) The vulnerability in iDRAC Controller could allow complete control on target DELL servers. DELL patched the flaw. Update now.
Realme XT gets July 2020 security patch with several new features (BGR India) The Realme XT update fixes for some of the known issues and improves system stability. Check out Realme XT news, updates and more via BGR.in.
Vivo V9 update rolls out with July 2020 security patch (BGR India) Vivo V9 update rolls out with July 2020 security patch. Check out Vivo V9 news, updates, features, specifications, price and more via BGR.in.
Heimdal Security CEO: "Cybercrime is already professionalized" (Finbold) During the interview, the CEO of Heimdal Security pointed out the importance of having cybersecurity as part of the modern education curriculum.
Cloud and Threat Report (Netskope) Download the latest Netskope Threat Labs Report for new cybersecurity research that highlights cloud threats, usage, and security trends.
AT&T : Survey Finds Businesses Believe Remote Work Increases Cyberattack Vulnerability (MarketScreener) AT&T Survey Shows 70% of Large Businesses Believe Remote Working Makes Them More Vulnerable to Cyberattacks
Fraud Attacks Double in 2020 as COVID-19 Transforms the Digital Economy, Reveals Arkose Labs (GlobeNewswire) 1.1 Billion Attacks Detected Since the Beginning of 2020, as Fraudsters Quickly Adapt to Consumers’ Evolving Behaviors
Internet Performance Report (ThousandEyes) A measurement-based study examining the performance of Internet infrastructure—including ISP, CDN, DNS, and cloud providers—during the COVID-19 pandemic.
Pandemic accelerating security at financial institutions (SC Media) Prior to the pandemic, financial institutions spent an average $2,700 on cybersecurity per full-time employee, up from $2,300 the previous year ), with
CrowdStrike APJ report reveals nearly three out of four business leaders see cyber security as a top priority in COVID-19 recovery (ITWeb) Nearly three out of four business leaders see cyber security as a top priority in COVID-19 recovery.
Asia Pacific & Japan State of Cybersecurity Report (CrowdStrike) Download the CrowdStrike APJ State of Cybersecurity Report revealing survey responses of business leaders' cybersecurity practices during the COVID-19.
Impact of Cyber Crimes on Indian Economy (Daily Excelsior) Niraj Dubey The 20th century has brought to reality the idea of a global village, where digital technology has interconnected and enmeshed the world
UK firms paid about £200m in ransoms last year: Emsisoft (iTWire) The security firm Emsisoft claims that cyber attackers earned more than £200 million in ransoms from British companies in 2019, with the criminals who demanded, and received the money, being in many cases from Russia and Eastern Europe. A study by the company, which specialises in helping companies...
This Is Where You’re Most Likely to Be Catfished in the USA in 2020 (HighSpeedInternet) Which states have the biggest problems with catfishing? We looked at FBI and Census data to determine your likelihood of being scammed.
Google to invest $450M in smart home security solutions provider ADT (TechCrunch) Google said on Monday it will invest $450 million in ADT and work with the Florida-headquartered firm’s 20,000 technicians to sell and install the search giant’s Nest family of smart home products. As part of the long-term investment — which is granting Google a 6.6% stake in ADT …
Mimecast Acquires Machine Learning Phishing Security Firm MessageControl (My TechDecisions) Mimecast has acquired MessageControl, a messaging security provider with solutions to respond to the increase in phishing attacks.
What Would Microsoft Do With TikTok? (New York Times) The potential blockbuster deal could go a few different ways.
With clock ticking, here's a look at TikTok and why Microsoft wants the business (WRAL TechWire) The short-form video app, the latest flashpoint in tensions between the United States and China, is also of interest to investors. As the geopolitical conflict between the world's two biggest eco
Microsoft’s Talks to Buy TikTok’s U.S. Operations Raise Ire in China (Wall Street Journal) Washington’s ultimatum to the Chinese owner of TikTok—sell the app’s American operations to Microsoft or leave the country—is hardening suspicions in China that the U.S. aims to sabotage the country’s efforts to grow its own technology.
5G unmade: The UK’s Huawei reversal splits the global telecom supply chain (ZDNet) The alliance in global engineering is suspended, probably permanently. What countries and telcos call “5G” will be whatever comes to fruition now. Depending on whom you ask, this is either catastrophic or just fine.
Huawei exclusion from private networks will disrupt the market (Rethink) While attention has been focused on Huawei’s involvement in national public 5G infrastructure, debate has intensified over its role in a far larger number of private networks in many countries, including the USA. The UK’s recent prohibition on Huawei was addressed explicitly at public networks, but the country’s National Cyber Security Centre (NCSC) did caution that vendors deemed high risk should not be used in safety-critical operations.
In Showdown Between China and the West, HSBC Gets Caught in the Middle (New York Times) Global businesses are increasingly being asked to pick political and legal sides in the confrontation between the world’s two biggest economies.
CISA chief wants younger, more experienced hackers in federal government (FCW) Professional experience and credentials don't have the same importance in cybersecurity, where teenagers can hack governments and multi-billion-dollar corporations.
Andhra Pradesh Police to train 1 lakh women online to fight cyber crime (Times Now) Andhra Pradesh Chief Minister YS Jagan Mohan Reddy launched 'E-RakshaBandhan' campaign at the Tadepalli Chief Minister camp office for women.
Which type of CISO are you? Company fit matters (SearchSecurity) Do you know which type of CISO you are? Executive cybersecurity leadership comes in many flavors, influenced by individual experiences and personalities that affect CISO strategy. Learn the six most common types of CISO, according to Forrester Research, and target the best environment for you.
Cyber Chiefs Watch Their People for Burnout as Pandemic Rolls On (Wall Street Journal) Work that seeps into home life, a reluctance to take vacation and a barrage of online attacks put heavy strain on cyber workers.
U.S. Defense, Air Force Invite Hackers to Re-Imagine How Space Systems Are Secured (I-Connect007) The U.S. Department of the Air Force and Department of Defense are changing the way they approach building secure and resilient space systems by inviting the global security research community to hone their space domain hacking skills in an open and collaborative environment.
ReversingLabs Named Winner in Black Unicorn Awards for 2020 (GlobeNewswire) ReversingLabs Wins the Title of Black Unicorn in the Most Prestigious Awards for Cybersecurity Companies Who Have the Potential of Being Valued at $1B
Remediant Named Winner in Black Unicorn Awards for 2020 (Benzinga) Remediant, the Precision Privileged Access Management (PAM) leader, today announced that it has been named a winner in the...
XM Cyber Named Winner in the 2020 Black Unicorn Awards (PR Newswire) XM Cyber, the multi-award-winning leader in breach and attack simulation (BAS) advanced cyber risk analytics and cloud security posture...
RevBits Named Winner as Top 100 Cybersecurity Startup for 2020 (PR Newswire) REVBITS CYBERSECURITY SOLUTIONS, a provider of a complete suite of security solutions, today announced that is has been named a Top 100...
Satori Cyber Named Winner as Top 100 Cybersecurity Startup for 2020 (Yahoo) Satori Cyber Named a Top 100 Winner in this Prestigious Awards Category Exclusively for Cybersecurity Startups at Black Hat 2020TEL AVIV, Israel, Aug. 03, 2020 (GLOBE NEWSWIRE) -- Satori Cyber, cybersecurity industry’s leading provider of cloud data protection today announced that it has been named a
Fundraising for St. Jude: SINET Impact Award, Honoree Jim Routh (Fundraising for St. Jude) SINET is pleased to honor Jim Routh, CISO at Mass Mutual as the 2020 SINET Impact Award Recipient. The award comes with a donation to the charity of the recipients choice - St. Jude Hospital.
Synopsys Taps Veteran Security Leader Jason Schmitt as GM of its Software Integrity Group (PR Newswire) Synopsys, Inc. (Nasdaq: SNPS) today announced that Jason Schmitt has joined Synopsys as the general manager of the Software Integrity Group and...
GoSecure Appoints Rick Miller as Chief Operating Officer (BusinessWire) GoSecure, a leading provider of Managed Detection and Response (MDR) services, today announced the hiring of Rick Miller as Chief Operating Officer. M
Products, Services, and Solutions
Clearing the Path: Perch Security Adds Datto Autotask PSA Ticket Integration for Managed Threat Detection and Response (PR Newswire) Perch Security, a leading threat detection platform and service for managed service providers (MSPs), today announced a collaboration with...
Cofense Expands SOAR Integration Partners to Accelerate Phishing Incident Response (Cofense) Enhanced integrations between Cofense Triage, Cofense Intelligence and SOAR solutions enable security teams to quickly respond to phishing campaigns that slip past perimeter defenses
Ivanti Integrates Ivanti Neurons Platform with Splunk Security Operations Suite to Further Enable the Self‑Healing Autonomous Edge (Ivanti) Ivanti Neurons Platform and Splunk Security Operations Suite Integrate to Power Self-Healing Endpoints and Self-Service Remote Workers with Automated Workflows from Endpoint to Cloud
AttackIQ Security Optimization Platform Helps Cybersecurity Leaders Navigate New Era of Increased Attacks, Heightened Business Risk, and Scrutinized Spending (BusinessWire) AttackIQ is reinventing the BAS market with the new AttackIQ Security Optimization Platform.
AttackIQ Launches Preactive Security Exchange (PSE) to Improve Security Controls Effectiveness for Customers (BusinessWire) AttackIQ launches its Preactive Security Exchange with inaugural partners including BlackBerry, Cisco, Microsoft, RSA and more.
Unisys Strengthens Multi-Cloud Advisory Services, Offers Comprehensive Migration and Management Strategies with Enhanced CloudForte® Capabilities (PR Newswire) Unisys Corporation (NYSE: UIS) today announced it has enhanced CloudForte®—its integrated, multi-cloud and application optimization platform....
Spin Technology Introduces Cyber Liability Insurance for SpinOne (PRWeb) Spin Technology, Inc., today introduced Cyber Liability Insurance for SpinOne. This additional offering provides a policy that new and existing SpinOne ...
Travelers Europe has enhanced its cyber insurance product (Help Net Security) Travelers Europe has enhanced its cyber insurance product, Travelers CyberRisk, to provide risk management solutions to strengthen cybersecurity programs.
ADVANTUM helping to protect regional shipping from cyberattacks (Gleaner) A recent article appearing in the online newsletter Offshore Energy states that “cyberattacks on the maritime industry’s operational technology systems have increased by 900 per cent over the last three years”. The increase in cyberattacks...
Capsule8 Now Available on AWS Marketplace (Yahoo) Availability provides easier deployment of Capsule8’s Linux protection solution to Amazon Web Services customers
Cellebrite adds cryptocurrency and blockchain investigations solution - (Enterprise Times) Tools, though very different, like those from Cellebrite, Chainalysis, CryptoHound, LunarCrush and others, will make a difference.
SafeBreach Integrates Threat Intelligence To Help Security Teams Identify Greatest Risks and Assess Security Posture (PR Newswire) SafeBreach, provider of the leading breach and attack simulation (BAS) platform to validate security controls, visualize security risk and...
Stage 2 Security Launches Voodoo 1.2.0 with ARM support (PR Newswire) A leader in Adversary Simulation, Protection and Prevention services, Stage 2 Security (S2) www.stage2sec.com announced the release of their...
Baffle Unveils New Tableau Integration to Protect Data Analytics Pipeline (Baffle.io) Learn more about data protection in our latest post "Baffle Unveils New Tableau Integration to Protect Data Analytics Pipeline". Baffle provides end-to-end access control and AES encryption that protects data in use, in memory, in the search index and at-rest to protect against modern day data breaches.
Morpheus Announces First Zero-Trust Cloud Management Platform and Enhances Hybrid Cloud Automation for DevSecOps (AiThority) Morpheus Data, the leading multi-cloud management platform company, unveiled dozens of network security and hybrid cloud updates
Hanwha Techwin America To Launch The Next Generation Wisenet 7 SoC To Address Challenges Of The Security Market (Security Informed) Hanwha Techwin America, a supplier of IP and analog video surveillance solutions, will debut its next generation Wisenet 7 SoC (System on Chip).Built from 30 years of innovation in video...
Exabeam Announces New Use Case Licensing and Content Library to Simplify SIEM Adoption, Enable Increased Visibility (Exabeam) First two use cases, along with new Cloud Connector and Turnkey Playbook for Threat Intelligence, promote efficiency, faster[...]
Aqua Extends its Alliance with Red Hat and IBM to Bring Cloud Native Security to the Red Hat Marketplace (Aqua) Aqua, the pure-play cloud native security leader, announced its Cloud Native Security Platform is available through Red Hat® Marketplace.
BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks (TechRepublic) One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.
Schneider Downs Releases redlure, an Open-Source Phishing Assessment Platform (PR Newswire) Schneider Downs, one of the nation's 60 largest accounting and business consulting firms, announced the release of redlure, an open-source...
Introducing Threat Stack support for AWS Fargate (Threat Stack) Learn how Threat Stack’s new Fargate support can augment your existing AWS security controls.
Threat Stack Announces Availability of Container Security Monitoring for AWS Fargate (BusinessWire) Threat Stack today announced the availability of Threat Stack Container Security Monitoring for AWS Fargate.
Digital Defense Announces New Partner Program for Managed Service Providers (Yahoo) Digital Defense, Inc., a leader in vulnerability and threat management solutions, today announced a new Managed Service Provider (MSP) partner program that empowers partners to raise their brand profile, service offerings and proof of value to their clients in the new economics of cloud and on-premises
SailPoint and Proofpoint Team Up to Fight Security Threats Facing Today’s Digital Workforce (BusinessWire) With more than 90% of today's threats starting with a seemingly innocuous email, SailPoint Technologies Holdings, Inc. (NYSE: SAIL), the leader in ide
Technologies, Techniques, and Standards
Why Data Ethics Is a Growing CISO Priority (Dark Reading) With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
Get Schooled On Cybersecurity: Online Learning Security Tips For Students & Parents (National Cybersecurity Alliance) As K-12 schools adopt fully online or blended virtual and in-person learning environments, it is important to understand some basic cybersecurity steps students and parents can take to make sure they move to the top of the class securely.
Pentagon wrestles with adopting zero-trust security approach (C4ISRNET) Work from home caused by the coronavirus pandemic has accelerated conversations about zero-trust, several IT officials have said recently.
3 Warning Signs of Client-Side Malware and How to Tackle Them (AiThority) Client-side malware manipulates your customer’s computers. It hacks into business-intelligence number that you just could not explain.
How To: Applied Purple Teaming Lab Build on Azure with Terraform (Windows DC, Member, and HELK!) (Black Hills Information Security) For those of you who have been diligently following along – three webcasts now, a four-hour intro training session on a Saturday, our students who have attended the virtual courses – it […]
The case for cybersecurity by design in application software (SearchSecurity) Cybersecurity by design must become a part of your application software process from the start. Making cybersecurity an afterthought leaves your organization vulnerable. Learn how to put this proactive approach into practice.
Network intelligence is stopping a wave of DDoS misdiagnosis (Security Brief) Security teams already know the value of a layered defence; it’s time to add more layers, writes ThousandEyes principal solutions analyst Mike Hicks.
How to ease cyber fatigue in a crisis (GovInsider) Cybersecurity experts at CyberArk share tips on how to stay secure through a crisis.
Caught in the act: Spotting suspicious user activity with behavioural analytics (teiss) User entity behaviour analytics uses behavioural profiling to alert security teams to suspicious behaviour by comparing it to a user's normal behaviour.
NH Guard hosts second Cyber Yankee regional training exercise (US Army) The New Hampshire National Guard hosted Cyber Yankee 2020, a regional exercise to provide cyber responders a virtual range to train and test their skills against cyberattacks, at the Edward Cross Training Center July 21–31.
Design and Innovation
System for thwarting deepfakes unveiled (Axios) A new technical standard could provide assurances that photos and videos haven't been tampered with.
New method to defend against smart home cyber attacks developed by Ben-Gurion University researchers (EurekAlert!) According to their new study published in Computers & Security, the ability to launch massive distributed denial-of-service (DDoS) attacks via a botnet of compromised devices is an exponentially growing risk in the Internet of Things (IoT). Such massive attacks, possibly emerging from IoT devices in home networks, impact the attack target, as well as the infrastructure of telecommunication service providers (telcos).
Research and Development
Soon, your brain will be connected to a computer. Can we stop hackers breaking in? (ZDNet) As the development of brain-computer interface technology speeds up, are security and privacy getting left behind?
Legislation, Policy, and Regulation
Europe's Incertitude in Cyberspace (Lawfare) When the U.S. attempted to build a vocal alliance of like-minded countries in response to an indictment of Chinese hackers, European nations stayed quiet.
Understanding Canadian Cybersecurity Laws: “Insert Something Clever Here” — Canada’s Anti-Spam Legislation (Article 5) (IT World Canada) As we continue to adapt to the changing demands to navigate the spread of COVID-19, an increasing number of workspaces and…
Trump Reverses Course on TikTok, Opening Door to Microsoft Bid (New York Times) The president said he did not object to a potential acquisition of the Chinese-owned app, retreating from comments about banning the service.
Why You Should Ignore China’s Misleading Fury Over TikTok (Forbes) China's warning over Trump's "smash and grab" of TikTok is not all it seems—and that will impact what happens next.
Why the UK was left out of Microsoft's offer to buy TikTok (The Telegraph) Data regulation concerns, a move in headquarters to London and splitting up the app have all put put forward as reasons
E&C Republican Leaders, Whip Scalise Request Classified Briefing on TikTok - Energy and Commerce Committee (Energy and Commerce Committee) Energy and Commerce Committee Republican Leader Greg Walden (R-OR), House Minority Whip Steve Scalise (R-LA), and Consumer Protection and Commerce Subcommittee Republican Leader Cathy McMorris Rodgers (R-WA) wrote to Secretary of State Mike Pompeo requesting a classified briefing on TikTok and other technology companies with alleged ties to the Chinese Communist Party. …
FCC chair says agency will take public comment on Trump social media petition (Reuters) The Federal Communications Commission will take public comment for 45 days on a petition filed by the Trump administration seeking new transparency rules in how social media companies moderate content, FCC Chairman Ajit Pai said on Monday.
House bill looks to carry on solarium commission recommendations (Federal News Network) A bill from a House Republican would start to carry out recommendations from the Congressionally chartered Cyberspace Solarium Commission.
Congress has a shot at correcting Trump's central mistake on cybersecurity (TheHill) With negotiations underway on the final version of the must-pass national defense bill, lawmakers have one more chance this year to position the United States for confronting a cybersecurity challenge that grows more dangerous at every turn
Senate and House Make Progress in Passing the National Defense Authorization Act for Fiscal Year 2021 (JD Supra) A recent article on this blog reported on the contents of the Senate version of the National Defense Authorization Act for Fiscal Year 2021 (NDAA),...
Commonwealth Cyber Initiative names managing director | Virginia Business (Virginia Business) John P. Delaney has been appointed as managing director of the Commonwealth Cyber Initiative (CCI), effective June 25, Virginia Tech announced Monday. The CCI Hub is located in the Virginia Tech Research Center in Arlington. Delaney is a U.S. Army veteran, having recently retired from a 30-year career. He had most recently been the chief…
Litigation, Investigation, and Law Enforcement
Amazon’s Market Power to Be Investigated by New York AG (Bloomberg) The FTC and two state AGs will interview witnesses together. Jeff Bezos last week testified before a House antitrust panel.
How the FBI Identified Twitter Hackers (SecurityWeek) Court documents show how two of the alleged Twitter hackers were identified by investigators based on Bitcoin transactions and other evidence
House Intelligence Committee To Investigate DHS Over Reports It Collected Info On Journalists, Protesters (Forbes) Homeland Security reportedly compiled “intelligence reports” about American journalists and analyzed the communications of protesters.
GandCrab ransomware gang member caught: actor from Belarus arrested (2Spyware) Distributor of one of the largest ransomware strains has been arrested in Belarus. The Ministry of Internal Affairs of Belarus announced last week that one
Fintech Faces Expanded Applicability of GLBA’s Privacy and Security Requirements (Cooley) In a little-noticed consent decree in the fall of 2019, the Federal Trade Commission took the position that businesses whose services facilitate financial operations on behalf of financial institut…
Morgan Stanley Attracts Second Data Breach Lawsuit (AdvisorHub) Wirehouse’s admission that personal customer data wasn’t scrubbed from decommissioned computer equipment, or wasn’t encrypted, has prompted a second class-action negligence and privacy lawsuit.
Morgan Stanley sued for failing to wipe client data from old computer equipment (Financial Planning) Current and former clients claim personal information, including Social Security and passport numbers, have been exposed due to negligence.
Wal-Mart Suffers Double Whammy From Data Breach Lawsuit Filed for CCPA Violations (Lexology) Data breaches have become a lot more dangerous in California. Joining the dubious ranks of Minted Inc., Zoom, TikTok, and Salseforce.com, Wal-Mart is…
Twitter Could Pay FTC Fine Over Alleged Privacy Violations (Wall Street Journal) Twitter Inc. said it could pay at least $150 million to the Federal Trade Commission related to alleged violations of a 2011 consent order for using consumers’ private data in targeted advertising.
Twitter could be facing an FTC fine of up to $250 million over allegations that it violated an agreement over user data privacy (Business Insider) Twitter said the FTC's complaints concerned its of personal data for targeted ads that users had provided for safety and security reasons.
How members of Kenyan family stole Sh2bn from taxpayers in US (Daily Nation)
The Makueni family is believed to have stolen more than Sh2 billion in one of the biggest cybercrime heists