Cyber Attacks, Threats, and Vulnerabilities
U.S. officials say Russian government hackers have penetrated energy and nuclear company business networks (Washington Post) The NSA has detected malicious cyber-based activity by Russia’s FSB spy agency, U.S. officials said.
Russian hackers 'breached US power plants' (The Independent) Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.
Did the Russians orchestrate a cyber-attack on a nuclear plant? (NBC News) Hackers targeted a dozen facilities, including the Wolf Creek nuclear plant in Kansas.
U.S. Energy Department helping power firms defend against cyber attacks (Reuters) The U.S. Department of Energy said on Friday it is helping U.S. firms defend against a hacking campaign that targeted power companies including at least one nuclear plant, saying the attacks have not impacted electricity generation or the grid.
Experts Blame Russia For NotPetya Cyberattack (PYMNTS.com) Experts are saying that the complexity and scale of the latest global cyberattack point to a hostile government, not a criminal group, as the originator of the attack. And many of them have an educated guess about who it was: Russia. On June 27, the hostile software — dubbed “NotPetya” after initial reports misidentified it as […]
Petya victims given hope by researchers (BBC News) A team claims to have found a way of decrypting some files damaged in the recent cyber-attack.
Organisations count the cost of Petya as the storm abates (Naked Security) So what happened? 10 days after the outbreak, some of the strands of the Petya outbreak are coming together – but there’s still plenty we don’t know
Next cyber-attack could cost insurers $2.5 billion (The Economic Times) Cybercrime insurers largely avoided costly claims from the recent attacks that hit businesses around the globe. The next global virus could change that.
Cyber attack victims Maersk and TNT find ways to keep customers' cargo moving (Load Star) Maersk, APM Terminals and TNT are working hard to get their operations back on track as they enter the third day of the Petya cyber attack.
Report: 44% of ocean carriers show 'cyber weakness' (American Shipper) Maersk Line and parcel carrier TNT Express are just now getting major functions back online after last week's massive cyber attack, compounding a systematic problem that needs to be addressed immediately, according to SeaIntel's Lars Jensen.
Shipping must learn from Maersk cyber attack – tighten security or be next, warning (Load Star) The shipping industry must learn from last week’s cyber attack on Maersk, say analysts, and the line’s chief commercial officer, Vincent Clerc, said the line would “have to ask ourselves some tough questions”.
Washington responded well to WannaCry and Petya, but don't celebrate yet (Washington Examiner) The federal government's response to recent cyber attacks earned positive reviews, but those incidents still showed the need for more coordi...
Kaspersky raps hacking group Lazarus for recent ATM attacks (The Economic Times) Kaspersky and other security firms had also linked the WannaCry ransomware attacks to the Lazarus group, in which hackers demanded ransom in Bitcoins.
OSX Malware Linked to Operation Emmental Hijacks User Network Traffic (TrendLabs Security Intelligence Blog) We recently discovered a new malware that showcases sophisticated features such as certificate abuse and security software evasion that affects machines using Apple’s OSX operating system. This malware, which specifically targets Swiss banking users, uses a phishing campaign to drop its payload, which eventually results in the hijacking of a user’s network traffic using a Man-in-the- Middle (MitM) attack. OSX_DOK.C seems to be another version of WERDLOD, which is a malware that was used during the Operation Emmental campaigns.
'CopyCat' Malware Infected 14 Million Google Android Devices (Apps for PC Daily) The researchers define CopyCat as "a fully developed malware with vast capabilities, including rooting devices, establishing persistency, and injecting code into the Zygote", which is a primary Android app launching process.
Highly Advanced SpyDealer Malware Can Root One in Four Android Devices (BleepingComputer) Security experts have discovered a brand new Android trojan that features a broad range of features that allow it to root Android devices, steal data from over 40 apps, and geo-track phone owners.
Broadpwn Bug Affects Millions of Android and iOS Devices (BleepingComputer) Broadcom Wi-Fi chips embedded in Android and iOS devices are vulnerable to a bug that allows an attacker to execute code on their devices, without any interaction needed from the user.
Jahoodists misspell to cloak interactions from state surveillance (SC Media) A new report has revealed the tricks IS sympathisers use to avoid automated law enforcement surveillance software.
ISIS, Despite Heavy Losses, Still Inspires Global Attacks (New York Times) The Islamic State’s territory-building project is crumbling, but it still has an international reach and an ideology that motivates attackers around the world.
Wi-Fi on planes: Are cyber-security fears tough to tackle? (The Economic Times) For in-flight Wi-Fi, Honeywell's satellite communications hardware is fitted on the aircraft so it can receive true broadband class connectivity via Inmarsat satellites.
IoT Physical Attack Exploit to be Revealed at Black Hat (Dark Reading) Security researcher Billy Rios plans to demonstrate how an exploit can cause an IoT device to launch a physical attack against a human.
ASIC impersonated in "largest-scale" Australian malware outbreak in past year": MailGuard (CRN Australia) Fourth malware attack targeting ASIC this year.
Self-Service Food Kiosk Vendor Avanti Hacked (KrebsOnSecurity) Avanti Markets, a company whose self-service payment kiosks sit beside shelves of snacks and drinks in thousands of corporate breakrooms across America, has suffered of breach of its internal networks in which hackers were able to push malicious software out to those payment devices, the company has acknowledged. The breach may have jeopardized customer credit card accounts as well as biometric data, Avanti warned.
Hard Rock, Loews Hotels Among Sabre Corp Hospitality Breach Victims (Threatpost | The first stop for security news) Victims of Sabre Corp’s SynXis reservation system breach reportedly include both the Hard Rock Hotel and Casino chain and the Loews Hotel chain.
Cinema Chain B&B Suffers Suspected Two-Year Car Breach (Infosecurity Magazine) Cinema Chain B&B Suffers Suspected Two-Year Car Breach. Company was reportedly tipped off by banking partner
Security Patches, Mitigations, and Software Updates
Security concerns: What you need to know before you update your Snapchat (Fox 54) The infamous dog filter, flower crowns, and other features are what make Snapchat truly unique.
Microsoft to Windows Home Server Users: Upgrade for Security's Sake (eWEEK) Microsoft has stopped supporting Windows Home Server 2011 and urges users to migrate to Windows Server Essentials for improved security.
Microsoft Pivots Windows 10 Toward Security: Revisiting a Near Catastrophic Mistake (IT Business Edge) Security isn’t fun. There is no better way to say this. I don’t care if you are working as a security guard, bodyguard, or defending against cyberattacks, the job is mostly dreadfully dull and when it gets exciting it is likely because you’ve screwed up or are in the wrong place at the wrong time.
Cyber Trends
New reality of ransomware attacks spikes FUD in cybersecurity (CSO Online) Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.
The World May Be Headed for a Fragmented ‘Splinternet’ (WIRED) In Germany, Canada, Austria, and elsewhere in the world, tech companies are being ordered to remove online content globally. Here's why that's troubling.
Kaspersky Lab chief urges global assault on hackers (Australian Business Review) The man who runs the global internet security firm under fire from US authorities over claims of cyber-espionage says governments across the world must urgently launch a co-ordinated effort to crack down on state-sponsored hackers.
UK executives badly informed about where data is stored compared to other countries (Help Net Security) When it comes to data compliance matters, 1 in 5 UK business decision makers do not know which compliance regulations their company is subject to.
Marketplace
Cybersecurity stocks rally as global hackings start to impact corporate bottom lines (CNBC) Cyber attacks are ramping up, and it looks like they're only going to get worse as more companies shift to the cloud.
Mach37 management shakeup ousts Rick Gordon and others (Washington Business Journal) Mach37's Rick Gordon, Dan Woolley and Bob Stratton are no longer at the Herndon cybersecurity accelerator, part of what its parent, the Center for Innovative Technology, is calling a “modification to the management structure.”
CIT Announces Leadership Transition at MACH37 Cyber Accelerator (Globe Newswire) Tom Weithman named President, Company adds industry veterans Mary Beth Borgwing and Jason Chen
Raytheon again selected to provide cyber security technologies for DHS (Jane's IHS) The US Department of Homeland Security (DHS) has awarded Raytheon a one year contract with four option years to provide cyber security capabilities to enhance the resiliency of United States' federal government computer networks.
Will Raytheon Abandon Cybersecurity? (Madison.com) Two years ago, I critiqued Raytheon's (NYSE: RTN) decision to more than triple the size of its cybersecurity business -- at a very high price -- by buying Websense. Two
Cisco Through The Looking-Glass Of Meta-Vision (Seeking Alpha) The ITC decision ratchets competition - recent '944 ITC ruling in favor of Arista will further impact near-term networking revenue growth. The FTC decision puts
5 Signs You Should Sell Palo Alto Networks (The Motley Fool) Avoid this cybersecurity play until its sales stabilize, losses narrow, and valuations cool down.
API Security Startup Elastic Beam Uses AI to Block Attacks (SDxCentral) API security startup Elastic Beam launched its flagship product, an artificial-intelligence powered software platform that blocks attacks.
Cybersecurity firm Edge Networks works to keep computer systems stable (The Columbian) The computer screens on the walls of Edge Networks paint a picture of an industry’s ongoing battles.
CACI wins task order to provide Navy with information assurance (Defense Systems) CACI’s information assurance upgrade is designed to strengthen cyber defense services for critical infrastructure systems.
CA Technologies Named an Overall Leader in Privilege Management for Fourth Consecutive Year (CA Technologies) CA Technologies today announced it has been named an “Overall Leader” in Privilege Management in this year’s Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security.
CrowdStrike Appoints Matthew Polly as Vice President of Worldwide Business Development and Channels (BusinessWire) CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced the appointment of Matthew Polly as vice president of Worldw
Products, Services, and Solutions
Kaspersky DDoS Protection Connect helps small and medium businesses thwart cyber threats (Windows Report - Windows 10 and Microsoft News, How-to Tips) Kaspersky's new DDoS Protection Connect is a DDoS protection suite for small and medium businesses. The DDoS Protection Connect is not only affordable but relatively easy to install and use.
Review: Acunetix 11 (Help Net Security) This Acunetix 11 review takes a deep look at a web vulnerability scanner that includes SQL injection and XSS black box scanning technology.
New Forcepoint Cloud Security, NGFW and Cross Domain Solutions Enhance Government IT Modernization and Security Capabilities (PRNewswire) Global cybersecurity leader Forcepoint today announced new enhancements...
Technologies, Techniques, and Standards
W3C Brazenly Ignores All Critics and Approves Browser DRM Standard (BleepingComputer) The World Wide Web Consortium (W3C) has announced this past week it's intention to promote the Encrypted Media Extensions (EME) draft as an official standard in the upcoming future.
Amid Unprecedented Controversy, W3C Greenlights DRM for the Web (Electronic Frontier Foundation) Early today, the World Wide Web Consortium (W3C) standards body publicly announced its intention to publish Encrypted Media Extensions (EME)—a DRM standard for web video—with no safeguards whatsoever for accessibility, security research or competition, despite an unprecedented internal controversy...
Tim Berners-Lee approves Web DRM, but W3C member organizations have two weeks to appeal (Defective by Design) Yesterday Tim Berners-Lee, the chief arbiter of Web standards, approved the controversial proposed Digital Restrictions Management (DRM) standard for the Web, Encrypted Media Extensions (EME).
The W3C has overruled members' objections and will publish its DRM for videos (Boing Boing) The W3C has overruled members' objections and will publish its DRM for videos
What is the CVE and how does it work? (CSO Online) The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
Closing the CVE gap: Is MITRE up to it? (CSO Online) Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.
Malware Round Two: EU's Cybersecurity Champ Defends Bloc via Information Sharing (Bloomberg BNA) A massive international cyberattack centered in Europe begins disrupting major companies. Sound familiar? It does to the European Union’s cybersecurity defense agency since they have now battled dramatic malware attacks twice in last two months—first with WannaCry and then with Petya.
Embrace 'consequence-based engineering' before the next WannaCry or Petya attack (Healthcare IT News) As attack surfaces become more common across various industries, the fact that this tactic has already worked elsewhere means hospitals can use the best practice too.
U.S. Cyber Command conducts mock attacks to prepare for the digital battlefield of the future | SOFREP (SOFREP) Although modern warfare can be every bit as brutal as the battles Americans have fought in the past, a new combat domain is rapidly becoming the focus of m
RSA’s Tran: Agencies must speed up the detection-response cycle (FederalNewsRadio.com) RSA's Peter Tran takes what he calls an edgier view of cybersecurity.
Your anti-virus software is not enough (Popular Science) As cyber-security gets more complicated, you should be taking more steps to protect yourself.
How I learned to stop worrying (mostly) and love my threat model (Ars Technica) Reducing privacy and security risks starts with knowing what the threats really are.
Adversary hunting with SOF-ELK (SANS Internet Storm Center) As we recently celebrated Independence Day in the U.S., I'm reminded that we honor what was, of course, an armed conflict. Today's realities, when we think about conflict, are quite different than the days of lining troops up across the field from each other, loading muskets, and flinging balls of lead into the fray.
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare (SANS Institute InfoSec Reading Room) Sophisticated and complex to implement, long-term cyber attacks are often considered the work of intelligent agencies and crime syndicates. However, the oversight and bureaucracy that comes from such management often hinders the ultimate lethality of the attack. In this paper, we will examine the significant impact a lone-wolf patriot hacker has had over the course of the last two years, and what important lessons we can learn from him on how to wage a successful fight in this domain.
For Phishing Protection, Rely on More than Users (Infosecurity Magazine) If we are “down to people” to protect against phishing and ransomware, we should just give up the fight.
Creating the Right Perception for Security Awareness Training (Infosecurity Magazine) “Just-in-time” security training can certainly help the individual, but what message is being sent to that employee?
Design and Innovation
DJI Is Locking Down Its Drones Against a Growing Army of DIY Hackers (Motherboard) Drone hackers have forced DJI into an arms race.
Google is funding the creation of software that writes local news stories (TechCrunch) Google’s Digital News Initiative has committed £622,000 ($805,000) to fund an automated news writing initiative for UK-based news agency, The Press..
Fake news is a war effort humans need to lead (TechCrunch) Of all the challenges we face in 2017 and beyond, “fake news” has certainly made its way to the top of the list. Can technology solve this issue head-on?..
We Investigated the Conspiracy Theory That r/conspiracy Is Hiding Something (Motherboard) Why did the subreddit decide to ban CNN articles?
Research and Development
IARPA to Brief Proposers on Distributed App Security Project (ExecutiveBiz) The Intelligence Advanced Research Projects Activity will hold a conference on July 26 to provide information on a new agency program that aims to help developers and architects use cryptographic techniques to build distributed applications. IARPA said the conference will take place in Washington and will field inquiries from potential vendors on the Homomorphic Encryption Computing...
Legislation, Policy, and Regulation
The Spies of the 'Five Eyes' Need to Speed Up Intel-Sharing (Defense One) Nations must speed the dissemination of information to enable real-time responses and counter disabling cyber threats.
Trump Backs Off Cybersecurity Plan With Putin After Criticism From Own Party (RadioFreeEurope/RadioLiberty) U.S. President Donald Trump late on July 9 stepped back from his proposal to work with Russian President Vladimir Putin to establish a cybersecurity unit to prevent hacking and election meddling after he received blistering criticism from his own party
Trump backtracks on U.S.-Russia cyber unit, says it cannot happen (Reuters) U.S. President Donald Trump on Sunday backtracked on his push for a cyber security unit with Russia, tweeting that he did not think it could happen, only hours after promoting it following his talks with Russian President Vladimir Putin.
Trump beats hasty retreat on Russia cyber security plan (CRN Australia) President announces Putin partnership then backtracks after friendly fire.
Trump: US must work with Russia, move past election issues (Military Times) President Donald Trump said Sunday that "it is time to move forward in working constructively with Russia" after his lengthy meeting with Russian President Vladimir Putin in Germany. But he is still avoiding the question of whether he accepts Putin's denial that Russia was responsible for meddling in the 2016 election.
Trump discussed forming “impenetrable” cyber security unit with Russia (TechCrunch) In a series of tweets on Sunday, U.S. President Trump recapped his lengthy meeting with Russian President Vladimir Putin on Friday. Apparently, the two world..
Trump says discussed forming cyber security unit with Putin (Reuters) U.S. President Donald Trump said on Twitter on Sunday that he discussed forming a cyber security unit to guard against election hacking with Russian President Vladimir Putin.
Trump, Putin discuss working together on cyber issues (TheHill) "This is like giving the alarm code to the guys who just burglarized your home," Dem says.
'This implicates us in their propaganda': The US just made a striking concession to the Kremlin (Business Insider) The US could inadvertently be furthering Russia's disinformation campaign.
Marco Rubio slams Trump's proposed Russia cybersecurity partnership: Putin 'will never be a trusted ally' (Washington Examiner) Trump proposed forming a 'impenetrable Cyber Security unit' with the Kremlin.
Republicans deride Trump's idea for cyber security unit with Russia (Reuters) U.S. President Donald Trump said on Sunday he and Russia's president had discussed forming a cyber security unit, an idea harshly criticized by Republicans who said Moscow could not be trusted after its alleged meddling in the 2016 U.S. election.
5 Takeaways From the ‘Very Robust,’ 2-Hour Meeting Between Trump and Putin (Foreign Policy) Clarity on Trump's stance on electoral meddling in the 2016 elections is not one of them.
State election officials worry about 2018 election security (News 12 Long Island) State election officials voiced doubt Saturday that adequate security measures can be adopted before 2018 elections to safeguard against the possibility of a foreign government interfering in...
Opinion | Combating a Real Threat to Election Integrity (New York Times) States can take steps to make voting systems more secure from hackers.
Ex-GCHQ Boss: Encryption Backdoors Are a Threat to All (Infosecurity Magazine) Ex-GCHQ Boss: Encryption Backdoors Are a Threat to All. Robert Hannigan says governments need to work in different ways with tech companies
The time is now for a public debate over cryptography policy (ZDNet) Experts, not just politicians, need to be at the table.
Spotify, Google, Tons of Other Companies Will Protest to Save Net Neutrality (Motherboard) The tech giants join Spotify, Reddit, Amazon, and the porn industry in next week's protest.
Singapore unveils first look at new cybersecurity laws (ZDNet) Government says proposed cybersecurity legislations were necessary to take proactive measures to safeguard the country's critical infrastructures and include licensing selected cybersecurity vendors.
Web guardians to repel Oman cyber attacks (Times of Oman) An online army of web guardians is being trained to repel attacks against Oman.
Web constables, SIs to keep hackers off AP net (The Pioneer) Known for its techies globally, but still hit by cyber ransomware viruses like WannaCry back home, Andhra Pradesh has decided to take the hacking menace head on. Citizens with specified
Litigation, Investigation, and Law Enforcement
Haley: 'Everybody knows that Russia meddled in our elections' (POLITICO) Haley said that Trump brought up Russian meddling early on in his meeting with Russian President Vladimir Putin on Friday, telling him to "cut it out."
Tillerson Says Russia Must Restore Ukraine Territory, or Sanctions Stay (New York Times) The secretary of state, on a visit to Kiev, appeared to set the same high bar for sanctions relief that the Obama administration did.
Trump accepts we didn’t mess with election, claim Russians (Times (London)) Donald Trump has accepted President Putin’s claims that the Kremlin did not meddle in last year’s US elections, according to Russia’s foreign minister. President Trump challenged Mr Putin over the...
Maddow warns other media of fake NSA documents (TheHill) The MSNBC host received documents on Russia that she believes were fake.
Hacked DNC servers: Will government ever be given access? (Fox News) As President Trump reportedly questions Russian President Vladimir Putin on alleged Russian interference in the U.S. election, there is a growing focus on a different, as-yet-unanswered question: Where are the Democratic National Committee servers that were allegedly breached by Russian hackers, and has anyone in the government been able to look at them?
Trump Is Less Convinced About Russian Hacking Than His Intelligence Chiefs (NPR.org) The president continues to hedge on whether he believes Russia meddled in the 2016 elections, despite evidence that Russia did interfere and testimony from the intelligence officials he chose.
Donald Trump intimates talked 'adoption' with Kremlin-linked lawyer (Deutsche Welle) US President Donald Trump's son, son-in-law and campaign chairman met with a Kremlin-linked lawyer last June, media report. The meeting occurred shortly after Trump won the 2016 Republican presidential nomination.
Trump’s Son Met With Russian Lawyer After Being Promised Damaging Information on Clinton (New York Times) Donald Trump Jr. is said to have arranged the meeting with the Kremlin-linked lawyer during the campaign after he was told he would be provided with details about Hillary Clinton.
Dvorak pushes Indiana election official for Russian hacking information (South Bend Tribune) Secretary of State Lawson offers meeting
Kaspersky backs Google, Apple's privacy stance (The Sydney Morning Herald) Eugene Kaspersky, the colourful Russian cyber security executive, says technology companies must respect the individual's privacy and products should not be made to be broken.
Waymo drops most patent claims in Uber self-driving car lawsuit (TechCrunch) There were a few big breaks in the case between Waymo and Uber over self-driving car technology today. As a result, the scope of the case is starting to come..
Audi manager charged in diesel scandal (Ars Technica) The 2015 Volkswagen diesel scandal continues, now with more subterfuge.
Banks Deploy AI to Cut Off Terrorists’ Funding (WIRED) Computers are better than humans are recognizing small patterns.
AI Is Making It Extremely Easy for Students to Cheat | Backchannel (WIRED) Teachers are being forced to adapt to new tools that execute homework perfectly.
Prisoner Uses Drones and Cell Phones to Escape (HackRead) Jimmy Causey, a 46-year-old inmate, captured for kidnapping a lawyer, escaped from the South Carolina prison using some sophisticated technology setup that
The Latest: SC governor demands prison cellphone jamming (KLTV) South Carolina's governor is demanding that federal officials allow state prisons to jam cellphone signals to keep the state's prisons safer.
Investor Claims Oracle Wanted To Acquire Palantir (Realist Investor) Marc Abramowitz, an investor in Palantir, told a court on Wednesday that Oracle Corp had held discussions last year with a view to acquiring the data analytics firm.
Cybersleuth Investigations Works to Educate and Assist Victims of Online Sextortion (PRNewswire) Last week, reality star, Rob Kardashian's ex-girlfriend, Blac Chyna,...
Sorry, But You Need to Care About Blac Chyna and Rob Kardashian (WIRED) Like it or not, the Kardashians set standards for social media behavior. Rob Kardashian's might just be illegal.
Man stole bitcoin by phishing individuals on the dark web (Help Net Security) Michael Richo went dark web phishing, and stole bitcoin from people involved in illegal deals through dark web marketplaces.