Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
November 27, 2018.
A CyberWire Daily News Briefing redesign is coming.
Over the next two weeks we'll be rolling out a new design for our email, the better to avoid falling into spam traps or becoming enmeshed in the array of anti-phishing measures enterprises increasingly deploy. You've seen some of the changes already with our addition of inline links to our summary.
When the redesign is complete, you'll see fewer links to suggested reading in the email itself. That selected reading will remain present in its entirety on our website, posted as always with the appropriate Daily News Briefing. We hope you'll find the new format more user-friendly. We'll announce the date of the rollout as it approaches. And, as always, thanks for subscribing and reading.
By The CyberWire Staff
Several malicious apps have been found in Google Play. Eight of them, according to researchers at Kochava, are ad-fraud fronts associated with two Chinese firms that also operate in the US: Cheetah Mobile and Kika Tech (Buzzfeed). Trend Micro also reports malware posing as Android voice apps. They suggest this foreshadows formation of a significant botnet. Some, but not all, of the malicious apps have been taken down.
Facebook receives a Parliamentary grilling in the UK today (Guardian). Both Facebook and Google have come in for criticism recently in Europe, the former for alleged data abuse and “fake news,” the latter mostly for alleged monopolistic practices. Paradoxically, GDPR has seemed to work in the two companies’ favor, as the EU data protection regime may have suppressed upstart competitors (Politico).
Citizen Lab reports that associates of slain Mexican journalist Javier Valdez Cárdenas received texts carrying NSO Group Pegasus spyware. Cárdenas was murdered in 2017, apparently by drug cartels. Citizen Lab notes that Mexico’s government has been an NSO customer.
Russia’s guttering war against Ukraine erupted in naval attacks against Ukrainian ships in the Sea of Azov (Times). Ukraine says Russia’s intent is to consolidate its control of Crimea and ultimately establish sovereignty over the Black Sea as a whole. Ukraine has declared martial law. Expect an escalation in the hybrid conflict's cyber operations.
Privacy? Bah. Not only might your smart speaker be spying on you (Motherboard), but that smart lightbulb could have its metaphorical eye on your data as well (SecurityWeek).
How to Budget for Insider Threat Management, Proactively
According to a Ponemon Institute study, 34% of cybersecurity professionals said a lack of budget was a major barrier to effective insider threat management. So, how do you ask for the budget you need to proactively detect and stop insider threats? The latest guide from ObserveIT gives you the in-depth information you need to ask for a dedicated insider threat line item in your cybersecurity budget. Download The Guide to Budgeting for Insider Threat Management today.
Cyber Security Summit: November 29 in Los Angeles(Los Angeles, California, United States, November 29, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The CIA, The City of Los Angeles, Verizon, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com
Rapid Prototyping Event: The Turing Test(Columbia, Maryland, United States, December 11 - 13, 2018) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM, is hosting a Rapid Prototyping Event in which participants implement an automated process to interact with a Microsoft Windows machine just as a human user may do with the goal being to fool a human judge who is monitoring target computers via Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) into thinking a normal user is interacting with that machine and not an automated program or process.
Bypassing CVE-2018-15442: Another case of DLL Hijacking(SecureAuth) As an exploit writer, one of my tasks consists of gathering common vulnerabilities and exposures (CVE) and all of the information related to them in order to design an exploit for Core Impact. As part of this process I stumbled across CVE-2018-15422: A vulnerability in the update service of Cisco WebEx Meetings Desktop App for Windows.
Researchers Use Smart Bulb for Data Exfiltration(SecurityWeek) Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration.
Email Scammers Leverage California Wildfire Tragedy(Agari) With multiple dead, hundreds missing, and homes destroyed, those affected by the California Camp Fire are looking for help. But be cautious—fraudsters are using email to scam helpful citizens out of money.
GDPR's impact: The first six months(Help Net Security) GDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush it would appear very little has changed.
Facebook denies report that election war room was disbanded(TechCrunch) Facebook’s election war room monitors and dashboards remain, since so does the threat of election interference. Facebook has confirmed to TechCrunch that its election war room that it paraded reporters through in October has not been disbanded and will be used again for future elections. That…
10 Slack security tools compared(CSO Online) Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.
New campaign launched to fight festive fraud(Action Fraud) This Christmas, Action Fraud and City of London Police are reminding shoppers to take extra care when shopping for gifts online. As consumers search online for bargains and gifts for loved ones, fraudsters are seeing this as an opportunity to trick people with the promise of great deals and big cash savings.
Ukraine counters Russian threat with martial law(Times) President Poroshenko won approval in parliament last night for martial law as a response to Russia’s attack on Ukrainian naval vessels in the Black Sea. Ukrainian regions “subject to Russian...
Australia launches joint cyber centre(Jane's 360) Australia has launched a Joint Cyber Security Centre (JCSC) to provide enhanced protection for its critical infrastructure, including its national defence industry, the government announced on 23 November.
Assange Case, If It Exists, Can't Be Made Public, U.S. Argues(Bloomberg) The news media has no legal right to learn whether WikiLeaks founder Julian Assange was charged in a sealed proceeding, despite an inadvertent filing in an unrelated case that said the Justice Department has accused him of wrongdoing, the U.S. said.
The Cyber Security Summit: Los Angeles(Los Angeles, California, USA, November 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.
IEEE WIE Forum USA East(White Plains, New York, United States, November 29 - December 1, 2018) IEEE WIE Forum USA East 2018 focuses on developing and improving leadership skills for individuals at all stages of their careers. Attendees will have the opportunity to hear inspirational and empowering...
Securing Digital ID 2018(Alexandria, Virginia, USA, December 4 - 5, 2018) As an increasing number of transactions move online and are mobile-enabled, the conference will explore today’s complex world of digital identities and how they are used for strong authentication and remote...
First Annual Maryland InfraGard Cybersecurity Conference(College Park, Maryland, USA, December 5, 2018) InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely...
International Cyber Risk Management Conference(Hamilton, Bermuda, December 6 - 7, 2018) Now in its fourth year in Canada, the International Cyber Risk Management Conference (ICRMC) has earned a reputation as one of the world’s most trusted cyber security forums. We are proud to bring ICRMC...
2018 Cloud Security Alliance Congress(Orlando, Florida, USA, December 10 - 12, 2018) Today, cloud represents the central IT system by which organizations will transform themselves over the coming years. As cloud represents the future of an agile enterprise, new technology trends, such...
Wall Street Journal Pro CyberSecurity Executive Forum(New York, New York, USA, December 11, 2018) The WSJ Pro Cybersecurity Executive Forum will bring together senior figures from industry and government to discuss how senior executives can best prepare for hacking threats, manage breaches, and work...
National Cyber League Fall Season(Chevy Chase, Maryland, USA, December 15, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.