Cyber Attacks, Threats, and Vulnerabilities
Facebook Login Update (Facebook Newsroom) Our investigation has so far found no evidence that the attackers accessed any apps using Facebook Login.
The Facebook Hack Exposes an Internet-Wide Failure (WIRED) Major sites using Facebook's Single Sign-On don't implement basic security features, potentially making the fallout of last week's hack much worse.
Darktrace commente la faille de sécurité de Facebook (Global Security Mag Online) Suite à l’actualité relative à l’incident de sécurité chez Facebook, Emily Orton, directrice et cofondatrice de Darktrace, commente :
U.S. intelligence officials question Canada’s ability to test China’s Huawei for security breaches (The Globe and Mail) Senior officials reportedly laugh at declaration that Canada possesses sufficient safeguards to address risks posed by telecom giant
Nielsen warns of Chinese influence campaign, but not with midterms (Fifth Domain) US officials warn that China is undergoing a long-term influence campaign, and the country has one of the most invasive signals intelligence capabilities
Government agents likely affiliated with Saudi Arabia spying on dissident in Canada, Citizen Lab alleges (The Globe and Mail) According to the organization, the goal was to capture the iPhone communications of a 27-year-old Quebecker named Omar Abdulaziz , a dissident Saudi activist with a large social-media presence and who is publicly critical of the regime
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration (Threatpost) The free online office suite software is used by more than 30 million people and is a ripe target for criminals.
DanaBot Gains Popularity and Targets US Organizations in Large Campaigns (Proofpoint) Proofpoint researchers describe new campaigns using the DanaBot banking Trojan.
Torii makes botnet watchers look twice and think plenty about IoT security (TechExplore) A botnet of a special nature is alive and well. Type of damage? Exfiltration of information; commands and executables via "multiple layers of encrypted communication."
Popular TP-Link wireless home router open to remote hijacking (Help Net Security) By concatenating a known authentication flaw with a newly discovered CSRF vulnerability, attackers can take over TP-Link TL-WRN841N wireless home routers.
Gigantic 100,000-strong botnet used to hijack traffic meant for Brazilian banks (ZDNet) Botnet redirects hijacked traffic to over 50 active phishing sites.
BlackVue dashcams share cars' mapped GPS locations, stream video feeds (CSO Online) Thanks to default cloud settings, BlackVue dashcam customers may be live-streaming video and audio from their vehicles, as well as having their location mapped.
Fortnite Cheaters Tempted with Data-Stealing Malware (Infosecurity Magazine) Fortnite Cheaters Tempted with Data-Stealing Malware. Researcher warns of booby-trapped YouTube vid
Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram (Naked Security) The gaming and hacking communities overlap: Some of the hacker accounts are offering botnet access as well as Fortnite accounts.
Hackers demand ransom from hijacked Instagram influencers (Naked Security) Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, revealed reports this week.
Lock screen bypass already discovered for Apple’s iOS 12 (Naked Security) Apple’s iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a device’s contents.
When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference? (KrebsOnSecurity) A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it.
Canadian restaurant chain suffers country-wide outage after malware outbreak (ZDNet) Some restaurant locations were temporarily shut down due to the IT outage, others continued to serve customers.
Cisco’s WebEx Teams still wobbling, a week after wipeout (CRN Australia) Bright Sparks still trying to fix it all, but the flame is sputtering.
Midland back to normal operations following cyber attack (Barrie) Operations have been restored in the town of Midland one month after a sophisticated cyber-attack froze the town’s financial processing systems.
Security Patches, Mitigations, and Software Updates
Google Patches Critical Vulnerabilities in Android OS (Threatpost) The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.
Google to make Chrome extensions safer and privacy-preserving (Help Net Security) Google has announced security changes in the Chrome extensions system that will definitely make Chrome extensions safer in the near future.
Google’s new rules for developers make Chrome extensions safer for all (Naked Security) Google has announced a range of security changes to its Chrome browser that will make the use of extensions more secure.
Update now: Adobe fixes 85 serious flaws in Acrobat and Reader (Naked Security) Adobe has released updates fixing a long list of security vulnerabilities discovered in the Mac and Windows versions of Acrobat and Reader.
Adobe fixes 47 critical flaws in Acrobat and Reader (Help Net Security) Adobe security updates October 2018 have been released. They fix a prodigious amount of critical (47) and important (39) vulnerabilities.
Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws (Threatpost) Foxit users should update to Reader 9.3 and Foxit PhantomPDF 9.3 to fix the more than 100 vulnerabilities.
Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader (Help Net Security) Cisco Talos researcher Aleksandar Nikolic discovered 23 vulnerabilities in Foxit PDF Reader, a popular, free program for viewing, creating and editing PDFs.
Some Apple laptops shipped with Intel chips in "manufacturing mode" (ZDNet) Apple fixed issue with an update released in June but other OEMs may also be affected.
Cyber Trends
The Future of War Will Be 'Liked' (Foreign Policy) In the social media age, what you share is deciding what happens on the battlefield.
New study finds 5 of every 6 routers are inadequately updated for security flaws (ZDNet) Consumer group blames open source libraries and the lack of auto-update mechanisms.
Network Security Threat Assessment (BluVector) In July of 2017, The ABC CO Health Group’s information security team requested a Network Threat Assessment provided by BluVector.
Insiders cause more than 50% of data breaches, reveals Netwrix IT Risks Report (Netwrix) In terms of main threat actors, expectation rarely matches reality, because most incidents were caused by insider mistakes rather than hacker attacks, as assumed by most respondents.
2018 Cybersecurity Trends Research (CompTIA) Free download of CompTIA's official industry analysis on 2018 trends in Cybersecurity. Learn about the new innovations and opportunities happening this year.
New Trends Take Off in the Cybermarket (Government Technology) New technologies have emerged to help fortify cyberdefenses. Will they work for government?
Students swap data for coffee at cashless cafe (Naked Security) In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.
How to Make This the Summer of Missing Out (New York Times) What’s happening? Who cares. Meet JOMO, FOMO’s benevolent younger cousin.
Most people suffer from ‘phantom vibration syndrome’ (The Independent) The syndrome is said to be caused by 'learned bodily habits' and anxiety caused by daily technologies
Microsoft report reveals top 3 cyberthreats in Saudi Arabia (Arab News) DUBAI: Digital transformation will generate an extra $16.9 billion in revenue each year for the Middle East between now and 2021, according to Microsoft. Because of this, Saudi Arabia has become an enticing target for cybercriminals because of insecure consumer habits and inadequate security measures, the company’s cybersecurity study has revealed. The study highlights top three kinds of cyberthreats the Kingdom faces.
Cyberattacks Are Becoming A Greater Challenge For The Energy Industry (Forbes) Cyber adversaries have increasing incentives and opportunities to target critical energy infrastructure. Shoring up infrastructure industries is critical not just because cyber adversaries have more and more motives for attacks, but today’s expanding attack landscape, adds urgency to the situation.
Marketplace
Huawei begs FCC for 5G role, claiming delayed deployment and higher prices (VentureBeat) Huawei is lobbying the FCC to reconsider its opposition, claiming that 5G deployments will be delayed and prices will be higher without its participation.
Security startup Tanium raises another $200M at a $6.5B valuation (TechCrunch) Security continues to remain top of mind for organizations and consumers, as each day seems to bring another high-profile network breach. One of the faster-growing startups in the space is capitalising on that by raising some significant funding to fuel its growth. Tanium today said that it has rai…
Palo Alto Networks to acquire RedLock for $173 M to beef up cloud security (TechCrunch) Palo Alto Networks launched in 2005 in the age of firewalls. As we all know by now, the enterprise expanded beyond the cozy confines of a firewall long ago and vendors like Palo Alto have moved to securing data in the cloud now too. To that end, the company announced its intent to pay $173 [&hellip…
Hysolate Secures $18M Series B Round for Disruptive Cybersecurity Isolation Platform (Hysolate) Revolutionizing the Endpoint
CloudKnox Launches Cloud Security Platform to Control the Most Significant Risk for Hybrid-Cloud Environments – Overprivileged Identities (BusinessWire) CloudKnox Security today launched with $10.75 million in funding led by ClearSky Security with participation from Dell Technologies Capital and Founda
Exostar acquires Pirean to simplify data, clinical application access (Outsourcing Pharma) The identity and access management firm Exostar has acquired UK-headquartered Pirean Limited to provide the pharma industry with simplicity, speed, and security, says VP.
Cisco closes on $2.35 billion acquisition of Duo Security (Crain's Detroit Business) Experts expect the deal announced in August to have cascading, ripple effects in the burgeoning tech startup hub of Ann Arbor and the wider region.
Raytheon announces partnerships to bring advanced technology to critical infrastructure cybersecurity (PR Newswire) Raytheon Company's (NYSE: RTN) Intelligence, Information and Services business announced two partnerships to enhance...
R9B Expands International Operations into Canada (R9B) The move will deepen existing relationships with Canadian government and private industry.
Products, Services, and Solutions
Twitter bans distribution of hacked materials ahead of US midterm elections (ZDNet) Twitter announces three new major rule changes to its site rules and policies.
Denim Group Recognized as a Trusted Election Security Advisor to Help States Prepare for the Prospect of Nation-State Interference (BusinessWire) As the mid-term elections draw near, Denim Group continues outreach and advising of state and local officials, helping them outline the steps they sho
Humio Powers New Syntax Managed Cloud Security Solution With Real-Time Ability To Monitor, Alert And Investigate Compromises (PR Newswire) Humio, the only log management solution offering real-time, limitless logging capabilities with instant accessibility to...
Cisco and EfficientIP Join Forces to Tackle ‘DNS-deep’ Cyber Threats (PRWeb) EfficientIP, a leading provider of network security and automation solutions, specializing in DDI (DNS-DHCP-IPAM), today announced it is combining its techno
FireEye Helix Moves Toward Automating Security Operations « FireEye Helix Moves Toward Automating Security Operations (FireEye) Next-generation security information and event management (SIEM) capabilities will now be native features in FireEye Helix.
FireEye to launch marketplace for tools and apps (CRN Australia) FireEye Market to launch in the second half of 2018.
RANK Software Delivers New Capabilities to Hunt for Cyber Attacks in Real-Time (GlobeNewswire News Room) New Support for Third Party Tools and Techniques Increases Speed and Accuracy of Preventing Attacks
Detect, Investigate and Act on All Threats Faster with Splunk Security Solutions (MarketWatch) Splunk Ecosystem Puts the Operations Back in the Security Operations Center
Lockpath Introduces Keylight 5.1 Platform (PR Newswire) Lockpath, a leading provider of integrated risk management solutions, today announced the release of Keylight ...
Splunk channel to sprout OEM and SI program (CRN Australia) The rest of you get a mobile app and new products to play with.
Aerohive introduces Client 360, machine-learning, client-comparative analytics (Help Net Security) Aerohive Networks' Client 360 provides IT with client-comparative analytics to verify or troubleshoot the client experience.
Waratek Secure Provides Fast and Accurate Protection Against Common Attacks and Zero Days (PR Newswire) Waratek, the compiler-based application security company, has announced a new, stand-alone lightweight runtime ...
AdaptiveMobile Security Introduces Commercial Traffic Management (ReadITQuik) The company noted that the A2P SMS market is expected to be worth $26.61 billion in 2022, which translates into an opportunity for carriers and aggregators to introduce supplementary management and analytics to these messages to make sure that A2P messages are distinguished as well as priced appropriately on the basis of their value to the sender.
Dashlane password manager adds VPN protection for total online security (Cult of Mac) The powerful Dashlane password manager just got a security boost. A newly added VPN feature makes sure all your online sessions are safe.
NYC Launches First-Of-Its-Kind Mobile Threat Detection App (BusinessWire) New York City Cyber Command announced today that it has launched NYC Secure, a free mobile threat protection app for New Yorkers.
EclecticIQ delivers curated and structured intelligence with Fusion Center Intelligence Bundles (PR Newswire) EclecticIQ, which empowers cyber defenses with Threat Intelligence, today announced at FS-ISAC European Summit the...
Ziften Enters United Kingdom (UK) and Ireland with Endpoint Protection Platform; Partners with Microsoft Windows Defender ATP Specialist Threatscape (PR Newswire) Ziften, a leader in endpoint protection plus visibility and hardening, today announced its entry into the UK and Irish...
Google’s cyber unit Jigsaw introduces Intra, a new security app dedicated to busting censorship (TechCrunch) Jigsaw, the division owned by Google parent Alphabet, has revealed Intra, a new app aimed at protecting users from state-sponsored censorship. Intra is a new app that aims to prevent DNS manipulation attacks. Whenever you visit a website, the easy-to-remember web address is converted to a less-than…
Anti-spam service Truecaller is now a messaging app too (TechCrunch) Truecaller, the app that helps screen spam calls and messages, is becoming a chat app as it continues to develop into a social service. The company announced today that it is introducing a chat feature to its Android and iOS apps, although it is already live for Android beta users. The move follows…
Technologies, Techniques, and Standards
Infrastructure providers should re-examine their contracts under the lens of NIS (Computing) Companies must inform the ICO of incidents, but that doesn't apply to their cloud providers,Cloud and Infrastructure ,Cloud and Infrastructure,Infrastructure provider,Cloud and Infrastructure Summit,Kuan Hon,Notification
FDA Reveals Steps to Bolster Medical Device Cybersecurity (GovInfo Security) In its ongoing quest to improve the state of medical device cybersecurity, the FDA has announced a number of key moves - including the release of a security
Latest Building Security In Maturity Model reflects software security initiatives of 120 firms (Help Net Security) BSIMM9 highlights impact of cloud transformation and growth of software security community. It reflects data collected of real-world SSIs across 120 firms.
You gotta fight, for your right, to erasure (Help Net Security) The right to erasure grants any user or customer the right to request that an organization deletes all data related or associated to them without delay.
How Many Daily Cybersecurity Alerts does the SOC Really Receive? (Bricata) The security operations center (SOC) is drowning in cybersecurity alerts.
How to minimize the negative effect of mobile device loss or theft (Help Net Security) When it comes to personal devices, you must react quickly, especially if you made the critical mistake of not securing your device with a strong passphrase.
How to have that difficult “stay safe online” conversation with your kids (Naked Security) As your children start using the internet with greater independence, help keep them – and their data – safe with these simple tips.
The Army is working toward a cyber domain doctrine (Fifth Domain) Cyber demands rules of engagement and concepts of operations just like those that exist for the other domains, and the Army is leading the way to establish the needed doctrine.
Jargon Buster Guide to Post Quantum Cryptography (ComputerWeekly.com) This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Cybercriminals are using blockchain to improve security. Should you? (CSO Online) Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.
Design and Innovation
Honda to Invest in GM’s Self-Driving Car Unit GM Cruise (Wall Street Journal) Honda is investing $2.75 billion in General Motors’s self-driving car unit, a move that comes as the transportation landscape is swiftly being reshaped by technology.
Research and Development
An eminent mathematician claims to have solved one of math's greatest mysteries — and it's one of 6 problems with a $1 million prize (Business Insider) In 2000, the Clay Mathematics Institute released a set of seven of the most important problems in modern mathematics, with a million dollar prize attached to each. Six remain unsolved.
Existence and Smoothness of Navier-Stokes Equations (ArXiv) In this paper we propose new method for proving of global solutions for 3D Navier-Stokes equations. This complies an application to the Clay Institute Millennium Prize Navier Stokes Problem. The proposed method can be applied for investigation of global solutions for other classes of PDEs.
Legislation, Policy, and Regulation
Europe is drawing fresh battle lines around the ethics of big data (TechCrunch) It’s been just over four months since Europe’s tough new privacy framework came into force. You might believe that little of substance has changed for big tech’s data-hungry smooth operators since then — beyond firing out a wave of privacy policy update spam, and putting up …
U.S., Montenegro conduct groundbreaking cyber defense cooperation (U.S. Cyber Command) U.S. service members worked alongside cyber defenders within the Government of Montenegro over the past few weeks to build cyber defense capabilities. U.S. Cyber Command Airmen, in cooperation with
How Russia and China Undermine Democracy (Foreign Affairs) Both Russia and China view weakening Western democracy as a means of enhancing their own standing.
Is the U.S. Using Sanctions Too Aggressively? (Foreign Affairs) The United States’ use of sanctions has exploded over the past decade. An analysis by the law firm Gibson Dunn found that President Donald Trump’s administration added nearly 1,000 people, companies, and entities to U.S. sanctions lists during 2017, nearly 30 percent more than the number added during former President Barack Obama’s last year in office.
How the US cyber force is maturing (Fifth Domain) U.S. Cyber Command is moving past building to operational readiness.
The Five Eyes Statement on Encryption: Things Are Seldom What They Seem (Lawfare) The statement is an effort by the intelligence alliance to show support for a new Australian proposal on lawful access to encrypted devices. But it ignores technical realities—and certain important signatures are missing.
Bill Text - SB-1001 Bots: disclosure.SB1001:v92#DOCUMENT (California Legislative Information) An act to add Chapter 6 (commencing with Section 17940) to Part 3 of Division 7 of the Business and Professions Code, relating to bots.
The Army has a new deputy for information and networks (C4ISRNET) The U.S. Army announced Gregory L. Garcia as the service’s new deputy chief information officer/G-6, a move that fills the Army’s highest civilian IT position
Litigation, Investigation, and Law Enforcement
Un policier de la DGSI écroué pour vente d’informations confidentielles (Le Parisien) Sur le Darknet, le gardien de la paix était notamment en contact avec des membres du crime organisé.
French police officer caught selling confidential police data on the dark web (ZDNet) Police officer also advertised a system to track the location of buyers' gang rivals or spouses based on the telephone numbers.
Facebook could face $1.63bn fine under GDPR over latest data breach (ZDNet) Facebook was fined £500,000 under the Data Protection Act for the Cambridge Analytica scandal but may not get away so lightly this time.
Irish regulator set to probe Facebook over cyber attack under GDPR (Financial Times) Facebook disclosed on Friday that hackers had stolen keys that allowed them to access up to 50m user accounts © PA
Data protection watchdog criticises Facebook as investigation continues (The Telegraph) A data protection watchdog has criticised Facebook for failing to provide adequate information about a security breach that has compromised the personal details of millions of people.
High Court Rules in Favour of Glasswall in Defence of the Validity of its Core Patent in an Action Brought by Clearswift (Glasswall Solutions) The High Court, has dismissed the challenge brought by Clearswift, a subsidiary of RUAG, against the first-family patent of Glasswall, a leading UK and global cyber security company. The specialist Patents Court endorsed Glasswall’s case, ruling the patent valid and …
Suspect forced to unlock iPhone with his face (Naked Security) The order so far hasn’t raised Fifth Amendment objections either, your face being something you are, rather than something you know.
CEO who sold phones with “totally unbreakable encryption” takes plea deal (Ars Technica) Phantom Secure's Vincent Ramos to be sentenced soon; colleagues remain at large.