AT&T Cybersecurity Insights Report: Security at the Speed of 5G
AT&T Cybersecurity teamed up with 451 Research to survey organizations on their 5G security plans. Download today and see organizations’ 5G cybersecurity preparedness responses followed by gap analysis on what’s possibly being overlooked plus recommendations for strengthening 5G security efforts.
December 3, 2019.
By the CyberWire staff
A leak of purportedly secret documents outlining alleged topics of Anglo-American trade talks appears to be foreign disinformation, most likely of Russian origin. Reuters reports that researchers see similarities to the Secondary Infektion campaign the Atlantic Council unmasked in June. The incident has raised concerns that foreign attempts to interfere with upcoming British elections may already be in progress.
US security start-up Strider has released a report on how China has penetrated quantum research laboratories in the US, Switzerland, the UK, and Germany to obtain results that have important military applications. Much of that penetration seems to have been obtained in traditional ways, by forming partnerships with universities, recruiting Western scientists, and placing students and faculty in research institutions of interest.
Responding to Senatorial questions, the US FBI said the Russian-developed facial-image-editing application FaceApp represents a counterintelligence threat. The New York Times points out that FaceApp denies sharing data with anyone, including the Russian intelligence and security organs, and says that "most" images are deleted from its servers within forty-eight hours. But the FBI regards any app built in Russia as inherently problematic. Russian services have "robust cyber exploitation capabilities," with both the ability and authority to "remotely access all communications and servers on Russian networks without making a request to ISPs."
BlackBerry Cylance describes PyXie, a new Python remote-access Trojan. This particular RAT delivers ransomware to targets in the education and healthcare sectors.
A US Ethereum developer was charged Friday with offenses related to helping North Korea evade sanctions.
Today's issue includes events affecting Brazil, China, European Union, India, Iran, Israel, Democratic Peoples Republic of Korea, Republic of Korea, Malaysia, Poland, Russia, United Kingdom, United States.
Bring your own context.
Information control, even in legitimate emergencies, can bite back.
"Another example about five years back was we had a group of terrorists seize a shopping mall in Kenya, and the government tried to shut down communication and reporting about what was happening. And the result was that the terrorists who were on social media became the primary source for the world on their act of terrorism. So actually, we fed into the very goal of terrorism, which is to drive the message and it's to drive fear viral. But what was, again, interesting is the terrorists realized that because they own the narrative, they also didn't have to tell the truth online. You know, again, sort of a seemingly obvious realization but, you know, this is where we are at."
Without proper context, cyber threat intelligence is useless.
The appearance of new threats and security challenges requires effective tools for their timely identification and in-depth analysis. Without proper contextualization, intelligence is completely useless. Context™ – Cyber Threat Intelligence Platform for enterprises and government agencies delivers cyber threat intelligence harvested from millions of data points from the Deep and Dark Web, combined with data science for objective and actionable insights.
And Recorded Future's latest podcast, produced in partnership with the CyberWire, is also up. In this episode, "Threat Hunting, Mentoring, and Having a Presence," the guest is O’Shea Bowens, CEO of Null Hat Security and a SOC manager for Toast, a Boston-area firm, where he focuses on threat hunting, incident response, SOC operations, and cloud computing. O’Shea shares his early beginnings as a teenage hacker learning the ropes, his career path, and why he believes it’s important to be a role model, a mentor, and to have a presence in the security community.
A bug in Microsoft’s login system put users at risk of account hijacks(TechCrunch) Microsoft has fixed a vulnerability in its login system, which security researchers say could have been used to trick unsuspecting victims into giving over complete access to their online accounts. The bug allowed attackers to quietly steal account tokens, which websites and apps use to grant users…
Meet PyXie: A Nefarious New Python RAT(Threat Vector) Introducing PyXie - a new Python RAT observed by our researchers delivering ransomware targeting the healthcare and education industries.
Quantum Dragon Report(Strider) Utilizing Strider’s technology platform and proprietary datasets, Quantum Dragon reveals how China leveraged foreign quantum science labs and government talent recruitment programs to advance its military quantum program.
Exposed Firebase databases hidden by Google search(SearchSecurity) A security researcher found that exposed Firebase databases are searchable in most search engines but claimed Google is scrubbing such search results to hide databases that are publicly accessible.
Vulnerability Summary for the Week of November 25, 2019(CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Security Patches, Mitigations, and Software Updates
10 Predictions How AI Will Improve Cybersecurity In 2020(Enterprise Irregulars) Cybersecurity is at an inflection point entering 2020. Advances in AI and machine learning are accelerating its technological progress. Real-time data and analytics are making it possible to build stronger business cases, driving higher adoption. Cybersecurity spending has rarely been linked to increasing revenues or reducing costs, but that’s about to change in 2020. What …
Ability Inc. Announces Entry into New Contracts(West) Ability Inc. (Nasdaq: ABIL) (the “Company”), a leading provider of innovative tactical and strategic communications intelligence solutions, today announced that on November 29, 2019, it has entered into, through its wholly-owned subsidiary Ability Computers and Software Industries Ltd. (“ACSI”), into new contracts for selling its strategic interception solutions. According to the contracts, ACSI is expected to receive fees in the aggregate amount of up to $9.0 million, subject to certain approvals from local authorities and systems acceptances.
Tanium Expands ‘Endpoint’ Visibility Vision(Forbes) The world is a maelstrom of endpoints. Computers and devices in any form that enjoy a connection to the Internet are known as ‘endpoints’, simply because they represent one end of the journey that information (in the form of data) takes to travel to the human or machine using it.
NortonLifeLock: A Leaner, Meaner Symantec(Seeking Alpha) After selling its stressed enterprise business division to Broadcom, a leaner NortonLifeLock (Symantec) plans to market its consumer cybersecurity business globally.
Cipherloc Appoints Andrew Borene as CEO(Yahoo) Borene brings deep domain expertise across both the public and private sectors to the CipherLoc team. "I look forward to hitting the ground running with the team at CipherLoc," said Andrew Borene, newly appointed CEO. "We are excited to welcome Andrew to CipherLoc," said Tom Wilkinson
OPTOLANE Chooses Trustonic to Protect New Connected Medical Diagnostic Devices(Global Security Mag Online) Trustonic announces that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities.
IGEL Enhances the Security Capabilities of UD7 Endpoints(IGEL) IGEL, provider of the next-gen edge OS for cloud workspaces, today announced that it has integrated the AMD Secure Processor on IGEL UD7 endpoints, effectively creating a dedicated ‘chain of trust’ security system that further strengthens IGEL’s security posture. IGEL UD7 featuring the integrated AMD Secure… Read More »
The priorities of cyber diplomacy in the Rouhani’s government(Modern Diplomacy) Technological growth and its breakthrough advances, along with their advantages, also have disadvantages, which are obvious examples of communication equipment. In fact, today, the Internet, telephones, cell phones and other communication devices can be described as a double-edged sword used to facilitate communications on the one hand and to spy on and monitor information. The […]
UN Facial ID Tenets Framed By China(PYMNTS.com) Technology firms in China are framing facial recognition policies at the UN. Standards established in the ITU are often used as doctrine by emerging nations.
Although the benefits of cyberspace are undeniable, malicious state and criminal actors often use it for nefarious ends, and at times endanger its digital infrastructure. A recently issued report by the Global Commission on the Stability of Cyberspace is a first step toward protecting this vulnerable domain.
MinDef seeks allocation to face cyber threats(The Edge Markets) The Ministry of Defence (MinDef) is seeking an additional allocation to face a new threat, namely, cyber attacks as stated in the Defence White Paper (KPP), said its Minister Mohamad Sabu.He said the ministry endeavoured to obtain more funds and found that Members of Parliament including from the opposition wanted the ministry to boost the acquisition of assets specifically in facing the threat of cyber attacks."Yes, they (government and opposition Members of Parliament) are of
US cyber commander in Seoul for ‘important, timely’ discussion(Korea Herald) Paul Nakasone, US director of the National Security Agency, has arrived in South Korea to discuss the two countries’ alliance and cyber cooperation, government officials here confirmed Tuesday. On Tuesday morning, Nakasone, who is also the commander of the US Cyber Command, met with Chun Jung-soo, commander for Korea’s Cyber Operations Command, to discuss reinforcing cooperation in the area of cybersecuri...
Air Force detachment activated for cyber testing(Antelope Valley Press) Detachment 1, 47th Cyberspace Test Squadron, 96th Cyberspace Test Group, 96th Test Wing, was officially activated during a ceremony at Edwards Air Force Base on Nov. 19.
FBI Letter to Senator Schumer re: FaceApp(Federal Bureau of Investigation) Dear Senator Schumer: On behalf of the Federal Bureau of Investigation (FBI), this responds to your letter, dated July 17, 2019, to the FBI and the Federal Trade Commission (FTC) regarding the mobile software application FaceApp.
Former Franklin Regional student pleads guilty in 2016 cyber attack case(TribLIVE.com) A former Franklin Regional High School student pleaded guilty Monday to launching a cyber attack on the school’s computer network that disrupted servers at more than a dozen other local school districts and government offices. Police said Michaela G. King, 21, of Murrysville, was a high school senior in November
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
WSJ Pro Cybersecurity Executive Forum(New York, New York, USA, December 3, 2019) Cybersecurity risks are rapidly changing, so this year’s forum and masterclasses have been redesigned to focus on timely topics including: lessons from the most recent major hacks, what and how to report...
International Security Expo 2019(London, England, UK, December 3 - 4, 2019) International Security Expo, formerly UK Security Expo showcases over 1,000 of the latest innovative security products to help you improve your security. Featured over the 2 days are 13 free to attend,...
Insider Threat Program Development & Management Training(College Park, Maryland, USA, December 3 - 4, 2019) The Insider Threat Defense Group will hold its highly sought after and very affordable Insider Threat Program (ITP) Development & Management Course, at the University of Maryland College Park Campus.
Dallas Cybersecurity Conference(Dallas, Texas, USA, December 4, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
CISO Leadership Forum(Austin, Texas, USA, December 4 - 5, 2019) Forget the typical conference, which may or may not focus on the latest industry buzz, vendor specific pitches or trendy new development. Our learning sessions are vendor agnostic only as we focus on peer-to-peer...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.