Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
The conference also sought to develop some high-level, yet actionable, recommendations for furthering such transatlantic cooperation. The conference took it as given that cyberspace had become a field of great power competition, and that the Western allies faced an immediate threat from Russia ("our friends to the East," as they were frequently called) in the form of hybrid war and its attendant information operations, and a more patient threat from China in the form of long-term economic entanglement.
The perspective was clearly informed by the experiences of the Three Seas countries, the Central and Eastern European nations that stretch from the Baltic to the Black and Adriatic Seas. It was also informed by the way in which cyber conflict has evolved: while it does now fall under NATO's Article 5 collective defense provisions, cyber warfare remains for the most part confined to actions that fall below the threshold of armed conflict, and thus not susceptible to the sort of responses and deterrence that have long been in place for conventional war.
Among the recommendations the conference developed with respect to "advancing secure digital transformation" were, first, auditing the assets in place that could serve both resilience and deterrence in the Three Seas region, second, arriving at a consensus among governments of the form 5G implementation will take; third, development of a "stronger narrative" concerning the value proposition of investment in digital transformation; fourth, auditing talent in the Three Seas region; and fifth, cooperating to develop truly international as opposed to merely regional standards. With respect to building cyber deterrence along NATO's eastern flank, the recommendations divided into achieving clarity about costs and advancing cooperation within the Atlantic Alliance.
The cost piece was particularly interesting, with an emphasis on identifying what the adversary (and in this context the adversary was principally the "friends to the East," Russia) valued, and determining how those values could be held at risk. The consensus of the panelists was that Moscow was likely to remain largely indifferent to naming-and-shaming, and so that other means of imposing costs would have to be pursued. The participants recommended full use of the NATO toolbox, including diplomatic and economic tools, and they argued that imposition of costs need not, and probably should not, be symmetric. That is, threatened retaliation for cyber attacks need not confine itself to cyber counterattacks.
We'll have further reflections on the conference available later.
By the CyberWire staff
Norsk Hydro has made significant strides toward recovering from yesterday's LockerGoga infestation. Computing reports that the company said this morning that it had recovered many of its affected systems, and is on its way toward restoring normal, "stable" operations. Early assessments, as summarized by the Washington Post, hold that this was low-level, commodity criminal activity with far-reaching effects.
DFRLab reports that Venezuela's disputed Chavista regime has used phishing to expose the identities of regime opponents, apparently with threatening intent.
Physician heal thyself. Security firm Cookiebot has looked into EU official government services sites and determined that a surprisingly large fraction of them leak personal information of EU citizens to various third-parties in ways that contravene the EU's GDPR regime. ZDNet calls it an infestation of "third-party adtech scripts."
The Wall Street Journal reports that the EU has fined Google's parent Alphabet €1.49 billion ($1.7 billion) for anti-competitive restriction of other companies' ads. This is last of three formal EU anti-trust actions against the company.
Facebook has settled a lawsuit by agreeing to change its advertising platform to reduce the possibility of discrimination in housing and employment, according to the New York Law Journal.
The number and volume of DDoS attacks dropped significantly after the FBI took down fifteen DDoS-for-hire sites in December, Threatpost reports. Researchers from NexusGuard found that, in the fourth quarter of 2018, the number of DDoS attacks sank by 11%, and average size of these attacks fell by 85%, so bravo FBI, but don't get cocky, kids.
"Cloud computing” is fast becoming simply “computing.” Enterprises need cloud-style quality of service across their hybrid information and technology environments. Visit Coalfire and download the latest Gartner Report, “Predicts 2019: Increasing Reliance on Cloud Computing Transforms IT and Business Practices,” for insight into how cloud computing has grown from a delivery option to an all-encompassing strategy. Learn how businesses leverage the cloud for efficiency and innovation. Visit www.coalfire.com and download your copy today.
ON THE PODCAST
In today's podcast, out later this afternoon, we speak with our partners at Virginia Tech's Hume Center, as Dr. Charles Clancy talks through the implications of updates to the GPS system. Our guest, Landon Lewis from Pondurance, talks about balancing AI and human intelligence.
Cyber Security Summits: April 2nd in Denver and in Philadelphia on April 25th(Denver, Colorado, United States, April 2 - 25, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, U.S. Secret Service, Dell, Oracle, Darktrace, Verizon and more. Passes are limited, secure yours today: www.CyberSummitUSA.com
Global Cyber Innovation Summit(Baltimore, Maryland, United States, May 1 - 2, 2019) This unique, invitation-only forum brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. Request an invitation today.
AVEVA InduSoft Web Studio and InTouch Edge HMI(ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 6.5ATTENTION: Low skill level to exploitVendor: AVEVAEquipment: InduSoft Web Studio, InTouch Edge HMIVulnerability: Uncontrolled Search Path Element2. RISK EVALUATIONSuccessful exploitation of this vulnerability could allow execution of unauthorized code or commands.
Columbia Weather Systems MicroServer(ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 9.8ATTENTION: Exploitable remotely/low skill level to exploitVendor: Columbia Weather Systems, Inc.Equipment: Weather MicroServerVulnerabilities: Cross-site Scripting, Path Traversal, Improper Authentication, Improper Input Validation, Code Injection2.
DDoS Threats Report 2018 Q4(Nexusguard) A new development: CSP (Communication Service Provider) networks — especially those at the ASN level — were hit by a stealthy, new volumetric attack whereby attackers contaminate legitimate traffic across hundreds of IP prefixes (some 159 ASNs, spanning 527 Class C networks, based on our findings) with small-sized, junk in order to bypass detection resulting in both maximum and average attack sizes decreased measurably YoY.
These Are the Worst Corporate Hacks of All Time(Bloomberg) As business processes and personal information move online, the number of data hacks is growing. Some are minor and go undetected, while others are so major that they can put an entire company at risk.
What’s a Security Pro Worth in 2019?(Bricata) The national average salary for a cybersecurity position in the U.S. is $96,185. Here's a look at six studies examining cybersecurity compensation across positions of all levels.
Akamai Opens New Facility in Costa Rica(Costa Rica Star News) The digital technology company, Akamai, inaugurated this Monday, Match 18 its new facility in Costa Rica, located in Roble Corporate Center.
Plixer Expands Operations in EMEA Market(Plixer) Plixer, the company that solves real-world security and network operations challenges, today announced their expansion of operations to support the rapid growth of customers and partners in EMEA.
Thales on facilitating safe drone traffic, fighting drones at airports(Runway Girl) Thales, a world leader in military drones, commercial avionics and air traffic management, has been tapped to lead a SESAR Joint Undertaking public/private project aimed at readying Europe for future increases in drone traffic. But Thales is also pursuing other initiatives aimed at stopping drones from causing disruptions at airports, and imperiling flight safety. Runway Girl Network recently reached out to Thales to learn more about its stated efforts on this front. Our Q&A with Thales executives is below.
KnowBe4 turns cybersecurity training into a spy thriller(St Pete Catalyst) KnowBe4, a Clearwater-based cybersecurity training firm, is launching a 12-episode video series that brings the pitfalls in office IT security to life. The series, titled The Inside Man, focuses on an IT security analyst starting a new job where no one suspects he’s already inside their most secure systems, or that sinister forces are pulling [...]
A connected approach to compromised mailbox security(Sophos News) Your mailbox is more valuable than ever to attackers, with 93% of company breaches in security now starting with a phishing email. Whether users are targeted to receive phishing emails, or they hav…
New cyber security service helps protect Australian democracy(Microsoft News Centre Australia) With the Federal election on the horizon and NSW poll just days away it’s timely to reflect on the importance of democracy to all Australians and to take stock of how well we are able to protect our democratic rights and ...
The Future of Passwords Isn’t Looking Bright – But We Still Have to Secure Them(Security Boulevard) Many security and IT professionals consider passwords to be the weakest link in their company’s defenses – and that’s for a good reason. The lack of strong passwords, a failure to change (or rotate) passwords... The post The Future of Passwords Isn’t Looking Bright – But We Still Have to Secure Them appeared first on CyberArk.
The Cognitive Science Behind Cybersecurity(American Security Today) Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really mean to security professionals? Are they just buzzwords, or can they truly help commercial and public sector organizations achieve stronger and more intelligent …
Pentagon to utilities: Uncle Sam wants you – but who do they really need(Control Global) Cyber Command is recruiting U.S. energy companies as partners in developing and a new strategy. However, the utility personnel Cyber Command wants are the engineers that know how to operate power plants and substations. However, they generally have no cyber security training or responsibility. Unfortunately, the bulk of the utility people associated with cyber security are compliance-focused without an understanding of the equipment used in power plants and the grid.
Five Eyes align zero day vulnerability procedures(Intelligence Online) Canada's Communications Security Establishment (CSE) and its Australian counterpart, the Australian Signals Directorate (ASD), published their procedures for handling zero-day
Law enforcement agencies across the EU prepare for major cross-border cyber-attacks(Europol) The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. To prepare for major cross-border cyber-attacks, an EU Law Enforcement Emergency Response Protocol has been adopted by the Council of the European Union. The Protocol gives a central role to Europol’s European Cybercrime Centre (EC3) and is part of the EU Blueprint for Coordinated Response to Large-Scale Cross-Border Cybersecurity Incidents and Crises1.
China wants to divide and rule in Europe(Times) President Xi Jinping can expect a hero’s welcome in Rome tomorrow since he ticks all of the populist government’s criteria for a strongman leader. How do we know this? Well, here’s a clue: the...
Chinese Rail Cars Spark Concern Over Cybersecurity(Government Technology) A bipartisan group of U.S. senators has introduced legislation that would prevent transit agencies from using federal funding for rail-car contracts with companies that are owned, controlled or subsidized by China.
Google Offers Concessions on Eve of New EU Antitrust Rebuke(Wall Street Journal) Google plans to ask all Android smartphone users in Europe whether they want to switch to competing search engines or web browsers, one of two new concessions the search giant is offering to stave off complaints—and potential fines—from European Union antitrust regulators.
Google Fined $1.7 Billion in EU for Restricting Rivals’ Ads(Wall Street Journal) Alphabet’s Google was fined €1.49 billion ($1.7 billion) by the European Union for limiting how some websites could display ads sold by its rivals, the tech giant’s third antitrust penalty from the block since 2017.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
National Cyber League Spring Season(Various, February 25 - March 24, 2019) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...
2019 S&T Cybersecurity and Innovation Showcase(Washington, DC, USA, March 18 - 20, 2019) The 2019 S&T Cybersecurity and Innovation Showcase is a unique event for the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to introduce its funded research projects to...
OSSEC Open Source Security Conference(Herndon, Virginia, USA, March 20 - 21, 2019) With tens of thousands of global users, OSSEC is the world’s most widely used open source host-based intrusion detection system. Join this exclusive event on March 20-21, 2019 at the Dulles Hilton in Herndon,...
KNOW 2019(Las Vegas, Nevada, USA, March 24 - 27, 2019) The Future of Trust starts at KNOW 2019, the definitive event focused on the data economy. From Facebook and Equifax to GDPR, identity data is at the forefront of cybersecurity and regulation. KNOW is...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.