Cyber Attacks, Threats, and Vulnerabilities
Removing Coordinated Inauthentic Behavior (About Facebook) Today we removed four separate networks for violating our policy against foreign interference and coordinated inauthentic behavior.
Facebook closes network of accounts and pages affiliated with Roger Stone for manipulation (Washington Post) The longtime Trump friend and former campaign adviser used fake accounts and other deceptive tactics to manipulate public debate, the company said
Facebook bans 'Roger Stone disinformation network' (BBC News) The ally of US President Donald Trump was convicted of lying to Congress.
More pre-installed malware has been found in budget US smartphones (ZDNet) Cheap phones often have tradeoffs but researchers say this should never compromise user safety.
More Malware Found Preinstalled on Government Smartphones (Dark Reading) Researchers report the American Network Solutions UL40 smartphone comes with compromised apps.
We found yet another phone with pre-installed malware via the Lifeline Assistance program (Malwarebytes Labs) We discovered yet another phone model with pre-installed malware provided from the Lifeline Assistance program via Assurance Wireless by Virgin Mobile.
Evilnum hackers use the same malware supplier as FIN6, Cobalt (BleepingComputer) Hackers in the Evilnum group have developed a toolset that combines custom malware, legitimate utilities, and tools bought from a malware-as-a-service (MaaS) provider that caters for big fintech threat actors.
Researchers connect Evilnum hacking group to cyberattacks against Fintech firms (ZDNet) The APT is also a loyal customer of Golden Chickens, a Malware-as-a-Service outfit.
More evil: A deep look at Evilnum and its toolset (WeLiveSecurity) ESET research gives a detailed picture of the operations of Evilnum and its toolkit used in attacks against carefully chosen targets in the fintech sector.
Joker Android malware keeps evading Google Play Store defenses (BleepingComputer) The threat actor behind the Joker Android malware has once again succeeded to successfully slip spyware infected apps onto the Play Store, Google's official Android app store.
()
Billing Fraud Malware Bypasses Google Play Store Protections, Again (Check Point) The infamous malware, known as Joker, adapts to hide in the “essential information” file every Android app is required to have, invisibly subscribing victims to premium services without their knowledge.
()
Microsoft warns of Office 365 phishing via malicious OAuth apps (BleepingComputer) Microsoft warns that with the shift to remote working, customers are exposed to additional security threats such as consent phishing, besides conventional credential theft and email phishing attacks.
Defence department still assessing cyber attack on leading Canadian military college (Financial Post) Canada’s National Defence department is still assessing the potential damage from a cyber attack on one of the country’s premier military colleges discovered six days ago.The web site a…
'Keeper' Group Targeted Payment Card Data on 570 Sites (BankInfo Security) A hacking group known as "Keeper" has been using Magecart-like web skimmers to target the online checkout sites and portals of hundreds of e-commerce
Kingminer Botnet Keeps up with the Times (Bitdefender Labs) The e-currency boom in late 2017 sparked a new type of "gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly since late 2017, cyber-criminals are still making... #botnet #cryptominer #Kingminer
Critical security vulnerabilities impact Bullguard's Antivirus and Secure Browser software, researcher claims (Computing) The bugs could allow malicious actors to spy on the users
Look Out for "Back to School" Scams (Tessian) Nearly all of the top 20 US universities are at risk of having their institution’s domain impersonated by scammers in phishing emails. Learn why.
()
American News Site’s Subdomains Left Open for Takeover (WizCase) Wizcase hacktivist team led by Avishai Efrat has recently found a vulnerability on an American broadcasting and media company website, CBS Local. Due to a technical misconfiguration, the content of 3 subdomains owned by the site became unregistered and open for takeover. Such vulnerability can be easily exploited by cybercriminals to trick users and ...
VCH warns employees of cyber attack, no evidence data removed, misused (NEWS 1130) Vancouver Coastal Health is out with a warning for anyone who accessed its Employee and Family Assistance Program over the last five years.
Haryana Police caution people against phishing emails promising Covid-19 treatment refund (The Times of India) Haryana Police have issued an advisory requesting citizens to beware of phishing emails received from unknown or untrusted sources promising free Covi
Hackers attack ride hailing app SWVL, access user information (Nairobi News) Egypt-based ride hailing app SWVL was hacked in an attack that exposed the personal information of passengers including emails, names and phone numbers.
Worries raised over cyber security risk at Crossrail (Building) TfL minutes reveal consultant's warning that a 'technical resource capability' needs to be addressed
Security Patches, Mitigations, and Software Updates
Google Patches Critical Android Vulnerabilities With July 2020 Updates (SecurityWeek) Several critical remote code execution vulnerabilities were addressed in Android this week with the release of the July 2020 security patches
Palo Alto Networks fixes another severe flaw in PAN-OS devices (BleepingComputer) Palo Alto Networks (PAN) today addressed another severe vulnerability found in the PAN-OS GlobalProtect portal and affecting unpatched PAN next-generation firewalls.
If you haven't potentially exposed 1000s of customers once again with networking vulns, step forward... Not so fast, Palo Alto Networks (Register) Getting to be a real PAN in the OS
Cyber Trends
Honeywell reports increase in cybersecurity threats (Hydrocarbon Engineering) Honeywell cybersecurity research reveals the risk of USB threats to industrials has doubled over the past 12 months.
2020 State of SecOps and Automation Report (Sumo Logic) Security alerts more than doubled in the last 5 years. Discover why security teams are looking at SaaS SIEM to solve tomorrow’s challenges today.
Stalkerware Use Surges During Lockdown (Avast) Since lockdown measures went into effect, incidents of domestic violence have increased as has the use of stalkerware to spy on people and track their movements.
In Brazil, scammers see the coronavirus as a serious money-making opportunity (CyberScoop) Brazilian President Jair Bolsonaro’s critics say he hasn’t taken the impact of the coronavirus seriously. The same can’t be said for Brazil’s cybercriminals.
Social engineering hacks weaken cybersecurity during the pandemic (InfoWorld) Disinformation, malware, and an array of cyberattacks are rising as fast as case counts
Ransomware attacks appeared to decline as pandemic arrived (StateScoop) The number of incidents dropped as government offices closed and schools emptied out, but are starting to creep back up again, cybersecurity analysts said.
More Cybersecurity Spending Does Not Equal Results (ClearanceJobs) Research found that despite more spending increases on cybersecurity to stop hacker attempts, results are not guaranteed.
NetMotion surveys industry experts on remote access, COVID-19, and the future of VPN & SDP (NetMotion Software) With more work being done from home, global IT leaders report soaring interest in SDP remote access solutions.
Is Your WAN Holding Your Business Back? (iomart) Our survey of network professionals highlights how traditional WANs are struggling to keep up with the cloud-centric focus of many businesses.
Op-ed: Strong cybersecurity strategy is no longer a luxury for small businesses (CNBC) While businesses across the country prepare to welcome back their customers, hackers and cyber criminals are actively infiltrating and exploiting small business databases, writes Sen. Jim Risch, R-Idaho.
One surefire way to get the boss's attention on network security is to get hacked. But there must be a better way? (Register) And there is – check out our latest survey findings
Marketplace
XM Cyber Secures $17 Million in Series B Funding to Accelerate Cloud Development | XM Cyber (XM Cyber) 2020 Cool Vendor Plans Expansion of Cloud Security Posture Management Solutions
Oxford-based PQShield raises €6.12 million to secure sensitive information for the quantum era (EU-Startups) The post-quantum cryptography startup PQShield today announced a significant seed investment of €6.12 million from Kindred Capital, Crane Venture Partners, Oxford Sciences Innovation and angel investors including Andre Crawford-Brunt, Deutsche Bank's former global head of equities.
BAE Systems Spins Out SOC.OS Cybersecurity Company (MSSP Alert) Applied Intelligence, a subsidiary of MSSP BAE Systems, launches SOC.OS to help internal security teams manage alerts generated by threat detection tools.
Information Assurance Specialists Announces Company Name Change to Sub U Systems (EIN News) The rebranding to Sub U Systems reflects both the company’s evolution and the innovative secure communications products and solutions the company delivers.
Vectra expands global footprint through enriched channel partner program, training and growth into commercial market (PR Newswire) Vectra® AI, a leader in network threat detection and response (NDR), today unveiled its modernized global channel partner program, new training...
Comodo and Data Partner Inc. Announce Strategic Partnership (Yahoo) Comodo and Data Partner Inc. today announced their strategic partnership. Data Partner, IT integrator of choice for solving the most complex of IT business challenges has partnered with Comodo. Comodo is the endpoint security vendor that Data Partner recommends to clients.
Deutsche Telekom under pressure after reports on Huawei reliance (POLITICO) The German operator strengthened its strategic relationship last year despite growing defiance toward the dominant Chinese 5G vendor.
Huawei stresses there is no threat to existing UK supply commitments (Telecoms.com) With Huawei’s fate looking increasingly fragile as the US attempts to chop and chip at its supply chain, the vendor has stated it has the stockpile and capacity to meet all existing commercial contracts.
Is Emirati G42’s deal with Israeli defence about Covid-19 or surveillance? (TRT World) Group 42, linked to Emirati intelligence, announced a deal with two Israeli aerospace and defence companies, but there’s might be more than meets the eye.
Ransomware Spreads Tentacles: 3 Cybersecurity Stocks to Watch (Revised) (Yahoo) Ransomware, being the most profitable malware, cannot be prevented by an antivirus alone. Here we pick three cybersecurity companies that gains from the rise in ransomware attacks.
CynergisTek Secures Renewals from Two Perennial Fortune 1000 and Global 500 Clients (Odessa American) CynergisTek (NYSE AMERICAN: CTEK), a leader in cybersecurity, privacy and compliance, today announced renewals of two long-term, publicly held clients for information technology (IT) audit and compliance contracts totaling approximately $950 thousand.
KnowBe4's Year-Over-Year Sales Increase 25% Q2 2020 Compared to Q2 2019 (Florida Trend) Despite COVID-19 challenges, KnowBe4 still experiencing hypergrowth
Help Wanted: Biden campaign hiring cyber professionals (FCW) The campaign has put out job notices for a cyber threat analyst and cloud security architect as it looks to beef up protections ahead of the 2020 elections.
Ryan Fairchild joins Novetta as Vice President, Enterprise Solutions (PR Newswire) Novetta, a leader in advanced analytics technology, today announced that Ryan Fairchild joins as VP of Enterprise Solutions in Novetta's...
Qualys appoints Ben Carr as Chief Information Security Officer (Security Magazine) Qualys, Inc., a provider of disruptive cloud-based IT, security and compliance solutions, announced the appointment of Ben Carr as Chief Information Security Officer (CISO).
Parsons appoints new cyber business development leader (Washington Technology) Parsons Corp. adds 16-year intelligence market veteran Michael McKloskey as a vice president of business development.
IndraSoft names Greg Jaksec as Senior Director for DISA Account (INSIDENOVA.COM) IndraSoft is excited to announce the addition of Mr. Greg Jaksec as our new DISA Account Director. In this newly created position, Greg
Products, Services, and Solutions
Free Tool Enables Recovery of Files Encrypted by ThiefQuest Mac Malware (SecurityWeek) Researchers have released a free tool that allows users to recover files encrypted by the ThiefQuest Mac malware, which poses as ransomware
vArmour Delivers First Enterprise-Wide Application Relationship Management Solution to Enable Businesses to Take Control of Risk (GlobeNewswire) Application Controller is the Leading Technology That Allows Businesses to Solve Critical Understanding of Cyber Resiliency and Risk
SentinelOne Releases Free ‘EvilQuest’ Ransomware Decryptor to Defend macOS Environments (BusinessWire) SentinelOne, the autonomous cybersecurity platform company, announced a new ransomware decryptor designed to rollback the ‘EvilQuest/ThiefQuest’ ranso
NetMotion Unveils Software Defined Perimeter to Help Organizations Ach (PRWeb) NetMotion, a provider of security solutions for the world’s growing mobile and remote workforce, today announced the public availability of its new security platform
Yellowbrick and Sonra Partner to Modernize Data Warehouses by Making XML and JSON Data Conversion Faster and Easier (BusinessWire) Hybrid cloud data warehouse company Yellowbrick Data today announced that Sonra has joined the company’s partner program. Both Yellowbrick and Sonra p
Thycotic Expands Identity Provider Integrations with SCIM Connector 2.0 (PR Newswire) Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today...
Protecting your remote workforce from application-based attacks like consent phishing (Microsoft Security) Learn how to protect your workforce from application based attacks and the investments Microsoft is making to help foster a secure and trustworthy app ecosystem.
Palo Alto Networks To Enter The UK Market With Cloud Hosting Offering (Data Economy) The company says investing in local cloud infrastructure is part of Palo Alto Networks’ continued commitment to customers around the world, wherever their data resides.
Kaspersky unifies endpoint detection and response offering (Security Brief) Kaspersky has combined three of its security solutions into one single offering, designed for medium businesses.
WISeKey IoT Cybersecurity Allows Electric Vehicles to Communicate (AiThority) WISeKey International Holding Ltd, a leading Swiss cybersecurity and IoT company announced that is combining software and microchips to allow Electric Vehicles (EVs) to securely communicate with charging stations
Vodacom, Cloudflare join forces to protect firms from DDoS (ITWeb) The telco teams up with Web security company Cloudflare to offer distributed denial of service protection services.
Aryaka and 8x8 Team to Enhance Enterprise Communications Performance Across Managed SD-WAN (BusinessWire) Aryaka and 8x8 Team to Enhance Enterprise Communications Performance Across Managed SD-WAN
Intrepid Managed Discovery Partners with SecureReview (PR Newswire) Intrepid Managed Discovery today announced a partnership with SecureReview to elevate its Managed Review offering. Using a multilayered method,...
Technologies, Techniques, and Standards
Secure Legacy Systems to Protect Against Cybersecurity Threats (Security Intelligence) Improving the security of old legacy systems should be a priority for businesses. Discover ways to ensure your system is secure.
Firms Must Test Cyber Resilience Plans, Policies (Business Today) Fear, uncertainty and rapid business shifts have created the perfect storm for cybercriminals to capitalise on...
The Limits of Intuition: Army Intelligence Should Embrace Analytic Tradecraft Standards (War on the Rocks) Army intelligence lags behind most of the intelligence community in one key respect. In 2007, the intelligence community established analytic tradecraft
A new company-level unit to support information warfare (C4ISRNET) The Army plans to launch a new company-level unit in fiscal 2021 to support information warfare efforts, according to military officials, with a contract already awarded to its parent battalion.
Design and Innovation
Respond Software Awarded Defense Innovation Unit Contract to Deliver Intelligent Decision Automation Platform (Respond Software) Automated, real-time cybersecurity monitoring and investigation platform accelerates detection of malicious activity
Security isn't privacy, and you can have one without the other (Android Central) Android is a very secure operating system but that doesn't have anything to do with the privacy that you're willing to give away.
Research and Development
Q-Net Security Awarded a $3M Phase II Innovation Research Contract with the U.S. Air Force (PR Newswire) Q-Net Security, Inc. (QNS) is pleased to announce a $3M project from the U.S. Air Force, as part of a Phase II Small Business Innovation...
Cignal LLC Awarded Phase 1 Funding by DHS S&T SVIP (PR Newswire) Cignal LLC, a technology startup that develops cutting-edge capabilities for the rapid training and deployment of advanced inspection and...
Academia
SVC noted for cyber defense excellence by national agency (The Latrobe Bulletin) The National Security Agency (NSA) and Department of Homeland Security (DHS) have named St. Vincent College a Center of Academic Excellence (CAE) in Cyber Defense Education for its bachelor of
Legislation, Policy, and Regulation
U.N. Rules Require Cybersecurity Guarantees for Connected Cars (Wall Street Journal) Manufacturers selling cars in places including Japan, South Korea and the European Union will soon be required to secure connected vehicles against cyberattacks under a new regulation.
The US-China Cold War Has Already Started (The Diplomat) The clashing geopolitical ambitions of the two states are fueling a rivalry that could be even more dangerous and consequential than the original Cold War.
Hong Kong's National Security Law Allows Police To Censor The Internet, Compel Decryption (Techdirt.) The national security law the Hong Kong government passed solely with the intent of shutting down protests and local dissent is amazingly bad. It criminalizes secession, subversion, terrorism, and foreign interference. Violators of any of these...
National security agency opens in Causeway Bay (The Standard) The Office for Safeguarding National Security of the Central People's Government in the HKSAR has been opened this morning.The four-star Metropark Hotel Causeway Bay on Tung Lo Wan Road is being u...
Huawei Urges UK Not to Rush Into 5G Decision (SecurityWeek) Chinese telecoms giant Huawei urges Britain not to rush into taking any costly decision to phase out its equipment from the UK's 5G network because of US sanctions
()
Huawei says US pressure on Brazil threatens long delays in 5G rollout (Gadget Now) A Huawei Technologies executive warned that Brazil could suffer years of delay in deploying a 5G telecoms network and higher costs if it succumbs to mounting U.S. pressure to snub the Chinese equipment supplier.
TikTok is a national security threat, US politicians say. Here’s what experts think (WTOP) TikTok faces the most direct threat to its expansion in the US — not from a competitor, but from the US government.
Who owns TikTok and why is the app considered a national security threat? (Fox Business) TikTok is owned by Beijing-based technology company ByteDance, which was founded by Chinese billionaire Zhang Yiming in 2012.
Should you delete TikTok? 3 cyber security experts answer (Yahoo) These experts have one thing in common: they either don’t have the app, or don’t think you should. Here’s what you need to know.
Director Wray Discusses Threat Posed By China to U.S. Economic and National Security (Federal Bureau of Investigation) FBI Director Christopher Wray’s remarks at the Hudson Institute, Washington, D.C.
Biden Pledged to ‘Prohibit’ US Tech Companies From Helping China. It Won’t Be Easy (Defense One) There’s a growing bipartisan appetite to block and ban China from buying U.S. tech. But actually enforcing blockades requires work.
INSLM recommends taking encryption-busting approvals power from Australian Ministers (ZDNet) Instead, he wants to stand up an independent body to oversee the approval of TOLA Act warrants.
The doomed cybersecurity effort (Techzim) The core focus of the cybersecurity bill seems to be preventing citizens from organising protests instead of actual information security
New DOE document names China, Russia as threats to US bulk power system (CSO Online) A US Department of Energy RFI seeks information on energy industry's supply chain security practices following executive order to develop industry regulations.
Three major gaps in the Cyberspace Solarium Commission's report that need to be addressed (Help Net Security) The Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity".
The Cybersecurity 202: These are the top things officials say they need to run November’s elections (Washington Post) More money, better and earlier planning by political leaders – and a big dose of bipartisan cooperation.
Director's Corner Series with Ram D. Sriram (NIST) Our third Director’s Corner series blog post brings insights from Ram D.
Litigation, Investigation, and Law Enforcement
Researchers to Supreme Court: Terms of service violations shouldn't be CFAA crime (CyberScoop) As the Supreme Court prepares to consider a controversial federal anti-hacking law, a group of prominent cybersecurity researchers and legal advocates is pleading with the court not to criminalize digital research in the public interest.
EFF To Supreme Court: Violating Terms of Service Isn’t a Crime Under the CFAA (Electronic Frontier Foundation) The Electronic Frontier Foundation (EFF) and leading cybersecurity experts today urged the Supreme Court to rein in the scope of the Computer Fraud and Abuse Act (CFAA)—and protect the security research we all rely on to keep us safe—by holding that accessing computers in ways that...
UK and Australian Information Commissioners to investigate Clearview AI (ZDNet) Joint investigation follows OAIC making prior contact with Clearview AI.
Trump Dossier Erred On Putin Bribery Claims, Judge Says (Law360) A London judge ruled Wednesday that author Christopher Steele's firm didn't take "reasonable steps" to ensure the accuracy of a bribery allegation in its notorious report about President Donald Trump.
Russian ambassador calls reports of bounty program to kill U.S. soldiers a ‘downright lie’ (Washington Post) U.S. media reports of a Russian bounty program to kill U.S. soldiers in Afghanistan are a “downright lie,” Moscow’s ambassador in Washington said Wednesday, and are “poisoning the atmosphere of cooperation” on Afghan peace between the two countries.
In Novel Ruling, 5th Circ. Curbs Privacy On Bitcoin Exchanges (Law360) A first-of-its-kind Fifth Circuit finding that Bitcoin exchanges can disclose user data to the government without being served a warrant has troubled advocates, who say the boosted privacy that the cryptocurrency can provide is crucial to its appeal.
WSJ News Exclusive | Wirecard Under Criminal Scrutiny by U.S. Authorities as Part of Probe Into Alleged Bank-Fraud Conspiracy (Wall Street Journal) The Justice Department is examining whether scandal-plagued German payment company Wirecard played a critical role in an alleged $100 million bank-fraud conspiracy connected to an online marijuana marketplace, according to people familiar with the investigation.
Wirecard Probe Brings Scrutiny to How Fintech Companies Are Audited (Wall Street Journal) Auditors are still figuring out how to assess the financial statements of fintech companies, a challenge highlighted in the recent accounting scandal surrounding German electronic-payments company Wirecard.
DC Circ. Orders Release Of Secret Surveillance Records (Law360) A D.C. Circuit panel has ordered a district judge to unseal electronic surveillance records and related materials in closed federal criminal investigations, undoing a lower court's order that blocks a reporter and a media advocacy group from accessing the long-sought information.
WSJ News Exclusive | FBI Probes Chinese Exile, Including Work With Former Trump Aide Steve Bannon (Wall Street Journal) The FBI is examining exiled Chinese businessman Guo Wengui and the money used to fund his media efforts in the U.S., including his work with Steve Bannon, a former senior adviser to President Trump, according to people familiar with the matter.
Feds unseal 2018 indictment charging Kazakh man in hacks (AP NEWS) Two weeks after a cyber-security firm released the identity of an alleged hacker from Kazakhstan, federal authorities in Seattle on Tuesday unsealed a 2018 indictment charging the...
GDPR and cybersecurity obligations of virtual arbitration hearings (Lexology) The current pandemic has forced the legal world to shift to an unprecedented remote working model. Video conferencing and virtual hearings are…
Is ‘cybersubrogation’ future of privacy, data security and cyber litigation? U.S. experience (The Lawyer's Daily) There is no denying that cybercrimes are on the rise around the globe. Between June 2018 and June 2019, 53 per cent of malware attacks occurred in the United States, while 10 per cent occurred in Canada, which given its relative size, is a very large proportion. Unfortunately, these trends are predicted to continue. As a result, cyber and privacy litigation is becoming more commonplace in the United States and Canada.