Thu.May 13, 2021

New US Executive Order on Cybersecurity

Schneier on Security

President Biden signed an executive order to improve government cybersecurity, setting new security standards for software sold to the federal government.

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

In a day and age when the prime directive for many organizations is to seek digital agility above all else, cool new apps get conceived, assembled and deployed at breakneck speed. Related: DHS instigates 60-day cybersecurity sprints. Software developers are king of the hill; they are the deeply-committed disciples pursuing wide open, highly dynamic creative processes set forth in the gospels of DevOps and CI/CD.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

When AI Becomes the Hacker

Dark Reading

Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society

Biden's executive order faces challenges trying to beef up US cybersecurity

Tech Republic Security

The EO is designed to protect federal networks, foster information sharing between the government and private sector, and better respond to cyber incidents. But will it do the trick

85% of Data Breaches Involve Human Interaction: Verizon DBIR

Dark Reading

Ransomware, phishing, and Web application attacks all increased during a year in which the majority of attacks involved a human element

DarkSide ransomware explained: How it works and who is behind it

CSO Magazine

DarkSide is a ransomware threat that has been in operation since at least August 2020 and was used in a cyberattack against Georgia-based Colonial Pipeline , leading to a major fuel supply disruption along the East Coast of the US.

Defending the Castle: How World History Can Teach Cybersecurity a Lesson

Dark Reading

Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended

More Trending

Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order

Dark Reading

Overall objectives are good, but EO may be too prescriptive in parts, industry experts say

US CISA and FBI publish joint alert on DarkSide ransomware

Security Affairs

FBI and DHS’s CISA have published a joint alert on DarkSide ransomware activity after the disruptive attack on Colonial Pipeline. FBI and DHS’s CISA have published a joint alert to warn of ransomware attacks conducted by the DarkSide group.

Dragos & IronNet Partner on Critical Infrastructure Security

Dark Reading

The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security

105
105

How to connect Ubuntu Linux Desktop 21.04 to an Active Directory domain

Tech Republic Security

Canonical has made it easy for admins to join Ubuntu Desktop to Active Directory domains. Jack Wallen walks you through the steps

145
145

Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential

Dark Reading

Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems

Biden issues Executive Order to strengthen nation's cybersecurity networks

Tech Republic Security

The administration, public and private sector leaders applaud the initial steps outlined but said more action needs to be taken

Firms Struggle to Secure Multicloud Misconfigurations

Dark Reading

Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database

102
102

SOC Trends ISACA Webinar Q&A

Anton on Security

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). We got a lot of great questions, and just like in the good old times , I am writing a blog where I cover some of the answers. Q: You mentioned that SOC is first a team: which skills are expected to distinguish the “basic” SOC from the modern SOC?

Risk 100

Critical Infrastructure Protection: Physical and Cyber Security Both Matter

eSecurity Planet

Oil and gas companies have two key areas of concern when addressing cybersecurity, especially in their unmanned remote facilities.

Adapting to the Security Threat of Climate Change

Dark Reading

Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown

98

European police bust major online investment fraud ring

We Live Security

The operation was carried out against an organized group that used online trading platforms to swindle victims out of US$36 million. The post European police bust major online investment fraud ring appeared first on WeLiveSecurity. Cybercrime

Gamers beware! Crooks take advantage of MSI download outage…

Naked Security

Vendor's site offline? Can't wait for your download? Tempted to go trawling through the underweb to find an "unofficial" version? Malware download scam malware MSI

Scams 88

Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack

Security Affairs

Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack.

Dark Web Getting Loaded With Bogus Covid-19 Vaccines and Forged Cards

The Hacker News

Bogus COVID-19 test results, fraudulent vaccination cards, and questionable vaccines are emerging a hot commodity on the dark web in what's the latest in a long list of cybercrimes capitalizing on the coronavirus pandemic. "A

Cisco fixes AnyConnect Client VPN zero-day disclosed in November

Security Affairs

Cisco has addressed a zero-day in the Cisco AnyConnect Secure Mobility Client VPN software, with publicly available proof-of-concept exploit code. Cisco has addressed a zero-day vulnerability in Cisco AnyConnect Secure Mobility Client , tracked as CVE-2020-3556 , that was disclosed in November.

VPN 82

Biden declines to comment on Colonial Pipeline $5m ransomware attack payment

CyberSecurity Insiders

Colonial Pipeline hack has taken a new twist yesterday when Congress came to learn that the company paid $5million to DarkSide Ransomware spreading hackers to free up the database from malware that led to disruption of fuel services across the United States and Australia to a certain extent.

Security at Bay: Critical Infrastructure Under Attack

Security Affairs

The recent Colonial Pipeline attack highlights the dangers that are facing Critical Infrastructure worldwide.

Colonial Pipeline Shells Out $5M in Extortion Payout, Report

Threatpost

According to news reports, Colonial Pipeline paid the cybergang known as DarkSide the ransom it demanded in return for a decryption key. Critical Infrastructure Malware Vulnerabilities Web Security

Biden signed executive order to improve the Nation’s Cybersecurity

Security Affairs

President Joe Biden signed an ambitious executive order to dramatically improve the security of the US government networks.

Popular Russian hacking forum XSS bans all ransomware topics

Bleeping Computer

One of the most popular Russian-speaking hacker forums, XSS, has banned all topics promoting ransomware to prevent unwanted attention. [.]. Security

Organizations in aerospace and travel sectors under attack, Microsoft warns

Security Affairs

Microsoft warns of a malware-based campaign that targeted organizations in the aerospace and travel sectors in the past months. Microsoft researchers revealed that organizations in the aerospace and travel sectors have been targeted in the past months in a malware-based campaign.

Do You Have These Top Cyber Security Skills?

CyberSecurity Insiders

An interesting take-away from the (ISC) 2 Cybersecurity Career Pursuers Study is what cybersecurity professionals told us were the most important technical skills for those looking for their first cybersecurity job.

Chemical distributor pays $4.4 million to DarkSide ransomware

Bleeping Computer

Chemical distribution company Brenntag paid a $4.4 million ransom in Bitcoin to the DarkSide ransomware gang to receive a decryptor for encrypted files and prevent the threat actors from publicly leaking stolen data. [.]. Security

Colonial Pipeline paid close to $5 million in ransomware blackmail payment

Zero Day

The payment was reportedly made soon after the attack began. It wasn’t enough to stop the disruption

Rapid7 source code, credentials accessed in Codecov supply-chain attack

Bleeping Computer

US cybersecurity firm Rapid7 has disclosed that some source code repositories were accessed in a security incident linked to the supply-chain attack that recently impacted customers of the popular Codecov code coverage tool. [.]. Security

PRODUCT REVIEW: FortiWeb Cloud WAF-as-a-Service

CyberSecurity Insiders

Today, we are reviewing FortiWeb Cloud WAF-as-a-Service by Fortinet, a Web Application Firewall solution to protect organizations against a broad range of attacks.

DDOS 79

Using iPhones and AirTags to sneak data out of air-gapped networks

Malwarebytes

Someone has found an extraordinary way to exfiltrate data by piggybacking data on the backs of unsuspecting iPhones. Say what?

Ransomware Going for $4K on the Cyber-Underground

Threatpost

An analysis of three popular forums used by ransomware operators reveals a complex ecosystem with many partnerships. Malware Most Recent ThreatLists Vulnerabilities Web Security

Joe Biden signs executive order to bolster supply chain security with Cyber Threat sharing

CyberSecurity Insiders

Joe Biden who succeeded in his first presidential task of vaccinating almost the entire populace of the United States against Corona Virus has signed an executive order on Wednesday that bolsters supply chain security with cyber threat sharing.

Apple’s ‘Find My’ Network Exploited via Bluetooth

Threatpost

The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers. Cloud Security IoT Mobile Security Vulnerabilities Web Security

IoT 110