The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The Joint Enterprise Defense Infrastructure cloud contract is just one slice of the Defense Department's potential cloud business, according to Deputy Defense Secretary Patrick Shanahan.
Google is Pursuing the Pentagon’s Giant Cloud Contract Quietly, Fearing An Employee Revolt - Defense One
A fierce internal debate may undermine the company's bid for the JEDI program.
Europol Shuts Down World’s Largest DDoS-for-Hire Service - Bleeping Computer
Europol officials have shut down WebStresser, a website where users could register and launch DDoS attacks after paying for a monthly plan, with prices starting as low as €15 ($18.25).
A pioneering fingerprint technique used to convict a drugs gang from a WhatsApp message "is the future" of how police approach evidence to catch criminals.
The Russian military has been jamming some U.S. military drones operating in the skies over Syria, seriously affecting American military operations, according to four U.S. officials.
New Satan Ransomware Available Through a Ransomware as a Service - Bleeping Computer
A new Ransomware as a Service, or RaaS, called Satan has been discovered by security researcher Xylitol. This service allows any wannabe criminal to register an account and create their very own customized version of the Satan Ransomware.
New Advanced Phishing Kit Targets eCommerce - Security Week
A new advanced phishing kit has surfaced, which provides miscreants with more than the usual one or two pages used to collect personal and financial data from victims, Check Point warns.
Attackers on Tuesday pulled off a complex attack using kinks in core internet infrastructure that caused users of an Ethereum wallet developer's website to be redirected to a phishing site.
Isolated, Air-Gapped Cypto-Wallets Hacked - InfoSecurity Magazine
For those who manage their cryptocurrency in offline, or "cold," wallets under the premise that they cannot be compromised, recent news from researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev, Israel, raises some alarms. Guri demonstrated that cold wallets can be infected with malicious code, allowing an attacker to access the wallet’s private keys.
At the Infiltrate conference in Miami later this week, Tuominen and Hirvonen plan to present a technique they've found to not simply clone the keycard RFID codes used by Vingcard's Vision locks, but to create a master key that can open any room in a hotel.
DARPA Wants to Merge Human and Computer Cyber Defenders - Defense One
The Pentagon's long-horizon research and development wing is betting it can combine human and computer cyber defenders in a way that adds up to more than the sum of their parts.
Researchers Hacked Amazon’s Alexa to Spy On Users, Again - Threat Post
A malicious proof-of-concept Amazon Echo Skill shows how attackers can abuse the Alexa virtual assistant to eavesdrop on consumers with smart devices – and automatically transcribe every word said.
Scientists Plan Huge European AI Hub to Compete with US - The Guardian
Leading scientists have drawn up plans for a vast multinational European institute devoted to world-class artificial intelligence (AI) research in a desperate bid to nurture and retain top talent in Europe.
A leading vendor of police body cameras and other law enforcement technology announced Thursday it would convene a panel of experts to serve as an "artificial intelligence ethics board."
Even with all Apple's expertise and investment in cybersecurity, there are some security problems that are so intractable the tech titan will require a whole lot more time and money to come up with a fix. Such an issue has been uncovered by Don A. Bailey, founder of Lab Mouse Security, who described to Forbes a hack that, whilst not catastrophic, exploits iOS devices' trust in Internet of Things devices like connected toasters and TVs. And, as he describes the attack, it can turn Apple's own security chip on iPhones into a kind of "skeleton key."
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.