The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
One goal of the DoD Net Centric vision is to provide visibility into the M&S resources across the DoD enterprise. The Defense M&S Catalog was established to support the visibility component of the net centric data strategy and to provide an avenue for M&S organizations to make resources available for reuse. This presentation will provide an overview of the Defense M&S Catalog.
A panel at the Army Cyber Institute's CyCon U.S. conference in Washington, including officials from the Federal Bureau of Investigation, Department of Homeland Security, and the Office of the Director of National Intelligence, agreed that PPD-41 codifies the collaboration and best practices that have evolved in response to recent major cyber attacks.
Announced on October 19 and expected to become a commercial reality by 2017, Fujitsu said in a release that it is currently designing two new types of blockchain-based systems.
The routine nature of OPM’s business made the revelations of April 15, 2015, as perplexing as they were disturbing.
Secure Passwords Can Be Sent Through Your Body, Instead of Air - University of Washington
University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body.
The case for using a blockchain boils down to a concept in computer security known as “information integrity.”
Ransomware groups have evolved yet another new tactic in their quest to infect victims with malicious file-encrypting software, including those behind the notorious Locky campaign.
$2 Million HIPAA Penalty After Patient Data Exposed on Web - HealthcareInfoSecurity
In the twelfth HIPAA enforcement action so far this year, federal regulators have smacked St. Joseph Health System with a $2.14 million penalty after investigating a breach that left protected health information of nearly 32,000 individuals exposed to internet searches for more than a year.
The attackers used hundreds of thousands of internet-connected devices that had previously been infected with a malicious code that allowed them to cause outages that began in the Eastern United States and then spread to other parts of the country and Europe.
Tags: Internet of Things (IoT)
In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices.
DOD officials spelled out the terms and conditions under which the activities could be conducted and explicitly stated that hackers would not be prosecuted if they stayed within the given parameters.
Tags: Network Security
LDAP Attack Vector Makes Terabit-Scale DDoS Attacks Possible - SecurityWeek
A new zero-day distributed denial of service (DDoS) attack vector could open the flood gates for terabit-scale DDoS events, researchers at Corero Network Security warn.
Tags: Denial-of-Service Attacks, Internet of Things (IoT)
The Defense Department has awarded a contract to HackerOne and Synack to create a new contract vehicle for DoD components and the services to launch their own ”bug bounty” challenges, similar to the “Hack the Pentagon” pilot program, with the ultimate objective to normalize the crowd-sourced approach to digital defenses, Pentagon officials announced today.
Rowhammer Vulnerability Comes to Android - ThreatPost
Researchers have published details of a new method for exploiting a problem with Android devices tied to a hardware flaw within DRAM memory modules that can allow attackers to get root-level access to target machines.
AtomBombing Microsoft Windows Via Code Injection - InformationWeek
Researchers have identified a new way to inject malicious code into Windows systems -- and it doesn't exploit a vulnerability.
IARPA program wants to build secure environments from the beginning that can respond to malicious actions more effectively than current offerings.
Free Tool Protects PCs from Master Boot Record Attacks - IDG News Service
The tool acts as a system driver and blocks ransomware and other malicious programs from injecting rogue code into the master boot record.
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.