The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The Obama administration has lured another top digital technologist away from Silicon Valley and to the White House, this time to help the government harness big data.
Desert Falcons: The Middle East’s Preeminent APT - Kaspersky
Researchers from Kaspersky Lab have uncovered the first ever Arabic language advanced persistent threat (APT) group.
Arabic Threat Group Attacking Thousands of Victims Globally - Security Week
Threat actors with Arabic roots are targeting multiple high profile organizations and individuals from Middle Eastern countries, according to a new report from Kaspersky Lab.
Its fifth worldwide and third in Asia, the Microsoft Cybercrime Satellite Centre in Singapore will support the company's cybersecurity efforts in the region.
Navy Can’t Afford to Fix All of It’s Cyber Vulnerabilities, So Time to Prioritize - Federal News Radio
The Navy is several months into a major effort that aims to draw up the service's first comprehensive, enterprise-wide approach to cybersecurity.
PrivDog, the free browsing privacy protection tool endorsed by Comodo, has been found to offer an insecure implementation of the way it uses its own root certificate to validate the certificates from HTTPS websites.
A highly advanced cyber-espionage group dubbed Equation has been modifying the firmware in more than a dozen hard drives, possibly infecting tens of thousands of computers in sensitive sectors of activity worldwide.
Superfish adware installed on some Lenovo PCs install a non-unique trusted root certification authority (CA) certificate, allowing an attacker to spoof HTTPS traffic.
A collaboration between the UTSA Department of Computer Science and Edina, Minn.-based Silicon Informatics Inc. has yielded the delivery of a pair of highly flexible, scalable high performance computing (HPC) software tools.
Researcher discovers that voice commands and their interpreted words are clearly visible to anyone attempting to look.
NSA director and commander of U.S. Cyber Command, Mike Rogers, said legislators need to create a legal framework outside the NSA and FBI's control that would establish norms of behavior for law enforcement and intelligence-gathering organizations in the U.S. and abroad.
NIST Seeks to Raise Its Cryptographic Profile - Bank Info Security
Budget addresses threats posed by quantum computing.
A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, WLAN details, and various details regarding clients connected to the device.
Security Firm Finds Link Between China and Anthem Hack - Washington Post
A Northern Virginia cyber security firm says it has uncovered links between Chinese government-sponsored researchers and the hack of health insurance giant Anthem.
A New York financial regulator said he is considering new rules to protect against "an Armageddon-type" cyber attack that would devastate U.S. financial markets.
Facebook Unveils ThreatExchange Platform - Tech Week Europe
New Facebook platform to allow professionals to share threat data to help bolster cybersecurity.
Cheat Sheet: What Bankers Need to Know About the $1B Carbanak Heist - American Banker
Bankers should act quickly to ensure they are not vulnerable to the same kinds of attacks that allowed a gang called Carbanak to steal $1 billion from financial institutions around the world.
Fact Sheet: Cyber Threat Intelligence Integration Center - White House
The President directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC).
Security vendor Kaspersky outs a group capable of inserting spying software onto hard drives around the world, while Reuters fingers the NSA as the culprit.
A Kaspersky Lab bulletin indicates a cyberattack group has the capability to infect hard drive firmware. Learn how this capability works, and what it means for your deployed systems.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.