The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
For many, Docker is the next big thing in cloud computing. But some big names, most notably Google, are now backing an alternative to this enormously influential technology.
90% of Healthcare Firms Hit by Cyber Attack: Ponemon - Insurance Journal
A rise in cyber attacks against doctors and hospitals is costing the U.S. healthcare system $6 billion a year as organized criminals who once targeted retailers and financial firms increasingly go after medical records.
Former Federal Employee Busted for Attempted Cyberattack to Sell Secrets to Foreign Government - Fox News
A former employee of the U.S. Department of Energy and U.S. Nuclear Regulatory Commission was busted in an FBI sting for allegedly attempting to set off a "spear fishing" cyberattack to extract nuclear information from the agency for personal gain.
The source of these attacks? North Korea. And South Korean investigators say they have proof -- the actual malicious codes used in the attacks.
Could Cyber Attacks Lead to Nuclear War? - The Diplomat
"De-alerting" nuclear arsenals could help reduce the likelihood of a cyberattack causing an accidental nuclear war between the United States and Russia.
Beijing attacked two U.S. web pages used to beat censors.
Internal Revenue Service Joins Cybercrime Hunt With New Investigation Team - Wall Street Journal
The agency, which is increasingly being drawn into complex cyberprobes involving tax fraud, has set up a new criminal-investigation team of about a dozen agents.
Microsoft announced a raft of security and data protection software on the first day of its Ignite conference.
Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.
Hackers Leak Baltimore Police Data - Softpedia
The recent manifestations in Baltimore against the police department have been noticed by hackers operating under the "Anonymous" banner, who sided with the protesters and disclosed to the public some information belonging to the law enforcement organization.
Researchers at Trend Micro have spotted thousands of spam emails designed to deliver a piece of malware to organizations.
Barracuda Fixes Critical MITM Flaws in its Web Filter - Net-Security
Barracuda Networks has issued a security update that patches critical flaws in the firmware of its Web Filter appliances, which could lead to an attacker successfully performing a man-in-the-middle (MITM) attack without the client knowing it.
A cybersecurity company faked hacks and extorted clients to buy its services, according to an ex-employee.
The emerging Pentagon division that coordinates military cybersecurity and cyberattacks is asking private contractors to help finish standing up the Cyber Command.
A hacker affiliated with the Anonymous hacktivist movement managed to extract information from databases stored on a server administered by the World Trade Organization (WTO).
SEC Releases Cybersecurity Guidance, Highlights Compliance Role - National Law Review
The SEC's Division of Investment Management recently released cybersecurity guidance highlighting best practices and warning that cybersecurity breaches and deficiencies in cybersecurity programs could cause funds and advisers to run afoul of securities laws.
Cybercriminals Use RawPOS Malware to Target Hotels, Casinos - Security Week
An old point-of-sale (PoS) malware has been used by cybercriminals to target the customers of resorts, hotels, and casinos in North America and other parts of the world.
The department blocked 1.19 billion malware instances and 358 million intrusion attempts into VA systems in March alone.
IBM scientists today unveiled two critical advances towards the realization of a practical quantum computer.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.