The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
This presentation will examine the 76 SWEG approach from selection, onboarding, integration, and continuing education. Are we doing all the right things? The answer to that should be represented by the performance of the resilient products that we deliver. We haven't gotten all the training right, but our evolutions are continuing to bring us closer.
Part 3 of this 6-part video series discusses the memory model paradigm, and foundational concepts behind the usage of memory: static, stack, and heap. The Class Model is described using illustrations of the relationships between code residing in static memory, and instances of objects in stack memory.
The San Jose-based company behind the now-popular videoconferencing software announced Thursday it has acquired Keybase, known for its secure messaging and file-sharing services. The plan, Zoom says, is to integrate Keybase's personnel to build end-to-end encryption throughout the service. Terms of the deal were not disclosed.
Tags: Encryption, Keybase, Zoom
GoDaddy Hack Breaches Hosting Account Credentials - Threat Post
The Trump administration is in talks with semiconductor companies about building chip factories in the United States, representatives from two chipmakers said on Sunday.
Tags: Semiconductor, United States (US)
900,000 WordPress sites attacked via XSS vulnerabilities - SC Magazine
Nearly 1 million WordPress sites are being hit by what is likely a single threat actor attempting to inject a redirect into the sites by exploiting a cross site scripting vulnerability.
Tags: Cross-Site Scripting (XSS), Vulnerability, WordPress
Hacker group floods dark web with data stolen from 11 companies - Bleeping Computer
Black Hat and DEF CON security conferences go virtual due to pandemic - Bleeping Computer
DEF CON and Black Hat announced today that their upcoming security conferences in Las Vegas this summer will no longer be in-person and are instead moving to an all-virtual event.
Tags: Black Hat, Coronavirus, DEF CON
State-linked hacking continues amid race for coronavirus treatments, US and UK agencies warn - Cyber Scoop
Hackers linked with foreign governments continue to target multiple global health care organizations and pharmaceutical companies in a possible bid to gather intelligence or steal research related to the coronavirus pandemic, American and British cybersecurity agencies said Tuesday.
Tags: Advanced Persistent Threat (APT), Coronavirus
Foreign intelligence officials say attempted cyberattack on Israeli water utilities linked to Iran - Washington Post
Iran is being linked to an attempted cyberattack last month that authorities believe was aimed at disrupting water supplies in at least two locations in Israel as that country was seeking to contain a covid-19 outbreak, according to foreign intelligence officials familiar with the matter.
Tags: Critical Infrastructure Protection (CIP), Cyber Attack, Iran, Israel
New NGA Tech Strategy Aims At AI Integration - Breaking Defense
The National Geospatial-Information Agency (NGA) is finalizing its first-ever technology strategy, designed to lay out its evolution to a data-centric operation using machine learning and artificial intelligence to speed information to users in the Intelligence Community and the military, NGA officials said today.
HASC’s Langevin Pushes White House Cyber Coordinator, ‘E-Congress’ - Breaking Defense
By pushing work online - and partially paralyzing Congress - COVID-19 has highlighted shortfalls the co-founder of the Cyber Caucus has warned about for 19 years.
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.