The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America.
The cyberattack on French broadcaster TV5Monde is on "a different scale", a terrorism expert has told Newsbeat.
Is the U.S.-Iran Cyber War Over? - The Daily Beast
U.S. officials and cyber security experts aren't betting that Iran will give up its pursuit of another strategic arsenal: cyber weapons, which the country has been rapidly acquiring and using against U.S. targets.
Hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet.
Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
A new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware.
IBM has uncovered a sophisticated fraud scheme run by a well- funded Eastern European gang of cyber criminals that uses a combination of phishing, malware and phone calls that the technology company says has netted more than $1 million from large and medium-sized U.S. companies.
SGI Selected to Boost HPC System for Total — One of the World’s Largest Commercial Deployments - Market Watch
SGI a global leader in high-performance solutions for compute, data analytics and data management, announced today that energy company Total has chosen SGI to upgrade its supercomputer "Pangea."
President Obama on Wednesday signed an executive order expanding his administration's ability to respond to malicious cyberattacks by allowing financial penalties to be inflicted on foreign actors who engage in such behavior.
AT&T agreed to pay a $25 million fine on Wednesday to settle federal charges that it failed to protect its customers' sensitive personal information, including Social Security numbers.
Researchers Spot 64-Bit Version of NewPosThings Trojan - Security Week
Researchers at Trend Micro have identified a 64-bit version of NewPosThings, a point-of-sale (PoS) malware designed to steal payment card and other sensitive information from infected systems.
Although the Coast Guard has taken substantial steps in protecting its IT operations from insider threats, a few nagging gaps remain in its internal cyber armor, according to a recent Department of Homeland Inspector Generalreport.
While DoD has hit several milestones along the way, a lack of a coordinated effort on the part of the CIO office and U.S. Cyber Command prevented an enterprise-wide switchover, according to an inspector general report from December 2014 that was recently made public.
Hackers earlier this year attacked a Federal Aviation Administration network with malicious software.
Air Force Stands Up Task Force Cyber Secure - Air Force
Chief of Staff of the Air Force General Mark A. Welsh III signed a memorandum on March 20, establishing Task Force Cyber Secure, to address challenges of the cyberspace domain in synchronization, operations and governance within the Air Force and with those organizations it supports.
The Pentagon has struggled to count up how much defense spending goes toward a "thing" called cybersecurity.
Cisco Survey Sees Evolving Security Threats - Enterprise Tech
IT infrastructure and the applications they deliver along with emerging open-source web frameworks remain the most attractive targets for hackers and cyber-criminals, according to new web security research data.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.