The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
One goal of the DoD Net Centric vision is to provide visibility into the M&S resources across the DoD enterprise. The Defense M&S Catalog was established to support the visibility component of the net centric data strategy and to provide an avenue for M&S organizations to make resources available for reuse. This presentation will provide an overview of the Defense M&S Catalog.
Researchers have devised a new malware attack against industrial programmable logic controllers (PLCs) that takes advantage of architectural shortcomings in microprocessors and bypasses current detection mechanisms.
Security researchers have discovered another serious vulnerability in industrial control kit from Schneider Electric.
Hitting Back at Hackers: Debate Swirls on How Far to Go - Security Week
After a seemingly endless barrage of cyberattacks, debate is heating up on hitting back at hackers where it hurts.
Google Discloses Windows Zero-Day Vulnerability - Security Week
Google has disclosed a Windows zero-day vulnerability after Microsoft failed to release a patch within the 7-day deadline the search giant gives vendors when it finds a flaw that is actively exploited by malicious actors.
Google disclosed an unpatched Windows zero-day vulnerability, which Microsoft claims is actively being exploited by a Russian APT group connected to the DNC hack.
A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats
China Passes Controversial Cybersecurity Law - Phys Org
China on Monday passed a controversial cybersecurity bill further tightening restrictions on online freedom of speech, raising concerns that it could intensify already wide-ranging Internet censorship.
Lotus Blossom Chinese Cyberspies Leverage on Fake Conference Invites in the Last Campaign - Security Affairs
The Chinese APT Lotus Blossom, also known as Elise and Esile, is behind a new cyber-espionage campaign that is trying to lure victims with fake invitations to Palo Alto Networks’ upcoming Cybersecurity Summit.
Study Finds Cyberthreat Data Overwhelming to Security Workers - HealthITSecurity
While more organizations are likely looking for the best options to combat evolving cybersecurity threats, a recent study found that the majority of security professionals are overwhelmed by the amount of cyber threat data that they receive.
Cray Awarded $26 Million Contract From the Department of Defense High Performance Computing Modernization Program - Globe Newswire
The Cray systems will be located at the U.S. Army Engineer Research and Development Center DoD Supercomputing Resource Center (ERDC DSRC) in Vicksburg, Mississippi.
Hong Kong-based researchers have demonstrated an attack on a massive number of Android applications, allowing them remote access to whatever accounts lie within.
Wi-Fi Auto Connect and Wi-Fi calling pose privacy risks for mobile device users, researchers show.
GM Bot Malware Campaign Targets 94 Mobile Banking Apps - SC Magazine
A recently discovered Android banking malware campaign targets 94 mobile banking apps used by individuals across at least seven countries including the U.S.
The nation state has a single point of failure fiber, recently installed in 2011, and it could spell disaster for dozens of other countries.
PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs - Volexity
In the wake of the 2016 United States Presidential Election, not even six hours after Donald Trump became the nation’s President-Elect, an advanced persistent threat (APT) group launched a series of coordinated and well-planned spear phishing campaigns.
Docker User? Haven’t Patched Dirty COW Yet? Bad News … - The Register
Here's another reason to pay attention to patching your Linux systems against the Dirty COW vulnerability: it can be used to escape Docker containers.
The routine nature of OPM’s business made the revelations of April 15, 2015, as perplexing as they were disturbing.
In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices.
A panel at the Army Cyber Institute's CyCon U.S. conference in Washington, including officials from the Federal Bureau of Investigation, Department of Homeland Security, and the Office of the Director of National Intelligence, agreed that PPD-41 codifies the collaboration and best practices that have evolved in response to recent major cyber attacks.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.