The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The DoD Cybersecurity Policy Chart has been updated on February 19, 2020. The chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.
Machine Learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the hood of a typical ML solution? And, why are so many problems suddenly becoming good ML candidates? This webinar explores non-mathematically the foundational aspects of ML and how they add up to a satisfactory solution. It also highlights the benefits and pitfalls of ML in several scenario exemplars.
(Requires DTIC account and a DoD CAC, ECA, or PIV)
Tags: CSIAC Webinar
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards autonomous driving. While semi-autonomous vehicles have existed for many years, the vision of fleets of fully autonomous vehicles operating as a single connected entity is very much still a thing of the future. However, the latest technical advances in this area bring us a unique and compelling picture of some of the capabilities we might expect to see "down the road." Pun intended.
Tags: ADAS, Autonomous Vehicles, Model Hacking
US Govt Warns of Ransomware Attacks on Pipeline Operations - Bleeping Computer
The Cybersecurity and Infrastructure Security Agency (CISA) today alerted organizations across all critical U.S. infrastructure sectors about a recent ransomware attack that affected a natural gas compression facility.
Tags: Critical Infrastructure Protection (CIP), Cybersecurity Information Sharing Act (CISA), Ransomware
Dell Technologies said it will sell RSA to a consortium led by Symphony Technology Group for $2.075 billion in a move to simplify its portfolio of businesses.
A slew of misconfigured Docker container registries has inadvertently exposed source code for 15,887 unique versions of applications owned by research institutes, retailers, news media organizations and technology companies.
Tags: Data Leak, Docker
Critical WordPress Plugin Bug Afflicts 700K Sites - Threat Post
Tags: Vulnerability, WordPress
During the last quarter of 2019, ClearSky research team has uncovered a widespread Iranian offensive campaign which we call "Fox Kitten Campaign"; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world.
Tags: Iran, VPN
FBI: Cybercrime Victims Lost $3.5 Billion in 2019 - Bleeping Computer
FBI's Internet Crime Complaint Center (IC3) published the 2019 Internet Crime Report which reveals that cybercrime was behind individual and business losses of $3.5 billion as shown by the 467,361 complaints received during the last year.
Tags: Cyber Crime, Internet Crime Complaint Center (IC3)
Russian intelligence agents reportedly went to Ireland to inspect undersea cables, and it’s reigniting fears they could cut them and take entire countries offline - Business Insider
Chinese Military Personnel Charged with Computer Fraud, Economic Espionage and Wire Fraud for Hacking into Credit Reporting Agency Equifax - Justice.gov
Indictment Alleges Four Members of China's People's Liberation Army Engaged in a Three-Month Long Campaign to Steal Sensitive Personal Information of Nearly 150 Million Americans.
Tags: Chinese Military, Computer Fraud, Economic Espionage, Equifax, Wire Fraud
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.