The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Register for CSIAC Webinar, Tuesday, Aug 20 @ 12:00 pm EDT: DoD Enterprise DevSecOps Initiative - CSIAC
This webinar will present the vision for transforming DoD software acquisition into secure, responsive software factories. It will examine and explore the utilization of modern software development processes and tools to revolutionize the Department's ability to provide responsive, timely, and secure software capabilities for our warfighters. The focus of the effort involves exploiting automated software tools, services, and standards so warfighters can rapidly create, deploy, and operate software applications in a secure, flexible, and interoperable manner.
Tags: DevSecOps, Software Development
At a session here at DEF CON on Saturday, Eclypsium's principal researcher Mickey Shkatov was joined by researcher Jesse Michael and both shed light on research that showed that the problem of insecure drivers is widespread, affecting more than 40 drivers from at least 20 different vendors - all drivers being certified by Microsoft.
Tags: Microsoft, Vulnerability
Early this spring, Russian government-linked hackers used three popular internet of things devices with weak security to access several Microsoft customers' networks, then tried infiltrating more privileged accounts, researchers announced Monday.
Tags: Advanced Persistent Threat (APT), Internet of Things (IoT)
North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using "widespread and increasingly sophisticated" cyberattacks to steal from banks and cryptocurrency exchanges, according to a confidential U.N. report seen by Reuters on Monday.
Tags: Advanced Persistent Threat (APT), Cryptocurrency, cyberattack
Capital One and GitHub have been hit with a class-action lawsuit over the recent data breach that resulted in the data of over 100 million Capital One customers and credit card applicants being exposed. The law firm Tycko & Zavareei LLP filed the lawsuit on Thursday, arguing that GitHub and Capital One demonstrated negligence in their response to the breach.
Tags: Capital One, Data Breach
Here at a session at DEF CON on Thursday, the researchers shed light on their work "breaking" Google Home. What made the talk unique wasn't necessarily that Google Home smart speakers could be compromised using Megellan - that was public news in Dec. 2018 - rather it was how the hack was pulled off.
Tags: Exploit, Google Home
Security researchers attending the annual Black Hat hacker convention in Las Vegas have managed to bypass the iPhone FaceID user authentication in just 120 seconds. The way they did it may well surprise you, but should it worry you as well?
Tags: Apple, Vulnerability
Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward - Threat Post
The device manufacturer in a Thursday Black Hat USA 2019 session said it will open the historically private program to all researchers in the fall. In addition, it plans to drastically boost some rewards for vulnerabilities found in its devices - including a $1 million payout - and adding a much-wanted program for its Mac devices.
Tags: Apple, Bug Bounties
New Critical Security Flaws Affect All Windows Versions, Millions Of Users At Risk — Update Now - Forbes
This is the nightmare scenario for system administrators around the world: Several severe security flaws affecting all Windows versions since Windows XP have just been made public today and Microsoft has barely released the appropriate security update which took 90 days-which is the common disclosure window before vulnerabilities are made public-to develop.
Tags: Microsoft, Vulnerability
In response to a DOD Chief Information Officer (CIO) directive, the Defense Information Systems Agency Services Development Directorate deployed Department of Defense Secure Access File Exchange (DOD SAFE) Aug. 15.
DOD SAFE, a replacement for the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC) Safe Access File Exchange (SAFE) slated to be retiring in August, will provide, at no cost, users with a DOD enterprise-wide method of securely transferring files.
Tags: Defense Information Systems Agency (DISA), DoD SAFE
Ransomware has become a major threat to computer systems in recent years, as high-profile attacks have locked users out of personal computers, hospitals, city governments, and even The Weather Channel. Now, security researchers have discovered that another device that might be at risk: a DSLR camera.
Tags: Malware, Ransomware
Millions of newer Intel microprocessors manufactured after 2012 are vulnerable to a new type of side-channel attack dubbed SWAPGS.
SWAPGS is similar to existing side-channel attacks such as Spectre and Meltdown and similarly could allow a hacker to gain access to sensitive data such as passwords and encryption keys on consumer and enterprise PCs.
Tags: CVE-2019-1125, Side-Channel Attacks, SWAPGS
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.