The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
CSIAC ANNOUNCEMENTS:
Register for CSIAC Webinar, Tuesday, Aug 20 @ 12:00 pm EDT: DoD Enterprise DevSecOps Initiative - CSIAC
This webinar will present the vision for transforming DoD software acquisition into secure, responsive software factories. It will examine and explore the utilization of modern software development processes and tools to revolutionize the Department's ability to provide responsive, timely, and secure software capabilities for our warfighters. The focus of the effort involves exploiting automated software tools, services, and standards so warfighters can rapidly create, deploy, and operate software applications in a secure, flexible, and interoperable manner.
Tags: DevSecOps, Software Development
RECENT HEADLINES:
Security Flaws Discovered in 40 Microsoft-Certified Device Drivers - Dark Reading
At a session here at DEF CON on Saturday, Eclypsium's principal researcher Mickey Shkatov was joined by researcher Jesse Michael and both shed light on research that showed that the problem of insecure drivers is widespread, affecting more than 40 drivers from at least 20 different vendors - all drivers being certified by Microsoft.
Tags: Microsoft, Vulnerability
Russian Government Hackers Used Office Technology to Try to Breach Privileged Accounts - CyberScoop
Early this spring, Russian government-linked hackers used three popular internet of things devices with weak security to access several Microsoft customers' networks, then tried infiltrating more privileged accounts, researchers announced Monday.
Tags: Advanced Persistent Threat (APT), Internet of Things (IoT)
North Korea Took $2 Billion in Cyberattacks to Fund Weapons Program: U.N. Report - Reuters
North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using "widespread and increasingly sophisticated" cyberattacks to steal from banks and cryptocurrency exchanges, according to a confidential U.N. report seen by Reuters on Monday.
Tags: Advanced Persistent Threat (APT), Cryptocurrency, Cyber Attack
Lawsuit Filed Against GitHub in Wake of Capital One Data Breach - The Hill
Capital One and GitHub have been hit with a class-action lawsuit over the recent data breach that resulted in the data of over 100 million Capital One customers and credit card applicants being exposed. The law firm Tycko & Zavareei LLP filed the lawsuit on Thursday, arguing that GitHub and Capital One demonstrated negligence in their response to the breach.
Tags: Capital One, Data Breach
Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids - Threat Post
Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children.
Tags: LeapFrog, Vulnerability
DEF CON 2019: Researchers Demo Hacking Google Home for RCE - Threat Post
Here at a session at DEF CON on Thursday, the researchers shed light on their work "breaking" Google Home. What made the talk unique wasn't necessarily that Google Home smart speakers could be compromised using Megellan - that was public news in Dec. 2018 - rather it was how the hack was pulled off.
Tags: Exploit, Google Home
Apple’s iPhone FaceID Hacked in Less Than 120 Seconds - Forbes
Security researchers attending the annual Black Hat hacker convention in Las Vegas have managed to bypass the iPhone FaceID user authentication in just 120 seconds. The way they did it may well surprise you, but should it worry you as well?
Tags: Apple, Vulnerability
Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward - Threat Post
The device manufacturer in a Thursday Black Hat USA 2019 session said it will open the historically private program to all researchers in the fall. In addition, it plans to drastically boost some rewards for vulnerabilities found in its devices - including a $1 million payout - and adding a much-wanted program for its Mac devices.
Tags: Apple, Bug Bounties
New Critical Security Flaws Affect All Windows Versions, Millions Of Users At Risk — Update Now - Forbes
This is the nightmare scenario for system administrators around the world: Several severe security flaws affecting all Windows versions since Windows XP have just been made public today and Microsoft has barely released the appropriate security update which took 90 days-which is the common disclosure window before vulnerabilities are made public-to develop.
Tags: Microsoft, Vulnerability
DOD Secure Access File Exchange Achieves Initial Operating Capability - DISA.mil
In response to a DOD Chief Information Officer (CIO) directive, the Defense Information Systems Agency Services Development Directorate deployed Department of Defense Secure Access File Exchange (DOD SAFE) Aug. 15.
DOD SAFE, a replacement for the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC) Safe Access File Exchange (SAFE) slated to be retiring in August, will provide, at no cost, users with a DOD enterprise-wide method of securely transferring files.
Tags: Defense Information Systems Agency (DISA), DoD SAFE
Security Researchers Find that DSLR Cameras are Vulnerable to Ransomware Attack - The Verge
Ransomware has become a major threat to computer systems in recent years, as high-profile attacks have locked users out of personal computers, hospitals, city governments, and even The Weather Channel. Now, security researchers have discovered that another device that might be at risk: a DSLR camera.
Tags: Malware, Ransomware
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer - Vice
It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer.
Tags: Apple, Vulnerability
New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses - Threat Post
Millions of newer Intel microprocessors manufactured after 2012 are vulnerable to a new type of side-channel attack dubbed SWAPGS.
SWAPGS is similar to existing side-channel attacks such as Spectre and Meltdown and similarly could allow a hacker to gain access to sensitive data such as passwords and encryption keys on consumer and enterprise PCs.
Tags: CVE-2019-1125, Side-Channel Attacks, SWAPGS
CSIAC Supported Communities
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
Technical Resources, Policy and Guidance
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.