The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The blockchain technology is a game changer to enhance the security of our supply chain, and smart manufacturing. The technology enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when combined with digital signatures, verifies the identity of the participants with its non-repudiation capabilities. Dr. Bertrand Cambo will present the prototypes developed at Northern Arizona University (NAU) demonstrating the feasibility of the schemes, and discuss the challenges to deploy this blockchain technology to established manufacturing subcontractors.
Tags: Blockchain, Supply Chain Management
HDIAC Webinar: Transforming Traumatic Memories: The Reconsolidation of Traumatic Memories (RTM) Protocol - HDIAC
This webinar features research and details of the RTM Protocol, a new and promising treatment for post-traumatic stress disorder (PTSD) that requires no drugs and is completed in less than three sessions totaling five hours. Developed by the Research and Recognition Project, the protocol has been rigorously tested under strict scientific standards. Over 90% of the 160 veterans in the studies finished treatment with measured loss of their PTSD diagnosis, nightmares, flashbacks, and directly related emotional symptoms.
Tags: HDIAC, Webinar
Microsoft has released a security advisory to address a critical vulnerability in Internet Explorer. A remote attacker could exploit this vulnerability to take control of an affected system. According to the advisory, "Microsoft is aware of limited targeted attacks."
Tags: Internet Explorer, Microsoft, US-Cert
Windows 7 Gets Final Monthly Rollup Update Before End Of Life - Bleeping Computer
Windows 7 has just received its last set of security updates. After today, Windows 7 won't receive any security or non-security updates from Microsoft, and it is now considered an unsupported operating system.
Tags: Microsoft, Windows 7
WeLeakInfo.com Seized For Selling Info from Data Breaches, 2 Arrested - Bleeping Computer
As a clear indication of how law enforcement views the commercial disclosure of stolen information, the FBI has seized the WeLeakInfo.com domain and international law enforcement arrested two individuals for selling subscriptions to data exposed in breaches.
Tags: Data Breach, WeLeakInfo.com
Citrix Ships Patches as Vulnerable Servers Come Under Attack - Naked Security
FBI Says State Actors Hacked US Govt Network With Pulse VPN Flaw - Bleeping Computer
FBI said in a flash security alert that nation-state actors have breached the networks of a US municipal government and a US financial entity by exploiting a critical vulnerability affecting Pulse Secure VPN servers.
Tags: FBI, Microsoft, Nation-State Actors
Equifax has agreed to pay $380.5 million to resolve allegations related to the 2017 data breach in which hackers stole information belonging to some 147 million Americans, under the terms of a settlement approved by a federal judge.
Tags: Data Breach, Equifax
New US Bill Wants to Assign State Cybersecurity Coordinators - Bleeping Computer
Four U.S. Senators have introduced a bipartisan bill that will require the Department of Homeland Security (DHS) to appoint cybersecurity effort coordinators in every state to orchestrate cyberattack response and remediation efforts, and to improve coordination between federal, state, and local entities.
Tags: Cybersecurity Defense, Department of Homeland Security (DHS)
On January 14, 2020, Microsoft released software fixes to address 49 vulnerabilities as part of their monthly Patch Tuesday announcement. Among the vulnerabilities patched were critical weaknesses in Windows CryptoAPI, Windows Remote Desktop Gateway (RD Gateway), and Windows Remote Desktop Client. An attacker could remotely exploit these vulnerabilities to decrypt, modify, or inject data on user connections.
Tags: Microsoft Windows, US-Cert, Vulnerabilities
Simplified Data Privacy and Security Template Makes Debut at Smart Cities Expo - Syracuse University
A School of Information Studies faculty member is heading to Washington, D.C. to discuss a new approach to cloud-stored data management architecture and to unveil a new structural template that can be adopted by entities of all types and sizes to strengthen the data privacy and security blanket across an entire region.
Tags: Data Privacy
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.