The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
What is the difference between a Virus, a Worm, and a Trojan? Don’t know? Find out in this short video.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. Given the increasing functionality, interconnectedness, and use of the IoT within critical infrastructure, securing the integrity of command and control (C2) within the IoT is essential.
Hackers of unknown origin cut power supplies in Ukraine for a second time in 12 months as part of wide-ranging attacks that hit the country in December.
The Ukrainian Power Grid Was Hacked Again - Motherboard
This would be the second such known hack of a Ukrainian power facility following a massive December 2015 power outage affecting about 230,000 people, which was later blamed on the Russian government.
US Office of the Director of National Intelligence releases unclassified version of intel community's findings on Russia's attempts to influence US presidential race via cyberattacks, leaks, and pure propaganda.
Some browsers will turn over a user's autofill information - even when the website doesn't ask for it.
The incredibly clever technique involves a fake but convincing and functional Gmail sign-in page.
Anthem Data Breach Reportedly Caused by Foreign Nation Attack - HealthIT Security
An investigation into the Anthem cyberattack found the identity of the attacker with a high degree of confidence” and “concluded with a medium degree of confidence that the attacker was acting on behalf of a foreign government.”
In one of the most significant tests of autonomous systems under development by the Department of Defense, the Strategic Capabilities Office, partnering with Naval Air Systems Command, successfully demonstrated one of the world’s largest micro-drone swarms at China Lake, California.
OTA Calls IoT Cyberattacks “Shot Across the Bow” - Online Trust Alliance (OTA)
The next incident could create significant safety issues. While most IoT devices are safe and secure, many still lack security safeguards and privacy controls placing users and the Internet at large are at risk.”
FTC vs. D-Link: A Warning to the IoT Industry - Security and Technology
The Message Is: Adopt Better Security or Prepare to Fight in Court
Maritime Cybersecurity Regulation on the Horizon - JDSupra Business Advisor
In the modern digital age, nearly every industry relies on various computer systems to support operations. Maritime operations are no exception.
DroidJack Masquerades as Super Mario Run for Android - SecurityWeek
Preying on the popularity of mobile games for distribution isn’t something new for Trojans.
Anonymity: Cybersecurity’s Double-edged Sword - SC Magazine
The ability to remain undetected while committing computer network intrusions provides the raison d'être for the IT security professional.
Six months of relative quiet around exploit kits recently changed when a public proof-of-concept attack disclosed by a Texas startup was integrated into the Sundown Exploit Kit.
The most noteworthy security fix in the WordPress 4.7.1 update is for a vulnerability that isn't actually within WordPress' own code, but rather in open-source code from the PHPMailer library.
Air Force Tests IBM’s Brain-Inspired Chip as an Aerial Tank Spotter - MIT Technology Review
The Air Force Research Lab (AFRL) reports good results from using a “neuromorphic” chip made by IBM to identify military and civilian vehicles in radar-generated aerial imagery.
NIST Updates Cybersecurity Framework, Seeks Comment - SC Magazine
The National Institute of Standards and Technology (NIST) issued a draft update on Tuesday to its Framework for Improving Critical Infrastructure Cybersecurity, aka the Cybersecurity Framework, aimed at forging stronger cybersecurity measures.
Pulling together quantum-resistant cryptography will take time, and NIST feels that, unless it starts now, that new cryptography won’t be ready.
Quantum Computers Ready to Leap Out of the Lab in 2017 - Scientific American
Google, Microsoft and a host of labs and start-ups are racing to turn scientific curiosities into working machines.
DHS, FBI Report Details Russian Election Hack and Defenses Against Future Attacks - Federal News Radio
While President Barack Obama chose to sanction the Russian individuals and organizations linked to the U.S. election cyber attacks, the Homeland Security Department and FBI are soliciting the help of the private sector in the wake of the network hacks.
DHS Slammed for Report on Russian Hackers - CyberScoop
The hacker groups known as Fancy Bear and Cozy Bear have been tracked for years by cybersecurity specialists — almost all of whom long accepted the detailed, public pattern of evidence linking them to Russian intelligence, including technical indicators-of-compromise.
Upcoming Events - CSIAC
View Upcoming Events around the world on the CSIAC website.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
The Cyber Shield Newsletter - New Mexico Counterintelligence Working Group (NMCIWG)
The Cyber Shield is a Cyber Newsletter for Counterintelligence, IT and Security Professionals associated with DoD and USG agencies. There are no distribution constraints. If you would like to subscribe, please contact Paul Losiewicz at firstname.lastname@example.org
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.