The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. Given the increasing functionality, interconnectedness, and use of the IoT within critical infrastructure, securing the integrity of command and control (C2) within the IoT is essential.
Ukraine Investigates Possible Cyberattack on Power Grid in Kiev - International Business Times
Ukraine authorities are investigating a possible cyber attack on Kiev's power grid that may have caused the recent power outage that left the northern part of the capital and surrounding areas without electricity this weekend.
Tags: Critical Infrastructure Protection (CIP)
San Francisco Rail System Hacker Hacked - Krebs on Security
The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, "You are Hacked. ALL Data Encrypted." Turns out, the miscreant behind this extortion attempt got hacked himself this past weekend, revealing details about other victims as well as tantalizing clues about his identity and location.
Report: $3-5M in Ad Fraud Daily from ‘Methbot’ - Krebs on Security
New research suggests that an elaborate cybercrime ring is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day.
Germany's domestic intelligence agency on Thursday reported a striking increase in Russian propaganda and disinformation campaigns aimed at destabilizing German society and targeted cyber attacks against political parties.
Cybersecurity’s Next Phase: Cyber Deterrence - The Conversation
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
Pentagon: China Threatened to Bankrupt Defense Contractor - Washington Free Beacon
A U.S. defense contractor was threatened with bankruptcy by Chinese hackers seeking jet fighter logistics secrets, according to the Pentagon’s Joint Staff.
Yahoo Inc warned on Wednesday that it had uncovered yet another massive cyber attack, saying data from more than 1 billion user accounts was compromised in August 2013, making it the largest breach in history.
It just became harder to distinguish bot behavior from human behavior.
New Decryptor Unlocks CRYPTXXX V3 Files - Threat Post
Researchers have neutralized the threat of the latest strain of the CryptXXX v.3 ransomware, releasing a decryption tool for unlocking files, and have added it to the RannohDecryptor, a free utility hosted by Kaspersky Lab’s No Ransom Project.
Researchers say they have uncovered ransomware still under development that comes with a novel and nasty twist.
L.A. County: Major Breach Stemmed from Phishing Attack - HealthcareInfoSecurity
The County of Los Angeles is notifying 756,000 individuals of a breach that occurred five months ago stemming from a phishing scheme that tricked more than 100 county employees.
Tags: OPM Data Breach, Phishing
IEEE Computer Society Predicts the Future of Tech for 2017 and Next Five Years - IEEE Computer Society
After grading itself on its 2016 vision, IEEE Computer Society has plunged into technology predictions for 2017 and for the next five years by 2022.
Rakos Malware Takes Over Embedded Linux Devices - SecurityWeek
A recently observed piece of malware targeting embedded Linux systems can provide attackers with full control over the infected devices, ESET security researchers warn.
Tags: Embedded Systems, Internet of Things (IoT), Linux
US Fails to Renegotiate Arms Control Rule for Hacking Tools - Associated Press
The Obama administration has failed to renegotiate portions of an international arms control arrangement so that it's simpler to export tools related to hacking and surveillance software — technologies that can be exploited by bad actors, but are also used to secure computer networks.
Tags: Cyber Legislation
More than one million Google accounts have been breached by malware that infiltrated older Android devices, cyber security firm Check Point Software Technologies Ltd. announced Wednesday.
Explained: Domain-Generating Algorithms - Darkreading
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.
As the last decade ended, ARM’s CTO Mike Muller warned the era of dark silicon was approaching.
Tags: High Performance Computing
Rapid7 Appointed CVE Numbering Authority - SecurityWeek
Boston, Mass.-based Rapid7 can, effective immediately, assign CVE identifiers to vulnerabilities found in its own products and software from other vendors, regardless if the issues have been disclosed by Rapid7 employees or third-party experts.
The US Department of Defense has signed a $927m, five-year deal for Microsoft's enterprise technical support services.
The time is right to make quantum computing real…
Tags: Quantum Computing
The Quantum Computers of the Future Will Work Equally Well With Encrypted and Unencrypted Inputs - PHYS.ORG
When future users of quantum computers need to analyze their data or run quantum algorithms, they will often have to send encrypted information to the computer.
Tags: Quantum Computing
We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists at the National Institute of Standards and Technology (NIST). To get there, they recommend that coders adopt the approaches they have compiled in a new publication.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.