The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
In this CSIAC podcast, Jim West discusses how the CIA triad has played a part in the management of risk, but lacks the details of considering all aspects of risk. West, describes a 9-point core security principles star that will better prepare many organizations to seek out possible solutions to risks, and provide senior leadership a more detailed visualization of what principles are acceptable risk and which ones are not.
In Case You Missed It: CSIAC Webinar – Security Engineering Risk Analysis (SERA): Connecting Technology Risk To Mission Impact - CSIAC
The Security Engineering Risk Analysis (SERA) Method defines a systematic approach for evaluating cybersecurity risk in highly complex networked environments. The SERA Method uses a scenario-based approach to analyze how an attacker could leverage available attack vectors and technology vulnerabilities to compromise confidentiality, integrity, and availability of mission-critical data and impact operational mission success. SERA can be applied at any point in the lifecycle to construct cyber-risk scenarios that show how the technology within a system and its context including supply chains and trusted connections in a system-of-systems provides opportunities for attackers to disrupt mission execution. Analysis of the scenarios will determine what risks are critical and which controls are important to reduce mission impact.
Google’s Medical AI Was Super Accurate in a Lab. Real Life Was a Different Story. - MIT Technology Review
If AI is really going to make a difference to patients we need to know how it works when real humans get their hands on it, in real situations.
Tags: Artificial Intelligence (AI), Google's Medical AI, Machine Learning (ML)
Hacking activity against corporations in the United States and other countries more than doubled by some measures last month as digital thieves took advantage of security weakened by pandemic work-from-home policies, researchers said.
Tags: Hacking activity, work-from-home
Companies that run Pulse Secure VPN servers are still at risk of getting hacked, despite patching vulnerable systems, cyber-security agencies from the US and Japan have warned this month.
Tags: Pulse Secure, VPN
Watchdog Says FCC Must Address Basic Cyber Hygiene Issues - Fifth Domain
The Federal Communications Commission still has data flowing through its network without proper encryption, according to an April 24 report from the Government Accountability Office.
Tags: Cyber Hygiene, FCC
With the U.S. Small Business Administration continuing to play a high-profile role in getting cash to companies that are struggling because of the coronavirus pandemic, cybercriminals are stepping up their efforts to steal money from those very firms.
Tags: Coronavirus Scam, SBA
A Cybersecurity and Infrastructure Security Agency task force will release supply chain guidance that incorporates aspects of the Pentagon's Cybersecurity Maturity Model Certification program, a CISA official said.
Tags: Supply Chain Guidance, Vendor Certification Program
Router vendor Linksys has locked user accounts on its Smart WiFi cloud service and is asking users to reset passwords after hackers have been observed hijacking accounts and changing router settings to redirect users to malware sites.
Tags: Home Router, LinkSys, Network Security
Microsoft Teams, the technology giant's professional collaboration tool, included a software bug that could have made it possible for hackers to steal data. Hackers could have used a malicious GIF to scrape user data from Microsoft Teams user accounts, spreading through an organization's entire roster of employees who use the service, researchers from CyberArk announced Monday.
Tags: Microsoft, Microsoft Teams, Vulnerability
You’ve Got (0-click) Mail! - ZecOps
Following a routine iOS Digital Forensics and Incident Response (DFIR) investigation, ZecOps found a number of suspicious events that affecting the default Mail application on iOS dating as far back as Jan 2018. ZecOps analyzed these events and discovered an exploitable vulnerability affecting Apple's iPhones and iPads. ZecOps detected multiple triggers in the wild to this vulnerability on enterprise users, VIPs, and MSSPs, over a prolonged period of time.
Tags: Exploits, iPad, iPhone
The Pentagon’s Cybersecurity Certification Plan Includes Continuously Monitoring Contractors - NextGov
The accreditation body overseeing the Defense Department's Cybersecurity Maturity Model Certification program-the CMMC-AB-issued a request for proposal that provides insight into how the group plans to keep track of contractors outside of conducting physical audits.
Tags: CMMC, Continuous Monitoring
Cyber-security firm Sophos has published an emergency security update on Saturday to patch a zero-day vulnerability in its XG enterprise firewall product that was being abused in the wild by hackers.
Tags: Sophos Firewall, Zero-day Exploits
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.