The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
CSIAC ANNOUNCEMENTS:
Updated DoD Cybersecurity Policy Chart – 25 Oct 2019 - CSIAC
The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme. The use of color, fonts and hyperlinks are all designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems and data.
Tags: Policy, Standards & References
RECENT HEADLINES:
Microsoft Beats Amazon to Win the Pentagon’s $10 Billion JEDI Cloud Contract - The Verge
The US government has awarded a giant $10 billion cloud contract to Microsoft, the Department of Defense has confirmed. Known as Joint Enterprise Defense Infrastructure (JEDI), the contract will provide the Pentagon with cloud services for basic storage and power all the way up to artificial intelligence processing, machine learning, and the ability to process mission-critical workloads.
Tags: Cloud, JEDI, Microsoft Azure
Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted - The Hacker News
A new vulnerability has been discovered in Sudo-one of the most important, powerful, and commonly used utilities that comes as a core command installed on almost every UNIX and Linux-based operating system.
Tags: CVE-2019-14287, Linux, Root
How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown - Wired
Federal investigators focused not on offensive hacking efforts or surveilling communications, but on the transactions using cryptocurrency.
Tags: Bitcoin, Cryptocurrency, Dark Web
Millions of Adobe Customers Exposed in Privacy Snafu - InfoSecurity Magazine
Adobe has become the latest big name to expose customer details via a misconfigured database, after researchers discovered nearly 7.5 million accounts via an online search.
Tags: Adobe Creative Cloud, Data Security
Some ICS Security Incidents Resulted in Injury, Loss of Life: Survey - SecurityWeek
SecurityWeek 2019 ICS Cyber Security Conference - Some of the recent cybersecurity incidents involving industrial control systems (ICS) have resulted in injury and even loss of life, according to a survey conducted by Control Systems Cyber Security Association International (CS2AI).
Tags: Critical Infrastructure Protection (CIP), ICS, Security Incidents
Facebook Alters Video to Make People Invisible to Facial Recognition - VentureBeat
Facebook AI Research says it's created a machine learning system for de-identification of individuals in video. Startups like D-ID and a number of previous works have made de-identification technology for still images, but this is the first one that works on video. In initial tests, the method was able to thwart state-of-the-art facial recognition systems.
Tags: AI, Facebook, Facial Recognition
Nasty PHP7 Remote Code Execution Bug Exploited in the Wild - ZDNet
A recently patched security flaw in modern versions of the PHP programming language is being exploited in the wild to take over servers, ZDNet has learned from threat intelligence firm Bad Packets.
Tags: Code Execution Bug, PHP7
The Threat to SoHo IoT Devices is Growing Rapidly - Security Week
A network of 50 honeypots deployed around the world has been catching and monitoring attacks against IoT devices. Such detected attacks have increased almost nine-fold between H1 2018 and H1 2019, from 12 million to 105 million. During the same period, the number of unique attacking IP addresses increased from 69,000 to 276,000.
Tags: Cyber Threats, IoT, SoHo
The Navy’s Plan to Stop Being ‘Woefully Behind’ in Cyber - Fifth Domain
Navy Secretary Richard Spencer was blunt: the service is struggling to beat back threats to cybersecurity and the supply chain.
Tags: Navy, Supply Chain
Rogers Warns on ‘Stovepiped’ Cybersecurity - FCW
Rep. Mike Rogers (R-Ala.) warned that the proliferation of cybersecurity-focused offices across government may be undermining the government's lead cyber agency and result in "stovepiping" of federal activities.
Tags: Cybersecurity Information Sharing Act (CISA), Mike Rogers
NSA: ‘We Know we Need to do Some Work’ on Declassifying Threat Intel - Cyberscoop
One of the National Security Agency's newly minted Cybersecurity Directorate's goals is to quickly share information on adversarial threats with the private sector - but the process for doing that needs to be refined, the directorate's leader said Thursday.
Tags: Declassification, Information Sharing, National Security Agency (NSA)
AWS Left Reeling After Eight-Hour DDoS - InfoSecurity Magazine
Amazon Web Services (AWS) customers were hit by severe outages yesterday after an apparent DDoS attack took S3 and other services offline for up to eight hours.
Tags: AWS, Cloud Computing, DDoS, S3 Buckets
Google Search Engine will Better Understand Natural Speech, Not Just Keywords - CNET
Google's search engine will now better understand your confusing search queries, the company said Friday. Google said it's updating the tool to improve analysis of natural language. The idea is to let people type in queries that reflect how they speak in real life, instead of entering a string of keywords they think the software is more likely to understand.
Tags: Google Search Engine, Machine Learning (ML), Natural Language
CSIAC Supported Communities
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
Technical Resources, Policy and Guidance
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.