The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
A full version, complete with premium plug-ins, of NanoCore remote access Trojan (RAT) has been leaked earlier this month and now security researchers see it used in targeted attacks against several energy companies.
Part of the nation's power grid is struck by a cyber or physical attack nearly once every four days. Some experts fear the rash of smaller-scale incidents may point to broader security problems with potentially devastating consequences.
Cyber Chief: Efforts to Deter Attacks Against the U.S. Are Not Working - Washington Post
The government's efforts to deter computer attacks against the United States are not working and it is time to consider boosting the military's cyber-offensive capability.
The malicious actors behind a recently launched phishing campaign aimed at American Express customers leveraged a weakness in email authentication systems to increase the chances of their bogus messages reaching their destination.
Security researchers at Ben Gurion University in Israel have found a way to retrieve data from an air-gapped computer using only heat emissions and a computer's built-in thermal sensors.
Dridex Banking Malware Dodges Detection With Run-on-Close Macros - Security Week
Researchers at Proofpoint discovered a crafty new trick in the repertoire of the Dridex banking malware.
The latest version of CryptoWall has been spotted to be delivered with a piece of spyware that ensures the cybercriminals still get an opportunity to make money if the victim has a proper backup system in place.
A new bill has been introduced to make sharing cyberthreat data between corporations and the government less risky -- legally.
House Intel Panel Closing in on Cyber Bill - The Hill
While all eyes are on the committee's Senate counterpart, which passed the Cybersecurity Information Sharing Act (CISA) last week, the House is quietly getting close to its own companion legislation.
A new point-of-sale (PoS) malware family, dubbed PoSeidon, has been discovered in the wild, contacting data exfiltration servers running websites with a Russian top-level domain.
The second day of Pwn2Own has ended and the challenges to bypass the defenses of the four major web browsers proved to be no match for the participant hackers.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.