Tag Archives: Trend

[ISN] Cybercom: Big Data Theft at OPM, Private Networks is New Trend in Cyber Attacks

http://freebeacon.com/national-security/cybercom-big-data-theft-at-opm-private-networks-is-new-trend-in-cyber-attacks/ By Bill Gertz Washington Free Beacon July 27, 2015 The commander of U.S. Cyber Command said last week that the Office of Personnel Management hack of millions of records of federal workers shows a new trend toward using Big Data analytics for both nation-state and criminal cyber attacks. “One of the lessons from OPM for me is we need to recognize that increasingly data has a value all its own and that there are people actively out there interested in acquiring data in volumes and numbers that we didn’t see before,” said Adm. Mike Rogers, the Cyber Command commander and also director of the National Security Agency. The theft of 22.1 million federal records, including sensitive background information on millions of security clearance holders, will assist foreign nations in conducting future cyber attacks through so-called “spear-phishing,” Rogers said, declining to name China as the nation state behind the OPM hacks. Additionally, China is suspected in the hack uncovered in February of 80 million medical records of the health care provider Anthem, which would have given it access to valuable personal intelligence that can be used to identify foreign spies and conduct additional cyber attacks. […]




Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Cool Vendors in Security Intelligence, 2015

Cool Vendors in security intelligence offer highly innovative technologies that address an organization’s demand for data-driven analytics, techniques in obfuscation and deception, and advanced detection solutions. CISOs should use this research when evaluating technology trends for planning. … illusivenetworks.com ) Analysis by Avivah Litan and Lawrence Pingree Why Cool: Illusive networks offers advanced attack deception … California ( trapx.com ) Analysis by Craig Lawson, Lawrence Pingree and Oliver Rochford Why Cool: TrapX Security is …

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Premera Blue Cross hack exposes 11M

http://www.healthcareitnews.com/news/premera-blue-cross-hack-exposes-data-11m By Mike Miliard Healthcare IT News March 18, 2015 In what looks to be becoming a trend, another health plan has been targeted with a “sophisticated cyberattack,” with hackers gaining access to the financial and medical information of 11 million members. Washington state-based Premera Blue Cross, a not-for-profit plan whose corporate clients include Pacific Northwest giants Microsoft and Starbucks, announced the breach, which was detected in January, on March 17. The attackers – who some have suggested may be the same Chinese spies suspected in the massive Anthem breach revealed this past month, gained access to to a plethora of personal data. The Anthem breach compromised the information of nearly 80 million people. “That information could include names, dates of birth, addresses, telephone numbers, email addresses, Social Security numbers, member identification number, medical claims information and financial information,” according to Premera. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] CFP: IEEE/ACM ASONAM 2015 — Paris, France, August 25-28, 2015 IEEE/ACM ASONAM 2015

Forwarded from: Sarah Sumarland The 2015 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining Paris, France, August 25-28, 2015 http://asonam.cpsc.ucalgary.ca/2015/ Dear Colleague, You are invited and highly encouraged to consider submitting your high quality original manuscripts to the flagship venue and premier conference in the area of social network analysis and mining (ASONAM 2015) or one of the co-located events on health informatics and bioinformatics, open source intelligence and security informatics, big data analytics, in addition to a number of tracks and workshops. See below for the detailed links. All types of submissions are welcome, including full papers, short papers, extended abstracts, posters, demos. You may consider one of the following options: Main Research Papers Track: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/ Industrial Track: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/CFPInd.php http://asonam.cpsc.ucalgary.ca/2015/CPFP.php PhD Forum and Posters Track: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/CPFP.php Multidisciplinary Track: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/CFPMulti.php Exhibitions and Demos Track: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/CPED.php Tutorials: For more information visit: http://asonam.cpsc.ucalgary.ca/2015/CFT.php FOSINT-SI 2015: The 2015 International Symposium on Foundations of Open Source Intelligence and Security Informatics; Paris, France, August 26-27, 2015. For more information visit: http://fosint-si.cpsc.ucalgary.ca/2015/ HI-BI-BI 2015: The 2015 International Symposium on Network Enabled Health Informatics, Biomedicine and Bioinformatics, Paris, France, August 26-27, 2015. For more information visit: http://hi-bi-bi.cpsc.ucalgary.ca/2015/ FAB 2015: The 2015 International Symposium on Foundations and Applications of Big Data Analytics, Paris, France, August 27-28, 2015. For more information visit: http://fab.cpsc.ucalgary.ca/2015/index.php All accepted papers will be published in the proceedings which will be included in the digital libraries of both sponsors: ACM and IEEE Computer Society. Following the trend from previous years, extended versions of accepted papers from ASONAM 2015 will be invited for publication in one of the following prestigious venues by Springer: 1. Social Networks Analysis and Mining Journal http://link.springer.com/journal/13278 2. Network Modeling Analysis in Health Informatics and Bioinformatics Journal http://link.springer.com/journal/volumesAndIssues/13721 3. Edited book in the Lecture Notes in Social Networks Series http://www.springer.com/series/8768


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Why Silicon Valley Hackers Still Won’t Work With the Military, and Vice Versa

http://motherboard.vice.com/read/why-silicon-valley-hackers-still-wont-work-with-the-military-and-vice-versa By Kari Paul Contributor Motherboard.vice.com February 26, 2015 In the fight to defend cyberspace from its enemies, the US military is rushing to hire as many skilled hackers as it can. But no one is really sure how to get the two cultures to coexist. Although the feds have implied they’re willing to loosen up some of their policies so that weed-smoking, basement-dwelling hacker stereotypes can work for government agencies, there are still some significant hurdles preventing the two industries from working together in earnest. At the first annual Future of War Conference on Wednesday, a panel of experts weighed in on the simmering Silicon Valley culture clash after an audience member asked why the US doesn’t just militarize Silicon Valley if private sector technology is so far ahead of the government’s own. “The real reason is DoD does not have a culture that would allow them in any way shape or form to manage a silicon valley operation,” said Brad Allenby, a faculty member at Arizona State University Center on the Future of War. “Someone high on coke, Skittles and slinging code is not a good candidate for basic training,” he later joked. Peter Singer, a strategist and senior fellow at the think tank New America Foundation, said the chasm between the private tech sector and the government is only widening—a trend that will have big implications for the “extraordinarily difficult” technological components of future war. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] The tooth gnashing you hear is from Flash users installing a new 0day patch

http://arstechnica.com/security/2015/01/those-teeth-gnashings-you-hear-are-flash-users-installing-a-new-0day-patch/ By Dan Goodin Ars Technica Jan 26 2015 Adobe Systems is once again rolling out an emergency Flash update that patches a critical vulnerability under active attack to compromise the computers of unsuspecting users. The latest Flash versions fix a remote code-execution bug that, as Ars reported last week, recently came under attack in the Angler exploit kit. Malware purveyors and other types of online crooks use such kits to seed compromised websites with attack code. Once people visit the sites with vulnerable computers, the booby-trapped pages surreptitiously exploit the vulnerabilities and install backdoors that can be used to log keystrokes, steal passwords, and install new pieces of malware at will. An advisory Adobe published late last week warned that the bug resides in versions running on Windows, Macs, and Linux systems. So far, reports suggest that in-the-wild exploits are limited only to Windows systems. The vulnerability stems from a so-called use-after-free bug that allows attackers to corrupt the memory of affected computers. Trend Micro has additional technical details here. “A critical vulnerability (CVE-2015-0311) exists in Adobe Flash Player 16.0.0.287 and earlier versions for Windows and Macintosh,” the Adobe advisory stated. “Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. We are aware of reports that this vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] New Technology Detects Cyberattacks By Their Power Consumption

http://www.darkreading.com/analytics/security-monitoring/new-technology-detects-cyberattacks-by-their-power-consumption-/d/d-id/1318669 By Kelly Jackson Higgins Dark Reading 1/20/2015 Startup’s “power fingerprinting” approach catches Stuxnet infection within seconds in DOE power grid test bed. A security startup launching early next week uses trends in power consumption activity, rather than standard malware detection, to spot cyberattacks against power and manufacturing plants. The technology successfully spotted Stuxnet in an experimental network before the malware went into action. PFP Cybersecurity, which officially launches on Monday and was originally funded by DARPA, the Defense Department, and the Department of Homeland Security, basically establishes the baseline power consumption of ICS/SCADA equipment such as programmable logic controllers (PLCs), supervisory relays, or other devices and issues an alert when power consumption or RF radiation changes outside of their baseline usage occur. Such changes could be due to malware, as well as to hardware or system failures, for instance. The US Department of Energy’s Savannah River National Laboratory (SRNL) recently tested the PFP technology’s ability to detect Stuxnet on a Siemens SIMATIC S7-1200 PLC. Joe Cordaro, advisory engineer with SRNL, says the PFP system right away found Stuxnet on the PLC, before the infamous malware began to activate


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Spike in Malware Attacks on Aging ATMs

http://krebsonsecurity.com/2014/10/spike-in-malware-attacks-on-aging-atms/ By Brian Krebs Krebs on Security October 20, 2014 This author has long been fascinated with ATM skimmers, custom-made fraud devices designed to steal card data and PINs from unsuspecting users of compromised cash machines. But a recent spike in malicious software capable of infecting and jackpotting ATMs is shifting the focus away from innovative, high-tech skimming devices toward the rapidly aging ATM infrastructure in the United States and abroad. Last month, media outlets in Malaysia reported that organized crime gangs had stolen the equivalent of about USD $1 million with the help of malware they’d installed on at least 18 ATMs across the country. Several stories about the Malaysian attack mention that the ATMs involved were all made by ATM giant NCR. To learn more about how these attacks are impacting banks and the ATM makers, I reached out to Owen Wild, NCR’s global marketing director, security compliance solutions. Wild said ATM malware is here to stay and is on the rise. BK: I have to say that if I’m a thief, injecting malware to jackpot an ATM is pretty money. What do you make of reports that these ATM malware thieves in Malaysia were all knocking over NCR machines? OW: The trend toward these new forms of software-based attacks is occurring industry-wide. It’s occurring on ATMs from every manufacturer, multiple model lines, and is not something that is endemic to NCR systems. In this particular situation for the [Malaysian] customer that was impacted, it happened to be an attack on a Persona series of NCR ATMs. These are older models. We introduced a new product line for new orders seven years ago, so the newest Persona is seven years old. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail