skip navigation
new Colorado Colorado Colorado Co Co new new new Colorado Colorado Colorado Co Co new new

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

new Colorado Colorado Colorado Co Co new new

Telegram has "stabilized" its service after sustaining a very large distributed denial-of-service attack, Reuters reports. The DDoS attack traffic originated largely from Chinese IP addresses, and circumstantial evidence points to Chinese government attempts to disrupt the use of the secure messaging service by protestors in Hong Kong. According to BloombergThe Non-government Services Inc Identification Of Card Idl, controversial legislation that would facilitate extraditions to China proper from the semi-autonomous city has prompted very widespread street protests in Hong Kong.

Recorded Future describes an influence campaign they're calling "Fishwrap." Fishwrap repackages genuine but old news as fresh ("breaking"). It's therefore not really fake, but rather misleading. The stories themselves don't appear to be altered, and even retain their original dates, but a flurry of tweets distributing a story from, say, 2016 gives the old news current impact. And Fishwrap generally doesn't violate platforms' terms of service, either. So far there's no attribution, but the effort seems to represent the systematic adoption of a relatively obvious but hitherto unusual tactic.

A ransomware infestation at one of its Belgian facilities has disrupted production at aircraft-parts manufacturer ASCO, ZDNet reports. About a thousand workers have been furloughed; plants in Belgium, Germany, Canada, and the US are temporarily closed.

Representative Tom Graves (Republican of Georgia) is reintroducing a hack-back bill to the US Congress, with bipartisan support. Cyberscoop notes that intelligence and law enforcement agencies remain cool to the idea.

Why do enterprises fail to patch known, high-consequence vulnerabilities, like BlueKeep? Avast calls it "update inertia." It's all in your heads, IT.

Notes.

Today's issue includes events affecting Belgium, Canada, China, European Union, France, Germany, India, Russia, South Africa, Spain, United Arab Emirates, United Kingdom, United States.

Bring your own context.

Social engineering afflicts law firms, too. Sometimes an odd request in the middle of a long exchange arouses suspicion. Especially when money is to be transferred or a check cut in a settlement. Things just didn't look right to one lawyer.

"And so what she did, which is part of our training, is she picked up the phone, and she called the attorney on the other side, rather than respond in the email, and asked him, why are you having us send the settlement in this direction? What's the purpose of that? To which he responded, I have no idea what you're talking about."

—Avi Solomon, director of information technology for Rumberger, Kirk and Caldwell, a litigation defense firm based in Florida, on the CyberWire's Hacking Humans, 6.12.19.

Why did the attorney on the other side have no idea? The request didn't come from them: it was phishing. Sometimes there's no substitute for a phone call. Or a face-to-face meeting.

Card Fake Carolina Id North Maker

Get the In-Depth Guide to Operationalizing Threat Intelligence.

Threat intelligence is critical but often difficult to manage, automate, or operationalize. Threat Intelligence Gateways are an exciting, emerging network security technology that take the heavy lifting out of making threat intelligence actionable, operational, and useful. Learn about how this technology is turning threat intelligence into action to block threats at scale in the whitepaper, Operationalizing Threat Intelligence: An In-Depth Guide to Threat Intelligence Gateways.

In today's podcast, out later this afternoon, we speak with our partners at the University of Maryland Center for Health and Homeland Security, as Ben Yelin talks about the New York Police Department's cellphone surveillance. Our guest is Dave Aitel from Cyxtera, who discusses offense-oriented security.

Hacking Humans is also up. In this week's episode, "Just because I trusted you yesterday doesn't mean I trust you today," Dave describes researchers spotting scammers on dating sites using AI. Joe shares a phishing scheme that asks users to manage undelivered mail. The catch of the day involves cute puppies and Mogwai meat. Dave interviews Avi Solomon, director of information technology for Rumberger, Kirk and Caldwell, an Orlando, Florida litigation firm.

Cyber Security Summits: Seattle on June 25th and in DC on July 16 new Colorado Colorado Colorado Co Co new (Seattle, Washington, United States, June 25, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The DOJ, U.S. Secret Service, Verizon, Center for Internet Security, Google and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today: www.CyberSummitUSA.com

RSA Conference 2019 Asia Pacific & Japan (Singapore, Republic of Singapore, July 16 - 18, 2019) Join industry leaders and peers at the region’s leading cybersecurity event. Learn the latest issues and solutions, stay on top of new regulations, demo cutting-edge products, expand your skills and grow your personal network. Register now.

Cyber Attacks, Threats, and Vulnerabilities

Advanced Targeted Attack Tools Found Being Used to Distribute Cryptocurrency Miners (TrendLabs Security Intelligence Blog) We recently came across evidence of a large-scale cybercrime activity that appears to combine targeted attack tools and regular cybercrime.

Telegram Traces Massive Cyber Attack to China During Hong Kong Protests (Yahoo) The encrypted messaging app said it experienced a powerful distributed denial of service attack after “garbage requests” flooded its servers and disrupted legitimate communications. Most of those queries came from Chinese internet protocol addresses, founder Pavel Durov said in a subsequent Twitter

CORRECTED-UPDATE 2-Messaging service Telegram CEO points to China... (Reuters) The chief executive of Telegram, a popular encrypted messaging app, said on Wedn...

Telegram faces DDoS attack in China… again new Colorado Colorado Colorado Co Co new (TechCrunch) The popular encrypted messaging service Telegram is once again being hit with a distributed denial of service (DDoS) attack in Asia as protestors in Hong Kong take to the streets. For the last several days, Hong Kong has been overrun with demonstrators protesting a new law that would put the munici…

The Discovery of Fishwrap: A New Social Media Information Operation Methodology (Recorded Future) We share insight into Fishwrap, a new kind of influence operation that recycles old news about terror incidents by publishing them to appear as new.

Fishwrap Campaign Sways Social Media Users with Old News (Threatpost) 215 accounts use the same family of special URL shorteners to track the effectiveness of the operation.

Not quite fake news: Twitter accounts amplify old stories to sow discord (CyberScoop) Researchers are tracking a new kind of social media influence operation apparently meant to inflame Twitter users by repackaging old news and amplifying divisive content.

Army of Fake Accounts Is Spreading Twitter’s False ‘Breaking News Alert’ Terror Alarms (The Daily Beast) Researchers found a network of phony users that’s spreading panic with misleading ‘breaking news alert’ posts—and keeping track of everyone who clicks.

Psd By Projects Training In Templates To 2019 Alan Certificate Mo Pin Online Passport On Try (WIRED) In a controversial move, the tech firm played both sides of an online argument in Russia with the aim of testing disinformation-for-hire services.

Team of American Hackers and Emirati Spies Discussed Attacking The Intercept (The Intercept) Spies working for the United Arab Emirates discussed the attack with operatives at controversial firm DarkMatter.

UAE Enlisted Businessman to Spy On Trump White House (The Intercept) Rashid Al-Malik reported to UAE intelligence on the Trump administration’s Middle East policy as part of a broader influence effort.

Hackers stole photos of travelers and license plates from subcontractor (Naked Security) Critics say if the US can’t protect such data – which was improperly stored by a subcontractor – it shouldn’t collect it.

Visual surveillance and weak cyber security, Part One: When cameras get dangerous new Colorado Colorado Colorado Co Co new (Daily Maverick) In 2019, 15,000 surveillance cameras will be connected to the Internet to monitor Joburg’s streets 24/7. This is courtesy of video surveillance service provider Vumacam. But online cameras can be hacked – often quite easily.

Ransomware halts production for days at major airplane parts manufacturer (ZDNet) Nearly 1,000 employees sent home for the entire week, on paid leave.

Palo Alto Networks Reports Identify Container Security Concerns (Container Journal) Reports by Palo Alto Networks highlight the biggest container security issue is not how secure they are, but rather how they are configured.

Flaw in Evernote Extension Allows Hackers to Steal Data (SecurityWeek) A critical vulnerability found in a popular Evernote extension for Chrome can be exploited to steal sensitive data from the websites accessed by a user.

Flaw in SymCrypt Can Trigger DDoS (Infosecurity Magazine) A Google researcher reported a Windows vulnerability as part of Project Zero.

Warning: Google Researcher Drops Windows 10 Zero-Day Security Bomb (Forbes) A Google security researcher has gone public with a Windows 10 security vulnerability that could "take down an entire Windows fleet relatively easily" before Microsoft has actually fixed it. Here's what you need to know...

Google Researcher Details Windows Cryptographic Library Bug new Colorado Colorado Colorado Co Co new (GovInfo Security) A Google security researcher has disclosed what he calls an unpatched bug in the main cryptographic library used in newer versions of the Windows operating system

Akamai Threat Research Points to Gaming Industry as a Rising Target with 12 Billion Attacks and Counting (PR Newswire) According to the Akamai 2019 State of the Internet / Security Web Attacks and Gaming Abuse Report, hackers have ...

This former Chinese hacker used USB sticks to steal data from hotel guests and then sold it on a popular freelancing site (CNBC) A former PLA hacker was inspired by Russians to start his own lucrative business stealing sensitive data from tourists, according to Kate Fazzini's new book, "Kingdom of Lies."

The Security Nightmare of Formjacking (Infosecurity Magazine) Staying ahead of trends and the security game, hackers have latched onto another high-return attack

3.4 billion fake emails are sent around the world every day (Help Net Security) More than 3 billion fake emails are sent worldwide every day, with most industries not implementing authentication protocols thus remaining vulnerable.

Lake City Reveals It Suffered a 'Triple Threat' Ransomware Attack (The State of Security) The City of Lake City has confirmed that a "Triple Threat" ransomware attack affected the functionality of several of its computer systems.

A computer virus has thrown Philadelphia’s court system into chaos (The Verge) A shutdown has lasted weeks

OK Computer: Did Radiohead Get Hacked? (BankInfo Security) Hacking and extortion attempts against organizations have unfortunately become all too commonplace these days. On Tuesday, an unlikely victim went public: the revered British band Radiohead. But was the band really a hacking and extortion victim?

The Best, Weirdest, and Most Revealing Moments on Radiohead’s OK Computer Sessions Leak (Pitchfork) We combed through the 16 hours of raw material so you don’t have to.

Security Patches, Mitigations, and Software Updates

Adobe fixes critical security flaws in Flash, ColdFusion, Campaign (ZDNet) Fixing code execution bugs was a priority this month for Adobe.

If you haven’t patched Vim or NeoVim text editors, you really, really should (Ars Technica) Sandbox escape in the ancient text editors lets attackers get a reverse shell.

Google opens its Android security-key tech to iPhone and iPad users (TechCrunch) Google will now allow iPhone and iPad owners to use their Android security key to verify sign-ins, the company said Wednesday. Last month, the search and mobile giant said it developed a new Bluetooth-based protocol that will allow modern Android 7.0 devices and later to act as a security key for t…

Update Inertia: The psychology behind patching and updating software (Avast) Many IT experts working in a small to mid-size business environment will be familiar with the conversation they have with their management team about maintaining security integrity of the IT systems.

Google Says It Isn't Killing Ad Blockers. Ad Blockers Disagree (WIRED) Upcoming changes to Chrome has left ad blockers up in arms. But Google insists it won't stifle the extensions.

Cyber Trends

Q&A: General Keith Alexander weighs in on how to win the cybersecurity battle (SiliconANGLE) Q&A: General Keith Alexander weighs in on how to win the cybersecurity battle

Modular Malware is the next big cyber threat in 2019: Study (CRN - India)Drivers Ids Idviking New License Jersey nj Id - Fake Scannable Best Barracuda researchers have seen a spike in the use of modular malware since the beginning of 2019. A recent analysis of email attacks targeting Barracuda customers identified more than 150,000 unique malicious files in the first five months of the year. Here’s a closer look at modular malware and ways to help detect and block …

The Symbiosis Between Public Cloud and MSSPs (SecurityWeek) As businesses move to the cloud and embrace MSSP, this will make it possible to deliver advanced capabilities that help fill entry level security requirements which account for the majority of security vacancies around the world.

Privacy policies are still too horrible to read in full (TechCrunch) A year on from Europe’s flagship update to the pan-EU data protection framework the Commission has warned that too many privacy policies are still too hard to read and has urged tech companies to declutter and clarify their T&Cs. (So full marks to Twitter for the timing of this announceme…

Data Theft/Fraud Tops National Security Fears, Unisys Finds (Meritalk) The latest survey by Unisys of consumer security concerns found that Americans are more alarmed about the possibility of identity theft and bankcard fraud than they are about national security in general.

Cyberattack Risk: Scans Find Big Businesses Exposed (BankInfo Security) Britain's biggest businesses continue to inappropriately expose servers and services to the internet, putting the organizations and data at risk, according to a

UK Orgs Lose 2.5 Months a Year on Poor Password Management (Infosecurity Magazine) Companies are failing to effectively manage password security

The Multibillion-Dollar Problem Of Weak Cybersecurity in Real Estate (Forbes) As the real estate industry continues to embrace PropTech, it also needs to grow in its awareness of the ever more sophisticated cybersecurity threats it can fall victim to! In this article, I looked at some of the main threats out there, and how they can be thwarted.

Marketplace

Without Aimed Passes Senate Immigrants Georgia Measure At

U.S. Cybersecurity Trade Mission to Southeast Asia (UCI Cybersecurity Policy & Research Institute) The rapid development of digital technologies in Southeast Asia is making the region a prime target for cybercriminals. The risk is heightened as ASEAN member countries become more integrated via trade, capital flow and connectivity, providing an opportunity for U.S.-based cybersecurity companies to export their knowledge and expertise to key countries in Southeast Asia.

Symantec, Sophos, NTT Lead Massive Cybersecurity M&A Surge (Channel Futures) It's been a big year for consolidation in cybersecurity this year, with powerhouses like Symantec and Sophos, as well as lesser-known competitors like Zix and Radware, buying companies.

Huawei’s Booming Smartphone Business Is Dealt a Blow by U.S. Ban (Wall Street Journal) The recent U.S. move to blacklist Huawei Technologies threatens to cut off its access to crucial phone components and software for devices used by millions of people world-wide.

Google Is Moving More Hardware Production Out of China (Bloomberg) Trump’s tariffs push tech giant to boost Taiwan manufacturing. Google proved keener than other tech companies about shift.

CrowdStrike pops more than 70% in debut, now worth over $11 billion (CNBC) Security software vendor CrowdStrike began trading on the Nasdaq under the ticker symbol "CRWD."

CrowdStrike stock jumps nearly 100% after IPO, CEO compares security company to Salesforce and ServiceNow (MarketWatch) The market for software initial public offerings remains strong, with CrowdStrike Holdings Inc. shares soaring in their trading debut.

Newly public CrowdStrike wants to become the Salesforce of cybersecurity (TechCrunch) Q&A with CrowdStrike CEO George Kurtz

Why CrowdStrike's CEO isn't surprised his company equaled Symantec in value in its Wall Street debut new Colorado Colorado Colorado Co Co new (Silicon Valley Business Journal) The Sunnyvale company's valuation soared to around $12 billion in its first day as a public company, nearly quadruple what it was last figured to be worth by private investors and roughly the same as much larger rival Symantec Corp.

Sunnyvale-based CrowdStrike tops targets in record cybersecurity IPO (Silicon Valley Business Journal) The company's initial market cap of about $6.7 billion is well above the previous high set by Santa Clara-based Palo Alto Networks, which was worth about $2.5 billion on its IPO day in 2012.

Security Awareness Training Firm KnowBe4 Raises $300 Million (SecurityWeek) Security awareness training firm KnowBe has taken a $300 million investment led by private equity giant KKR, valuing the cybersecurity company at $1 billion.

Phishing Simulation Vendor KnowBe4 Raises $300M To Grow Globally (CRN) Security awareness training and phishing simulation vendor KnowBe4 has received a $300 million investment from private equity giant KKR.

CybeReady Closes $5 Million Financing to Accelerate Go-to-Market Growth of Autonomous Security Awareness Training Platform (PR Newswire) CybeReady, the only autonomous cybersecurity training platform for enterprises, today entered the North...

SignalFx raises $75 million to monitor cloud apps, services, and environments in real time (VentureBeat) SignalFx, which develops a real-time cloud monitoring solution for customers in a range of verticals, has raised $75 million in venture capital.

Thales updates 2019 view after Gemalto integration (MarketWatch) Thales SA (HO.FR) has updated some of its 2019 targets following the completion of the integration of digital security company Gemalto and the disposal of...

Jacobs Completes Acquisition of KeyW; Steve Demetriou QuotedFake Id Identification Buy Arizona Scannable (GovCon Wire) Jacobs announced on Wednesday that its acquisition of KeyW has been completed. The move further positions...

World's largest brewer opens Israeli cybersecurity unit as attacks... (Reuters) Anheuser-Busch InBev (AB InBev), the world's largest beer maker, said on Th...

The Newest Haven for Cryptocurrency Companies? Wyoming (WIRED) The nation's least-populous state has enacted 13 laws in the past two years to welcome blockchain and cryptocurrency companies.

Exclusive: TEDCO CEO George Davis to resign (Baltimroe Business Journal) Davis is the latest executive to depart the state-backed funding organization, which has faced heavy scrutiny in recent months.

'Not going away': Outgoing TEDCO CEO Davis plans to continue working with Md. startups (Baltimore Business Journal) "I love TEDCO, I love what we're doing here, but I think there’s some things I can do in the private sector that can be just as impactful."

Secure Code Warrior Establishes Technical Advisory Board (Yahoo) Experienced software security executives provide advice and guidance on technology and product strategy. Global secure coding company, Secure Code Warrior, today announced the establishment of a Technical Advisory Board (TAB) to provide guidance, insights and mentoring to the company regarding the

Products, Services, and Solutions

Identity Signal Startup Proxy Launches Open Platform with New Access API and Identity SDK – Initial Integrations Include S2, Traction Guest, HQO, and Join Digital (West) Cutting-edge technology providers flocking to the platform to build out privacy-oriented, personalized, responsive building services

STEALTHbits Delivers Important Enhancements to Active Directory and LDAP Auditing Functionality in the Latest Release of StealthINTERCEPT new Colorado Colorado Colorado Co Co new (BusinessWire)Number Customer Customer Customer dl Number dl dl dl Number Customer Number STEALTHbits Technologies, Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers

Deep Instinct Selected by Kings Food Markets to Bring Advanced Cybersecurity to its Retail Stores Nationwide - Deep Instinct (Deep Instinct) Deep Instinct has been selected by Kings Food Markets to protect their complex digital infrastructure and POS systems across 24 grocery locations in the USA

Use your Android phone’s built-in security key to verify sign-in on iOS devices (Google Online Security Blog) Posted by Kaiyu Yan and Christiaan Brand Compromised credentials are one of the most common causes of security breaches. While Google aut...

VMware sneaks out mobile vSphere management app (CRN Australia) But MSPs can’t quite reclaim their weekends yet.

Arachnys and BAE Systems to improve the security and risk management of financial institutions (Help Net Security) Arachnys and BAE Systems to address anti-money laundering and compliance obligations and deliver accurate and efficient fraud detection and prevention.

Telefónica Launches a Fortinet-Powered SD-WAN Virtual Firewall (SDxCentral) Telefónica’s Business Solutions division launched a virtual firewall service based on Fortinet’s platform to protect SD-WAN deployments.

Akamai Introduces the Edge Cloud Solution (Light Reading) IoT Edge Connect, the newest product in the Edge Cloud solution line, enables real-time messaging and reliability to millions of IoT and application endpoints.

BlackBerry's Government Mobility Suite Becomes FedRAMP Ready (Nasdaq) BlackBerry Limited BB recently announced that its new Government Mobility Suite has received Federal Risk and Authorization Management Program (FedRAMP) Ready status.

Ixia network packet broker, cybersecurity test introduced (SearchNetworking) The Ixia network packet broker, Vision X, intends to provide visibility to users' data centers, while Ixia BreakingPoint QuickTest is designed to quickly and easily evaluate performance and security of devices and networks, according to Ixia.

Aruba Instant On: Secure wireless solutions for small businesses (Help Net Security) Aruba announced Aruba Instant On, a new secure wireless solution to address the current and future needs of small businesses with capacity for growth.

Louisiana-Based TraceSecurity Launches National Initiative to Raise Aw (PRWeb) Today, TraceSecurity, one of Louisiana’s leading cybersecurity firms, announced that it would provide a free Security Risk Assessment (SRA) tool to healthca

Farsight Security(R) and ThreatSTOP Partner to Introduce ThreatSTOP NOD to Prevent Phishing and Other Risks Associated with New Domains (Dark Reading) Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.

Verisk Launches New Underwriting Solution for Cyber Insurance (Yahoo) Verisk (VRSK), a leading data analytics provider, announced today the launch of its Cyber Underwriting Report, a new InsurTech solution that can help insurers underwrite a wide variety of risks in the growing cyber market with increased speed and precision. The report is designed to help insurers underwrite

CyberArk Joins Forces with CNA on Cybersecurity Program (Yahoo) CyberArk (CYBR) and CNA's new program will educate companies on the types of security gaps and possible threats along with providing additional privileged access-related services to policyholders.

California Designs Turf Agoura Grass Grass Cat Backyard (PR Newswire) Consumer Affinity has released its initial platform for the iOS, Android, and web into a closed beta program for select...

Technologies, Techniques, and Standards

Agencies upgrade their systems for network access, promising stronger cybersecurity | Federal News Network (Federal News Network) ACT-IAC has teamed up with the Office of the Director of National Intelligence to advance ICAM best practices.

Use Of DNS Firewalls Could Reduce 33% Of All Cybersecurity Breaches, New Global Cyber Alliance Research Finds (Yahoo) NEW YORK, June 12, 2019 /PRNewswire/ -- New research from the Global Cyber Alliance (GCA) has found that Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33% of cybersecurity data breaches from occurring. Through a simple

Retten, was zu retten ist (Netzpalaver) Der Rechner ist verschlüsselt. Wie geht es weiter?

Rebuilt Offutt Could Be New Information Warfare “Foothold” (Air Force Magazine) From the floodwaters that covered this base in March could emerge a new opportunity for the 55th Wing: the chance to be a key hub for the Air Force’s emerging information dominance organization.

Design and Innovation

Facebook Failed To Delete 93% Of Posts Containing Speech Violating Its Own Rules In India (BuzzFeed News) A yearlong study concluded that Facebook had made little progress in moderating non-English-language content in India, the company’s largest market by users.

Pinterest Has Banned The Influential Anti-Abortion Group Live Action After First Classifying It As Porn (BuzzFeed News) Pinterest said Live Action, which has more than 3.3 million social media followers, was spreading misinformation and conspiracy theories.

Google Protecting Jussie Smollett From 'Disparaging' Searches (Washington Free Beacon) Google is hiding searches of Jussi Smollett's self-attack from its platform due to concerns of "potentially disparaging" the liberal actor.

Predicting Vulnerability Weaponization (Dark Reading) Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.

Leaked: The Feds’ Favorite iPhone Hackers Plan To Crack Android (Forbes) Grayshift, one of the government's favorite iPhone hackers, is planning to hack Androids too. But it'll master hacks of Apple products first, the CEO says.

Research and Development

£2m to boost cyber power behind wind energy production (EurekAlert!) The University of Nottingham is leading a £2m High Performance Computing (HPC) project to optimise the sustainable exploitation of wind power in both the European and Brazilian energy markets. Full story below....

Academia

Henry Ford College cybersecurity professor named mentor of the year (Press and Guide) Marrci Conner, who has taught cybersecurity at HFC for 10 years, was recently named Mentor of the Year by the Air Force Association’s (AFA) CyberPatriot, the National Youth Cyber Education

Legislation, Policy, and Regulation

Report warns of Dutch vulnerability to cyberattacks (Washington Post) The Dutch counter-terrorism and security coordinator is warning that the country is vulnerable to cyber espionage and sabotage from countries including China Russia and Iran

Russia Bans 9 VPNs, But Not Kaspersky (Tech.co) Russian will ban all leading VPN providers except for one: Kaspersky Secure Connection. Here's how it happened and why Kaspersky stayed in their good books.

‘New Rules of Trust & Security’: Macron Wants EU Ties with Moscow Independent of NATO & US (Al-Manar TV Lebanon) French President Emmanuel Macron has called on Brussels to build “new rules of trust and security” w...

Battle of cyberspace (Tribuneindia News Service) THE G20 Summit, to be held in Japan on June 28-29, brings together leaders from developed and rising economies. The summit will be an important occasion for PM Modi to meet Presidents Trump, Xi Jinping and Putin after his decisive electoral victory.

Huawei asks U.S. to consider rural providers and open dialogue (Axios) Huawei argues that a proposed FCC ban on federal subsidies to telecoms using Huawei equipment would harm rural providers.

Why Huawei and 5G Pose a Cyber Threat to the U.S. (Yahoo) Mark Testoni, SAP National Security Services chief executive officer, and Deborah Golden, Deloitte U.S. cyber practice leader, discuss the cyber threat risks posed by the deployment of 5G technology with Bloomberg's Emily Chang on "Bloomberg Technology."

Why the Huawei ban is bad for security (CSO Online) Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats.

The U.S. Government Is Utterly Inept at Keeping Your Data Secure (The New Republic) What do your smartphone and the world’s most advanced fighter jet have in common? The Trump administration can’t protect them from hackers.

Analysis | The Cybersecurity 202: Get ready for the hacking back debate: Round 2 (Washington Post) A new bill would allow companies to take retaliatory action.

Congress to take another stab at hack back legislation (CyberScoop) Rep. Tom Graves, R-Ga., is reintroducing a hack back bill that would allow companies to go outside of their own networks and disrupt attackers' activities.

Active Cyber Defense Certainty Act (Washington Post) To amend title 18, United States Code, to provide a defense to prosecution for fraud and related activity in connection with computers for persons defending against unauthorized intrusions into their computers, and for other purposes.

House panel advances bill to create cybersecurity standards for government IT devices (TheHill) The House Oversight and Reform Committee approved bipartisan legislation on Wednesday that would establish baseline cybersecurity standards for government-purchased internet-connected devices.

Companies' self-regulation doesn't have to be bad for the public (The Conversation) A Nobel Prize-winning political economist found a way to promote good governance and protect users without the need for heavy-handed government regulation.

Congress wants to create ‘cyber first responders’ (Fifth Domain) The legislation is a companion to a similar bill approved by Senate committee in April.

Nevada Privacy Law Gives Consumers Right to Opt Out of Sale of Personal Information, Following California’s Lead in CCPA new Colorado Colorado Colorado Co Co new (Cooley) On May 29, 2019, Nevada passed a privacy law that gives consumers the right to opt out of the sale of their personal information. The law, SB 220, contains provisions that are similar to the C…

Litigation, Investigation, and Law Enforcement

Facebook collected device data on 187,000 users using banned snooping app (TechCrunch) Facebook obtained personal and sensitive device data on about 187,000 users of its now-defunct Research app, which Apple banned earlier this year after the app violated its rules. The social media giant said in a letter to Sen. Richard Blumenthal’s office — which TechCrunch obtained — that it…

Facebook Worries Emails Could Show Zuckerberg Knew of Questionable Privacy Practices (Wall Street Journal) Facebook uncovered emails that appear to show CEO Mark Zuckerberg’s connection to potentially problematic privacy practices at the company.

4,000 banned devices found on government networks new Colorado Colorado Colorado Co Co new (Fifth Domain) The Trump Administration and Commerce Department are weighing another ban on a Chinese technology company, Hikivision. However, a data security firm claims devices from previous bans still exist in the public sector.

Huawei Presses Verizon to Pay for Patents (Wall Street Journal) Huawei Technologies has told Verizon Communications that the carrier should pay licensing fees for more than 200 of its patents, further escalating tensions between the Chinese company and the U.S.

Trump says he’d consider accepting information from foreign governments on his opponents (Washington Post) President tells ABC in an interview, “there isn’t anything wrong with listening.”

Top Hoyer Aide Coordinated Steele Dossier Work With Key Obama State Department Officials (Epoch Times) Daniel Silverberg, then-House Democratic Whip Steny Hoyer’s national security adviser, coordinated “work on Russia dossier materials provided by ...

UK signs extradition request for Julian Assange (Deutsche Welle) The WikiLeaks whistleblower is one step closer to extradition after the UK signed a US request. His case will be heard by the courts on Friday.

Spanish soccer league’s app caught eavesdropping on users in anti-piracy push (Ars Technica) Shazam-like feature aimed to catch bars showing pirated soccer streams.

La Liga fined €250,000 for using its mobile app to eavesdrop on fans (Computing) Spanish football league used popular mobile app for fans to identify bars illegally televising matches

Practice Washington 2019 Test Free Cdl

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

Status And Messages Text Fake 1144 Conversations Most Share Lte At Advance Ooo Name Iphone Jeff Am Contact Create Pm Online Today Lifelike Composer Are Date Ma How Time With 80 amp;t 347 D Back Phone In You Coming Today (Philadelphia, Pennsylvania, USA, June 12 - 14, 2019) The NetDiligence® Cyber Risk Summit in Philadelphia is attended by more than 600 cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event,...

SecureWorld Chicago (Chicago, Illinois, USA, June 13, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

Baltimore Cybersecurity Conference (Baltimore, Maryland, USA, June 13, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

SINET Innovation Summit 2019 (New York, New York, USA, June 13, 2019) SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration on security initiatives.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

new Colorado Colorado Colorado Co Co new Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.

Colorado(New CO)
ShareThis Copy and Paste

Id State On Moves Advantagenews Of Real - Changes Secretary com