I spoke on a Docent Institute webinar last night co-hosted by Iowa Illinois IEEE Section – R4 and IEEE Computer Society (Iowa-Illinois Chapter). The title of the talk is, “Navigating Cybersecurity and Systemic Risk in a Rapidly Advancing Technological Landscape”where I discussed #cybersecurity and #systemic_risk. Thanks to Binto George & Michael Umakor, who were co-hosts. Check out the video! You may find the video and slides here:
Armis has published a list of MITRE ATT&CK techniques to aid security practitioners in assessing the strength of their cyber defenses and improve their ability to protect industrial control systems (ICS). #ICS #industrialcybersecurity #OT
Here are links to the 4 parts in the series. Read More
On January 1, 2020, California’s new Internet of Things (IoT) Security Law goes into effect. The law is the first IoT-specific security law in the United States and, simply put, requires all IoT devices sold in California to be equipped with reasonable security measures. The law requires that the connected device be equipped with “reasonable security features” appropriate to the nature and function of the device and the information it may collect or transmit, and designed to protect the device and any information within from unauthorized access, destruction, use, modification or disclosure. IoT equipment suppliers are being asked to implement “security by design”. The FCC states the definition as “A development practice that reduces cyber risk by using a disciplined process of continuous testing, authentication safeguards and adherence to best development practices.” Many are speculating if other states will adopt similar laws, but in the meantime, the California market is too big for suppliers to walk away from and many are trying to understand how these laws will impact their products.
The Cybersecurity and Infrastructure Security Agency within the US Department of Homeland Security also released an advisory in July about the cybersecurity vulnerabilities, known as URGENT/11. “Some medical device manufacturers are already actively assessing which devices that use these operating systems are affected by URGENT/11 and identifying risk and remediation actions. Several manufacturers have also notified their customers consumers with devices determined to be affected so far, which include an imaging system, an infusion pump, and an anesthesia machine,” FDA says. [via CI Security]
Researchers at the Georgia Institute of Technology recently shed light on a less-discussed aspect of the threats of connecting the digital and physical worlds. In a study published in the journal Physical Review E, the researchers showed how hacked cars can cause mass mayhem by freezing traffic and gridlocking large cities. […] Yunker and his colleagues found that randomly hacking and stalling as much as 10 percent of cars during rush hour could bring traffic in a city such as Manhattan to a stand-still and disrupt critical services. This means that only a fraction of cars needs to be connected to the internet to make this threat a reality. [via CI Security 9/30/19]
As a result, connected devices at the enterprise level including medical devices, utility company meters, robots tracking warehouse inventory, and other devices are at risk. Devices connected to the cloud could allow Mirai adversaries to gain access to cloud servers, infect a server with additional malware dropped by Mirai, or expose all IoT devices connected to the server to further compromise.
FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs
Hackers are exploiting security weaknesses in devices like Hikvision cameras and D-Link devices as many vendors haven’t addressed critical vulnerabilities like CVE-2017-7921 (Hikvision cameras), CVE-2020-25078 (D-Link…
Cyber Storm IX, the ninth iteration of the drills, was the first that the agency had invited the ministry to participate in. The exercises involved 2,200 participants from 11 countries simulating major cyberattacks, testing…
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
The campaign, discovered by researchers at Check Point Software, relies on modified "sender" headings to make emails appear as if they were sent via Google Calendar on behalf of a legitimate entity, such…