WTB: China-linked APT15 Develops New “MirageFox” Malware

The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Backdoor, Botnet, Cryptocurrency-miner, Data breach, Data theft, Misconfigured account, Spear phishing, Ransomware, RAT, Targeted attack, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.

What is Our Martian Quarantine Protocol?

If you somehow haven’t read or watched War of the Worlds, here’s a spoiler alert. The Martians are brought down by the common cold. You can argue if alien biology would be susceptible to human pathogens, but if they were, it wouldn’t be surprising if aliens had little defense against our bugs. The worrisome part of that is the reverse. Could an astronaut or a space probe bring back something that would ravage the Earth with some disease? This is not science fiction, it is both a historically serious question and one we’ll face in the near future. If we send people to Mars are they going to come back with something harmful?

GDPR Case Studies and Practical Examples: How did companies start data protection?

Upon the rollout of GDPR, many US companies were left wondering what they needed to do. Numerous businesses were slow to take action, and in spring 2018, most of them were not prepared for the new legislation. When the GDPR compliance deadline of May 25 passed, we reached out to various enterprises and SMEs and asked them to share the steps they took while starting the process as well as their practical GDPR case studies and success stories.

Everything you need to know about NIST 800-53

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology Laboratory Bulletins).  A complete list of security standards, guidelines and recommendations publications can be found at the Computer Security Resource Center located on the NIST.GOV website.

5 Statistics That Prove Why Your Security Posture Can’t Be Purely Reactive

While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security approach is simply not effective given the way that today’s technical infrastructures and the cyber ecosystem itself have become ever more complex. With organizations adopting new technologies — spreading sensitive data across different cloud servers, service providers, containers, and even various SaaS platforms — it’s essential that they begin to take a more proactive approach to security.

IDG Contributor Network: GDP…Argh!

It seems like every day brings news of a new data breach, sending consumers scrambling to find out if their privacy has been compromised. The fallout from these breaches has become increasingly commonplace: Broken trust, finger pointing, ruined reputations and ad hoc legal consequences.

Crate.io raises $11M and launches its hosted IoT data platform.

Crate.io, the winner of our Disrupt Europe 2014 Startup Battlefield competition, today announced that it has raised an $11 million Series A round. In addition, the company also launched its ‘Crate Machine Learning Platform’ today, a new hosted solution for businesses that want to use the company’s SQL-based database platform for working with IoT data.

Why Community Is a Lifeline for Cybersecurity Experts

Think about your day-to-day job as one of the many cybersecurity experts working in the industry today: Do you often find yourself frantically typing queries into search engines? Do you struggle to get ahead of problems because you’re scrambling just to keep up? Do you feel like your skills are behind? Does it feel like your company’s approach to security is built upon fighting fires?

CISO Chat – Allan Alford, CISO at Forcepoint

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO, which also involves consulting to boardroom level executives about the multitude of potential risks that threaten their business and being prepared for an eventual attack.

Olympic Destroyer is back, targeting chemical, biological and nuclear threat protection entities in Europe

Kaspersky Lab researchers tracking the Olympic Destroyer threat that famously struck the opening of the Winter Olympic Games in Pyeongchang with a destructive network worm have discovered that the hacking group behind it is still active. It appears to be targeting Germany, France, Switzerland, the Netherlands, Ukraine and Russia, with a focus on organisations involved in protection against chemical and biological threats.

Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug

Security researcher Marcus Brinkmann has turned up another vulnerability in the GnuPG cryptographic library, this time specific to the Simple Password Store. Brinkmann explained that CVE-2018-12356 offers both access to passwords and possible remote code execution. This bug is an incomplete regex in GnuPG’s signature verification routine, meaning an attacker can spoof file signatures on configuration files and extension scripts (Brinkmann has dubbed the bug “SigSpoof 3” as the third signature spoofing bug he’s found).