View this email in your browser
IT Security News Blast – 6-9-2021

[Panel] Back to the Office: Cyber Concerns
Join myself and Jenifer Clark for a panel discussion on how to handle those nasty computers that have been on home networks, will be coming back onto your networks, and may continue to come and go. Handling this requires some thoughtful planning and Jenifer and I will talk through a guide we co-wrote for the local Infragard chapter.
Jackware: A new type of ransomware could be 10 times as dangerous
Cybercriminals are constantly evolving, and what is keeping many security professionals up at night is the growing risk of “jackware” — a new type of ransomware that could be 10 times more dangerous because instead of encrypting Windows computers and servers. Jackware hijacks the actual physical devices and machines that make modern life possible.
FDA lays out device cybersecurity efforts as feds look to implement Biden executive order
The agency voiced its concerns for the healthcare sector and specifically medical device cybersecurity in a response to a National Institute of Standards and Technology call for position papers to fulfill President Joe Biden’s executive order signed last month, which seeks to bolster U.S. cyber posture amid growing hacker threats.
Healthcare and the Data Privacy Cliff
What’s required in healthcare and other industries is a transformational security awareness program, one that goes beyond an “event” or series of policies and proclamations that work in concert, rather than against, human nature. One that creates an ongoing, intentional focus on what we refer to as the knowledge-intention-behavior gap, which considers the idiosyncrasies of human behavior, thought and reasoning, social dynamics and the power of emotion.
Union School District investigating cyber attack, unauthorized access to data
But as the ongoing investigation continued, officials "became aware of additional documents that may have been accessed by an unauthorized individual. Those documents are currently under review, and the District is committed to providing additional information to the community as quickly as possible," said Fleshner.
UBS brand hijacked by bond scammers
Investment bank UBS is the latest Australian company to have its brand hijacked by a complex fraud scheme that dupes consumers with fake high-yield bond prospectuses. Potential victims are being pressured to deposit at least $100,000 into the sophisticated scam in which savings are siphoned through investment offers via copy-cat prospectuses and then lost in the cryptocurrency ecosystem.
Grim prospects for US cyber market: AM Best
Challenges the cyber insurance market are facing include rapid growth in exposure without adequate underwriting controls, the growing sophistication of cyber criminals that have exploited malware and cyber vulnerabilities, and the far-reaching implications of the cascading effects of cyber risks and the lack of geographic or commercial boundaries.
NYC Law Department system still down three days after hack uncovered
The hackers have yet to demand a ransom, according to de Blasio, but a top NYPD official didn’t rule out the possibility down the road. “Is it someone looking to corral information, export it and then do a ransomware attack? That’s a possibility,” John Miller, the NYPD’s deputy commissioner of intelligence and counterterrorism, said at a Tuesday press conference alongside the mayor.
Public Infrastructure Cyberattacks May Pose Broad Financial Risk
Infrastructure that has been compromised can directly affect state and municipal government finances in the near term through ransom payments and/or the costs of remediation and restoration of data and service, as well as over the longer term, as a result of broad economic disruption that leads to loss of tax revenue.
The Emerging Biden Administration Cyber Strategy
Taken together, these elements represent the pieces of an emerging federal cyber strategy that contains at least three key components: increased accountability for cybersecurity at all levels in both public and private enterprise, better implementation of a risk-informed set of core cyber security best practices, and enhanced public-private integration, especially regarding threat intelligence.
The Cybersecurity 202: Congress is tiring of the ‘don’t blame hacked companies’ line
“While I don’t think a culture of blaming the victim is ultimately constructive, clearly we can all do better to protect our critical networks,” Katko plans to say. The company’s commitment to improve its cybersecurity “begs an obvious question,” he will say. “If your pipeline provides fuel to 45 percent of the east coast, why are you only hardening systems AFTER an attack?”
Germany warns: AI arms race already underway
And you can see it in China's latest five-year plan, which places AI at the center of a relentless ramp-up in research and development, while the People's Liberation Army girds for a future of what it calls "intelligentized warfare." As Russian President Vladimir Putin put it as early as 2017, "whoever becomes the leader in this sphere will become the ruler of the world."
U.S. Cyber Tools Are Being Turned Against Americans, Limiting Biden's Options on Russia
"It's that challenge where anytime a tool or capability is used, it's pretty much considered burned," the official said. "Because, for an offensive portion, you have to deploy processes and technologies to adversarial systems to be able to reach out and touch somebody, right? So, once they're uncovered, they can reverse-engineer it."
Exporting Chinese surveillance: the security risks of ‘smart cities’
“This represents the global expansion of the Chinese system of digital authoritarianism. When I say digital authoritarianism, I mean the ability to control, surveil and coerce societies using this type of safe and smart city technology,” says Xiao Qiang, an expert on China’s state surveillance at the University of California, Berkeley.
Risk and reward: Nefilim ransomware gang mainly targets fewer, richer companies and that strategy is paying off, warns Trend Micro
[Initial] access brokers, essential actors in the ransomware business chain who make the first break into a target's networks before selling that illicit access to other criminal organisations. "The price for access varies greatly — it can range from tens of dollars for a random victim asset, to several hundreds or even thousands of dollars for a categorized asset; access to the infrastructure of a large organization can cost five to six figures," the report states.
Intel Plugs 29 Holes in CPUs, Bluetooth, Security
Intel’s senior director of communications, Jerry Bryant, said in a blog post on Wednesday that Intel’s mostly digging these security issues up internally – as in, 95 percent – through its own diligence, with big chunks of them coming through its bugs bounty program and the company’s own research.
Mystery malware steals 26M passwords from 3M PCs. Are you affected?
[The] database contained 26 million login credentials, 1.1 million unique email addresses, more than 2 billion browser cookies, and 6.6 million files. In some cases, victims stored passwords in text files created with the Notepad application. The stash also included over 1 million images and more than 650,000 Word and .pdf files. Additionally, the malware made a screenshot after it infected the computer and took a picture using the device’s webcam.
US House Rep on cyber committees tweets Gmail password, PIN in Capitol riot lawsuit outrage
Brooks, who sits on the House's Cyber, Innovative Technologies, and Information Systems subcommittee, and the Science, Space, and Technology committee, tweeted a photo from an iPad of his Windows computer, attached to which was a piece of paper with login credentials written on it.
You are receiving this email because you are subscribed to receive the IT Security Daily Blast email from Michael Hamilton, Founder, President, and CISO of Critical Insight, formerly Critical Informatics and CI Security. 

We host a free, never boring Security Awareness Training every other Friday. Register here. 

Archived articles are available at

Critical Insight and the Critical Insight logo are the trademarks of Critical Insight, Inc. All other brand names, trademarks, service marks, and copyrights are the property of their respective owners.

© 2020 CI Security. All rights reserved.
Critical Insight

245 4th St, Suite 405  Bremerton, WA   98337

About Us   |   Critical Insight Security News   |   Contact Us 

Add this Email to Your Address Book