Cisco fixes Remote Code Execution flaws in Webex Network Recording Player

Cisco released security patches to fix RCE flaws in the Webex Network Recording Player for Advanced Recording Format (ARF).

Cisco released security patches to address vulnerabilities in the Webex Network Recording Player for Advanced Recording Format (ARF) (CVE-2018-15414, CVE-2018-15421, and CVE-2018-15422) that could be exploited by an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system

The Webex Meetings Server is a collaboration and communications solution that can be deployed on a private cloud and which manages the Webex Meetings Suite services and Webex Meetings Online hosted multimedia conferencing solutions.

The Meetings services allow customers to record meetings and store them online or in an ARF format or on a local computer, in WRF format.

The relative player Network Recording Player can be installed either automatically when a user accesses a recording file hosted on a Webex Meetings Suite site or manually by downloading it from the Webex site.

The lack of proper validation for the Webex recording files is the root cause of the vulnerabilities that could allow unauthenticated, remote attacker to execute arbitrary code on the target machine.

“Multiple vulnerabilities in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.” reads the security advisory published by Cisco.

“The vulnerabilities are due to improper validation of Webex recording files. An attacker could exploit these vulnerabilities by sending a user a link or email attachment containing a malicious file and persuading the user to open the file in the Cisco Webex Player. A successful exploit could allow the attacker to execute arbitrary code on an affected system.”

An attacker could exploit the flaw by tricking victims into opening a malicious file in the Cisco Webex Player, the file could be sent via email as an attachment or through a link in the content referencing it.

The vulnerabilities affect the following ARF recording players:

  • Cisco Webex Meetings Suite (WBS32) – Webex Network Recording Player versions prior to WBS32.15.10
  • Cisco Webex Meetings Suite (WBS33) – Webex Network Recording Player versions prior to WBS33.3
  • Cisco Webex Meetings Online – Webex Network Recording Player versions prior to 1.3.37
  • Cisco Webex Meetings Server – Webex Network Recording Player versions prior to 3.0MR2

Each version of the Webex Network Recording Players for Windows, OS X, and Linux is affected by at least one of the issues.

The following Network Recording Player updates address  the vulnerabilities:

  • Meetings Suite (WBS32) – Player versions WBS32.15.10 and later and Meetings Suite (WBS33) – Player versions WBS33.3 and later;
  • Meetings Online – Player versions 1.3.37 and later; and Meetings Server – Player versions 3.0MR2 and later.

Cisco warns that there are no known workarounds for these issues.

“The Cisco Webex Network Recording Player (for .arf files) will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a Cisco Webex Meetings site that contains the versions previously specified,” concludes the Cisco advisory.

Pierluigi Paganini

(Security Affairs – Cisco Webex Network Recording Player, RCE)

The post Cisco fixes Remote Code Execution flaws in Webex Network Recording Player appeared first on Security Affairs.

MageCart Hacked Customers’ In NewEgg Credit Card Data Breach

The infamous cyber gang Magecart seems unstoppable. The gang has been around for quite a few years. However, this year,

MageCart Hacked Customers’ In NewEgg Credit Card Data Breach on Latest Hacking News.

Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange.

According to the Tech Bureau Corp., a Japanese cryptocurrency firm, hackers have compromised its Zaif exchange and have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies, including Bitcoin, Monacoin, and Bitcoin Cash.

The stole digital currencies included roughly 2.2 billion yen belonged to Tech Bureau and 4.5 billion belonged to its clients.

The hacked have taked the control of the exchange for a couple of hours on Sept. 14, and illegally transferred coins form the “hot wallet” of the exchange to wallets under their control.

“Japanese cryptocurrency firm Tech Bureau Corp said about $60 million in digital currencies were stolen from its exchange, highlighting the industry’s vulnerability despite recent efforts by authorities to make it more secure.” reported the Reuters.

Three days later, operators at the exchange noticed server problems and publicly disclosed the hack on Sept. 18.

The Tech Bureau took offline the exchange and sold to Fisco Ltd the majority ownership for a 5 billion yen ($44.59 million) investment that would be used to replace the digital currencies stolen from client accounts.

“Documents seen by Reuters on Thursday showed Japan’s Financial Services Agency would conduct emergency checks on cryptocurrency exchange operators’ management of customer assets, following the theft. FSA officials were not immediately available for comment.” continues the Reuters.

This is the second hack suffered by a Japan’s crypto exchange this year, earlier January  Japan-based digital exchange Coincheck was hacked and crooks stole$530 million in digital coins.

Earlier this year, a problem at the Zaif exchange allowed some people to buy cryptocurrencies without paying.

Japan is considered a global leaked in cryptocurrency technologies, the Bitcoin could be used for payment in the country since April 2017 major retailers accept this kind of payments.

Experts believe that the cyber heist will affect the FSA’s ongoing regulatory review of the cryptocurrency industry.

Last year Japan became the first country to regulate cryptocurrency exchanges, they have to register with FSA and required reporting and other responsibilities.

Anyway, the incidents demonstrate that the level of security of exchanges has to be improved.

Pierluigi Paganini

(Security Affairs – Zaif exchange, hacking)

The post Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange appeared first on Security Affairs.

Security Affairs: Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange.

According to the Tech Bureau Corp., a Japanese cryptocurrency firm, hackers have compromised its Zaif exchange and have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies, including Bitcoin, Monacoin, and Bitcoin Cash.

The stole digital currencies included roughly 2.2 billion yen belonged to Tech Bureau and 4.5 billion belonged to its clients.

The hacked have taked the control of the exchange for a couple of hours on Sept. 14, and illegally transferred coins form the “hot wallet” of the exchange to wallets under their control.

“Japanese cryptocurrency firm Tech Bureau Corp said about $60 million in digital currencies were stolen from its exchange, highlighting the industry’s vulnerability despite recent efforts by authorities to make it more secure.” reported the Reuters.

Three days later, operators at the exchange noticed server problems and publicly disclosed the hack on Sept. 18.

The Tech Bureau took offline the exchange and sold to Fisco Ltd the majority ownership for a 5 billion yen ($44.59 million) investment that would be used to replace the digital currencies stolen from client accounts.

“Documents seen by Reuters on Thursday showed Japan’s Financial Services Agency would conduct emergency checks on cryptocurrency exchange operators’ management of customer assets, following the theft. FSA officials were not immediately available for comment.” continues the Reuters.

This is the second hack suffered by a Japan’s crypto exchange this year, earlier January  Japan-based digital exchange Coincheck was hacked and crooks stole$530 million in digital coins.

Earlier this year, a problem at the Zaif exchange allowed some people to buy cryptocurrencies without paying.

Japan is considered a global leaked in cryptocurrency technologies, the Bitcoin could be used for payment in the country since April 2017 major retailers accept this kind of payments.

Experts believe that the cyber heist will affect the FSA’s ongoing regulatory review of the cryptocurrency industry.

Last year Japan became the first country to regulate cryptocurrency exchanges, they have to register with FSA and required reporting and other responsibilities.

Anyway, the incidents demonstrate that the level of security of exchanges has to be improved.

Pierluigi Paganini

(Security Affairs – Zaif exchange, hacking)

The post Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange appeared first on Security Affairs.



Security Affairs

Latest Hacking News Podcast #126

Microsoft Jet zero-day and WD My Cloud vulnerabilities disclosed, US authorizes offensive cyber operations and more on today's Latest Hacking News Podcast.

Latest Hacking News Podcast #126 on Latest Hacking News.

Facebook Will Open a ‘War Room’ Next Week To Monitor Election Interference

An anonymous reader quotes a report from The Verge: Sheera Frankel and Mike Isaac [write from The New York Times]: "Sandwiched between Building 20 and Building 21 in the heart of Facebook's campus, an approximately 25-foot by 35-foot conference room is under construction. Thick cords of blue wiring hang from the ceiling, ready to be attached to window-size computer monitors on 16 desks. On one wall, a half dozen televisions will be tuned to CNN, MSNBC, Fox News and other major cable networks. A small paper sign with orange lettering taped to the glass door describes what's being built: "War Room." Set to open next week, the conference room is in keeping with Facebook's nick-of-time approach to midterm election preparedness. (It introduced a "pilot program" for candidate account security on Monday.) It's a big project. Samidh Chakrabarti, who oversees elections and civic engagement, told the Times: "We see this as probably the biggest companywide reorientation since our shift from desktops to mobile phones." Of course, the effort extends beyond the new conference room. Chakrabarti showed the Times a new internal tool "that helps track information flowing across the social network in real time," helping to identify misinformation as it goes viral or a surge in the creation of new (and likely fake) accounts.

Read more of this story at Slashdot.

CVE-2018-17283

Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.

Tech Titans 2018: Washington’s Top Tech Leaders

washingtonian

Tech Titans 2018: Washington’s Top Tech Leaders
Joe Guinto, Washingtonian, September 20, 2018
Source: https://www.washingtonian.com/2018/09/20/tech-titans-2018-washingtons-top-tech-leaders/


Our guide to the most important and innovative people in Washington’s digital economy.

There was a time when Washington’s tech sector was dominated by three big names—Micro­Strategy, LivingSocial, Blackboard. But as those companies split apart or morphed into something other than the juggernauts they once were, they gave way to firms with names like Cofense, EverFi, EdgeConneX—hopeful, hip, made-up words that suggest something fresh and new on the scene. Look closer, though, and you’ll see that the old titans are very much there in this new landscape: Sid Banerjee at Clarabridge. Andrew Rosen at Interfolio. Sanju Bansal at Hunch Analytics. Timothy Chi at WeddingWire. Susan Tynan at Framebridge. All are alumni of those Big Three.

What’s also new is that none of the aforementioned companies are dependent on Washington’s best-known buyer of tech, the federal government. As the DC technology industry has expanded, it has diversified. Today it’s increasingly common for local start-ups not to depend on the government at all, instead getting into the kind of business that would be equally at home in Silicon Valley—things such as SocialCode’s “audience intelligence software,” which helps big brands better leverage social media, or Alarm.com’s connected, smart-home devices.

The region’s entrepreneurial class has long fantasized about being seen as more than a cadre of glorified federal contractors, which is one reason firms like these get so much hype. In reality, Uncle Sam’s bony fingers are still all over our list—and that’s good news, even if that story isn’t as sexy as the Silicon Valley version. The government being the government, some of what it buys from local contractors is relatively mundane, if important, work such as data processing and enterprise software. Yet some of the local companies that do those things for government agencies now rank among the fastest-growing small businesses in the country. Meanwhile, some government tech contractors here have become multibillion-dollar IT concerns: Leidos, General Dynamics Information Technology, and DXC Technology are all billion-dollar businesses, and all have expanded exponentially through recent mergers.

The feds are also helping drive what may be the fastest-growing subcategory of tech here—cybersecurity. Companies such as Endgame are earning their keep protecting federal databases, while firms including Altamira are getting paid to manage geospatial-intelligence info. Others, such as LookingGlass Cyber Solutions and Dragos, are also establishing reputations for being the best in the business for addressing cybersecurity.

A lot of venture-capital money is betting on those cyberfirms—K Street’s Paladin Capital, for one, has made more investments in such companies than any other VC fund in the US. Steve Case’s Revolution Growth is putting its money into cybersecurity, too, as well as funding local companies such as Optoro, which finds innovative ways to resell products that have been returned by customers, and Cava, the Greek fast-casual chain that has leveraged high-tech tools to fuel its nationwide expansion.

Plenty of others are moving money into tech here, including local NextGen Venture Partners and QED Investors, as well as the local branches of Silicon Valley Bank and the vast New Enterprise Associates. What’s more, Washington firms have drawn the attention of national funds not based here. The Rise Fund (singer Bono is an investor) has poured cash into EverFi, a hot start-up in education technology—another growing sector, along with cybersecurity and data centers (70 percent of all internet data traffic now flows through Northern Virginia).

On and on it goes. Cushman & Wakefield ranks ours as the third-best metropolitan area for tech, behind only San Francisco and Silicon Valley. Were Washington to land Amazon’s HQ2, that position would likely be solidified.

The ranking reflects what we found in compiling our 2018 list of Tech Titans, a group that covers small start-ups with big potential and ever-expanding tech mega-firms. Backed by local financiers, boosted by potentially billions in federal funding, and supported by a plethora of local universities, the tech industry is growing at a blazing clip. That may make this year’s group of Tech Titans the most innovative, most important, and most influential we’ve ever assembled.

 

The Entrepreneurs

Reggie Aggarwal
Founder and CEO, Cvent

Aggarwal started this event-management software company with his own money and a staff of two back in 1999. It’s now a 3,400-person firm and was sold two years ago to Vista Equity Partners for $1.65 billion, but Aggarwal remains at the helm.

Michael Avon
CEO, chairman, and founder, ICX Media

A former principal at Columbia Capital, Avon now runs ICX, which offers a platform that can be used by digital video creators, including big consumer brands and social-media stars, to more closely monitor and understand their audience. In April, actor/writer/filmmaker Edward Burns joined the three-year-old company’s board, which includes former Time Inc. CEO Laura Lang. The company has been backed by $9.6 million in funding.

Brian Ballard, Jeff Jenkins, and Chris Hoyt
Founders, Upskill

The company makes a software platform called Skylight that runs on smart glasses and other wearable devices, giving workers instant access to data that can boost their productivity. The platform is in use by Boeing, and GE Ventures has invested in Upskill. The latest in­fusion, of $17.2 million, came this past spring.

Zvi Band and Tony Cappaert
Cofounders, Contactually

Maker of a customer-relationship-management platform that has been optimized for real-estate agents, Contactually was launched seven years ago, and both of its founders have tried to help other executives enjoy the same kind of success they’ve had. Band helped found the DC Tech Meetup group, and Cappaert holds a regular dinner-party series in which he meets with other local business founders.

Sid Banerjee
Founder, executive vice chairman, and chief strategy officer, Clarabridge

Banerjee was one of the founding employees at MicroStrategy. At Clara­bridge, he has created a firm offering artificial-intelligence-driven software systems that analyze customer interactions to help boost customer service at major companies including Walmart, United, and eBay.

Sanju Bansal, Aneesh Chopra, and Dan Ross
CEO (Bansal) and founders (Chopra and Ross), Hunch Analytics

In 2014, Bansal, a former executive vice president at MicroStrategy, joined this firm founded by Ross and Chopra, who in 2009 became the first federal-level chief technology officer. Hunch Analytics mines public and private databases for information that can help health-care firms and other companies make more informed strategic decisions.

Randy Brouckman
CEO, EdgeConneX

This Herndon company is the only global provider of “edge” data centers—facilities that either fill in gaps in internet connectivity or boost signal service in high-traffic areas. It’s expanding rapidly, having announced new centers this year in Miami, Atlanta, Phoenix, Portland, Denver, Toronto, and Buenos Aires.

Richard D. Calder Jr.
CEO and president, GTT Communications

This McLean company, which offers cloud networking services to multinational firms, has been growing through acquisitions, including the $2.3-billion cash buyout of the European cloud networker Interoute, which closed this year. GTT Communications appears to be on track to top $1 billion in revenue in 2018.

Matt Calkins
Founder and CEO, Appian

Appian was one of a few Washington-area firms to issue an IPO in 2017, and shares have nearly tripled since the company made its Nasdaq debut. In his spare time, Calkins competes in the World Boardgaming Championships, which is a real thing.

Timothy Chi
Cofounder and CEO, WeddingWire

In 2007, Chi—a cofounder of Blackboard—launched WeddingWire, an online marketplace that pairs grooms- and brides-to-be with wedding vendors. It has grown steadily, and in May it sold a majority stake to the private-equity firm Permira for $350 million.

Zia Chishti
CEO, founder, and chairman of the board, Afiniti

Born in the US and raised in Pakistan, Chishti now has led a second company to a billion-dollar valuation. (His first was Align Technology.) The DC firm makes artificial-intelligence products that more efficiently pair agents with customers who dial into a company’s call center. It expects to go public in 2019.

Zack Christenson
CEO, Crowdskout

The company makes a customer-relationship-management soft-ware platform for political-advocacy groups. The platform has been used by the Republican National Committee, nonprofits, and trade groups. Under Christenson, Crowdskout has added nearly two dozen people in recent months, tripling the staff before the 2018 midterm elections.

Tom Davidson
Cofounder and CEO, EverFi

Last year the über-exclusive Rise Fund—which includes U2’s Bono and LinkedIn’s Reid Hoffman among its investors—put $150 million of a total $190 million in financing into EverFi, which offers online-education courses. That cemented its place as one of the hottest education-tech start-ups in the country.

Ted Davies
CEO and chairman, Altamira Technologies Corporation

Davies came to Altamira after being president of Unisys Federal Systems as well as a partner specializing in tech and government at Booz Allen Hamilton. Today the company he leads is a major contractor helping the Defense Department and US intelligence agencies find ways to move data to the cloud securely.

Brandon Torres Declet
Cofounder and CEO, Measure

Declet had worked for the Department of Defense, the NYPD, and the House Homeland Security Committee before cofounding Measure, a drone operator headquartered, ironically, in one of the least drone-friendly cities in the US. The company’s drone services—which include pilots who do the flying—can help firms inspect things such as construction or cell towers as well as respond to emergencies. Measure received $15 million in Series B financing last year.

Donald Graham
Chairman, Graham Holdings Company

Born with ink in his veins, Graham knew his way around digital even before his family sold the Washington Post. He was a longtime member of Facebook’s board of directors, and his $2.6-billion Graham Holdings owns several techy companies, including the cybersecurity education outfit CyberVista. It can only help that Timothy O’Shaughnessy, former head of LivingSocial—who is married to Graham’s daughter, Laura—is CEO of Graham Holdings.

Blake Hall
Founder and CEO, ID.me

Late last year, this company, which offers a digital-identity service—sort of a driver’s license for online transactions—brought on a CFO and CTO as it surpassed 5 million total users. That came just months after Hall, an Army veteran who served in a combat unit in Iraq, secured $19 million in Series B funding for his growing company.

Tim Hwang
Founder and CEO, FiscalNote

Investment heavyweights New Enterprise Associates, Mark Cuban, Revolution, and Jerry Yang have all backed 26-year-old Hwang’s FiscalNote, now the top player in legal analytics, offering data that helps customers track and predict the potential impact of new regulations and legislation. This July, FiscalNote expanded into media by acquiring CQ Roll Call from the Economist Group.

Wayne Jackson III
CEO, Sonatype

Jackson, head of Sonatype since 2010, once led the network-security firm Sourcefire from start-up to IPO to a $2.7-billion acquisition by Cisco. Sonatype, which helps distribute secure open-source software to developers, saw sales double in the first quarter of this year.

Reid Jackson
CEO and president, Compusearch

Late last year, Jackson led the buyout of Route 7 neighbor and reverse-auction marketplace maker FedBid. The combined companies today work with every Cabinet-level agency in the federal government, for example, providing modern procurement services and supply-chain analytics.

Kay Kapoor
Founder and CEO, Arya Technologies

A former CEO of Accenture Federal Services, Kapoor left her lead position at AT&T’s $15-billion Global Public Sector division last year to found her own firm. Though still in the early start-up phase, Arya Technologies is worth watching because at AT&T Kapoor helped land a 25-year federal contract worth an estimated $100 billion.

Ajay Kori and Jeff Sheely

Cofounders, UrbanStems

This flower-delivery business now has six operations centers and is delivering same-day to customers in Washington and New York City, as well as next-day to customers nationally through a new partnership with FedEx.

Mike Lawrie
Chairman and CEO, DXC Technology

DXC is still in its infancy but is already a leader in IT services—a mega-firm with 6,000 clients from a variety of industries. The $21-billion Tysons company was formed in April 2017 by the merger of CSC and the enterprise-services division of Hewlett Packard Enterprise. Lawrie, who had been CEO of CSC before the merger, oversees a worldwide workforce of 134,000 people.

Robert M. Lee, Justin Cavinee, and Jon Lavender
CEO (Lee), chief data scientist (Cavinee), and CTO (Lavender), Dragos

This trio of former cybersecurity experts working within the US intelligence community raised $10 million in 2017 for Dragos. The mission of their Han-over, Maryland, firm is to help protect private companies from cyberattacks, especially those whose businesses involve infrastructure used by the public—a wind-farm operator, for instance. Or, as Lee has grandly put it: “Dragos exists to safeguard civilization.”

John Mazur
CEO, Homesnap

Deloitte ranks this Rockville company as one of the 500 fastest-growing tech firms in the US. Its app, launched in 2012, connects real-estate brokers and homebuyers and offers instantly updated home listings. Homesnap, which Mazur took over in 2017, has raised more than $30 million.

Tobin Moore and Adam Vitarello
Cofounders, Optoro

Several of Washington’s biggest investors have backed Optoro, which runs a software platform offering retailers a way to make money off of the millions of things retail customers either didn’t buy or did buy but later returned. QED, Grotech, and Revolution Growth have all chipped in to what’s now a $129-million investment pool that Optoro’s founders—a couple of thirtysomething St. Albans grads—hope will help them create a billion-dollar business.

Laura Graham O’Shaughnessy
CEO, SocialCode

The company markets “audience-intelligence software” to major brands—everything from Heine­ken to GEICO—helping them better identify, understand, and target their customers on social media.

Bill Pardue and Jim Shelhamer
CEO and co-founder (Pardue) and executive vice president (Shelhamer), Athenium Analytics

The forecast for Pardue’s start-up, formerly called Weather Analytics, proved to be sunny. The six-year-old DC firm—provider of weather and predictive-risk software to insurance companies—took in $17 million in financing last year and completed a merger with the insurance-software maker Athenium this summer.

Carolyn Parent
CEO, LiveSafe

Parent’s Arlington firm demonstrated its technology in front of industry leaders this year, outfitting almost 5,000 SXSW conference staff and volunteers in Austin with mobile technology that can instantly connect people and share their locations in the event of an emergency.

Chip Paucek
CEO, 2U

Northwestern, USC, SMU, Georgetown, and other universities use 2U’s platform to provide online classes. Revenues are growing—fast. In June, the Lanham company raised $331 million through a public offering of its common stock to fund more growth through acquisitions.

Andrew Rosen
CEO, Interfolio

Rosen is an alumnus of two of Washington’s best-known tech firms, Blackboard and Micro­Strategy. He took over as Interfolio CEO in 2015 from founder and now president Steve Goldenberg. The company’s software steers applicants and faculty committees through the higher-education hiring process. Since joining the company, he has driven growth by helping secure a $12-million financing round, inking a partnership with the University of California at San Diego, and acquiring a Kentucky faculty-data-evaluation firm.

Brett Schulman
CEO, Cava

Tech and tzatziki? For the burgeoning fast-casual restaurant chain Cava—with more than 60 locations nationwide and counting—that’s been a delicious combination. Schulman has invested heavily in data tools. Among them: sensors at some locations that track employee and customer movements. The resulting data is analyzed to improve efficiency and better understand how customers use Cava’s spaces.

Steve Trundle
CEO, Alarm.com

This publicly traded firm was a small division within MicroStrategy until it spun off in 2000. Since then, it has broken into the “smart security” industry in a big way: Among the 8 million homes and businesses with smart-security systems in this country, some 5 million areAlarm.com subscribers.

Susan Tynan
Founder, Framebridge

Tynan’s business—which offers quick custom framing at cut-rate prices—has taken off with investors, including New Enterprise Associates and Revolution. They’ve placed $67 million into the four-year-old business, including a $30-million funding round this summer.

 

The Government

Matt Cutts
Acting administrator, US Digital Service

USDS focuses on, among other things, making the websites of federal agencies more functional. Cutts, a former Google executive, began running it early last year. Since then, he has prioritized hiring tech talent and working to retain workers amid rapid turnover.

Andrei Iancu
Director, US Patent and Trademark Office

Iancu was unanimously confirmed by the Senate on February 5. No doubt that same day, tech execs all over the country began Googling for old syllabi from the advanced patent class he taught at UCLA.

Christopher C. Krebs
Undersecretary, National Protection and Programs Directorate, Department of Homeland Security

Krebs headed cybersecurity policy for Micro­soft before joining the Trump administration in March 2017. Today he oversees a key division at DHS involved with protecting US infrastructure (e.g., the power grid) as well as cybersecurity and communications network security—all of which are thought to be under potential threat from foreign powers and terrorist groups.

Barney Krucoff
Interim chief technology officer, District of Columbia

When he was chief data officer for the District, the city described Krucoff as “the man behind all of DC’s data.” Now, after taking over as CTO, he’ll be the man in front of all DC’s data, which is increasingly being made available online for public perusal.

Jason Matheny
Director, Intelligence Advanced Research Projects Activity

Matheny’s agency, part of the Office of the Director of National Intelligence, is looking to invest in “high-risk, high-payoff research programs that have the potential to provide our nation with an overwhelming intelligence advantage over future adversaries.” A few examples: IARPA is seeking technology that could detect and prevent the use of biological weapons as well as new technology that will improve the accuracy of polygraph machines.

Dawn Meyerriecks
Deputy director for science and technology, CIA

Spy vs. Spy is increasingly becoming Machine vs. Machine. Under the direction of former AOL executive Meyerriecks, the CIA is transforming the way it monitors other countries, employing artificial intelligence to watch the machines that are watching American agents. As of last year, Meyerriecks’s division has been engaged in almost 140 AI projects.

Jerrold Nadler, Doug Collins, Steve Chabot, and Tom Marino
Congressional representatives, House Judiciary Committee

Top contenders to re­place longtime Virginia congressman Bob Goodlatte, who isn’t seeking reelection, as Judiciary Committee chair, these four will all help decide the fate of net-neutrality rules repealed by the FCC in June, because their committee would need to sign off on countering the FCC action. Republicans Collins, Chabot, and Marino are all against net neutrality. Democrat Nadler, who’s likely to take over the committee if a blue wave swamps the House, is in favor of congressional action to restore the rules.

General Paul Nakasone
Director, National Security Agency; Commander, US Cyber Command

The Minnesota native who commanded troops while deployed in Iraq and Afghanistan headed the Army’s Cyber Command for two years before taking on the Department of Defense’s top cybersecurity post this past spring. USCYBERCOM, as it’s known, is expanding quickly in response to perceived cyber threats against military targets.

Buddy Rizer
Economic-development director, Loudoun County

Loudoun is called “Data Center Alley” in part be­cause Rizer has worked hard to make his suburban county a hotbed for data centers. Some 70 percent of all global internet traffic now flows through the area, and data centers across Virginia create an estimated $10.2 billion in annual economic output.

Steven H. Walker
Director, Defense Advanced Research Projects Agency

Few agencies have done more to influence the development of cutting-edge technologies. For example, DARPA robotics initiatives led to the technology that makes driver­less cars possible. That means Walker—who officially took over DARPA last November—is one of the most important people in all of tech.

Mark Warner and Tim Kaine
US senators from Virginia

Warner, who founded the Senate Cybersecurity Caucus, and Kaine introduced legislation to overrule the FCC’s elimination of net-neutrality regulations last February. It passed with bipartisan support, but the House hasn’t fol­-lowed suit and likely won’t if Republicans retain control after November. In that case, Warner and Kaine may reach into the bag of parliamentary tricks to find another way to block the FCC’s removal of those Obama-era rules.

 

The Lobbyists

Danielle Burr
Head of federal affairs, Uber

Uber’s spending on lobbying has, ahem, surged—to a record $540,000 in the first quarter of this year—since this former aide to House majority leader Kevin McCarthy took over the company’s top federal-liaison spot in January. The firm, which has tested its own self-driving vehicles, could be affected by a bill called the SELF-DRIVE Act, which would allow it to test-drive autonomous cars. After passing the House overwhelmingly last fall, the legislation has languished in the Senate.

Teresa Carlson
Vice president, worldwide public sector, Amazon Web Services

Amazon Web Services—Amazon’s cloud-services arm—is projected to do $2.8 billion in business with the federal government this year and $4.6 billion in 2019. It’s also reportedly a lead contender for a $10-billion Defense Department IT contract.

Colin Crowell and Carlos Monje
Vice president of global public policy (Crowell) and director of public policy (Monje), Twitter

Twitter has a fight on its hands with the powers that be in the House GOP. In August, majority leader Kevin McCarthy called for Twitter CEO Jack Dorsey to testify on the Hill about the company’s filtering of certain accounts. Some have alleged that Twitter is “shadow-banning” conservatives. Crowell, who was senior counsel at the Obama-era FCC, and Monje will lead the effort to calm those concerns.

Matthew Eggers
Vice president for cybersecurity policy, US Chamber of Commerce

Anything that the Chamber, an enormous lobbying group, has to say on cybersecurity policy is likely to be heard at the White House.

Jeff Greene
Vice president, global government affairs and policy, Symantec

Lawmakers on the Hill often rely on Greene, a top DC representative for the California security-software firm Symantec, to share industry insights as well as offer official testimony. He recently addressed a hearing titled “Empty Threat or Serious Danger: Assessing North Korea’s Risk to the Homeland.”

Brian Huseman
Vice president of public policy, Amazon

Amazon has built the biggest tech-business lobbying shop in Washington over the past year, doubling the number of employees to, at last count, 28. That’s twice the size of Google’s DC operations. All those new faces fall under Huseman’s purview. Whether they’re about to be joined by 50,000 new Amazonians working at a Washington HQ2 remains to be seen.

Joel Kaplan and Erin Egan
Vice president of global public policy (Kaplan) and chief privacy officer (Egan), Facebook

Even if you get most of your news from Russian online trolls, you probably know that the world’s leading social network has had a rough year. But bad news for Facebook’s stock price is good news for its DC office, which reportedly spent a record $3.67 million on lobbying during the quarter when Mark Zuckerberg appeared on the Hill to answer questions on privacy issues related to Cambridge Analytica. Look for them to add more muscle as law­makers and regulators circle.

Angela McKay and Fred Humphries
Senior director of cybersecurity policy and strategy (McKay) and corporate vice president of US government affairs (Humphries), Microsoft

A Booz Allen Hamilton alum, McKay heads cybersecurity and cloud-security policy for Microsoft. That’s an important position considering the federal government’s current emphasis on cyber issues. Humphries helms government affairs overall. Last year, the company spent $8.5 million on lobbying. One of its big pushes is to get the Trump administration to reverse its decision to place tariffs on imported solar panels and solar cells. In March, Microsoft made the largest corporate purchase of solar power in history, buying millions of megawatts from solar farms in Virginia.

Coleman Mehta
Senior director, US policy, Palo Alto Networks

The $2.24-billion Palo Alto Networks, which sells network-and-enterprise-security products from Santa Clara, California, brought on Mehta last year to lead its federal interactions. He was director of legislative affairs for the National Security Council during the Obama administration. The company provides cybersecurity services for government clients and issues watch reports on hacker activities that federal agencies could use.

Susan Molinari
Vice president of public policy and government relations for the Americas, Google

President Trump leaped to Google’s defense when the European Union sanctioned the company for antitrust violations this past summer. Molinari’s connections may have played a role in that. She’s a former Republican representative from New York who, the Center for Public Integrity reported, personally donated money to Trump’s transition. Even though her company hasn’t taken the public shaming that, say, Facebook has, it still spent $18 million on lobbying in 2017—second only to AT&T among individual companies.

Nuala O’Connor
President and CEO, Center for Democracy & Technology

The nonprofit CDT, whose mission is to “advance our digital rights,” has been urging lawmakers to roll back the FCC’s elimination of net-neutrality rules installed during the Obama administration. So far, it has won Senate support, and in July it picked up the backing of its first House Republican.

Jeff Ratner
Senior policy counsel, Apple

Ratner was director for legislative affairs and cybersecurity policy in the Obama administration before leaving to join Apple in 2016. As a conduit between the company and the federal government, he’s been especially busy this year thanks to Apple CEO Tim Cook’s public stance against the Trump administration’s immigration policies.

Gary Shapiro
President and CEO, Consumer Technology Association

This Arlington trade group lobbies for the industry and puts on a wacky, well-known annual event in Las Vegas, the Consumer Electronics Show.

 

The Financiers

Jenny Abramson
Founder and managing partner, Rethink Impact

Rethink Impact is a rare venture-capital firm that focuses its investments on companies led by women.

Frank Adams
Founder and managing general partner, Grotech

Adams’s firm, which has more than $1.5 billion under management, has financed fellow tech titans ICX Media, Op-toro, and Contactually. He also cofounded Mid-Atlantic Venture Association, a nonprofit that promotes investment in tech start-ups in the Mid-Atlantic region.

Edward Albrigo
CEO, the Center for Innovative Technology

CIT is a nonprofit technology accelerator backed by the state of Virginia. Its funds have put money into more than 200 companies since 2004— investments that helped attract $600 million in additional private equity. Albrigo has been with CIT only since 2015, but in his first year he shored up its finances, wiping out nearly all of an $800,000 deficit that had been covered by the state and returning $710,000 to the Commonwealth.

Peter Barris
Chairman and general partner, New Enterprise Associates

Barris took a step up from his managing partner role to become chairman in 2017. Now, in response to a sluggish market for IPOs, the venture-capital mega-firm (which had about $20 billion in assets last year) plans to sell its investments in some 20 start-ups for about $1 billion—opening them up for private investment.

Jason Booma, Jim Fleming, Patrick Hendy, Monish Kundra, and John Siegel
Partners, Columbia Capital

The VC fund founded in 1989 by Virginia senator Mark Warner made winning bets on Nextel Communications early on and has since put some of its money into local start-ups including Broadsoft, Millennial Media, and Digital Signal Corp.

Steve Case
Chairman and CEO, Revolution

Billionaire Steve Case is using campaign tactics to tout his Rise of the Rest fund, a $150-million investment vehicle that backs seed-stage companies that aren’t in Silicon Valley, New York City, or Boston. He’s taken seven bus tours through 26 states and 38 cities in recent years to meet start-ups that might get some of that money.

Chris Darby
CEO, In-Q-Tel

In-Q-Tel is a nonprofit investment firm, founded by the CIA, that puts money into start-up companies developing technologies to serve the nation’s intelligence agencies. It has funded multiple start-ups that went on to fetch big acquisition prices—Google bought one firm backed by In-Q-Tel for $625 million; IBM acquired another for $1.3 billion.

Mark Ein
Founder, Capitol Acquisition Corp. IV

After serial investor Ein—who has been involved in the founding or early stages of six companies that have grown to be valued at more than $1 billion, including XM Satellite Radio—closed the $2.4-billion merger between his Capitol Acquisition Corp. III and Cision in July 2017, he started all over, incorporating Capitol Acquisition Corp. IV and taking that firm public only months later through a $350-million IPO.

Scott Frederick
Business-development and federal head, New Enterprise Associates

Frederick specializes in introducing his VC-backed firms to those in government who have needs to fill and money to spend.

Jeff Ganek, Robert Poulin, and Mark Foster
Cofounders, Blazar Ventures

The original employees at Neustar back when it was still a division within Lockheed Martin, these three took Neustar public in 2005 and have since moved on to form their own VC firm in Alexandria.

Carter Griffin
General partner, Updata

DC’s Updata Partners has put more than $750 million of investments into 40-plus companies, most of them growth firms in the software development business. That includes, earlier this year, part of a $14-million investment Griffin helped put together in Homesnap, a Bethesda firm that makes a real-estate database and app.

Ted Leonsis
Founder and partner, Revolution Growth

This year, his Washington sports teams won the Stanley Cup and the Arena Bowl. So if the co-founder of the Revolution Growth fund contacts your tech firm looking to invest, definitely take his call.

Dan Mindus and Brett Gibson
Founders, NextGen Venture Partners

Gibson is one of many LivingSocial alums still working in Washington, while Mindus has been in investing most of his career. Their portfolio has a distinctively local flavor, having backed Avizia, Interfolio, Upskill, and UrbanStems.

Nigel Morris
Cofounder and managing partner, QED Investors

Morris’s Alexandria firm filed with the SEC this past June to raise $150 million for a new investment fund. That will pave the way for new investments such as those QED has made in Credit Karma.

Steve Pann
Founding partner, Razor’s Edge

In 1997, Pann cofound-ed Blackbird Technologies, an engineering, research, and technology company, then sold it to Raytheon in 2014. In 2010, he cofounded Razor’s Edge Ventures, an investment firm in Reston that specializes in big data, computing, and space-technology enterprises. Its investments include Altamira, a data-analytics firm in McLean that’s a government contractor with the Pentagon.

Tige Savage
Managing partner, Revolution Ventures

Savage helps oversee Revolution Ventures, a portfolio with investments in local companies such as Optoro and Cava, as well as Sweetgreen, which moved from Georgetown to Los Angeles in 2016.

Fredrick Schaufeld and Anthony Nader
Cofounders and managing directors, SWaN & Legend Venture Partners

Their firm has backed Cava, Optoro, Frame­bridge, and Urban­Stems—whose CEOs are all fellow Tech Titans—as well as the nutrition-bar maker Kind.

Michael Steed
Founder and managing partner, Paladin Capital Group

Paladin has made 19 total investments in cybersecurity firms in the past three years—more than any other venture-capital firm in the country. It’s also the fourth-leading firm in terms of total general technology investments over that same stretch.

Sean Stone
Head of sales origination, Silicon Valley Bank

Is there anyone in DC tech whom Sean Stone doesn’t know? Maybe not. Stone’s bank, which is headquartered in California but has an outpost in Arling­ton, has helped fund Ever-Fi, among other local firms, and he’s constantly meeting with top tech and government leaders as well as newer start-ups around town.

J.D. Vance
Managing partner, Rise of the Rest

Venture capitalist isn’t exactly an on-brand title for the bestselling author of Hillbilly Elegy, who’s known for sorrowful ruminations about troubled small towns and the state of conservatism. However, Vance—who lives in Ohio but spends much of his time in Washington (his wife is a clerk for Supreme Court chief justice John Roberts)—is involved in the tech sector, where he oversees Revolution’s $150-million Rise of the Rest fund, which is investing in early-stage companies headquartered outside of the nation’s big tech hubs.

 

The Biggest Players

Ted Colbert
Chief information officer and senior vice president, Information Technology and Data Analytics, Boeing

Colbert is part of the small team of executives who work in Boeing’s Arlington office, but his job is a big one. He over-sees IT strategy and operations as well as 6,500 IT and analytics employees worldwide.

Jim Connelly
Vice president and chief information-security officer, Lockheed Martin

Connelly is in charge of a cyberattack team that’s impressive in scope: It has hundreds of cyber-intelligence officers stationed in centers around the globe.

Amy Gilliland
President, General Dynamics Information Technology

After General Dynamics completed a nearly $10-billion acquisition of the Falls Church IT-services firm CSRA in April, it merged the company’s operations into its General Dynamics Information Technology division, which Gilliland had taken over late last year. It’s a giant organization that’s likely to be one of the most competitive bidders for government IT contracts.

Charles E. Gottdiener
President and CEO, Neustar

Neustar, in Sterling, has been called “the most powerful, well-connected company you’ve never heard of.” The 1,800-person firm grew out of being the initial “Local Number Portability Administrator” in 1996—meaning it helped telcos help customers switch numbers between carriers. But it lost that business, worth about $500 million, after a 2015 FCC ruling granting the LNPA title to Iconectiv, which is partly owned by Ericsson. That didn’t derail a private-equity group from taking Neustar private last summer in a $2.9-billion deal. Gottdiener took over this summer after that deal closed.

Marillyn Hewson
CEO, Lockheed Martin

This former industrial engineer who has been with Lockheed Martin for 35 years has built the company into a powerhouse defense contractor that also runs a burgeoning tech investment fund called Lock-heed Martin Ventures. That San Francisco–based division looks to back companies developing “disruptive, cutting-edge technologies” that could be important to Lockheed Martin. Ear­lier this year, Hewson announced that the company would increase the fund’s size, doubling it from $100 million to $200 million.

Gus Hunt
Cyberstrategy lead and managing director, Accenture Federal Services

Hunt, a former chief technology officer for the CIA, oversees cybersecurity for government clients for Accenture, which is in the midst of a rapid expansion of its local cyber workforce.

Roger A. Krone
Chairman and CEO, Leidos

Krone runs one of the biggest technology-and-science contractors in the defense industry, a $10-billion company headquartered in Reston that now has 31,000 employees. It became the mega-firm it is today after a division of Lockheed Martin was spun off and merged with Leidos two years ago.

Ryan LaSalle
Managing director, Accenture Security North America

LaSalle oversees the newly created Accenture Cyber Fusion Center in Arlington—which, among other things, helps clients simulate threats and test their response to cyber breaches. He’s also one of the local executives heading Accenture’s plans to add 1,000 skilled tech jobs to its local workforce—most in cybersecurity and cloud-based services—by the end of 2020.

Phebe Novakovic
CEO, General Dynamics

The mega–defense contractor’s chief led the acquisition of CSRA this year, in the process helping its General Dynamics Information Technology division better challenge the leader in that field, Leidos.

Michael Papay
Vice president and chief information-security officer, Northrop Grumman

Papay oversees the company’s global computer and network information-security systems and handles Northrop Grumman’s cyberstrategy.

Kathy Warden
Incoming CEO, Northrop Grumman

Warden was just named CEO in July. A month earlier, as Northrop Grumman’s chief operating officer, she oversaw the $9.2-billion purchase of Dulles’s Orbital ATK, a top defense and aerospace contractor. That led to the creation of a fourth division of the company, called Northrop Grumman Innovation Systems. With the purchase, total 2018 sales for Northrop Grumman are expected to be $30 billion.

 

The Lawyers

Eric Grossman
Partner, DLA Piper

Grossman came to DLA Piper’s Northern Virginia offices from a firm based in Palo Alto, so you know he knows tech. He has represented start-ups and established clients in a variety of businesses including cloud computing, e-commerce, and cybersecurity.

Steve Kaplan
Partner, Pillsbury Winthrop Shaw Pittman

Entrepreneurial companies are Kaplan’s specialty. No surprise, then, that he has represented the local start-ups Social Tables and UrbanStems.

Mike Lincoln
Business-department chair, Cooley

Lincoln has worked with multiple high-profile clients including ad­vising Optoro since its inception and Hyperloop One through its first few rounds of financing.

 

The Cybersecurity Specialists

Will Ackerly and John Ackerly
Cofounders, Virtru

The company’s encryption software—which works with Gmail and Microsoft Outlook—has drawn the attention of Mark Zuckerberg’s wealth-fund manager, ICONIQ Capital. The fund led a Series B round this past spring that’s part of $77 million Virtru has raised to date.

Rohyt Belani and Aaron Higbee
Cofounders and CEO (Belani) and CTO (Higbee), Cofense

When Paladin Capital, an early backer of this company when it was known as PhishMe, cashed in its early stake in February, the firm was valued at a whop-ping $400 million. Belani and Higbee’s cyber-security-counterpunching firm has since rebranded as Cofense.

Frank Cilluffo
Director, Center for Cyber and Homeland Security, George Washington University

Cilluffo, a former Homeland Security assistant in the George W. Bush administration, has put together a murderer’s row of cybersecurity senior fellows. They once included Kirstjen Nielsen, now head of DHS.

Chris Coleman
CEO, LookingGlass Cyber Solutions

The company moved to bigger corporate digs in Reston last year, reflecting gr0..owth fueled by about $100 million in funding. LookingGlass also made headlines when it discovered 40 million voter-registration records being offered for sale online.

Rohyt Belani and Aaron Higbee.

Their cybersecurity firm, Cofense, helps clients guard against email phishing attacks.

Michael Daniel
CEO, Cyber Threat Alliance

It once was an informal information network among top cybersecurity firms, but now Cyber Threat Alliance is a formal threat-watch/threat-response organization. This more official version of CTA set up shop in Arlington last year, headed by Daniel, a onetime Obama-administration official.

Nate Fick
CEO, Endgame

Endgame is a cyber-security firm in Arling-ton that has worked with both the federal government and private companies since 2012. Fick, a former Marine officer, was named this year to a Fast Company list of the 100 most creative people in business.

Dave Merkel
CEO, Expel

They call him Merk, and his firm takes an irreverent approach to the serious business of managing cybersecurity services for companies. He insists, for instance, that some people mis-take him for Willy Wonka, and Merk—who once chased hackers for the federal government—seems to be holding a Golden Ticket. Expel has racked up $27.5 million in financing, including $20 million in a Series B round last April.

Matthew Rhoades
Managing director, cybersecurity and technology program, Aspen Institute

Rhoades oversees one of the most important cyberstrategy groups meeting today. Aspen’s is made up of 35 former elected officials, industry heads, scholars, and others who get together regularly to discuss threats and responses to them.

Sam Visner
Director, National Cybersecurity Federally Funded Research and Development Center

The FFRDC—a di­vision of MITRE, a government-backed research-and-development outfit—is creating a set of cybersecurity practices for an industry desperate for such standards.

 

The Networkers, Nonprofits, and Incubators

Steve Balistreri
Emerging-growth-company practice leader, Deloitte

Balistreri is an ex-pert in working with firms on the rise. He’s also an active member of the board at Mind­share, a year­long training-and-mentoring program that pairs CEOs of new companies with executives at more established firms.

Melissa Bradley
Professor, McDonough School of Business at Georgetown University; founder of Project 500

Project 500 hopes to help 500 entrepreneurs in the District’s Wards 7 and 8 find help and mentorship in expanding their businesses.

Alexandra Reeve Givens
Executive director, Institute for Technology Law & Policy at Georgetown Law

Besides running Georgetown Law’s Institute for Technology Law & Policy, Givens oversees Beacon, a DC-backed initiative to encourage the formation of start-ups that are owned by women, whether by providing more access to re-sources and capital or creating new opportunities.

Shana Glenzer
CMO, Crowdskout

Glenzer cofounded DCFemTech, a collective of the city’s female tech leaders who support one another regularly. She’s also a board member of Beacon, an organization whose ultimate goal is to make Washington the top city in the country for women entrepreneurs. In her day job, she works for Crowdskout, which makes a customer-relationship-management software platform for political-advocacy groups.

Bobbie Kilberg
CEO, Northern Virginia Technology Council

You probably already know that Northern Virginia is a hotbed for data centers, cybersecurity, data analytics, and health tech. But Kilberg, who runs a trade group representing 1,000 companies, is working to spread that news to people who don’t.

Elizabeth Lindsey
Executive director, Byte Back

This nonprofit received a half-million-dollar grant from Citibank this year and was award-ed a top prize in WeWork’s Creator Awards last year for the innovative ways in which it offers free tech career training to underserved DC residents. Lindsey was named this year to the Federal Communications Commission’s Advisory Committee on Diversity and Digital Empowerment, which has her working with influential Washington lobbyists from Verizon, Comcast, and T-Mobile.

Anna Mason and Rebecca Yarbrough
Partner, Rise of the Rest (Mason), and director of growth and business operations, Virgil Security (Yarbrough)

The two are codirectors of the Washington chapter of the Vinetta Project, which encourages investors to put money into businesses founded by women. Yarbrough is also president of the Off­line Society, which sets up social events for singles in DC.

DJ Saul
CEO, ISL; founder, DC Tech Meetup

Saul’s company is a digital, design, and marketing agency that works with top companies such as Lockheed Martin. His monthly meetups range from casual cocktail chats to product-demo events.

Aaron Saunders
CEO, Clearly Innovative

Saunders’s company, which develops mobile apps and other digital products for clients, was hired by the District to help establish the Inclusive Innovation Incubator on the campus of Howard University last year. The 8,000-square-foot space has conference rooms, individual workstations, private offices, and free wi-fi, as well as classes and training for budding entrepreneurs.

Julia Spicer
Executive director, Mid-Atlantic Venture Association

Tech people will tell you that the reason the Washington area has a robust venture-capital scene is because of the work done by the nonprofit Mid-Atlantic Venture Association, which has been trying to speed the flow of investment capital here for 30 years. The organization is perhaps best known for its Tech Buzz events, which put early-stage companies in front of investors. Spicer has been executive director since 2002, when she left Columbia Capital to join the group.

Tien Wong
Chairman, Lore Systems; founder, Connectpreneur

Wong’s Connectpreneur is a quarterly breakfast forum that draws about 500 attendees who come to hear speakers such as Steve Case and Mark Ein. Wong’s Lore Systems offers cloud storage and cloud-based IT software.

The post Tech Titans 2018: Washington’s Top Tech Leaders appeared first on LookingGlass Cyber Solutions Inc..

The State of Security: Is Your Security Dashboard Ready for the Cloud?

The ability to feed key security information onto a big screen dashboard opens up many new opportunities for managing the day-to-day security and maintenance workload as well as providing a useful method of highlighting new incidents faster than “just another email alert.” Most Security Operation Centres I’ve visited in recent years have embraced having a […]… Read More

The post Is Your Security Dashboard Ready for the Cloud? appeared first on The State of Security.



The State of Security

Is Your Security Dashboard Ready for the Cloud?

The ability to feed key security information onto a big screen dashboard opens up many new opportunities for managing the day-to-day security and maintenance workload as well as providing a useful method of highlighting new incidents faster than “just another email alert.” Most Security Operation Centres I’ve visited in recent years have embraced having a […]… Read More

The post Is Your Security Dashboard Ready for the Cloud? appeared first on The State of Security.

The State of Security: Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror.) Every show was its own stand-alone story that took viewers into an alternate reality where things got weird in a hurry followed by twists and turns culminating in a surprise ending. These types […]… Read More

The post Entering the Twilight Zone: Adventures in the Security Leader Search appeared first on The State of Security.



The State of Security

Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror.) Every show was its own stand-alone story that took viewers into an alternate reality where things got weird in a hurry followed by twists and turns culminating in a surprise ending. These types […]… Read More

The post Entering the Twilight Zone: Adventures in the Security Leader Search appeared first on The State of Security.

Magecart’s Next Attack Resulted In ABS-CBN Data Breach

We’ve been hearing about the malicious attacks by Magecart attacks targeting multiple firms. After British Airways and Feedify, Magecart’s next

Magecart’s Next Attack Resulted In ABS-CBN Data Breach on Latest Hacking News.

Tesla Model 3 Earns Five-Star Crash Safety Rating From NHTSA

The National Highway Traffic Safety Administration has awarded the Tesla Model 3 with a five-star safety rating -- the highest possible score. This means that every car Tesla has built has earned a five-star rating. Jalopnik reports: The NHTSA tests cover three primary categories: Frontal Crash, Side Crash, and Rollover, and the Model 3 received the highest ratings in all categories. For some categories, it's easy to understand why Teslas do so well. Rollover resistance, for example, makes sense for cars that carry most of their weight at the very bottom, in the batteries sandwiched in the Tesla's chassis design. Other reasons for the remarkable crash safety may be that, without the need for a heavy chunk of metal as a drivetrain, effective and large crumple zones can be designed in, front and rear. The NHTSA has released videos of their frontal collision test, side pole collision test, and side collision test, for those who like watching these sort of things.

Read more of this story at Slashdot.

China Blocks Twitch

After becoming the third most popular free app on China's App Store, Twitch is now no longer accessible and the Twitch app has been removed from the country's App Store. Engadget reports: While Twitch was available in China previously, it never gained much traction since its service is much slower than it is elsewhere. But when the country's CCTV state broadcaster chose not to air the Asian Games, those wanting to watch the event's eSports competitions sought coverage from other outlets. Now, with Twitch seemingly blocked in the country, it follows in the footsteps of other banned sites, including Facebook, YouTube and Twitter. Abacus first reported the news.

Read more of this story at Slashdot.

Why Investors Should Pay Attention to Metal Coin

The current blockchain and ICO investing climate is very much in favour of grand solutions that are going to “revolutionize business” and other extremes along that line. But these companies are missing a very real problem in the crypto world: many potential users are still afraid of investing in them. Right now there is a […]

The post Why Investors Should Pay Attention to Metal Coin appeared first on Hacked: Hacking Finance.

Apple Will Judge Call, Email Activity To Assign Users a ‘Trust Score’

Apple recently updated its iTunes privacy policy page, making mention of a "trust score" it gives iPhone users on how they make calls or send emails. The INQUIRER reports: "To help identify and prevent fraud, information about how you use your device, including the approximate number of phone calls or emails you send and receive, will be used to compute a device trust score when you attempt a purchase," Apple explained. "The submissions are designed so Apple cannot learn the real values on your device. The scores are stored for a fixed time on our servers." In practical terms, the Cupertino crew will only look at Apple account usage patterns and hoover up metadata rather than more personal, and potentially damning information. [T]he data collection and trust score assigning should help Apple better spot and dodgy activity going on in Apple accounts that aren't in keeping with those of the legitimate users. [I]t's not entirely clear how Apple will use the metadata to actually spot fraud, as it hasn't explained its workings.

Read more of this story at Slashdot.

Mageia 2018-0377: libx11 security update

LinuxSecurity.com: Updated libx11 packages fix security vulnerabilities: An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later

Mageia 2018-0376: bouncycastle security update

LinuxSecurity.com: Updated bouncycastle packages fix security vulnerabilities: Ensure full validation of ASN.1 encoding of signature on verification. It was possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may have

Walmart Is Putting 17,000 Oculus Go Headsets In Its Stores To Help Train Employees In VR

Walmart is reportedly planning to send Oculus Go headsets to each of its nearly 5,000 stores so that more of its employees can get instruction more often. TechCrunch reports: The big box giant will begin sending four headsets to each Walmart supercenter and two headsets to each Neighborhood Market in the country. That may not necessarily seem like a ton to train a store full of employees, but at Walmart's scale that amounts to about 17,000 headsets being shipped by year's end. The move is the evolution of an announcement that the company made last year that it was working with STRIVR Labs to bring virtual reality training to its 200 "Walmart Academy" training centers. Those training sessions were done on PC-tethered Oculus Rifts, the move to Oculus Go headsets really showcases how much more simple standalone headset hardware is to set up and operate.

Read more of this story at Slashdot.

Authentication Bypass Vulnerability Disclosed in Western Digital My Cloud NAS Devices

Security Researchers at Securify have found an elevation of privilege vulnerability in the WD MyCloud platform which can be exploited by

Authentication Bypass Vulnerability Disclosed in Western Digital My Cloud NAS Devices on Latest Hacking News.

What Ecstasy Does To Octopuses

Gul Dolen, a neuroscientist at the Johns Hopkins School of Medicine who studies how the cells and chemicals in animal brains influence animals' social lives, gave ecstasy to octopuses and recorded her observations. The study, published in the journal Current Biology, suggests that the psychoactive drug that can make people feel extra loving toward others also has the same effect on octopuses. An anonymous reader shares the report from The Atlantic: [Dolen] and her colleague Eric Edsinger put five Californian two-spot octopuses individually into the middle of three connected chambers and gave them free rein to explore. One of the adjacent chambers housed a second octopus, confined inside an overturned plastic basket. The other contained an unfamiliar object, such as a plastic flower or a Chewbacca figurine. Dolen and Edsinger measured how long the main animal spent in the company of its peer, and how long with the random toy. The free-moving individuals thoroughly explored the chambers, and from their movements, Dolen realized that individuals of any sex gravitate toward females, but avoid males. Next, she dosed the animals with ecstasy. Again, there's no precedent for this, but researchers often anesthetize octopuses by dunking them in ethanol -- a humane procedure with no lasting side effects. So Dolen and Edsinger submerged their octopuses in an MDMA solution, allowing them to absorb the drug through their gills. At first they used too high a dose, and the animals "freaked out and did all these color changes," Dolen says. But once the team found a more suitable dose, the animals behaved more calmly -- and more sociably. "With ecstasy in their system, the five octopuses spent far more time in the company of the same trapped male they once shunned," the report continues. "Even without a stopwatch, the change was obvious. Before the drug, they explored the chamber with the other octopus very tentatively." "They mashed themselves against one wall, very slowly extended one arm, touched the [other animal], and went back to the other side," Dolen says. "But when they had MDMA, they had this very relaxed posture. They floated around, they wrapped their arms around the chamber, and they interacted with the other octopus in a much more fluid and generous way. They even exposed their [underside], where their mouth is, which is not something octopuses usually do."

Read more of this story at Slashdot.

Risky Business feature: iOS exploits just got a lot more expensive

We’re going to be talking to two people in this podcast and the topic is, for the most part, the introduction of pointer authentication on the latest Apple iPhones. This is a development that flew under the radar of most of the infosec media and it’s significant because it is going to basically wipe out ROP exploits as we know them. There’s no such thing as a perfect mitigation, but Apple has leveraged some recent ARM features to really lock down their devices.

In addition to the pointer authentication suff they’ve also made some changes that will affect the ability of companies like Cellebrite to unlock phones. Again, this won’t kill unlocks completely, but in one release Apple really has made life a lot harder for people in the offence game.

This will eventually have some consequences for the crypto debate. These devices are just getting more and more secure through some really cool engineering.

So we’ll be talking to Chris Wade about this, he’s the brain behind Corellium, an iOS emulator. His clients include everyone from exploit developers to the publishers of very popular iOS applications. If you want to back-test an app change on 15 different versions of iOS Corellium is the way to do that… or if you want to, you know, test your latest 0day it’s good for that, too.

Then we’re going to hear from Dr. Silvio Cesare of Infosect here in Oz. He’s going to talk about whether we might see similar mitigations on intel and weigh in on Apple’s changes.

Faraday 3.1

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

E Hacking News – Latest Hacker News and IT Security News: Quick Heal finds over 180 million threats to Windows OS




Global Internet security firm Quick Heal Technologies has detected more than 180 million threats on desktops and laptops with Windows Operating System in India.

According to the quarterly threat report released by the firm on Wednesday, more than 2 million malware, 16,000 ransomware, 13,000 crypto-mining malware, 141,000 exploits, and 40,488 potentially unwanted applications (PUAs) and adware are detected on a daily basis.

“More than 18 crore threats were detected on Windows devices of individual and enterprise users between April and June 2018. May was the busiest month, with more than 74 million incidents detected, followed by April and June that witnessed 55 million and 51 million detections respectively,” a Quarterly Threat Report 2018 said.


“The absence of appropriate cybersecurity measures has also made users and businesses across India more vulnerable to emerging threats,” it further added.

Joint Managing Director and Chief Technology Officer, Sanjay Katkar said in a statement, "Cybercriminals are at a completely different level today than they were a few years ago. They are using novel technologies to drive increasingly-complex attacks and are targeting larger user bases."

"The latest threat report highlights this risk that individuals and businesses in India currently face with this evolution of the threat landscape," Katkar said.


The Trojan Horse families have registered a quarter-on-quarter growth of four percent in the second quarter of 2018 and remained the most dominant malware in this quarter also.

“Individual users and businesses across India need to understand the massive risk that they are exposed to at present. Ignorance is not a viable cybersecurity strategy. The need of the hour is to drive large-scale adoption of cutting-edge security solutions such as those offered by Quick Heal and Seqrite,” he said.

However, the rise of cryptojacking remains the biggest worry, as it is getting direct monetary benefits to cybercriminals.

“Cryptojacking attacks remain undetected for a long time and can often be used as a platform to launch other complex attacks…over 3 million cryptojacking hits were detected till May 2018, with the number of active mobile cryptojacking variants increasing to 25,” the report said.


E Hacking News - Latest Hacker News and IT Security News

Quick Heal finds over 180 million threats to Windows OS




Global Internet security firm Quick Heal Technologies has detected more than 180 million threats on desktops and laptops with Windows Operating System in India.

According to the quarterly threat report released by the firm on Wednesday, more than 2 million malware, 16,000 ransomware, 13,000 crypto-mining malware, 141,000 exploits, and 40,488 potentially unwanted applications (PUAs) and adware are detected on a daily basis.

“More than 18 crore threats were detected on Windows devices of individual and enterprise users between April and June 2018. May was the busiest month, with more than 74 million incidents detected, followed by April and June that witnessed 55 million and 51 million detections respectively,” a Quarterly Threat Report 2018 said.


“The absence of appropriate cybersecurity measures has also made users and businesses across India more vulnerable to emerging threats,” it further added.

Joint Managing Director and Chief Technology Officer, Sanjay Katkar said in a statement, "Cybercriminals are at a completely different level today than they were a few years ago. They are using novel technologies to drive increasingly-complex attacks and are targeting larger user bases."

"The latest threat report highlights this risk that individuals and businesses in India currently face with this evolution of the threat landscape," Katkar said.


The Trojan Horse families have registered a quarter-on-quarter growth of four percent in the second quarter of 2018 and remained the most dominant malware in this quarter also.

“Individual users and businesses across India need to understand the massive risk that they are exposed to at present. Ignorance is not a viable cybersecurity strategy. The need of the hour is to drive large-scale adoption of cutting-edge security solutions such as those offered by Quick Heal and Seqrite,” he said.

However, the rise of cryptojacking remains the biggest worry, as it is getting direct monetary benefits to cybercriminals.

“Cryptojacking attacks remain undetected for a long time and can often be used as a platform to launch other complex attacks…over 3 million cryptojacking hits were detected till May 2018, with the number of active mobile cryptojacking variants increasing to 25,” the report said.

Microsoft’s Jet crash: Zero-day flaw drops after deadline passes

Don't click on the link, people – well, people using the database on a vulnerable installation

The Zero Day Initiative has gone public with an unpatched remote-code execution bug in Microsoft's Jet database engine, after giving Redmond 120 days to fix it. The Windows giant did not address the security blunder in time, so now everyone knows about the flaw, and no official patch is available.…

HITBSecConf2018PEK Call For CTF

JD-HITB2018 Beijing CTF plus Finals of the 4th XCTF International League (XCTF Finals 2018) will take place on the 1st and 2nd of November alongside the first-ever HITB Security Conference in Beijing! Participate and stand a chance to win cash prizes worth up to USD 2000.

McAfee Blogs: Announcing McAfee’s Evolved Consumer Product Portfolio

Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, and a holistic approach to securing every facet of a connected consumer’s life. Curious how exactly our lineup does that? Allow us to break it down.

First, there are a few key product updates. In exciting news, McAfee Identity Theft Protection and McAfee Safe Family are now both included in McAfee Total Protection and McAfee LiveSafe. Additionally, McAfee Ransom Guard and PC Boost have been added to the entire product lineup, which includes McAfee AntiVirus, McAfee AntiVirus Plus and McAfee Internet Security. Now, let’s get into a few specifics about product performance.

Improved Performance

McAfee’s core lineup of products now sends malware analysis to the McAfee Global Threat Intelligence (GTI) cloud, which means fewer system resources are required, and PCs can work at optimal speeds. Beyond that, we’ve also implemented a few key PC enhancements, including:

  • McAfee App Boost – Helps resource-hungry apps complete tasks more quickly by automatically allocating more resources to applications the customer is actively using.
  • McAfee Web Boost – Prevents unwanted or unrequested downloads and system activity caused by auto-play videos resulting in reduced bandwidth and resource consumption.

There’s a few notable mobile enhancements as well, which include:

    • McAfee Mobile Security – Fully redesigned to deliver a more intuitive and engaging user experience.
    • McAfee Mobile Security for Android – Now includes machine learning capabilities within the mobile AV engine, which provides more efficient scanning and faster malware detection.
    • McAfee Mobile Security for iOS – New Wi-Fi Threat Scan shows the security status of the connected Wi-Fi network and alerts users if the Wi-Fi network they are connected to is at risk.

Increased Ransomware Protection

Ransomware attacks have shown no signs of slowing, which is why last year McAfee introduced a machine learning-based anti-virus engine with Real Protect to protect consumers from modern-day threats. And now we’ve updated our features to continue the fight against these advanced attacks. New features include:

  • McAfee Ransom Guard – Adds another layer of protection on the PC which monitors for suspicious file changes, warns the user when ransomware may be at work and suggests recommended actions for remediation. Additionally, this technology allows McAfee to detect many variants of zero-day ransomware.
  • Virus Protection Pledge – This year’s lineup extends the guarantee to six additional languages. If a customer enrolled in automatic renewal gets a virus with protection turned on, the customer support team will remove it, or the customer will receive a refund.

Protecting People’s Digital Lives

As people become more and more connected in the modern digital era, they’re in need of protection in every part of their online life. That’s why McAfee’s new lineup now includes features that make it easier than ever to protect what matters most. This includes:

  • McAfee Safe Family – Provides parents the visibility and controls needed to keep their children safer online when they use their PCs, smartphones and tablets.
    • Key features and benefits include: Activity reports, app and web blocking capabilities, screen time controls, location tracking, 1-click digital time-outs and more. McAfee Safe Family Premium is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.
  • McAfee Identity Theft Protection – Allows users to take a proactive approach to protecting their identities.
    • Key features and benefits include: Cyber monitoring, Social security number trace, credit monitoring, 24/7 agency support and ID recovery and stolen funds reimbursement. McAfee Identity Theft Protection Essentials is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.

So, whether you’re focused on fighting back against ransomware, or ensuring all your online interactions are protected from threats, our evolved portfolio of products is here to ensure you can live your connected life with confidence. Make sure you get proactive about your personal protection now.

To learn more about consumer security and our approach to it, be sure to follow us at @McAfee and @McAfee_Home.

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.



McAfee Blogs

Announcing McAfee’s Evolved Consumer Product Portfolio

Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, and a holistic approach to securing every facet of a connected consumer’s life. Curious how exactly our lineup does that? Allow us to break it down.

First, there are a few key product updates. In exciting news, McAfee Identity Theft Protection and McAfee Safe Family are now both included in McAfee Total Protection and McAfee LiveSafe. Additionally, McAfee Ransom Guard and PC Boost have been added to the entire product lineup, which includes McAfee AntiVirus, McAfee AntiVirus Plus and McAfee Internet Security. Now, let’s get into a few specifics about product performance.

Improved Performance

McAfee’s core lineup of products now sends malware analysis to the McAfee Global Threat Intelligence (GTI) cloud, which means fewer system resources are required, and PCs can work at optimal speeds. Beyond that, we’ve also implemented a few key PC enhancements, including:

  • McAfee App Boost – Helps resource-hungry apps complete tasks more quickly by automatically allocating more resources to applications the customer is actively using.
  • McAfee Web Boost – Prevents unwanted or unrequested downloads and system activity caused by auto-play videos resulting in reduced bandwidth and resource consumption.

There’s a few notable mobile enhancements as well, which include:

    • McAfee Mobile Security – Fully redesigned to deliver a more intuitive and engaging user experience.
    • McAfee Mobile Security for Android – Now includes machine learning capabilities within the mobile AV engine, which provides more efficient scanning and faster malware detection.
    • McAfee Mobile Security for iOS – New Wi-Fi Threat Scan shows the security status of the connected Wi-Fi network and alerts users if the Wi-Fi network they are connected to is at risk.

Increased Ransomware Protection

Ransomware attacks have shown no signs of slowing, which is why last year McAfee introduced a machine learning-based anti-virus engine with Real Protect to protect consumers from modern-day threats. And now we’ve updated our features to continue the fight against these advanced attacks. New features include:

  • McAfee Ransom Guard – Adds another layer of protection on the PC which monitors for suspicious file changes, warns the user when ransomware may be at work and suggests recommended actions for remediation. Additionally, this technology allows McAfee to detect many variants of zero-day ransomware.
  • Virus Protection Pledge – This year’s lineup extends the guarantee to six additional languages. If a customer enrolled in automatic renewal gets a virus with protection turned on, the customer support team will remove it, or the customer will receive a refund.

Protecting People’s Digital Lives

As people become more and more connected in the modern digital era, they’re in need of protection in every part of their online life. That’s why McAfee’s new lineup now includes features that make it easier than ever to protect what matters most. This includes:

  • McAfee Safe Family – Provides parents the visibility and controls needed to keep their children safer online when they use their PCs, smartphones and tablets.
    • Key features and benefits include: Activity reports, app and web blocking capabilities, screen time controls, location tracking, 1-click digital time-outs and more. McAfee Safe Family Premium is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.
  • McAfee Identity Theft Protection – Allows users to take a proactive approach to protecting their identities.
    • Key features and benefits include: Cyber monitoring, Social security number trace, credit monitoring, 24/7 agency support and ID recovery and stolen funds reimbursement. McAfee Identity Theft Protection Essentials is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.

So, whether you’re focused on fighting back against ransomware, or ensuring all your online interactions are protected from threats, our evolved portfolio of products is here to ensure you can live your connected life with confidence. Make sure you get proactive about your personal protection now.

To learn more about consumer security and our approach to it, be sure to follow us at @McAfee and @McAfee_Home.

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.

Crippling DDoS Vulnerability Put the Entire Bitcoin Market At Risk

A major flaw was spotted in the Bitcoin network that could have allowed miners to bring down the entire blockchain by flooding full node operators with traffic, via a Distributed Denial-of-Service (DDoS) attack. "A denial-of-service vulnerability (CVE-2018-17144) exploitable by miners has been discovered in Bitcoin Core versions 0.14.0 up to 0.16.2." the patch notes state. "It is recommended to upgrade any of the vulnerable versions to 0.16.3 as soon as possible." The Next Web reports: Developers have issued a patch for anyone running nodes, along with an appeal to update the software immediately. As far as the attack vector in question goes, there's a catch: anyone ballsy enough to try to bring down Bitcoin would have to sacrifice almost $80,000 worth of Bitcoin in order do it. The bug relates to its consensus code. It meant that some miners had the option to send transaction data twice, causing the Bitcoin network to crash when attempting to validate them. As such invalid blocks need to be mined anyway, only those willing to disregard block reward of 12.5BTC ($80,000) could actually do any real damage.

Read more of this story at Slashdot.

Asterisk Project Security Advisory – AST-2018-009

Asterisk Project Security Advisory - There is a stack overflow vulnerability in the res_http_websocket.so module of Asterisk that allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. The attacker's request causes Asterisk to run out of stack space and crash.

Red Hat Security Advisory 2018-2733-01

Red Hat Security Advisory 2018-2733-01 - The rubygem provided by rubygem-smart_proxy_dynflow is a plugin into Foreman's Smart Proxy for running Dynflow actions on the Smart Proxy. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2018-2731-01

Red Hat Security Advisory 2018-2731-01 - The Simple Protocol for Independent Computing Environments is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. The spice-gtk packages provide a GIMP Toolkit widget for Simple Protocol for Independent Computing Environments clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Issues addressed include buffer overflow and denial of service vulnerabilities.

Red Hat Security Advisory 2018-2732-01

Red Hat Security Advisory 2018-2732-01 - The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. The spice-gtk packages provide a GIMP Toolkit widget for Simple Protocol for Independent Computing Environments clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Issues addressed include buffer overflow and denial of service vulnerabilities.

Ubuntu Security Notice USN-3770-2

Ubuntu Security Notice 3770-2 - USN-3770-1 fixed a vulnerability in Little CMS. This update provides the corresponding update for Ubuntu 12.04 ESM. Pedro Ribeiro discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

Red Hat Security Advisory 2018-2729-01

Red Hat Security Advisory 2018-2729-01 - Red Hat OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service cloud running on commonly available physical hardware. Issues addressed include an insecure download vulnerability.

Ubuntu Security Notice USN-3770-1

Ubuntu Security Notice 3770-1 - Ibrahim El-Sayed discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. Quang Nguyen discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.

Ubuntu Security Notice USN-3769-1

Ubuntu Security Notice 3769-1 - It was discovered that Bind incorrectly handled the deny-answer-aliases feature. If this feature is enabled, a remote attacker could use this issue to cause Bind to crash, resulting in a denial of service.

State Department Data Breach

Rich Campagna, CMO at Bitglass:

“All organizations have a responsibility to keep their employee data safe – there is no room for error. This is particularly true of governmental groups that are supposed to be serving citizens and protecting their personal information. Unfortunately, despite the amount and type of data that these organizations handle, many are unprepared when it comes to cybersecurity. The State Department’s recent authentication debacle serves as an example of this.

These kinds of breaches can have lasting consequences for all parties involved. Institutions that expose data lose the trust of employees and consumers, while individuals who have their information stolen may be forced to grapple with the long-term effects of identity theft. As such, governmental organizations must adopt modern security technologies. Dynamic identity management solutions, for instance, can verify users’ identities, detect potential intrusions, and enforce multi-factor authentication in a real-time, step-up fashion.”

Ruchika Mishra, Director of Products and Solutions at Balbix:

“It has become increasingly difficult for large organizations to watch over the ever-growing volume of end-users, devices and applications, which has accelerated with the proliferation of IoT and Industrial Control Systems (ICS) in the workplace.

Further challenges appear as organizations commonly allow employees to access their work from their own devices (BYOD), whether it is managed by their IT department or not. Government organizations, in particular, need to have full visibility into all of their IT assets and the devices accessing their network.

A proactive approach to breach avoidance starts with putting the right tools in place. While only a small percentage of State Department employees were impacted and the breach did not appear to put classified information at risk, it is clear that a number of government departments must do more to identify potential breach risk scenarios and proactively take the necessary steps to avoid future breaches.”

The ISBuzz Post: This Post State Department Data Breach appeared first on Information Security Buzz.

Packet Storm: Faraday 3.1

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Packet Storm

Packet Storm: HITBSecConf2018PEK Call For CTF

JD-HITB2018 Beijing CTF plus Finals of the 4th XCTF International League (XCTF Finals 2018) will take place on the 1st and 2nd of November alongside the first-ever HITB Security Conference in Beijing! Participate and stand a chance to win cash prizes worth up to USD 2000.

Packet Storm

Packet Storm: Ubuntu Security Notice USN-3770-2

Ubuntu Security Notice 3770-2 - USN-3770-1 fixed a vulnerability in Little CMS. This update provides the corresponding update for Ubuntu 12.04 ESM. Pedro Ribeiro discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

Packet Storm

Packet Storm: Ubuntu Security Notice USN-3770-1

Ubuntu Security Notice 3770-1 - Ibrahim El-Sayed discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. Quang Nguyen discovered that Little CMS incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.

Packet Storm

Packet Storm: Ubuntu Security Notice USN-3769-1

Ubuntu Security Notice 3769-1 - It was discovered that Bind incorrectly handled the deny-answer-aliases feature. If this feature is enabled, a remote attacker could use this issue to cause Bind to crash, resulting in a denial of service.

Packet Storm

Packet Storm: Red Hat Security Advisory 2018-2732-01

Red Hat Security Advisory 2018-2732-01 - The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. The spice-gtk packages provide a GIMP Toolkit widget for Simple Protocol for Independent Computing Environments clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Issues addressed include buffer overflow and denial of service vulnerabilities.

Packet Storm

Packet Storm: Asterisk Project Security Advisory – AST-2018-009

Asterisk Project Security Advisory - There is a stack overflow vulnerability in the res_http_websocket.so module of Asterisk that allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. The attacker's request causes Asterisk to run out of stack space and crash.

Packet Storm

Packet Storm: Red Hat Security Advisory 2018-2729-01

Red Hat Security Advisory 2018-2729-01 - Red Hat OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service cloud running on commonly available physical hardware. Issues addressed include an insecure download vulnerability.

Packet Storm

Packet Storm: Red Hat Security Advisory 2018-2731-01

Red Hat Security Advisory 2018-2731-01 - The Simple Protocol for Independent Computing Environments is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. The spice-gtk packages provide a GIMP Toolkit widget for Simple Protocol for Independent Computing Environments clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Issues addressed include buffer overflow and denial of service vulnerabilities.

Packet Storm

Increased Use of a Delphi Packer to Evade Malware Classification « Increased Use of a Delphi Packer to Evade Malware Classification

fireeye.com - The concept of "packing" or "crypting" a malicious program is widely popular among threat actors looking to bypass or defeat analysis by static and dynamic analysis tools. Evasion of classification a…


Tweeted by @Cyber_O51NT https://twitter.com/Cyber_O51NT/status/1042909365156687873

Xiaomi Admits To Putting Ads In the Settings Menu of Its Phones

Xiaomi, the world's fourth largest smartphone maker, was caught by a Reddit user for placing ads in the settings menu of its smartphones. The ads reportedly show up in Xiaomi's MIUI apps, including the music app and settings menu (MIUI is the name of Xiaomi's skinned version of Android). The Verge reports: When The Verge reached out to Xiaomi for confirmation on this matter, the company responded with the following statement, while also clarifying that it only applies to its devices running MIUI and not its Android One phones: "Advertising has been and will continue to be an integral part of Xiaomi's Internet services, a key component of the company's business model. At the same time, we will uphold user experience by offering options to turn off the ads and by constantly improving our approach towards advertising, including adjusting where and when ads appear. Our philosophy is that ads should be unobtrusive, and users always have the option of receiving fewer recommendations."

Read more of this story at Slashdot.

US authorities Have Pardoned Authors of Mirai Ransomware in Return For Government “Cooperation”

The authors of the Mirai botnet have been pardoned and have avoided jail since they have helped the FBI in

US authorities Have Pardoned Authors of Mirai Ransomware in Return For Government “Cooperation” on Latest Hacking News.

Slow-moving hurricanes like Florence could become increasingly common

The idea of a slow-moving storm isn’t exactly a new one. Hurricane Harvey in 2017 bore a similar signature. A recent study showed that the speed of tropical cyclones worldwide over land has decreased by ten percent in the last 70 years, between 1949 and 2016. The science isn’t settled on the cause of the slowdowns, but, if these trends continue, hurricanes like Harvey and Florence -- and the devastating flooding they caused -- could become increasingly common.

WebRTC FEC Out-Of-Bounds Read

There is an out-of-bounds read in FEC processing in WebRTC. If a very short RTP packet is received, FEC will assume the packet is longer and process data outside of the allocated buffer.

Amazon Plants Fake Packages In Delivery Trucks As Part of Undercover Ploy To ‘Trap’ Drivers Stealing

An anonymous reader quotes a report from Business Insider: Amazon uses fake packages to catch delivery drivers who are stealing, according to sources with knowledge of the practice. The company plants the packages -- internally referred to as "dummy" packages -- in the trucks of drivers at random. The dummy packages have fake labels and are often empty. Here's how the practice works, according to the sources: During deliveries, drivers scan the labels of every package they deliver. When they scan a fake label on a dummy package, an error message will pop up. When this happens, drivers might call their supervisors to address the problem, or keep the package in their truck and return it to an Amazon warehouse at the end of their shift. Drivers, in theory, could also choose to steal the package. The error message means the package isn't detected in Amazon's system. As a result, it could go unnoticed if the package were to go missing. "If you bring the package back, you are innocent. If you don't, you're a thug," said Sid Shah, a former manager for DeliverOL, a courier company that delivers packages for Amazon.

Read more of this story at Slashdot.

Tron Kickstarts Recovery as TRX Gains European Exposure

Tron (TRX) was recently listed on BitBay, the third largest cryptocurrency exchange in Europe, and facilitator of 70% of Poland’s crypto trading market. The addition of TRX to the exchange will mean that Tron now has increased liquidity within the European markets, with TRX/EUR and TRX/PLN (Polish złoty) pairs available for trade. TRX Kickstarts Recovery […]

The post Tron Kickstarts Recovery as TRX Gains European Exposure appeared first on Hacked: Hacking Finance.

Credential Stuffing Attacks Target Financial Services

A new report from Akamai reveals that the financial services industry has become a prime target for credential stuffing botnets. The report highlights two attacks on financial services sites. One botnet attack caused a major financial company’s login attempts to spike from an average of approximately 50,000 an hour to over 350,000 in one afternoon. The other saw a credit union attacked by three botnets at the same time, the most dangerous not being the biggest, but the one which kept up a sustained lower level attack over a longer period so as not to arouse suspicion.

Ryan Wilk, Vice President at NuData Security:

“Based on what we’ve seen at NuData, 90% of attacks start with some sort of automation, credential stuffing being a prominent one. The software for credential stuffing is now so affordable that this type of attack is becoming accessible for almost anyone. What this means is that adversaries can automatically cycle through username and password pairs against login portals. This technique, known as credential stuffing, is a type of brute force attack whereby large sets of credentials are automatically inserted into login pages until a match with an existing account is found.

Having customers change their passwords is a temporary fix, a band-aid that doesn’t get to the root of the problem. One effective way to stop this type of attack is to implement security solutions that detect this sophisticated automated activity at login and other placements. By using technologies that include behavioural biometrics, automated activity is flagged at login before it can even test any credentials in the company’s environment. At the same time, companies should stay alert for any leaked credentials of their employees or customers along with mentions of the company and brand names across cracking forums to stay on top of this trend.”

The ISBuzz Post: This Post Credential Stuffing Attacks Target Financial Services appeared first on Information Security Buzz.

In a World of Robots, Carmakers Persist in Hiring More Humans

It looks like car-industry employees who are concerned about robots taking their jobs don't need to worry -- for now, at least. Of the 13 publicly traded automakers with at least 100,000 workers at the end of their most-recent fiscal year, 11 had more staff compared with year-end 2013, according to data compiled by Bloomberg. Combined, they had 3.1 million employees, or 11 percent more than four years earlier, the data show. From the report: Carmakers in China and other emerging markets, where growth is strongest, favor human labor because it requires less upfront investment, said Steve Man, an analyst at Bloomberg Intelligence in Hong Kong. In developed markets, tasks that can be handled by robots were automated years ago and automakers are now boosting hiring in research and development as the industry evolves. "There's been a lot of growth in emerging markets, especially China, so that's one reason automakers are adding staff," Man said. "More staff is being added on the R&D side, with the push for autonomous, electric, connected vehicles." A trio of Chinese automakers, SAIC Motor, Dongfeng Motor Group and BYD -- in which Warren Buffett is a major investor -- increased staff by at least 24 percent. Volkswagen accounted for more than one in five jobs among the group of 13, and increased its employee count by 12 percent in the period. Things, however, look differently at General Motors, which shrank its payroll 18 percent to 180,000, and Nissan Motor, which contracted by 2.8 percent to 139,000 workers, the report added.

Read more of this story at Slashdot.

Cyber-espionage, insider abuse among top threats to manufacturing industry – Rochester, Buffalo, Syracuse | Dox

doxnet.com - By Ken Michael From insider theft at Tesla to cyber-espionage by government-funded bad actors, manufacturing businesses face multiple threats. Keeping sensitive information and proprietary data is ke…


Tweeted by @DoxElectronics https://twitter.com/DoxElectronics/status/1042888548922286080

McAfee Total Protection

McAfee Total Protection offers excellent security and password management for all your devices, and parental control for all except Macs. The suite's comprehensive new identity theft protection system is an enticing extra.

Radio Astronomers Are Increasingly Using Convolutional Neural Networks To Sift Through Massive Amounts of Data

Radio astronomers have so far cataloged fewer than 300 fast radio bursts, mysterious broadband radio signals that originate from well beyond the Milky Way. Almost a third of them -- 72, to be precise -- were not detected by astronomers at all but instead were recently discovered by an artificial intelligence (AI) program trained to spot their telltale signals, even hidden underneath noisy background data. The very first recorded fast radio burst, or FRB, was spotted by radio astronomers in 2007, nestled in data from 2001, reads a report on IEEE Spectrum. Today, algorithms spot FRBs by sifting through massive amounts of data as it comes in. However, today's best algorithms still can't detect every FRB that reaches Earth. That's why AI developed by Breakthrough Listen, a SETI project headed by the University of California, Berkeley, which has already found dozens of new bursts in its trial run, will be a big help in future searches. The report adds: There are a few theories about what FRBs (fast radio bursts) might be. The prevailing theory is that they're created by rapidly rotating neutron stars. In other theories, they emanate from supermassive black holes. Even more out-there theories describe how they're produced when neutron stars collide with stars composed of hypothetical dark matter particles called axions. The bursts are probably not sent by aliens, but that theory has its supporters, too. What we do know is that FRBs come from deep space and each burst lasts for only a few milliseconds. Traditionally, algorithms tease them out of the data by identifying the quadratic signals associated with FRBs. But these signals are coming from far-flung galaxies. "Because these pulses travel so far, there are plenty of complications en route," says Zhang. Pulses can be distorted and warped along the way. And even when one reaches Earth, our own noisy planet can obfuscate a pulse. That's why it makes sense to train an AI -- specifically, a convolutional neural network -- to poke through the data and find the ones that traditional algorithms missed. "In radio astronomy," says Zhang, "at least nowadays, it's characterized by big data." Case in point: The 72 FRBs identified by the Berkeley team's AI were found in 8 terabytes of data gathered by the Green Bank Telescope in West Virginia. To even give the AI enough information to learn how to spot those signals in the first place, Zhang says the team generated about 100,000 fake FRB pulses. The simple quadratic structure of FRBs makes it fairly easy to construct fake pulses for training, according to Zhang. Then, they disguised these signals among the Green Bank Telescope data. As the team explains in their paper [PDF], accepted by The Astrophysical Journal with a preprint available on arXiv, it took 20 hours to train the AI with those fake pulses using a Nvidia Titan Xp GPU. By the end, the AI could detect 88 percent of the fake test signals. Furthermore, 98 percent of the identifications that the AI made were actually planted signals, as opposed to the machine mistakenly identifying background noise as an FRB pulse.

Read more of this story at Slashdot.