Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Yes, Virgina, Malicious Advertising Growth in Numbers and Viciousness Is Startling →

February 04, 2018 by Marc Handelman in Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

Dan Goodin, writing at our beloved Ars Technica, reports on the startling large numbers of malicious advertising exploits and the subsequent malevolence of same. Unfortunately, Today's Must Read.

February 04, 2018 /Marc Handelman
Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

National Security Agency Research Directorate's 6th Annual Scientific Cybersecurity Paper Competition →

February 03, 2018 by Marc Handelman in Security Education, Security Research, Security Science, Information Security, Cybersecurity, USCSS, USNSA

The National Security Agency's 6th Annual Scientific Cybersecurity Paper Competition has been announced, along with the following Distinguished Experts and other Pertinent Particulars of the Competition (eg., the submittal criteria et cetera). Interested? Read On... A superlative conclave of security luminaries will examine the nominations and provide their specific submittal preferences to the National Security Agency's Research Directorate.

  • PROF. L. JEAN CAMP, Indiana University
  • DR. ROBERT CUNNINGHAM, Lincoln Laboratory
  • DR. WHITFIELD DIFFIE, Cybersecurity Advisor
  • DR. DAN GEER, In-Q-Tel
  • DR. JOHN MCLEAN, Naval Research Laboratory
  • PROF. STEFAN SAVAGE, University of California, San Diego
  • MR. PHIL VENABLES, Goldman Sachs
  • PROF. DAVID WAGNER, University California at Berkeley
  • DR. JEANNETTE WING, Columbia University

Here are the all-important dates:

  • Submission Period Begins: December 15, 2017
  • Submission Period for Entries Ends: March 30, 2018 11:59 PM, EST.
  • Evaluation Process for Entries Begins: April 2, 2018
  • Winners Notified: By September 14, 2018
  • Winners Announced: Fall 2018
February 03, 2018 /Marc Handelman
Security Education, Security Research, Security Science, Information Security, Cybersecurity, USCSS, USNSA

Sunday's Site of Interest

January 28, 2018 by Marc Handelman in Sunday Site of Interest, Offensive Security, Information Security, Cybersecurity

This Sunday's Site of Interest is Offensive Security by Automation; containing pertinent information on Subdomain Delegation Takeover to Massdns the site is short, concise yet helpful to finding bugs, challenges and whatnot within your client's domains. Enjoy.

January 28, 2018 /Marc Handelman
Sunday Site of Interest, Offensive Security, Information Security, Cybersecurity

Orange Trumps Bear →

January 27, 2018 by Marc Handelman in Cybersecurity, Cyberwar

via Graham Cluely, comes this superb tale of how the Kingdom of the Netherlands' intelligence agency AIVD tracked and reported on nefarious Russian infiltrators into the election systems (and others) of the United States of America. Those Dutch!

January 27, 2018 /Marc Handelman
Cybersecurity, Cyberwar

Dr. Chuvakin's Prescription: 'On Negative Pressure ...'

January 25, 2018 by Marc Handelman in Brilliant, Security Tooling, Security Testing, Security Strategy, Information Security, Cybersecurity

via Anton Chuvakin, Ph.D., Research VP and Distinguished Analyst at Gartner, speaks security truth to power. Pay attention folks - your organization's security and continued existence could very well depend on the action you take in your environments, based what he has to say.

January 25, 2018 /Marc Handelman
Brilliant, Security Tooling, Security Testing, Security Strategy, Information Security, Cybersecurity

Jeremiah Grossman on 'The National: Cybersecurity, Nuclear Threat and Global Politics →

January 12, 2018 by Marc Handelman in Cybersecurity, Information Security, Canada
January 12, 2018 /Marc Handelman
Cybersecurity, Information Security, Canada
Image Credit: Wikimedia Commons

Image Credit: Wikimedia Commons

The Ten Thousand →

January 11, 2018 by Marc Handelman in Cybersecurity, Cyberwar

Mai Ngoc Chau, writing at Bloomberg, tells the tale of the ten thousand, in this case that's ten thousand cyber warfare specialists in-the-midst of standing-up as a unit to combat what the Vietnamese now define as 'Wrongful Views'... Enjoy!

January 11, 2018 /Marc Handelman
Cybersecurity, Cyberwar

AWS GuardDuty: Human Security Employment Will Become Moot →

November 30, 2017 by Marc Handelman in Information Security Jobs, Cybersecurity Jobs, SecDevOpps Jobs, Intelligence, Intelligence Sharing, Information Security, Cybersecurity, Analytics, Security Economics, Security Architecture, Security, Security Automation

The apparent beginning of the end for certain information and cyber security employment categories: Behold the newly minted Amazon.com, Inc. (NASDAQ: AMZN) AWS GuardDuty... H/T via the inimitable Trey Blalock of Firewall Consultants and Verification Labs.

November 30, 2017 /Marc Handelman
Information Security Jobs, Cybersecurity Jobs, SecDevOpps Jobs, Intelligence, Intelligence Sharing, Information Security, Cybersecurity, Analytics, Security Economics, Security Architecture, Security, Security Automation

North Korean Dingus of Mass Disruption →

November 28, 2017 by Marc Handelman in All is Information, Attack Analysis, Cybersecurity, Cyberwar, Information Security, Electronic Warfare

Erudite write-up by Adam Meyers (opining at 38North) in which, Adam details the cyberweapons of mass disruption (in this case the primary weapons discussed are WannaCry, the Wiper Attack and who-can't-forget the electronic Bonnie-and-Clyde aka the 2016 SWIFT attack on the Bank of Bangladesh). Enjoy!

"North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue." - Adam Meyers writing at 38North)

November 28, 2017 /Marc Handelman
All is Information, Attack Analysis, Cybersecurity, Cyberwar, Information Security, Electronic Warfare

Twelve Percentile →

November 27, 2017 by Marc Handelman in Cyberthis Cyberthat, Information Security, Cybersecurity, Cybersecurity Competence, Or Lack Thereof

Deaf, Dumb and Blind, but they sure play a mean pinball..., or, why only 12% of companies can detect a so-called 'sophisticated' cybersecurity attack.

November 27, 2017 /Marc Handelman
Cyberthis Cyberthat, Information Security, Cybersecurity, Cybersecurity Competence, Or Lack Thereof

Learn and Avoid →

November 21, 2017 by Marc Handelman in Must Read, Information Security, Cybersecurity, Incident Response, Incident Management, Incident Handling

i.e., Negative Potentiality...

Well scrivened, crafted, reasoned, and timely blog post by Andrew Cook (writing at the Delta Risk - A Chertoff Company - blog). In which, impeccable advice is offered, on learning and avoiding pitfalls, targeting Incident Response - i.e., Successful Incident Response. This weeks' Must Read.

November 21, 2017 /Marc Handelman
Must Read, Information Security, Cybersecurity, Incident Response, Incident Management, Incident Handling

New S3 Encryption Feature, Is Amazon's Encryption Move Enough? →

November 08, 2017 by Marc Handelman in Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

You be the judge... Essentially, all are targeted at data-and-objects-at-rest, rather than in-motion (except, perhaps the new cross-region replication feature with KMS).

Regardless, all of the annouced new features are welcome (in my currently rather jaded opinion). Now, if we can just overcome human error (not to mention blatant developer and data-owner lack-of-attention-to-detail, read about that here)...

  • Default Encryption – You can now mandate that all objects in a bucket must be stored in encrypted form without having to construct a bucket policy that rejects objects that are not encrypted.
  • Permission Checks – The S3 Console now displays a prominent indicator next to each S3 bucket that is publicly accessible.
  • Cross-Region Replication ACL Overwrite – When you replicate objects across AWS accounts, you can now specify that the object gets a new ACL that gives full access to the destination account.
  • Cross-Region Replication with KMS – You can now replicate objects that are encrypted with keys that are managed by AWS Key Management Service (KMS).
  • Detailed Inventory Report – The S3 Inventory report now includes the encryption status of each object. The report itself can also be encrypted. - via Jeff Barr, writing at the AWS Blog

And, thanks for the H/T go out to Trey Blalock over at rapidly growing Firewall Consultants!

November 08, 2017 /Marc Handelman
Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

Akamai's Dave Lewis Scrutinizes Mirai →

November 04, 2017 by Marc Handelman in Information Security, Cybersecurity, Security Leadership
November 04, 2017 /Marc Handelman
Information Security, Cybersecurity, Security Leadership

USENIX Enigma 2017, John Launchbury's 'Cyber Security: A DARPA Perspective' →

September 28, 2017 by Marc Handelman in Conferences, US DARPA, Education, Cybersecurity, Information Security, USENIX
September 28, 2017 /Marc Handelman
Conferences, US DARPA, Education, Cybersecurity, Information Security, USENIX

USENIX Enigma 2017 — Dr. Ian Levy's 'National Scale Cyber Security' →

September 12, 2017 by Marc Handelman in Conferences, Education, Information Security, Cybersecurity, Cybersecurity Competence, United Kingdom
September 12, 2017 /Marc Handelman
Conferences, Education, Information Security, Cybersecurity, Cybersecurity Competence, United Kingdom

Cybersecurity Vulnerabilities to Artificial Intelligence →

August 29, 2017 by Marc Handelman in All is Information, Artificial Irony, Cybersecurity, Must Read

The Council on Foreign Relations has published an superlative thought piece - written by Adam Segal - targeting security implications to artificial intelligence. Today's Must Read.

"Facebook CEO Mark Zuckerberg and Tesla CEO Elon Musk recently fought over whether artificial intelligence (AI) posed an existential threat to humanity. Musk made the case AI machines could eventually become self-aware and dispose of their human masters, like in the movie Ex Machina, whereas Zuckerberg argued humanity had nothing to fear." via a blog posting written by Adam Segal for the Council on Foreign Relations

Attribution: "Adam Segal is the Maurice R. Greenberg Senior Fellow for China Studies and Director of the Digital and Cyberspace Policy Program at the the Council on Foreign Relations. He is author of The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (New York, NY: Public Affairs, 2016)." via the Council on Foreign Relations

August 29, 2017 /Marc Handelman
All is Information, Artificial Irony, Cybersecurity, Must Read

USENIX Enigma 2017 — John Launchbury's 'Cyber Security: A DARPA Perspective' →

August 24, 2017 by Marc Handelman in Cybersecurity Competence, Cybersecurity, Information Security, US DARPA, USENIX
August 24, 2017 /Marc Handelman
Cybersecurity Competence, Cybersecurity, Information Security, US DARPA, USENIX

Meet Alice and Bob →

July 25, 2017 by Marc Handelman in Cybersecurity, Network Security, Cryptography, Information Security, Data Security

Meet the eponymous and phenomenally inimitable Alice and Bob; examine their crypto-history as a crypto-couple, as it were (and, in this case) - for your crypto-pleasure. If you read anything on cryptography read this for the fluctuant jubilance it shall undoubtedly convey to you, cryptographiclly speaking. H/T

July 25, 2017 /Marc Handelman
Cybersecurity, Network Security, Cryptography, Information Security, Data Security

Sam Cattle on Ransomware →

July 20, 2017 by Marc Handelman in Brilliant, Cybersecurity, Cybernetic Crime, Information Security

Sam Cattle - National Security Practice Director at Rolta AdviseX, presents on the company's solutions in the anti-ransomeware space. Enjoy.

July 20, 2017 /Marc Handelman
Brilliant, Cybersecurity, Cybernetic Crime, Information Security

Shmoocon 2017, Travis Goodspeed's Quick & Dirty ARM Emulation →

February 22, 2017 by Marc Handelman in All is Information, Conferences, Cybersecurity, Education, Hardware Security, Emulators
February 22, 2017 /Marc Handelman
All is Information, Conferences, Cybersecurity, Education, Hardware Security, Emulators
  • Newer
  • Older