Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots. Blog

Forescout Cyber Weekly Roundup February 15, 2019

Colby Proffitt, Cyber Strategist | February 15, 2019

The Forescout Cyber Roundup is a weekly blog series that highlights some of the major cyber headlines, as well as some of the more obscure stories from the week. The purpose of this curation is to raise cyber awareness, provoke thought and encourage discussion among cyber professionals at all levels. Articles are categorized by industry, not necessarily priority.

Twitter: @proffitt_colby

    Public Sector
  1. Unplug-and-play Protocol: Russia’s plans to ‘unplug’ may result in internet censorship for its citizens and millions of dollars in short-term economic losses – but what most are worried about is long-term cyber superiority.
  2. And then they ATT&CKed: Understanding the root cause of an attack is key to preventing future damages, but it’s also one of the most difficult tasks facing cyber professionals across all enterprises; however, MITRE’s ATT&CK framework and knowledge base can help explain the ‘why’ behind adversary tactics.
  3. Defense

  4. Bigger guns are only better when they work: The new weapons on the Army’s Stryker Infantry Carrier vehicle are apparently just as susceptible to cyber compromise as U.S. weapons systems. https://taskandpurpose.com/army-stryker-vehicles-cyber-vulnerabilities
  5. Deterrence done right: The aftermath of an offensive cyberattack is usually easier to see than the veiled months of planning, espionage and deception; defensive tactics such as deterrence require a similar covert strategy, but unlike an attack, the net effect of cyber defense can be harder to see and take much longer to realize.
  6. Retail

  7. Don’t Fall Prey on Cyber V-Day: Much like Black Friday and Cyber Monday, Valentine’s Day is another busy day for consumers, retailers, and cyber thieves.
  8. “Don’t worry – I’m sure they just write it off”: When retailers want to make a profit and consumers want a frictionless, convenient user experience, hackers win.
  9. Healthcare

  10. Time for your annual checkup: Breaches may have decreased, but the attacks are getting more personal and creative.
  11. Bluebloods isn’t just a TV series anymore: The question is, can these bioelectric breakthroughs be hacked?
  12. Financial Services

  13. More Power? How about No Power? When killing the power becomes step one in your cyber defense playbook, it’s probably a sign that you need a new playbook.
  14. Too big to blockchain? Blockchain and bitcoin naysayers beware, digital currency is now backed by JP Morgan—but, did JPM just become more secure, or a bigger target?
  15. Operational Technology / Industrial Control Systems

  16. Work smarter, not harder: Company focuses on velocity, scalability, adaptability and sustainability to future proof critical infrastructure.
  17. Things are about to get physical: The convergence of traditional IT, operational technology (OT) and Internet of Things (IoT) devices is exposing new threat vectors across U.S. critical infrastructure.
  18. State, Local & Education

  19. What? You’re cutting after-school robot wars? As part of the increase in Science, Technology, Engineering, Arts, and Math (STEAM) programs, many schools are now offering cyber-specific coursework, although the future of some cyber charter schools is uncertain.
  20. New kid on the block: While healthcare and financial services remain prime targets for cyber criminals, K-12 is the new sector garnering more and more attention.
  21. Editor’s Choice

  22. Critical ICS Flaw: The Siemens CERT issued 16 advisories, including a 10/10 critical RCE security bug that allows remote, unauthenticated attackers to tinker malicious TCP packets destined for 22347. “The affected SICAM 230 process control system is used as an integrated energy system for utility companies, and as a monitoring system for smart-grid applications.”
  23. Android PNG Parser Fail: A picture may be worth a thousand words, but in this case it might be malware and simply opening the image could unleash malicious code on Android devices.
Demo RequestForescout PlatformTop of Page