Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots. Blog

Forescout Cyber Weekly Roundup March 1, 2019

Colby Proffitt, Cyber Strategist | March 1, 2019

The Forescout Cyber Roundup is a weekly blog series that highlights some of the major cyber headlines, as well as some of the more obscure stories from the week. The purpose of this curation is to raise cyber awareness, provoke thought and encourage discussion among cyber professionals at all levels. Articles are categorized by industry, not necessarily priority.

Twitter: @proffitt_colby

    Public Sector
  1. You said you wanted to unplug: U.S. Cyber Command put the kibosh on Russian trolls during the midterms, effectively taking the notorious Internet Research Agency offline.
  2. This is what Public Sector and Private Sector collaboration should look like: “The Information and Communications Technology (ICT) Supply Chain Risk Management Task Force holds the potential to serve as one of the primary drivers of federal supply chain efforts moving forward.” Hopefully, we’ll see more actionable cyber collaboration in the near future.
  3. Defense

  4. To trust or not to trust, that is the question: The pressure is on for avionics systems integrators to educate themselves to ensure systems are up to new security standards. https://www.militaryaerospace.com/articles/2019/02/trusted-computing-cyber-security-aircraft.html
  5. The sky is no longer the limit: The recently released U.S. National Strategy for Aviation Security calls on agencies to step up efforts to defend the aviation industry against a growing array of emerging threats like cyberattacks and drones.
  6. Retail

  7. Knowledge is power—and security: National Consumer Protection Week (NCPW) is March 3–9. This annual event encourages individuals and businesses to learn about their consumer rights and how to keep themselves secure. The Federal Trade Commission (FTC) and its NCPW partners provide free resources to protect consumers from fraud, scams and identity theft.
  8. Retail SWOT Analysis: The retail industry has been a longstanding target for cyber criminals, but research suggests the industry as a whole has been slow to learn from its mistakes. However, retail isn’t completely devoid of cyber strengths.
  9. Healthcare

  10. You’re not a special target, your security controls are just the oldest: Numerous reports in recent years highlight which industries are the hardest hit by cyberattacks. Healthcare continues to rank poorly—and in this case, it’s largely due to poor email security defenses.
  11. Does the squeaky wheel get more grease, or more scrutiny? Sen. Mark Warner, D-Va., this week wrote to the Food and Drug Administration, the Department of Health and Human Services, the Centers for Medicare and Medicaid Services and the National Institute of Standards and Technology asking for recommendations to improve the security posture of the healthcare industry.
  12. Financial Services

  13. Amazon AWS, Accenture and Mastercard establish ‘circular supply chain’: The effort may result in “allowing consumers to make more sustainable choices about what they buy. Consumers are also able to tip producers, directly rewarding them for their choices in production.”
  14. For some reason they keep sending us electronic mail: The Financial Times reported that “financial services companies in the UK saw a fivefold rise in data breaches in 2018 compared with the year before, according to the Financial Conduct Authority. Last April, it emerged that seven UK retail banks, including Santander, Royal Bank of Scotland, Barclays and Tesco Bank, had to limit or shut down their systems after sustained attacks that cost them hundreds of thousands of pounds to remedy.”
  15. Operational Technology / Industrial Control Systems

  16. Welcome to the Internet of Everything (IoE): The attack surface—the number of connected systems and devices—has been increasing exponentially since the Internet of Things (IoT) started becoming more like the Internet of Everything (IoE).
  17. A solid effort: The Industrial Internet Consortium published the first version of their IoT Security Maturity Model Practitioner Guide this week, which focuses on 1) Governance, 2) Enablement and Identity, and 3) Hardening.
  18. State, Local & Education

  19. There’s a fine line between transparency, security monitoring, and total privacy invasion: Although seemingly well-intentioned, many believe the recent wave of monitoring software bills wouldn’t just be a personal invasion of privacy, but they could also put the data collected at risk.
  20. CyberPatriot Program offers a new ‘window’ of cyber opportunity: Students across the U.S. have an opportunity to learn about cybersecurity from cyber and Information Technology (IT) experts as part of the Air Force Association’s (AFA) CyberPatriot program.
  21. Editor’s Choice

  22. And this button pops the register! Windows-based VMware Horizon point-of-sale systems are under attack. The POS-scraping FrameworkPOS malware is currently attributed to hacking group Fin6.
  23. It’s like “borrowing” cable TV from your neighbor: But in reality, it’s actually more like hacking firmware in the cloud, where we all live together.
  24. Because Plug and Play and USB weren’t good enough: Apple and Intel joined forces to give us Thunderbolt hardware technology for Mac, Windows and Linux peripherals. Unfortunately, all versions of Thunderbolt were disclosed as vulnerable this week at the NDSS 2019 security conference.
  25. See that little file icon there? Just right-click and tap “unzip” to use WinRAR: That connects you directly to Mexico, downloads the Cobalt Strike Beacon penetration testing tool, and gives hackers remote access to your device.
  26. Sure, US-CERT issued just another moderate severity OpenSSL advisory: But in the fine print, the OpenSSL website suggests “OpenSSL 1.0.2 and 1.1.0 are currently only receiving security updates. Support for 1.0.2 will end on December 31, 2019. Support for 1.1.0 will end on September 11, 2019.”
Demo Request Forescout Platform Top of Page