Government/Defense | SC Media Government/Defense

Government/Defense

Army cyber troops

Army (websites) defeated, but for the greater good

Normally the U.S. Army would not tout the success of an attacker, but in the case of Hack the Army 2.0 bug bounty program the service proudly announced 146 vulnerabilities were found. The platoon-sized unit of white hat hackers, 52 individuals, found the valid vulnerabilities while investigating 60 publicly accessible Army websites, including army.mil, .goarmy.mil,…

Cybersecurity takes the stage

No longer just the concern of IT, cybersecurity is the bad boy headliner that dominates centerstage and all stages beyond.  Teri Robinson reports.  At the recent Lonestar Blues and Heritage Festival in, where else, Texas, fans bounced between the main stage where headliners strutted their stuff and the porch stage where more modest acts plucked their guitars – and…

USA Freedom Act foiled by Senate Republicans

Senators press federal officials for ISAC funding, national 5G strategy

Key lawmakers in the U.S. Senate today called for increased funding of the Multi-State Information Sharing and Analysis Center and Election Infrastructure Information Sharing and Analysis Center, while others demanded the development of a national 5G strategy. On Tuesday, Senate Democratic Leader Chuck Schumer, D-N.Y.; Sen. Maggie Hassan, D-N.H.; and Homeland Security and Governmental Affairs…

Following cyber order from Obama, CISPA is back

Lawmakers advance bills that would add to DHS’ cyber responsibilities

The U.S. Senate last week passed a bill requiring the Department of Homeland Security to maintain cyber hunt and incident response teams, while the House passed one that instructs DHS to share protocols for mitigating cyber vulnerabilities. The Senate bill, S.315, aka the DHS Cyber Hunt and Incident Response Teams Act of 2019, passed by…

Ryuk-like malware targeting law, military and finance groups

A new malware containing some similarities to Ryuk ransomware, but which acts as an information stealer targeting military, law and financial institutions has been uncovered by MalwareHunterTeam. Once onboard a device the as-yet-unnamed malware begins its attack begins searching for .docx and .xlsx files, according to Bleeping Computer. In a fashion similar to how ransomware…

Facebook hosts election security meeting between tech companies, intel officials

Executives from leading technology and social media firms convened with U.S. intelligence representatives yesterday to discuss ongoing efforts to shield their platforms and users from election interference campaigns. According to Bloomberg and additional news outlets, Facebook used its Menlo Park, Calif. headquarters to host the meeting, which was attended by Google, Microsoft, Twitter and members…

Report: Dutch agency recruited Iranian mole to help U.S. and Israel plant Stuxnet virus

The 2007 Stuxnet virus attack perpetrated against Iran’s then-budding nuclear program was made possible after U.S. and Israeli intelligence coordinated with Dutch intelligence agency AIVD to recruit an Iranian engineer as a mole who could infect Iran’s enrichment plant near Natanz, Yahoo News reported this week. The engineer initially provided data that helped Stuxnet’s authors…

election hacking

Facebook releases more election security changes

In the runup to the 2020 presidential election Facebook shared additional steps it is taking to help ensure campaign ads are properly attributed and vetted. Katie Harbath, Facebook’s public policy director, global elections, said the changes include strengthening the authorization process for U.S. advertisers and showing users more information about each advertiser. This includes placing…

Next post in Election Coverage