Category: Uncategorized

  • If you're good with computer, a cyber security career may be for you – MyCG

    Official websites use .mil
    Secure .mil websites use HTTPS

    Typically, when people hear that someone works in cyber, they think of someone in a dark room, wearing a hoodie, hacking into a computer system. While this is a great visual for movies, this is not indicative of what working in cyber is in real life. 
    There are hundreds of jobs that revolve around cyber. So many so, that currently there are about 700,000 cyber job openings in the United States alone – and that number continues to grow every day! 
    This Cyber Security Awareness Month, we at CISA want to help you to #SeeYourselfInCyber. These jobs are not just for those that are “good with computers." They are a great fit for those from every background! To learn more about different cyber careers, check out CISA's Cybersecurity Career Cards

    Training doesn't always take place in a classroom. That's why we like to think outside of the box and offer both traditional and non-traditional training opportunities to keep our nation's cyber workforce at the top of its game. These trainings include competitions, webinars, and hands-on labs. Check out CISA's Cybersecurity Career Resources to enhance your cyber career now: 
    This Cybersecurity Awareness Month, take some time to explore all the amazing opportunities a cybersecurity career can offer and ask yourself, “How do I see myself in cyber?" 

    source

  • Michigan AG warns of cybersecurity risks after data breach of gaming sites – MLive.com

    Michigan Attorney General Dana Nessel speaks during a Democratic Attorneys General Association virtual press conference on Jan. 19, 2023.Screenshot | Zoom
    Michigan residents are urged to be aware of potential scams and cybersecurity risks related to internet gaming sites after a recent cyber-attack hit popular sites like DraftKings, FanDuel, and BetMGM.
    On Wednesday, Feb. 8, Attorney General Dana Nessel used the upcoming Super Bowl to remind users to stay alert with their finances, and what to do if they suspect their personal data has been stolen.
    “This data breach is another reminder to always monitor your bank accounts, credit reports, and credit card statements,” Nessel said in a prepared statement. “Bad actors are always looking for new ways to rob you of your identity and your savings, and the Super Bowl is no exception.”
    DraftKings has disclosed that more than 67,000 customers had their personal information exposed. The data included names, addresses, phone numbers, email addresses, profile photos and the last four digits of customer’s payment card. Information not believed to be affected include social security numbers, driver’s license information or financial account numbers.
    Related: Former Flint police chief avoids trial, pleads no contest in illegal gambling case
    FanDuel Sportsbook also notified customers that the breach exposed their names and email addresses, but no further information.
    BetMGM stated the breach resulted in the release of some names, postal addresses, emails, telephone numbers, birthdays, hashed Social Security numbers, account IDs, and transaction data. They said their passwords and account funds were not accessed.
    Residents whose information was accessed should be notified by the affected company. Nessel’s office recommends saving all notices and following their recommended steps.
    Users should also consider changing all exposed passwords, as well as login information for other sites that use the same password. Setting up a two-step or multi-factor authentication requirement is another good strategy for additional protection.
    They should also monitor their financial accounts and credit reports for unusual activity.
    “The ease of online betting may cause consumers to forget they are gambling with real money,” said Nessel. “Protect yourself and your livelihood by protecting your personal information, only betting on licensed platforms, and setting limits for how much you spend.”
    Residents can report illegal or suspicious gambling activity to the Michigan Gaming Control Board by calling 888-314-2682 and leaving an anonymous tip.
    If you or someone you know has a gambling problem, contact the Michigan Problem Gambling Helpline at 1-800-270-7117. The helpline is confidential and offers trained counselors available 24-7 to provide immediate help, including screening services and referrals to treatment or support groups.
    Read more on MLive:
    Didn’t read Whitmer’s budget? Here’s 7 things you might have missed.
    What is ‘He Gets Us?’ Michigan agency behind $20M Super Bowl ad for Jesus
    Whitmer’s budget proposes funding increases in every aspect of Michigan education
    If you purchase a product or register for an account through one of the links on our site, we may receive compensation.
    Use of and/or registration on any portion of this site constitutes acceptance of our User Agreement, Privacy Policy and Cookie Statement, and Your Privacy Choices and Rights (each updated 1/26/2023).

    © 2023 Advance Local Media LLC. All rights reserved (About Us).
    The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Advance Local.
    Community Rules apply to all content you upload or otherwise submit to this site.
    YouTube’s privacy policy is available here and YouTube’s terms of service is available here.
    Ad ChoicesAd Choices

    source

  • #StopRansomware: Ransomware Attacks on Critical Infrastructure … – CISA

    An official website of the United States government
    Here’s how you know
    Official websites use .gov
    A .gov website belongs to an official government organization in the United States.
    Secure .gov websites use HTTPS
    A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    Search
    Note: This Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors. These #StopRansomware advisories detail historically and recently observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn about other ransomware threats and no-cost resources.
    The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.
    This CSA provides an overview of Democratic People’s Republic of Korea (DPRK) state-sponsored ransomware and updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector. This advisory highlights TTPs and IOCs DPRK cyber actors used to gain access to and conduct ransomware attacks against Healthcare and Public Health (HPH) Sector organizations and other critical infrastructure sector entities, as well as DPRK cyber actors’ use of cryptocurrency to demand ransoms.
    The authoring agencies assess that an unspecified amount of revenue from these cryptocurrency operations supports DPRK national-level priorities and objectives, including cyber operations targeting the United States and South Korea governments—specific targets include Department of Defense Information Networks and Defense Industrial Base member networks. The IOCs in this product should be useful to sectors previously targeted by DPRK cyber operations (e.g., U.S. government, Department of Defense, and Defense Industrial Base). The authoring agencies highly discourage paying ransoms as doing so does not guarantee files and records will be recovered and may pose sanctions risks.
    For additional information on state-sponsored DPRK malicious cyber activity, see CISA’s North Korea Cyber Threat Overview and Advisories webpage.
    Download the PDF version of this report: pdf, 661 kb.
    For a downloadable copy of IOCs, see
    TECHNICAL DETAILS
    Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 12. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
    This CSA is supplementary to previous reports on malicious cyber actor activities involving DPRK ransomware campaigns—namely Maui and H0lyGh0st ransomware. The authoring agencies are issuing this advisory to highlight additional observed TTPs DPRK cyber actors are using to conduct ransomware attacks targeting South Korean and U.S. healthcare systems.
    The TTPs associated with DPRK ransomware attacks include those traditionally observed in ransomware operations. Additionally, these TTPs span phases from acquiring and purchasing infrastructure to concealing DPRK affiliation:
    Actors also likely spread malicious code through Trojanized files for “X-Popup,” an open source messenger commonly used by employees of small and medium hospitals in South Korea [T1195].
    The actors spread malware by leveraging two domains: xpopup.pe[.]kr and xpopup.com. xpopup.pe[.]kr is registered to IP address 115.68.95[.]128 and xpopup[.]com is registered to IP address 119.205.197[.]111. Related file names and hashes are listed in table 1.
    Note: These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the U.S. National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. For more information on the CPGs, including additional recommended baseline protections, see cisa.gov/cpg.
    The authoring agencies urge HPH organizations to:
    In addition, the authoring agencies urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for and mitigate ransomware incidents:
    If a ransomware incident occurs at your organization:
    Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link:
    https://www.stairwell.com/news/threat-research-report-maui-ransomware/
    The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files. As stated above, the authoring agencies discourage paying ransoms. Payment does not guarantee files will be recovered and may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. However, the agencies understand that when victims are faced with an inability to function, all options are evaluated to protect shareholders, employees, and customers.
    Regardless of whether you or your organization decide to pay a ransom, the authoring agencies urge you to promptly report ransomware incidents using the contact information above.
    NSA, FBI, CISA, and HHS would like to thank ROK NIS and DSA for their contributions to this CSA.
    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
    Microsoft Threat Intelligence Center is a registered trademark of Microsoft Corporation. Apache®, Sonicwall, and Apache Log4j are trademarks of Apache Software Foundation. TerraMaster Operating System is a registered trademark of Octagon Systems.
    This document was developed in furtherance of the authors’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
    System administrators should refer to the SonicWall Security Advisories in the reference section to determine affected applications/systems and appropriate fix actions.
    Support for 9.0.0 firmware ended on 10/31/2021. Customers still using that firmware are requested to upgrade to the latest 10.2.x versions.
    The IOC section includes hashes and IP addresses for the Maui and H0lyGh0st ransomware variants—as well as custom malware implants assumedly developed by DPRK cyber actors, such as remote access trojans (RATs), loaders, and other tools—that enable subsequent deployment of ransomware. For additional Maui IOCs, see joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.
    Table 2 lists MD5 and SHA256 hashes associated with malware implants, RATs, and other tools used by DPRK cyber actors, including tools that drop Maui ransomware files.
    Table 3 lists MD5 and SHA256 hashes are associated with Maui Ransomware files.
    Table 4 lists MD5 and SHA256 hashes associated with H0lyGh0st Ransomware files.
    Df0c7bb88e3c67d849d78d13cee30671b39b300e0cda5550280350775d5762d8
    * from Microsoft blog post on h0lygh0st
    NSA Client Requirements / General Cybersecurity Inquiries: CybersecurityReports@nsa.gov
    Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
    To report incidents and anomalous activity related to information found in this Joint Cybersecurity Advisory, contact CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870 or your local FBI field office at www.fbi.gov/contact-us/field. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    Media Inquiries / Press Desk:

    source

  • How to Transition From IT to Cyber Security – Security Boulevard

    The Home of the Security Bloggers Network
    Home » Security Bloggers Network » How to Transition From IT to Cyber Security
    Moving from a general IT role into cyber security; a challenging thought? Perhaps not. 
    You may think you might have to go back to University to get a degree in cyber security, or only take an entry-level role, but this isn’t necessarily the case. With the current skills gap in cyber security at an all-time high, employers look to other types of candidate to fill roles. 
    There are plenty of things you can do to set yourself apart from the crowd, and take that leap from general IT into a cyber security career. 
    Let’s take a look at how you can set yourself up for success… 
    Education/Qualifications 
    You worked hard to get where you are in your IT career, so going back to school might not seem too appealing. Depending on your level of experience and life circumstances, you probably won’t have to. Only 33% of the cyber work force in the UK have a specialist degree in cyber security, whereas 30% have a general Computer Science/IT degree, so you probably won’t need to start saving up to buy books off a new reading list anytime soon. In fact, 27% of cyber security workers come from non-cyber security related backgrounds, so having experience in IT stands you in good stead.  
    What might be more beneficial is looking at gaining some cyber security certifications. We’ve got an extensive list of the best certifications to hold here. Take a look at what type of certification would suit you at your current skill level. You’re not going to be jumping into the CISSP straight away, but there are plenty of options available, which are less costly and time consuming than going back to university. 
    It’s also worth looking at short courses, as some institutions offer cyber security boot camps, which could help boost you on your path from general IT into cyber security.  
    Make sure you start researching which branch of cyber security you’d like to pursue. Here’s a handy tool from the UKCSC about the various career paths available within cyber security. Take a look at the skills you need for your chosen niche. These might be risk assessment and management, cryptography, security operations, information assurance, authentication, Linux, information systems, digital forensics, coding languages, and more.  Being able to demonstrate your knowledge in the desired areas will help you bag that cyber security role. 
    Transferable Skills 
    Having an IT background means you have plenty of technical and ‘soft’ skills that will translate well into a cyber security role. Some of these may include: an understanding of the industry, network systems and database management, knowledge of commonly used terminology and data privacy, an understanding of cyber security across various tech platforms and devices, coding skills, problem-solving, presentation skills, attention to detail, teamwork, communication, a desire to learn, logical and analytical thinking, interpersonal skills…the list goes on. 
    You’re probably able to tick more of those boxes than you imagined. What you need to do now is demonstrate these in your current role, and document examples of when you have used these skills. Create as much evidence as possible of how you possess transferable skills, and this will set you apart from other candidates. You don’t want to leave a mid-level or senior IT role for an entry-level cyber security role, so the more you can build a case for yourself, the better. It’s of note that with any change in career, you likely won’t take a sidestep in pay and responsibility, but if you can reduce the drop in level of role, you can minimise the impact on your career and personal life. 
    Hands-on experience 
    You’ve got plenty of hands-on experience in IT and tech, so why not just reroute this a little? Use your current role as a spring board, and get in touch with the security and privacy departments at your organisation. If you start to take on some junior-level tasks for them, you’ll gather some great new skills and hands-on cyber security experience. If you catch their eye, it might also be a great internal route into a new cyber security role
    You could also try volunteering, or creating a project at home. This is still good evidence to add to your portfolio. 
    Research and explore the industry 
    At this stage, you need to be a sponge. Stay up to date on relevant cyber security news and publications. Attend webinars, listen to podcasts, and try to join the cyber workforce community. Ever been to a hackathon? Now might be the time to start. You should be able to hold an intelligible conversation about the latest security innovations if you’re going to impress your interviewer when going for a cyber security role. If you can do this, you’ll demonstrate your passion for the industry, and boost your profile above those who haven’t bothered to put the work in. 
    Another useful tool for you to use is CyberSeek – a resource for gaining information on careers in cyber security, how to start or advance your career in cyber security, and regional demand for cyber professionals in your community. Knowledge is power! 
    Make yourself as attractive a candidate as possible, and the challenging feat of transitioning from general IT to cyber security won’t be such an uphill struggle anymore. 
    Want some career advice? Looking for a cyber security role? Ready to take the leap? Get in touch with one of our Cyber Security Recruitment Specialists today to see how we can help. 
    *** This is a Security Bloggers Network syndicated blog from Focus on Security authored by Rachel Stoward. Read the original post at: https://focus-on-security.org/how-to-transition-from-it-into-cyber-security/
    More Webinars
    Security Boulevard Logo White
    DMCA

    source

  • How to get the federal government to pay for your cybersecurity … – Fortune

    Cybersecurity professionals are in such high demand that they can land six-figure salaries after graduation and advance to roles that pay nearly $1 million. And the field is rapidly expanding: The number of unfilled cybersecurity jobs grew 350% between 2013 and 2021, according to Cybersecurity Ventures, which covers the global cyber economy. While it’s not mandatory to have a bachelor’s, master’s, or Ph.D. degree to work in cybersecurity, it can certainly help—and there’s a way to obtain a degree for free—thanks to the federal government.
    Through the CyberCorps: Scholarship for Service Program, the federal government pays for a person’s education in exchange for committing to work for the federal government or a state, local, tribal, or territorial government in cybersecurity—so long as it’s an equal length of time as their schooling took.
    “You will get all tuition paid without [us] asking how much it is,” says Victor Piotrowski, CyberCorps’ lead program director at the National Science Foundation (NSF). “There is no limit. We pay all tuition, all fees. Then we provide you with a cash stipend.”
    Additionally, the program offers living stipends of $25,000 per year for undergraduate students and $34,000 for graduate students. Participants can also receive $6,000 for professional development. If that sounds enticing, read on to learn how the CyberCorps program works.
    Founded in the waning days of the Bill Clinton administration by presidential directive, CyberCorps was created to address the growing need for cybersecurity professionals working in the federal government. And as the world has become increasingly digital, cybersecurity demands have only expanded. One-third of federal cybersecurity roles are currently unfilled, according to Piotrowski.
    CyberCorps is a partnership between the NSF, the Department of Personnel Management and the Department of Homeland Security. Each year, colleges and universities across the country apply to take part in the program. Out of the dozens of schools that apply each year, only about eight to 10 are awarded between $3 million and $5 million to establish a five-to-six-year program. Presently, roughly 900 students are active in the program at 94 participating universities.
    Instead of applying to the NSF, students who wish to take part in the program apply at one of the 94 schools that currently has a CyberCorps grant. To be a part of the program, students sign a legal agreement with the federal government to exchange their schooling for work after graduating.
    Once enrolled in the program, students maintain a current resume in CyberCorps’ databases. Hiring managers at different governmental agencies have access to those resumes for recruiting purposes. “Students, when they are still in school, create connections with the agencies to have internships, then when they graduate, they choose,” Piotrowski says. “They can go anywhere they want.”
    While a student who graduates from the CyberCorps program has an obligation to repay the government with service, Piotrowski says it doesn’t have to start right away.
    “When a student graduates, [they] have 18 months to start working on their obligation. They don’t have to start the day after graduation,” he says. “The bottom line is your commitment is not for life. Your commitment is for maximum three years.”
    After the conclusion of their paid government service, CyberCorps grads can opt to stay at their current organization or move on to another job.
    Still, there are a small handful of graduates who change their minds about working for the federal government. Those individuals must pay back the government for their schooling, which averages $55,000 per year for undergrad. Students who don’t complete their program must also pay back money.
    Piotrowski says that even if graduates wish to work for Google or another company, it makes sense for them to fulfill their government commitment first, stating that they will make more money in the long run and gain government connections and contracts. The only downside of working in cybersecurity for the government, Piotrowski says, is employees must undergo background checks and he stresses the importance of being honest in answering the government’s questions.
    “We have students that tried every possible drug in high school, and we still enrolled them, because the important thing is that [the drug use is] in the past,” Piotrowski says.
    Many CyberCorps grads end up working at the National Security Agency; 740 CyberCorps grads have worked for the NSA, by Piotrowski’s count.
    “As we’re recruiting at those universities, we are … looking for those CyberCorps students that owe back a commitment of service to the United States government,” says Dave Luber, deputy director of cybersecurity for NSA, adding that he sometimes sits in on Ph.D. dissertations of students in the program. “It’s a good opportunity to track their progress throughout their university work before they join the NSA.”
    Even for those graduates who don’t want to work for the NSA, there are a wide variety of options open to them. In a report to Congress last year, CyberCorps listed more than 700 types of positions within the federal government that related to cybersecurity.
    “Cybersecurity is one of the most dynamic interesting professions,” Piotrowski says, noting the millions of open jobs and that only two of three cybersecurity positions at the federal level are currently filled. “That [ratio] will not get better in your lifetime.”
    See how the schools you’re considering fared in Fortune’s rankings of the best master’s degree programs in data science (in-person and online), nursing, computer science, cybersecurity, psychology, public health, and business analytics, as well as the doctorate in education programs and MBA programs (part-time, executive, full-time, and online).

    source

  • Analysis | The State of the Union was light on cybersecurity – The Washington Post

    Sign in
    A newsletter briefing on cybersecurity news and policy.
    with research by Vanessa Montalbano
    A newsletter briefing on cybersecurity news and policy.
    Welcome to The Cybersecurity 202! No idea if any of this is deserved, but if you like a good scathing music review, here you go.
    Reading this online? Sign up for The Cybersecurity 202 to get scoops and sharp analysis in your inbox each morning.
    Below: U.S. officials link the Chinese spy balloon to a vast aerial surveillance operation, and scammers pose as charities trying to help Turkey and Syria after Monday’s earthquakes. First: 
    President Biden used his State of the Union address Tuesday evening to discuss some cyber-related topics like online privacy, but he steered clear of addressing cyber directly.
    It’s part of a recent trend in the annual speech — which is widely seen as a signal of every White House’s priorities — where the subject usually hasn’t been explicitly mentioned. 
    Biden devoted just two paragraphs to online privacy, and largely focused on privacy for children online. “It’s time to pass bipartisan legislation to stop Big Tech from collecting personal data on our kids and teenagers online, ban targeted advertising to children, and impose stricter limits on the personal data the companies collect on all of us,” Biden said in his speech
    Those subjects do relate to cybersecurity, as Cliff Steinhauer, director of information security and engagement at the nonprofit National Cybersecurity Alliance, told me: “If you aren’t collecting Social Security numbers, you don’t have to protect Social Security numbers. If you’re not collecting location data, then you don’t have potential location data that you can lose. So, absolutely, it becomes safer not to take that information in the first place because it becomes very difficult to protect it.” 
    The presence of some marginally cyber-related material, though, didn’t fully satisfy some cyber experts. They would’ve liked to see some more head-on State of the Union talk on cyber from the president.
    “It’s disappointing,” Alex Santos, CEO of the critical infrastructure protection-focused firm Fortress Information Security, told me. “At the same time, [the speech is] arguably a performance and maybe the public isn’t as interested in that issue as some of the headline issues.”
    The new chairman of the House Homeland Security Committee was less understanding of the Democratic president’s omission.
    “President Biden didn’t so much as utter the word cybersecurity once in his remarks tonight,” said Rep. Mark Green (R-Tenn.) in a news release. “Cyberthreats from criminal actors and nation-state adversaries are a preeminent national security threat of our time. Given the magnitude of the cyberthreat landscape, I strongly believe cybersecurity must be a priority. But this clear void in his speech is nothing new.” 
    In his speech, Biden touted the need for privacy, health and safety online, especially for children using social media platforms.
    Children are “subject to the platforms’ excessive data collection vacuum, which they use to deliver sensational and harmful content troves of paid advertising,” a fact sheet from the administration reads.
    Social media platforms and other digital service providers need to prioritize safety-by-design over profit, Biden said. On the cyber side, the Cybersecurity and Infrastructure Security Agency has similarly been touting safety and security-by-design.
    The fact sheet also addressed data collection practices:
    Industry organizations, like the Information Technology Industry Council, and tech advocacy groups, like Fight for the Future, used the occasion of Biden’s speech to call for passage of long-stalled federal privacy legislation. 
    Biden also mentioned the need to “crack down on identify fraud by criminal syndicates stealing billions of dollars from the American people.”
    And Biden made an allusion to alleged Chinese spying, referencing the balloon the U.S. military shot down over the weekend. But he didn’t mention Chinese hacking and cyberespionage, which experts say pose a significant threat.
    “Make no mistake: As we made clear last week, if China threatens our sovereignty, we will act to protect our country,” he said. “And we did.”
    The recent history of State of the Union mentions of “cyber” is hit-or-miss.
    Even though this year’s speech didn’t mention cybersecurity, that doesn’t mean the Biden administration is doing nothing on cyber. Nor does the lack of cyber mentions in prior administrations’ State of the Union speeches mean they didn’t do anything on the subject. 
    The White House is preparing the forthcoming national cybersecurity strategy, which will lay out a blueprint for approaching cybersecurity — and is set to embrace the role of regulation in boosting America’s cyberdefenses. 
    Cybersecurity work by the White House and CISA is important, said Steinhauer, whose organization promotes safe use of technology and partnership between government and industry. (CISA and Steinhauer’s organization partner on initiatives such as National Cybersecurity Awareness Month.)
    But the group also talks about creating a culture of security and a culture of privacy, he noted.
    “We say it all the time that it starts at the top of the organization,” Steinhauer said. “I would definitely like to see the president talk about that” in a speech like the State of the Union, he said.
    The U.S. intelligence community on Tuesday linked the Chinese spy balloon that was shot down Saturday to a vast surveillance program run by the People’s Liberation Army that has for years collected information on military assets in several countries and areas of strategic interest, Ellen Naskashima, Shane Harris, John Hudson, and Dan Lamothe report for The Washington Post. 
    One official acknowledged that while they still are unsure of the size of the balloon fleet, there have been “dozens” of missions since 2018. The balloon that was shot down Saturday is the fifth one to be identified over U.S. territory in recent years. 
    Biden directed sensitive sites to be protected from spying, “which was straightforward because we could track the path of the balloon and ensure no sensitive activities or unencrypted communications would be conducted in its vicinity,” National Security Council spokesman John Kirby said. The Biden administration “turned the tables on China and collected against the balloon” to “learn more about China’s capabilities and tradecraft,” Kirby said. 
    Some of the balloons have electrooptical sensors or digital cameras that can capture highly precise images, officials said. They also have the ability to transmit radio signals, they said.
    As part of a broader misinformation campaign, the Kremlin is supporting actors that impersonate international media outlets, according to a new study published Tuesday by the European Union’s External Action Service, Bloomberg News reports. 
    The operations targeting print and TV media have become more sophisticated since Russia invaded Ukraine nearly a year ago, with magazines in particular seeing their style mimicked to give a sense of legitimacy to the content mostly targeting Ukraine.  
    “We have plenty of evidence that Russia is behind coordinated attempts to manipulate public debates in open societies,” E.U. foreign policy chief Josep Borrell said in a speech Tuesday.
    The new evidence of information manipulation comes as the “E.U. is struggling to counter Russian disinformation efforts, which officials have said is aimed at undermining the bloc’s unity in supporting Ukraine,” Bloomberg News reports. The report added that the scheme is also intended to distract audiences, deflect blame or direct attention to different topics. 
    Less than 24 hours after two massive earthquakes killed more than 11,000 people and injured tens of thousands of people, cybercriminals have begun targeting global efforts to provide aid to victims, according to Bitdefender’s Alina Bizga.
    The scam, identified by the Bitdefender Antispam Lab, involves a fake Ukrainian charity foundation seeking money to send to those impacted by the natural disaster, with alleged representatives reaching out to people via email. 
    The lab found that a majority of the scam messages were traced back to IP addresses in Pakistan. 
    The fake charity, dubbed the Wladimir Foundation, was originally established to target donations to assist those enduring the war in Ukraine. It had been operating as recently as Dec. 29, 2022, according to the lab.
    “Fraudsters always try to advantage of individuals’ vulnerabilities and feelings after natural disasters strike, exploiting the empathy of the online community to steal personal info and money,” Bizga writes. “While these insidious acts are nothing new, they can be quite effective in stealing money from unwary and kindhearted individuals.” 
    Russian crypto exchange exec pleads guilty to laundering Ryuk ransomware funds (The Record)
    Florida state court system, US, EU universities hit by ransomware outbreak (Reuters)
    After Hive takedown, could the LockBit ransomware crew be the next to fall? (CyberScoop)
    Medusa botnet returns as a Mirai-based variant with ransomware sting (Bleeping Computer)
    pic.twitter.com/xnAhGIy67M
    Thanks for reading. See you tomorrow.

    source

  • LSU Attracts Two of the Nation's Top Cybersecurity Professors – Louisiana State University

    September 19, 2022
    BATON ROUGE – Cybersecurity jobs are among the fastest growing careers nationwide. To meet this critical demand across every industry, having the top cybersecurity experts to train the next generation of information security analysts and cyber professionals is a priority at LSU.
    In recognition and support of this priority, the state granted $5 million this past legislative session for LSU’s cybersecurity and defense programs in Baton Rouge and Shreveport. LSU Alexandria also has announced its Technovation Center for cyber and defense with support from Louisiana Economic Development. The state’s investment has made the expansion of LSU’s cybersecurity research resources and faculty possible. As a result of this prioritization, two of the nation’s top cybersecurity experts have joined LSU’s faculty.
    – William F. Tate IV, LSU President
    Ibrahim “Abe” Baggili is LSU Department of Computer Science & Cybersecurity Professor in the LSU College of Engineering and Center for Computation & Technology and Aisha Ali-Gombe is an associate professor in the LSU Department of Computer Science & Engineering and the Center for Computation & Technology.
    – Photo: Katherine Seghers, LSU
    Ibrahim “Abe” Baggili has joined LSU’s faculty as an LSU Department of Computer Science & Cybersecurity Professor in the LSU College of Engineering and Center for Computation & Technology. He was the former director of the Connecticut Institute of Technology and the Elder Family Endowed Chair at the University of New Haven, where he secured over $7 million in research funding, helped more than double enrollment in computing programs and led the university to become one of only 21 in the nation to be designated by the National Security Agency as a Center of Academic Excellence in Cyber Operations, or CAE-CO. 
    Baggili leads an extensive cybersecurity and forensics research and outreach agenda and has received multiple national and international awards. He received all of his higher education degrees, including his Ph.D. in technology, from Purdue University. He is a first-generation college graduate and is originally from Jordan and is fluent in Arabic.
    “President Tate’s bold vision for defense and cybersecurity is critical to compete in this fast-paced and evolving field. LSU’s cyber vision synchronizes well with my own aspirations. I joined because I could see limitless potential at LSU. I have no doubts in my mind that with the right leadership support and accomplished faculty and students, we are on our way towards becoming the preeminent cybersecurity program both nationally and internationally. I am here to be part of this vision and to make it a reality,” Baggili said.
    Aisha Ali-Gombe has joined LSU’s faculty as an associate professor in the LSU Department of Computer Science & Engineering and the Center for Computation & Technology. She was an assistant professor at Towson University in Maryland. She received her Ph.D. in computer science with a concentration in information assurance from the University of New Orleans. She received her Bachelor of Science degree in computer science from the University of Abuja in Nigeria and her master’s degree in business administration specializing in entrepreneurship and venture creation from Bayero University Kano in Nigeria. She is one of the few Black female cybersecurity researchers with a Ph.D. at a Carnegie-designated research-intensive university. 
    “I’ve always had a close relationship with LSU – as a postdoc and a visiting research scientist. But with President Tate’s unveiling of the APECS initiative in March, I knew it’s time. It’s time to give back to the community that made me. Having been a critical backbone of another top CAE-CO school and my wealth of experience in system security pedagogy and research, I am confident we can actualize the president’s vision of making Louisiana a national leader in cyber workforce development, industry collaboration and scholarship,” Ali-Gombe said.
    For more information on LSU’s defense/cybersecurity priority, please visit https://lsu.edu/president/priorities/defense.php.  
     
    POPULAR SEARCHES:

    source

  • Cybersecurity skills gap: Why it exists and how to address it – TechTarget

    It’s no secret that companies are facing a huge cybersecurity talent shortage. The word’s been out for several years that many high-paying positions requiring cybersecurity skills are going unfilled.
    Unfortunately, broadcasting the cybersecurity skills gap hasn’t done enough to increase the cyber workforce. Indeed, the vast majority of cyber professionals (95%) believe the skills gap has not improved over the past few years, and nearly half (44%) believe it has gotten worse, according to research from Information Systems Security Association (ISSA) and analyst firm Enterprise Strategy Group (ESG), a TechTarget division.
    How big is the gap? Cyberseek reported there are around 1.1 million people employed in cybersecurity in the U.S., but over 700,000 unfilled positions are currently available. Worldwide, the cyber workforce shortfall is approximately 3.5 million people, according to Cybersecurity Ventures.
    Meanwhile, as organizations compete against each other to acquire the scarce talent available, cybersecurity salaries keep escalating, meaning that organizations can’t afford to hire as many cybersecurity workers. The existing workforce is asked to take on more work, which in turn causes burnout, the ISSA study found.
    This article is part of
    Download this entire guide for FREE now!
    The result is that companies, government agencies, educational institutions and other organizations have weaker security in place than they should, putting all of their employees, customers and constituents at increased risk of data breaches, privacy violations, financial fraud and other adverse consequences.
    Bridging this vast gap requires understanding why the cybersecurity skills shortage exists and persists. This article explores that and proposes several ways that IT leaders and their organizations can address the underlying problems.
    Many factors have come together to cause the cybersecurity skills gap. Here are the top five causes:
    There’s no way to bridge the cybersecurity skills gap overnight, but organizations can start making progress today by doing the following three things:
    Cybersecurity outlook 2022: Consultants cite 5 trends
    Top 10 cybersecurity best practices to protect your business
    5 tips for building a cybersecurity culture at your company
    Cybersecurity governance: A path to cyber maturity
    This SD-WAN vendor comparison chart is a useful starting point to evaluate information about deployment options, pricing, …
    Cisco Live returned as an in-person event this year and customers responded positively, with 16,000 showing up to the Mandalay …
    Use this guide to Cisco Live 2023 — a five-day in-person and online conference — to learn about networking trends, including …
    Policymakers want federal data privacy legislation limiting businesses’ ability to collect data on individuals and banning …
    Public, private, hybrid or consortium, each blockchain network has distinct pluses and minuses that largely drive its ideal uses …
    The 2023 trends that are reshaping the risk management landscape include GRC platforms, maturity frameworks, risk appetite …
    IT should understand the differences between UEM, EMM and MDM tools so they can choose the right option for their users. Learn …
    Internet Explorer mode lets users view legacy IE websites not supported by other browsers, which can increase productivity and …
    Implementing MDM in BYOD environments isn’t easy. IT should communicate with end users to set expectations about what personal …
    Azure management groups, subscriptions, resource groups and resources are not mutually exclusive. Businesses can — and often do …
    Amazon CodeGuru reviews code and suggests improvements to users looking to make their code more efficient as well as optimize …
    Establishing sound multi-cloud governance practices can mitigate challenges and enforce security. Review best practices and tools…
    The strategy will focus on ensuring closer collaboration on cyber security between government and industry, while giving software…
    As 5G adoption accelerates, industry leaders are already getting ready for the next-generation of mobile technology, and looking …
    Comms tech providers tasked to modernise parts of leading MENA and Asia operator’s existing networks, including deploying new …
    All Rights Reserved, Copyright 2000 – 2023, TechTarget

    Privacy Policy
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    source

  • UK Metal Engineering Firm Vesuvius Hit by Cyber-Attack – Infosecurity Magazine

    Vesuvius, a UK-based molten metal flow engineering company issued an alert on February 6, 2023, which stated it was “currently managing a cyber incident, [which] has involved unauthorized access to our systems.”
    The London Stock Exchange-listed ceramics manufacturer did not give any information on the nature and scope of the incident, the systems impacted, or the identity of the attacker.
    “Immediately upon becoming aware of unauthorized activity on our networks, we have taken the necessary steps to investigate and respond to the incident, including shutting down affected systems. We are working with leading cyber security experts to support our investigations and identify the extent of the issue, including the impact on production and contract fulfillment,” the company said in a statement.
    “We are taking steps to comply with all relevant regulatory obligations in light of the information that emerges from our ongoing investigations.”
    Shares in Vesuvius fell 3.8% in early trading on February 6, security analyst Graham Cluley reported.
    This incident is the latest of a series of cyber-attacks targeting UK companies, with Royal Mail hit in January and Ion, a trading software provider, in early February.

    source

  • Looking for a six-figure cybersecurity job? Check out this new online … – Fortune

    Companies are in desperate need of cybersecurity talent—and are willing to pay up for it. To help up-and-coming cybersecurity talent land jobs in the industry, cybersecurity and digital skills training company ThriveDX and NightDragon announced in late July the launch of the world’s first job search and career platform solely focused on cybersecurity jobs, the Cyber Talent Hub.
    Cybersecurity salaries typically range from $85,000 to $130,000 per year, according to the New England Institute of Technology, but research done by tech and digital recruiting firm Mondo shows that many of these jobs pay well into the $200,000s and up.
    “We often see that cybersecurity skills carry a significant salary premium in some cases on the order of $10,000, $15,000, or more” than other technical roles, Will Markow, vice president of applied research–talent at Emsi Burning Glass, previously told Fortune.
    Globally there are 3.5 million unfilled jobs, according to Cybersecurity Ventures. And in the U.S. alone, there are about 1 million cybersecurity workers, but there were around 715,000 jobs yet to be filled as of November 2021, according to a report by Emsi Burning Glass (now Lightcast), a market research company. 
    “It takes a village to address an immense industrywide challenge such as the cybersecurity skills gap,” Dave DeWalt, founder and managing director of investment firm NightDragon, said in a statement.
    The Cyber Talent Hub, which has a goal to “attract, retain, foster, and continuously develop cyber talent,” is hosted by corporate and educational sponsors including Carahsoft, Exclusive Networks, Ingram Micro, Jacobs, Kyndryl, Liberty Mutual Insurance, Mandiant, Marsh, and educators including New York University, the University of Chicago, the University of Michigan, and the University of Wisconsin.
    “Solving the most critical cybersecurity challenges starts with attracting, developing, and retaining the right people and providing them with the best-in-class training and technology to do their jobs best,” Brian O’Donnell, Carahsoft vice president of cybersecurity solutions, said in a statement. “With the threat landscape continuing to expand both in sophistication and frequency, the time has never been better for us to join forces with other industry leaders to shape this first-of-its-kind talent hub and increase our pipeline of exceptional tech talent that is ready and able to tackle the challenges ahead.”
    The platform is mutually beneficial: Cybersecurity professionals will have access to job postings, and companies will have access to a pool of qualified applicants—some of whom will come directly from participating university programs. The Cyber Talent Hub will host people who are trained and interested in cybersecurity careers, and then match them with employer partners who are looking to hire.
    “There is a growing global urgency to present new routes that enable access to employment opportunities and skill building avenues,” Barbara Massa, executive vice president and chief of business operations at cybersecurity firm Mandiant, said in a statement. “Tackling the cybersecurity skills gap as a collective group of industry leaders, employers, and educational institutions opens up a whole new diverse talent pool.”
    The Cyber Talent Hub also includes access to cybersecurity upskilling training by ThriveDX. In February, the company announced it had secured a $100 million growth-funding round to expand its cybersecurity training and upskilling offerings. 
    “With this, we’ll make a significant impact in closing the cybersecurity skills gap and opening up the opportunity of entering the digital industry to learners from all backgrounds,” Dan Vigdor, founder and co-CEO of ThriveDX, said in a statement.
    See how the schools you’re considering fared in Fortune’s rankings of the best master’s degree programs in nursingcomputer sciencecybersecuritypsychology, public healthbusiness analyticsdata sciencedoctorate in education, and part-timeexecutive, full-time, and online MBA programs.

    source