Saturday, September 26, 2020

I don’t think of the FBI as an offensive weapon. Or are they saying that DoD does not understand Cyber attacks?

https://www.nextgov.com/cybersecurity/2020/09/fbi-director-feeding-dods-cyber-offense-operations-crucial-new-strategy/168760/

FBI Director: Feeding DOD’s Cyber Offense Operations Is Crucial to New Strategy

The FBI’s new strategy to establish costs for entities perpetrating cyberattacks will include supplying intelligence to the Department of Defense and related intelligence agencies to carry out offensive cyber operations, the director of the bureau told members of Congress.

An important part of fighting back against our foreign adversaries in the cyber realm is offense as well as defense,” FBI Director Christopher Wray said testifying before the Senate Homeland Security and Government Affairs Committee Thursday during an annual hearing on worldwide threats to the homeland. “That’s a big part of this new FBI strategy that I rolled out.”

The strategy, which Wray announced Sep. 16 during the Cybersecurity and Infrastructure Security Agency Summit, is to “impose risk and consequences on cyber adversaries.”





Each generation of technology is “the end of privacy.”

https://www.engadget.com/next-generation-wearables-privacy-191237188.html?guccounter=1

The next generation of wearables will be a privacy minefield

What happens when we let companies track our emotions?

Facebook recently gave us our best glimpse yet into its augmented reality plans. The company will be piloting a new set of glasses that will lay the groundwork for an eventual consumer-ready product.

The company published a lengthy blog post on all the ways it’s taking privacy into consideration.

But none of that addresses how Facebook intends to use this data or what type of “research” it will be used for.





Another privacy exception due to Covid.

California Governor Vetoes Genetic Testing Data Disclosure Law

Laura Mahoney reports:

California Gov. Gavin Newsom vetoed a bill Friday that would have set state rules for sharing genetic information held by direct-to-consumer testing companies out of concern it could impede reporting of coronavirus test results.

The bill (S.B. 980 ) could interfere with laboratories’ mandatory requirement to report Covid-19 test outcomes to local public health departments and the state, Newsom said in a veto message.

Read more on Bloomberg Law.





It could be…

https://www.nytimes.com/live/2020/09/26/us/trump-vs-biden

2020 Live Updates: Trump Selects Amy Coney Barrett as Supreme Court Nominee

President Trump’s pick was leaked on Friday, 24 hours before his expected announcement. Conservatives and anti-abortion activists praised the news while some on the left condemned it.



(Related) Analysis, before the announcement.

https://fivethirtyeight.com/features/how-amy-coney-barrett-could-change-the-supreme-court/

How Amy Coney Barrett Could Change the Supreme Court



Friday, September 25, 2020

Somehow this does not give me that warm, fuzzy feeling…

https://www.politico.com/news/2020/09/24/fbi-cisa-election-hacking-panic-421144?&web_view=true

FBI, CISA urge public not to panic if they hear about election hacking

Trump — contradicted by his own intelligence agencies — claims that foreign powers plan to "rig" the election by printing fraudulent mail-in ballots.

The public should be aware that election officials have multiple safeguards and plans in place — such as provisional ballots to ensure registered voters can cast ballots, paper backups, and backup pollbooks — to limit the impact and recover from a cyber incident with minimal disruption to voting,” the agencies said in a public service announcement.

The goal of the latest PSA is to explain why voters shouldn’t believe disinformation about vote-stealing hacks if they see it. But its unqualified promise about the resilience of local officials’ backup plans and the sanctity of election results is questionable, given the sophistication of nation-state hackers and the inadequate security measures in many counties.



(Related) If they can’t protect systems they have some control over, what success will they have with state systems not under their control?

https://threatpost.com/feds-cyberattack-data-stolen/159541/?web_view=true

Feds Hit with Successful Cyberattack, Data Stolen

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert on Thursday, not naming the agency [too embarrassing? Bob] but providing technical details of the attack. Hackers, it said, gained initial access by using employees’ legitimate Microsoft Office 365 log-in credentials to sign onto an agency computer remotely.

The cyber-threat actor had valid access credentials for multiple users’ Microsoft Office 365 (O365) accounts and domain administrator accounts,” according to CISA.



(Related) One of many, many election system examples.

https://www.propublica.org/article/foreign-hackers-cripple-texas-countys-email-system-raising-election-security-concerns

Foreign Hackers Cripple Texas County’s Email System, Raising Election Security Concerns

The malware attack, which sent fake email replies to voters and businesses, spotlights an overlooked vulnerability in counties that don’t follow best practices for computer security.

Last week, voters and election administrators who emailed Leanne Jackson, the clerk of rural Hamilton County in central Texas, received bureaucratic-looking replies. “Re: official precinct results,” one subject line read. The text supplied passwords for an attached file.

But Jackson didn’t send the messages. Instead, they came from Sri Lankan and Congolese email addresses, and they cleverly hid malicious software inside a Microsoft Word attachment. By the time Jackson learned about the forgery, it was too late. Hackers continued to fire off look-alike replies. Jackson’s three-person office, already grappling with the coronavirus pandemic, ground to a near standstill.

I’ve only sent three emails today, and they were emails I absolutely had to send,” Jackson said Friday. “I’m scared to” send more, she said, for fear of spreading the malware.





Why the people who make these decisions are paid the ‘big bucks.’

https://securityboulevard.com/2020/09/the-high-cost-of-reporting-a-non-reportable-data-breach/

The High Cost of Reporting a Non-Reportable Data Breach

In May, cloud provider Blackbaud was the victim of a ransomware attack designed to lock it out of accessing its own data and servers. The company notified law enforcement, used its own cybersecurity team and hired outside consultants, and successfully prevented the attacker from blocking access to the system and “fully encrypting” the files—ultimately expelling the threat actor from its system. Blackbaud noted that the hacker had “removed a copy of a subset of data from our self-hosted environment” but that “[t]he cybercriminal did not access credit card information, bank account information, or Social Security numbers.”

In the case of Blackbaud, similar to the case of Uber, the company decided to pay the hackers. While it does not appear that the company paid the hackers for their silence, Blackbaud “paid the cybercriminal’s demand with confirmation that the copy they removed had been destroyed,” and the company noted that, based on its investigation and that of law enforcement and the nature of the incident, “we have no reason to believe that any data went beyond the cybercriminal, was or will be misused; or will be disseminated or otherwise made available publicly …”

In short, the company suffered a ransomware attack that included a partial data breach (breach of a subset of its data). Blackbaud recovered from the ransomware, secured the data and had reasonable assurance (not sure how) that the data, while breached in the sense that there was “unauthorized access” to the data, was not used or transmitted to anyone else and was destroyed.

Under these circumstances, a data breach disclosure to customers and to various Attorneys General is probably both legally required and unnecessary. Indeed, Blackbaud did make such a breach disclosure. In return, the company was sued in a class action filed on behalf of its customers.





Can’t hurt.

https://www.helpnetsecurity.com/2020/09/24/nist-guide-recover-ransomware/?web_view=true

NIST guide to help orgs recover from ransomware, other data integrity attacks

The National Institute of Standards and Technology (NIST) has published a cybersecurity practice guide enterprises can use to recover from data integrity attacks, i.e., destructive malware and ransomware attacks, malicious insider activity or simply mistakes by employees that have resulted in the modification or destruction of company data (emails, employee records, financial records, and customer data).

Special Publication (SP) 1800-11, Data Integrity: Recovering from Ransomware and Other Destructive Events can help organizations to develop a strategy for recovering from an attack affecting data integrity (and to be able to trust that any recovered data is accurate, complete, and free of malware), recover from such an event while maintaining operations, and manage enterprise risk.





Addressed to those who should know better?

https://www.helpnetsecurity.com/2020/09/24/phishers-targeting-employees-fake-gdpr-compliance-reminders/?web_view=true

Phishers are targeting employees with fake GDPR compliance reminders

The attacker lures targets under the pretense that their email security is not GDPR compliant and requires immediate action. For many who are not versed in GDPR regulations, this phish could be merely taken as more red tape to contend with rather than being identified as a malicious message,” Area 1 Security researchers noted.

Following the link in the email takes victims to the phishing site, initially hosted on a compromised, outdated WordPress site.

The link is “personalized” with the target’s email address, so the HTML form on the malicious webpage auto-populates the username field with the correct email address (found in the URL’s “email” parameter). Despite the “generic” look of the phishing page, this capability can convince some users to log in.





Great risk offers an opportunity for great reward?

https://www.buzzfeednews.com/article/ryanmac/controversial-clearview-ai-raises-8-million

Controversial Facial Recognition Firm Clearview AI Raised $8.6 Million

Controversial facial recognition company Clearview AI — which has built a database of more than 3 billion images taken from Facebook, Instagram, and the world’s largest social networking platforms — raised $8.6 million in a recent fundraising round, according to financial documents filed on Thursday.

The fundraising round comes amid a series of legal challenges to Clearview for its alleged violation of various states’ biometric information and data privacy laws, and follows a year in which the company has come under heavy scrutiny for its previously undisclosed relationships with law enforcement agencies and private companies.





I too would like to see their justification.

https://www.reuters.com/article/us-usa-tiktok-idUSKCN26F35F

Judge says U.S. must defend or delay TikTok app store ban by Friday

A U.S. judge said Thursday the Trump administration must either delay a ban on U.S. app stores offering TikTok for download or file legal papers defending the decision by Friday.

The U.S. Commerce Department order banning Apple Inc and Alphabet Inc’s Google app stores from offering the short video sharing app for new downloads is set to take effect late Sunday. U.S. District Judge Carl Nichols said the government must file a response to a request by TikTok for a preliminary injunction or delay the order by 2:30 p.m. EDT Friday.

A federal judge in San Francisco on Saturday issued a preliminary injunction blocking a similar Commerce Department order from taking effect on Sunday on Tencent Holdings’ WeChat app.





But will they listen? (If your issue is not listed, you can still use the contact information)

https://www.bespacific.com/5-calls-easiest-and-most-effective-way-for-citizens-to-make-an-impact-in-national-and-local-politics/

5 Calls – easiest and most effective way for citizens to make an impact in national and local politics

How do I use 5 Calls?

  • Type in your ZIP code (or let your browser or the app find your location for you).

  • Choose an issue that’s important to you.

  • Make calls!

  • You have three members of Congress – two senators and a House rep.

    • Some issues need calls to all three (we’ll tell you when they do). For those, call the first person on the list. When you’re done, enter your call results and then move to the next person on your list. Lather, rinse, repeat until you’re done.

    • Some issues only need a call to your House rep; for others, just your senators. Again, we’ll make it clear who you should call.

  • You may also see issues that ask you to call a non-Congressional entity, office, etc. Those calls work the same way…”



Thursday, September 24, 2020

For my next Computer Security class. (and my Ethical Hackers)

https://www.welivesecurity.com/2020/09/22/new-tool-helps-companies-assess-why-employees-click-phishing-emails/?&web_view=true

New tool helps companies assess why employees click on phishing emails

Researchers at the US National Institute of Standards and Technology (NIST) have devised a new method that could be used to accurately assess why employees click on certain phishing emails. The tool, dubbed Phish Scale, uses real data to evaluate the complexity and quality of phishing attacks to help organizations comprehend where their (human) vulnerabilities lie.

… “The Phish Scale is intended to help provide a deeper understanding of whether a particular phishing email is harder or easier for a particular target audience to detect,” said NIST researcher Michelle Steves in the press release announcing the new tool.

Phish Scale looks at two main elements when assessing how difficult it is to detect a potential phishing email. The first variable the tool evaluates is ‘phishing email cues’ – observable signs, such as spelling mistakes, using personal email addresses rather than work emails, or using time-pressuring techniques.

Meanwhile, the second ‘alignment of the email’s context to the user’ leverages a rating system to evaluate if the context is relevant to the target – the more relevant it is, the harder it becomes to identify it as a phishing email. Based on a combination of these factors, Phishing Scale categorizes the difficulty of spotting the phish into three categories: least, moderate, and very difficult.





Could be a useful tool. Well worth reading the article!

https://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites

The High Privacy Cost of a “Free” Website

She said she only allowed three trackers on spartapride.org: cookies from Twitter and Facebook that accompany their “like” buttons on the site, and one from Disqus, a commenting platform she got through a prepackaged website theme she bought off the internet for $59 to build the site.

But when The Markup scanned spartapride.org using our new instant privacy inspector, Blacklight, we found 21 different ad-tech companies tracked visitors to the site, sending possible signals about people’s gender identities to advertisers—without the users’ knowledge or consent.

The trackers loaded because Disqus sells ads on the free version of its commenting portal, and that ad space comes with third-party tracking. Disqus discloses those trackers on its own website, but the company wouldn’t comment about tracking SPART*A’s users.

To investigate the pervasiveness of online tracking, The Markup spent 18 months building a one-of-a-kind free public tool that can be used to inspect websites for potential privacy violations in real time. Blacklight reveals the trackers loading on any site—including methods created to thwart privacy-protection tools or watch your every scroll and click.

Try out Blacklight here. Enter a website, and Blacklight will scan it for user-tracking technologies — and who’s getting your data.





Could be worth watching to see what they come up with…

https://www.cyberscoop.com/secret-service-ciab-cyber-command/

Secret Service looks to outsiders to boost financial cybercrime probes

The U.S. Secret Service is pulling in outside expertise from the private sector and U.S. Cyber Command as it weighs changes to its investigative methods in an attempt to keep pace with international hackers.

To formalize its interest in tapping into the private sector’s understanding of scammers’ latest tactics, the agency earlier this year established an advisory group composed of cybersecurity practitioners from the private sector, academia, and U.S. government, as CyberScoop first reported.

Known as the Cyber Investigations Advisory Board (CIAB), the group met last week for the first time and is expected to provide insights on how the Secret Service must adapt to a rapidly changing criminal underground.



(Related) The flip side of Hacker prosecution?

https://www.cyberscoop.com/story/arkady-bukh-man-in-the-middle/

Arkady Bukh Man in the Middle

How Arkady Bukh, a New York-based immigrant from the former Soviet bloc, emerged as the go-to defense lawyer for the cybercrime underworld.





How the EU sees AI.

https://fuck-videos.xxx/en/xxx/?u=~aHR0cHMlM0ElMkYlMkZ3d3cuZ290cG9ybi5jb20lMkYxOXlvLWFtYXRldXItYmFiZS1yb3VnaGZ1Y2tlZC1pbi1tYW55LXBvc2VzJTJGdmlkZW8tNjM2MjQyNQ==~&serv=21061298039585111424575239526

Artificial intelligence: threats and opportunities

Europe's growth and wealth are closely connected to how it will make use of data and connected technologies. AI can make a big difference to our lives – for better or worse - and the European Parliament has established a committee to examine the impact of the technology. Below are some key opportunities and threats connected to future applications of AI.

The volume of data produced in the world is expected to grow from 33 zettabytes in 2018 to 175 zettabytes in 2025 (one zettabyte is a thousand billion gigabytes)





Perspective. Was the topic ethical? Vegetarian (lousy hunter) ethics?

https://phys.org/news/2020-09-ethics-classes-students-moral-behavior.html

Can ethics classes actually influence students' moral behavior?

The study found that after exposure to a philosophy article, a 50-minute discussion section, and an optional online video concerning the ethics of eating factory-farmed meat, students decreased their rates of meat purchasing from 52% to 45%. That compared to a constant rate of 52% among students in a control group exposed to similar materials on the ethics of charitable giving.

… He added the goal of the study was not specifically to convince students to eat less meat, but to find out whether philosophical ethical instruction is even capable of influencing real-world choices.



Wednesday, September 23, 2020

Hard to tell an ‘audition’ from a retaliation.

https://thehackernews.com/2020/09/russian-ransomware-hack.html?&web_view=true

A New Hacking Group Hitting Russian Companies With Ransomware

The ransomware gang, codenamed "OldGremlin" and believed to be a Russian-speaking threat actor, has been linked to a series of campaigns at least since March, including a successful attack against a clinical diagnostics laboratory that occurred last month on August 11.

"The group has targeted only Russian companies so far, which was typical for many Russian-speaking adversaries, such as Silence and Cobalt, at the beginning of their criminal path," Singaporean cybersecurity firm Group-IB said in a report published today and shared with The Hacker News.





Understand the law, if not the debate.

https://www.bespacific.com/cybercrime-and-the-law-computer-fraud-and-abuse-act-and-the-116th-congress/

Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress

CRS report via LC – Cybercrime and the Law: Computer Fraud and Abuse Act (CFAA) and the 116th Congress, September 21, 2020: “…Since the original enactment of the CFAA in 1984, technology and the human relationship to it have continued to evolve. Although Congress has amended the CFAA on numerous occasions to respond to new conditions, the rapid pace of technological advancement continues to present novel legal issues under the statute. For example, with increasing computerization has come a corresponding proliferation of Terms of Service (ToS) agreements—contractual restrictions on computer use. But federal courts disagree on whether the CFAA imposes criminal liability for ToS violations, and the United States Supreme Court is currently considering a case on this issue. Another technological development that has created tension under the CFAA is the rise of botnets, which are networks of compromised computers often used by cyber criminals. Although the CFAA prohibits creating botnets and using them to commit certain crimes, it is unclear if selling or renting a botnet violates the statute—a potential concern given that botnet access is often rented from botnet brokers. On a more basic level, another change that has prompted some reexamination of the CFAA is the seemingly-growing frequency of computer crime. Some contend that the prevalence and perniciousness of hacking requires private actors to defend themselves by hacking back—that is, initiating some level of intrusion into the computer of the initial attacker. The same provisions of the CFAA that prohibit hacking ostensibly also make it a crime to hack back, which some legislation has sought to change…





If it’s good enough for Apple…

https://www.imore.com/swift-language-tools-now-available-windows

Swift language tools now available for Windows 10

The Swift Project, the ongoing open-source efforts to develop the Swift programming language, has announced that an initial release of Swift is now available for Windows 10. What this means is that the tools, like the compiler and core libraries, are all available for developers right now.

You can download the Swift toolchain for Windows from the Swift Project website.



Tuesday, September 22, 2020

Trusting third-parties and trusting hackers – not the same thing.

https://www.infosecurity-magazine.com/news/minnesota-suffers-secondlargest/

Minnesota Suffers Second-Largest Data Breach

Hundreds of thousands of Minnesotans are receiving letters warning them that their data may have been exposed in the second-largest healthcare data breach in state history.

The letters were sent to individuals who had donated to or been a patient of Allina Health hospitals and clinics or Children’s Minnesota, a two-hospital pediatric health system in the Twin Cities.

Breach notifications warned that personal data may have been exposed following a ransomware attack on third-party vendor Blackbaud in May 2020. The South Carolina company is one of the world's largest providers of education administration, fundraising, and financial management software.

To date, over 3 million people in the United States have been impacted by the attack on Blackbaud, which has also impacted a number of universities, charities, and organizations in the United Kingdom.

A statement on Allina's website seeks to reassure customers by rather optimistically telling them: "Blackbaud did pay the cybercriminal’s demand with confirmation that the copy of the data that they removed had been destroyed."



(Related)

https://www.zdnet.com/article/ransomware-is-evolving-but-the-key-to-preventing-attacks-remains-the-same/?&web_view=true

Ransomware is evolving, but the key to preventing attacks remains the same

Europol's No More Ransom project is attempting to take the fight to cyber criminals by offering free decryption tools for hundreds of different families of ransomware, something which is estimated to have stopped over four million victims from giving into ransom demands.

But the best way to protect against the potential damage of a ransomware attack is to make sure organisations, businesses and individuals have the necessary cybersecurity measures in place to avoid falling victim to ransomware in the first place.

"Prevention is the key," said Ruiz. "The main advice is keep backups of your data and keep them offline. Also it's essential that all the operating systems and anti-virus are properly updated; implement any available patch as soon as possible in order to mitigate any vulnerabilities. It's also important that organisations teach employees how to spot a potential cyberattack.





Makes me wonder what else the “Texas government” could order. (Call out the National Guard?)

https://www.infosecurity-magazine.com/news/texas-government-spoofed/?&web_view=true

Cyber-Criminals Spoof Texas Government

Cyber-criminals have tried to receive free goods by posing as the Texas government and emailing out Requests for Quotes (RFQs).

The multi-layered email attack, in which threat actors pretended to be from the Texas Department of State Health Services, was discovered by researchers at Abnormal Security.

"If unsuspecting salespersons were to respond to this initial request, attackers could establish a line of communication and eventually follow-through with the requested goods," noted researchers.

Using what appears to be a genuine government purchase order, the attackers attempted to obtain products worth hundreds of thousands of dollars without handing over a penny.

Careful attention had been paid by the attackers to the fine details. The deceptive email included the genuine logo of Texas Health and Human Services, and the request appeared to be sent by John William Hellerstedt, MD, the genuine commissioner of Texas Health.

Researchers noted: "The phone number provided is not associated with the 'bill to' address, although the area code is in Texas and does match the area code for the department of state health services phone number. This is a social engineering tactic aimed to engage recipients into requesting the ship to address, either by email or phone.”





What do you call it when lawyers don’t look at the law? I don’t think “misinterpretation” is the word I’d choose.

https://www.databreaches.net/legal-misinterpretation-to-blame-for-delay-in-reporting-kentucky-unemployment-breach/

Legal misinterpretation to blame for delay in reporting Kentucky unemployment breach

Matthew Glowicki reports:

An inspector general report has found there were “unacceptable” delays in reporting an April security breach of Kentucky’s unemployment system but that residents’ personal information doesn’t appear to have been misused.

The report primarily blames the monthlong delay in reporting the breach on current legal staff who relied on a holdover procedure from the previous administration that misinterpreted state law governing when breaches need to be reported.

Read more on Louisville Courier Journal.





Law and sausage.

https://www.wired.com/story/california-prop-24-fight-over-privacy-future/

The Fight Over the Fight Over California’s Privacy Future

WHEN STATE SENATOR Bob Hertzberg learned that an ambitious privacy initiative had gotten enough signatures to qualify for the ballot in California, he knew he had to act quickly.

“My objective,” he says, “was to get the damn thing off the ballot.”

… Much better, he thought, to address the problem of data privacy through the legislative process. So Hertzberg approached Mactaggart with a deal: work with him to craft a bill, and once it passes, withdraw the ballot initiative. Mactaggart agreed.

… So, about a year after the CCPA was passed—but before it had gone into effect—Hertzberg, who by then was majority leader of the California State Senate, pitched a new idea to Mactaggart. In a total reversal from his earlier stance, Hertzberg urged Mactaggart to bypass the legislative process. Instead, he should fund and draft a new ballot initiative to improve upon the CCPA. And this one wouldn’t be a bargaining chip. It would go all the way to a vote by the people of California. Thus was born the California Privacy Rights Act, which will appear on Californians’ ballots this fall as Proposition 24.





Could this set a precedent for the rest of us? IF they get Fourth Amendment protection, shouldn’t I? Will Google et al file briefs?

Seventh Circuit Examines Lifetime GPS Tracking of Sex Offenders

Joe Kelly reports:

The Seventh Circuit on Friday weighed the intrusiveness of a Wisconsin statute that institutes lifetime GPS monitoring of certain convicted sex offenders against the necessity of preventing further offenses from that particular class of criminals.

The underlying suit was first filed as a federal class action by eight registered sex offenders in March 2019. They argued that a 2017 statutory interpretation by former Wisconsin Attorney General Brad Schimel that broadened the class of sex offenders subjected to lifetime GPS monitoring after the completion of their sentences constitutes an unreasonable search under the Fourth Amendment, calling the tracking “an intrusive search that provides the government detailed, real-time data about a person’s every move.”

Read more on Courthouse News.





You mean it was Okay to hack elections before? (But will Trump veto it?)

https://thehill.com/policy/cybersecurity/517462-house-approves-legislation-making-hacking-voting-systems-a-federal-crime?&web_view=true

House approves legislation making hacking voting systems a federal crime





Not sure this is a good idea, but it should be an attractive one. Do they already have licensing agreements with Google, Facebook and others?

https://www.technologyreview.com/2020/09/21/1008654/cias-new-tech-recruiting-pitch-more-patents-more-profits/

CIA’s new tech recruiting pitch: More patents, more profits

The newest federal lab gives the CIA and its officers the unprecedented ability to make money off inventions that come from within the agency.





Even I can see this is a bluff.

https://www.vice.com/en_us/article/889pk3/facebook-threatens-to-pull-out-of-europe-if-it-doesnt-get-its-way

Facebook Says it Will Stop Operating in Europe If Regulators Don’t Back Down

… In a court filing in Dublin, Facebook said that a decision by Ireland’s Data Protection Commission (DPC) would force the company to pull up stakes and leave the 410 million people who use Facebook and photo-sharing service Instagram in the lurch.



Monday, September 21, 2020

For my Ethical Hackers. A billboard that screams, “Please shut the barn door before someone steals all the horses,” may not be the best way to alert your security teams.

https://www.zdnet.com/article/us-govt-orders-federal-agencies-to-patch-dangerous-zerologon-bug-by-monday/?&web_view=true

US govt orders federal agencies to patch dangerous Zerologon bug by Monday

The Department of Homeland Security's cybersecurity division has ordered federal civilian agencies to install a security patch for Windows Servers, citing "unacceptable risk" posed by the vulnerability to federal networks.

The DHS order was issued via an emergency directive, a rarely-used legal mechanism through which US government officials can force federal agencies into taking various actions.

The target of the DHS's latest emergency directive is CVE-2020-1472, a vulnerability also known as Zerologon.

The vulnerability is considered extremely dangerous, as it allows threat actors that have a foothold on an internal network to hijack Windows Servers running as domain controllers and effectively take over the entire network





Some scare stories...

https://www.forbes.com/sites/cindygordon/2020/09/21/why-cybersecurity-and-ai-are-top-governance-risks-for-board-directors-and-ceos/#22e0e5f66fd4

Why CyberSecurity And AI Are Top Governance Risks For Board Directors And CEOs?

Ask most board directors and CEO’s to define cybersecurity and artificial intelligence in a board meeting and have them share their answers and you may well find that their depth of knowledge is too shallow in their duty of care responsibilities.





Perspective.

https://techcrunch.com/2020/09/20/gangster-capitalism-and-the-american-theft-of-chinese-innovation/

Gangster capitalism and the American theft of Chinese innovation

So much as China protected its industry from overseas competitors like Google and Amazon through market-entry barriers, America is now protecting its entrenched incumbents from overseas competitors like TikTok. We’re demanding joint ventures and local cloud data sovereignty just as the Communist Party has demanded for years.

Hell, we’re apparently demanding a $5 billion tax payment from ByteDance, which the president says will fund patriotic education for youth.





Have we gone beyond ‘talking’ about AI?

https://www.cio.com/article/3575542/ai-first-or-nothing.html

AI-first or nothing

5 steps to AI transformation and survival

… Data gathered from 100+ global CIOs at the Metis Strategy Digital Symposium in July 2020 personifies the trend toward AI-first operating models: 66% of CIOs stated that they have teams focused on identifying AI use cases, conducting pilots and scaling those cases that improve outcomes. Of the CIOs who do not currently have resources focused on this, roughly 60% indicated it is on their roadmap.

In our work with Fortune 500 companies, we have identified common characteristics among organizations that successfully navigate the shift to AI-first. Below are a series of smart first steps digital leaders can take to initiate, accelerate, or course correct their AI transformation.





Well, it’s a start. Other free courses & ebooks available here too.

https://www.analyticsvidhya.com/blog/2020/09/3-free-certificate-courses-data-science-machine-learning-analytics-vidhya/

Big Announcement: 3 Free Certificate Courses in Data Science and Machine Learning by Analytics Vidhya!

… The 3 Free Certified Courses Are:

  • Introduction to Python

  • Getting Started with Decision Trees

  • Getting Started with Neural Networks