A Review of the Best News of the Week on Cyber Threats & Defense

T-Mobile Employee Made Unauthorized ‘SIM Swap’ (Krebs on Security, May 18 2018)
T-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username.

New Research Seeks to Shorten Attack Dwell Time (Dark Reading, May 18 2018)
It can take months for an organization to know they’ve been hacked. A new DARPA-funded project seeks to reduce that time to hours.

Serious XSS vulnerability discovered in Signal (Naked Security – Sophos, May 16 2018)
Researchers have discovered a serious cross-site scripting (XSS) vulnerability affecting all desktop versions of Edward Snowden’s favourite security application, Signal.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


A tale of two zero-days (WeLiveSecurity, May 15 2018)
Double zero-day vulnerabilities fused into one. A mysterious sample enables attackers to execute arbitrary code with the highest privileges on intended targets

Security Report Analysis: 2018 DBIR Report – Daniel Miessler (Daniel Miessler, May 21 2018)
Healthcare is the only industry where insider threat is greater than outside (56%)

Insider threat blind spot enables employee revenge attacks (Help Net Security, May 15 2018)
Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed organizations.

The Risks of Remote Desktop Access Are Far from Remote (Dark Reading, May 17 2018)
RDP is used by fraudsters to steal and monetize data more often than you might think. But there are ways to stay safe.

Google Offers Free DDoS Protection for U.S. Political Organizations (SecurityWeek, May 17 2018)
Jigsaw, an incubator run by Google parent Alphabet, this week announced the availability of Project Shield – which offers free distributed denial of service (DDoS) protections – for the U.S. political community.

StalinLocker deletes data if you don’t enter the right code in time (SC Magazine, May 18 2018)
Ransomware gives you ten minutes to comply. Ransomware is under development that gives victims 10 minutes to enter a code and will delete the contents of a hard drive in the event of failure.

You Can Send Invisible Messages With Subtle Font Tweaks (Wired, May 20 2018)
Researchers have developed a new technique called FontCode that hides secrets in plain sight.

Get Smart About Network Segmentation & Traffic Routing (Dark Reading, May 21 2018)
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here’s how.