Tag Archive for: General

Deputy Attorney General Lisa O. Monaco Delivers Keynote Address at International Conference on Cyber Security (ICCS) 2022 | OPA


Remarks as Prepared for Delivery

Thanks so much, Ed. It’s great to be back at Fordham and ICCS. It’s also great to be sharing the stage with another former federal prosecutor – President Tetlow. I see great colleagues and friends in the audience from my previous tours at the White House and the government. It’s also great to be here in person for the first time since COVID began.

The FBI and Fordham University convene this forum for experts and leaders to discuss the complex cybersecurity challenges facing our country. And every year, those challenges get more and more pressing.

The last time I spoke here, I sat in a different seat in government; I was President Obama’s Homeland Security and Counterterrorism Advisor. I was part of the team that briefed him every morning on the urgent threats facing our nation. And over those years, I spent more and more time during that morning briefing him on cyber threats – in particular, nation-state actors.

Since returning to the government and in my current seat as the Deputy Attorney General, I have been struck by an evolution: malicious cyber actors becoming more aggressive, more sophisticated, more belligerent and brazen – and an increased blurring of the line between state-sponsored cyberattacks and attacks by criminal groups.

At the Justice Department, keeping the American people safe from all threats, foreign and domestic, is an essential part of our mission. That is why, over the last year, we have been focusing on attacking cyber threats from every angle. We are taking a proactive approach to the threat. That approach has been informed by a Comprehensive Cyber Review conducted over the last year – the final report of which we are releasing today.

Building on the work of cyber experts in the Justice Department from across Administrations, our focus has been on increasing our capacity to disrupt and to respond to malicious cyber activity. And the report we release today reflects what we have learned over the last year, including the need to prioritize prevention, to ensure we are doing all we can to help victims, and above all else – to use all the tools at our disposal, working with partners here and around…

Source…

AWS Announces General Availability of Three New Serverless Analytics Offerings


New serverless options for Amazon EMR, Amazon MSK, and Amazon Redshift help customers analyze vast amounts of data without having to configure, scale, or manage the underlying infrastructure

Informatica, NextGen Healthcare, and Huron among customers and partners using new serverless analytics options

SEATTLE–(BUSINESS WIRE)–Amazon Web Services, Inc. (AWS), an Amazon.com, Inc. company (NASDAQ: AMZN), today announced the general availability of three new serverless analytics offerings that make it even easier for customers to analyze vast amounts of data without having to configure, scale, or manage the underlying infrastructure. Today’s announcements include new serverless offerings for Amazon EMR to enable customers to run analytics applications using open-source big data frameworks (Apache Spark and Hive) without having to manage the underlying infrastructure, Amazon Managed Streaming for Apache Kafka (Amazon MSK) to simplify real-time data ingestion and streaming, and Amazon Redshift to allow customers to run high-performance data warehousing and analytics workloads on petabytes of data without having to manage clusters. Along with other serverless analytics offerings from AWS such as Amazon QuickSight for business intelligence and AWS Glue for data integration, the new offerings announced today make it significantly easier and more cost-effective for customers to modernize their infrastructure and analyze vast amounts of data without worrying about capacity planning or incurring excess costs by over-provisioning for peak demand. There are no upfront commitments or additional costs to use Amazon EMR Serverless, Amazon MSK Serverless, and Amazon Redshift Serverless, and customers only pay for the precise capacity needed for their analytics workloads.

“By offering the most serverless options for data analytics in the cloud—including options for data warehousing, big data processing, real-time data analysis, data integration, interactive dashboards and visualizations, and more—we are making it even easier for customers to maximize the value of their data to drive innovation, improve customer experiences, and make better decisions faster,” said Swami…

Source…

General Motors Announces Data Breach; Zoom Releases Security Patch


Data breaches are not a new occurrence, but if you feel as though they have become much larger in scale over the past couple of years, those feelings are not misguided. According to research conducted by AtlasVPN, around 5.9 billion records were affected by a data breach in 2021, a new record high.

In this week’s BlackCloak Thursday Threat Update, we’ll take a look at a data breach disclosed by General Motors and a security patch recently released by Zoom.

General Motors discloses data breach

What we know: General Motors announced it was the victim of a data breach, as the automotive manufacturer discovered malicious login activity between April 11 and April 29. While details are still unfolding, cybercriminals may have had access to the personal information of GM online and mobile application accounts, including users’ names, home and email addresses, phone numbers, and usernames. General Motors said in its data breach notification letter that cybercriminals were able to login through credentials they gathered from other data breaches not tied to the company.

Recommendation: In order to access an account, GM is requiring all users to reset their passwords. When you do, create a password that is long, complex and is completely unique from all of your other passwords. Since the incident occurred because of compromised credentials from other data breaches, now is a good time to reset the passwords for all of the services you use to ensure they are all completely unique. Be on the lookout for phishing scams as well. While they are commonly conducted via email, cybercriminals can also perform these scams through text messages and phone calls, practices known as “smishing” and “vishing,” respectively.

Zoom releases security patch for ‘zero click’ vulnerability

What we know: Zoom has released a security patch to address a vulnerability affecting Windows, macOS, iOS and Android users. A Google Project Zero security researcher discovered the vulnerability, which can give cybercriminals the ability to compromise a victim’s account through Zoom’s chat functionality without any user interaction. Should a cybercriminal exploit this flaw, they could force the targeted…

Source…

NSA general confirms US offensive cyber ops in Ukraine war • The Register


America’s military conducted offensive cyber operations to support Ukraine in its response to Russia’s illegal invasion, US Cyber Command chief General Paul Nakasone has said.

“We’ve conducted a series of operations across the full spectrum; offensive, defensive, [and] information operations,” General Nakasone told Sky News in an interview that aired Wednesday.

Nakasone, who also serves as director of the NSA, didn’t provide specific details about the offensive operations, though he said they were lawful and complied with US policy.

“My job is to provide a series of options to the secretary of defense and the President, and so that’s what I do,” he said. 

White House press spokesperson Karine Jean-Pierre doubled down on the message, saying: “We don’t negotiate our security assistance packages to Ukraine. We are doing exactly what the President said he would do … to provide security assistance that is above and beyond.”

Tom Kellermann, head of cybersecurity strategy at VMware, called the move “historic.”

“Since 2013, the Russians have waged an insurgency in American cyberspace and our retaliation and disruption has been muted,” Kellermann, who is also a global fellow for cyber policy at the Wilson Center, told The Register

“The paradigm has changed as Russia must play defense now,” he continued. “The US brings to bear the formidable capabilities of Cyber Command against rogue nation states. Cyberspace is a new domain for warfare.”

Tenable CEO Amit Yoran added: “That the US has engaged in offensive cyber operations should be of no surprise to anyone. There are very few countries around the globe today who do not use such measures. The fact that these operations are acknowledged in a public way is unusual.”

Last month, the US and the European…

Source…