Audioburst Search
|
5 months ago

Coming up next

A new story from The CyberWire

The CyberWire
|
5 months ago

States scramble for medical supplies as national stockpile runs low

The Al Malmberg Show
|
2 hrs ago

Inmate dies after contracting coronavirus at Louisiana federal prison

All Things Considered
|
2 hrs ago

Cuomo: NY coronavirus cases could peak at end of April

All Things Considered
|
3 hrs ago

Man hid coronavirus symptoms to visit wife in maternity ward

KRLD News, Weather and Traffic
|
5 hrs ago

Democrats emphasize infrastructure in "phase 4" coronavirus proposal

Rush Limbaugh
|
7 hrs ago

Trump may be a lot more vulnerable than you think

Rush Limbaugh
|
8 hrs ago

"I heard the roar": Strong earthquake rocks central Idaho

Morning Edition
|
15 hrs ago

Church packed for services again despite charges against pastor

10 10 WINS 24 Hour News
|
9 hrs ago

It's the first of the month. Do you need to pay rent?

10 10 WINS 24 Hour News
|
9 hrs ago

Trump rolls back US fuel economy standards

Bloomberg Daybreak
|
15 hrs ago

Boston Tops 1,000 Coronavirus Cases

WBZ Afternoon News
|
5 hrs ago

Gov. Ron DeSantis to issue statewide stay-at-home order for Florida

Noon Report with Rick Van Cise
|
6 hrs ago

Coast Guard Tells Cruise Ships With COVID-19 Cases To Stay Away From U.S. Ports

KNX Midday News with Brian Ping
|
6 hrs ago

University of California suspends admission testing requirements because of coronavirus pandemic

KNX Midday News with Brian Ping
|
6 hrs ago

Texas Gov. Greg Abbott says religious services should be conducted remotely or adhere to social distancing guidelines

Michael Wallace and Steve Scott
|
6 hrs ago

Atlanta - Fulton County residents ordered to shelter in place

Rush Limbaugh
|
6 hrs ago

Louisiana faces an acute shortage of beds and ventilators as coronavirus cases continue to spike

Markley and Van Camp
|
7 hrs ago

Wimbledon canceled for 1st time since World War II because of coronavirus pandemic

Newsradio 950 WWJ 24 Hour News
|
9 hrs ago

Is It Safe to Go to the Grocery Store Amid Coronavirus?

Herman Cain
|
9 hrs ago

Philadelphia - Montco officials call out Exelon for not social-distancing

KYW 24 Hour News
|
11 hrs ago

Indianapolis - Health insurance provider, Anthem, accused of duping the Medicare system out of millions of dollars

Tony Katz and the Morning News
|
12 hrs ago

Seattle - Everett's Angel of the Winds Arena opens as a coronavirus quarantine site

First Light
|
14 hrs ago

ESPN moves up release of Jordan and Chicago Bulls series two months early amid lockdown

This Morning with Gordon Deal
|
14 hrs ago

Automatic TRANSCRIPT

And now word from our sponsor observe it it the greatest threat to businesses today isn't the outsider trying to get in. It's the people you trust. The ones who already have the keys your employees contractors and privileged abusers sixty percent of online attacks are carried out by insiders to stop these insider threats. You need to see what users are doing. Before an incident occurs observe observe it enables security teams to detect risky user activity investigate incidents in minutes and effectively respond with observant. You know the whole story. Get your free trial at observed dot com slash cyber wire. That's observe the letter. I the letter T.. Dot Com forward slash cyber wire and and we thank observant for sponsoring our show funding for this cyber wire. PODCAST is made possible in part by McAfee security built by the power of harnessing one billion threat sensors from device to cloud intelligence that enables you to respond to your environment and insights that empower. Our you change it. McAfee the device to cloud cybersecurity company go to McAfee dot com slash insights from the cyber wire studios at data tribe. I'm Dave Bittner with a little bit of a cold with your cyber wire summary for Tuesday November Fifth Twenty Nineteen ransomware has hit hit Spain Reuters reports that ransomware attack hit the country's largest radio station Cadena Se are yesterday. National Service was disrupted but let local broadcasting continued without interruption. It's unknown what strain of ransomware was involved in the attack. SCR is working toward recovery. Spain's is national security department said that other unspecified companies were affected by similar attacks. The agency said that Esi our had disconnected. It's major systems from its networks and it recommended that other organizations similarly affected do likewise bleeping. Computer says it's obtained a leaked copy of a ransom note that confirms that. NTT Data subsidiary embarrass was one of the officially unnamed companies. That were also hit. One of Spain's larger managed service providers riders embarrass is thought to have been infected with a variant of bit. Pay Mer ransomware. The extortionists have asked the P for just under eight hundred thirty. Six thousand dollars was in ransom. Bitcoin Dot E. S. reports other enterprises are concerned about the possibility of downstream attacks. Flowing from those affecting the widely used. MS APPEA- bleeping computer sites anonymous source close to those investigating the incident as saying that the extortionist may have exploited the blue keep vulnerability in their attack back but the grounds for this suspicion may be circumstantial. The advice to disconnect systems is being read by more than a few observers as an indication that there's a worm involved solved and the wormhole of the day is of course blue. Keep the list of those WHATSAPP warned of possible. Pegasus infections strikes many in India India as suggesting that the spyware was distributed by the government India's government BBC reports denies any such involvement in the incident. The scroll describes describes the activists lawyers and scholars whose devices were affected what's APPs litigation against. Nso Group is proceeding in a US. Court but Reuters reports sorts. An activist lawyer has petitioned India's Supreme Court to direct the country's counter-terrorism agency to open an investigation into not only NSO group but also what's what's APP and its corporate parent. facebook one of the matters at issue is sent to be a claim that the APPs encryption isn't up to snuff the Chinese own social media. The APP tick Tock remains the subject of US Security Investigation and the Defense Department is considering how to educate military personnel about the risks. The APP might pose military military times. Reports Tick Tock seems destined for the Walwa Z.. T. E. treatment from Washington and it's displaying the kind of preemptive good corporate citizenship the two hardware giants used in their own charm offensives in Tik Tok. Ace the social medium has applied to join the Global Internet Forum to Counter Terrorism Club to which facebook Microsoft Twitter Youtube Pinterest dropbox Amazon linked in. And what's APP currently belong. The Hill says that the forum has so far declined to admit tick tock probably over concerns surrounding the company's data collection and censorship practices. But you can't blame them for trying Booz Allen today released its predictions for the major threat trends of twenty twenty. They call out nine of these. I the Global Balkanisation of technology by which means such government policies. As Ras calmness Zora's movement toward creating an Autarkic Russian internet and Moscow offers to create similar national Internet infrastructures Structures for the bricks nations Brazil Russia India China and South Africa as well as an alternative domain name system second they see the clones loans and counterfeits posing a growing threat to supply chains third. These swiftly increasing rates at which automobiles generate data will prove. They say irresistible. CYBERCRIMINALS Tiber criminals they expect the hoods to work hard at stealing information from cars and monetize that information as they have other categories of data and a similar development development the proliferation of drones as business tools will in Booz Allen's fourth prediction increase many businesses attack surfaces a lot of Bluetooth exploits for example example. Work only if you're close to the targets and drones will they say make for a new generation of war driving V since satellites are becoming coming more enmeshed with terrestrial I t the study predicts more cyber attacks against satellites consider the ubiquity of GPS. In the arrival of satellite constellations relations like starlink that will deliver the Internet to users on the ground. Sixth Nation States can be expected to use more of the same attack tools and techniques and attribution attribution already. Difficult will get tougher. Seventh thread actors will continue their efforts to interfere with elections by the trolling of opinion by disinformation and by direct attack on election infrastructure cyber operations will continue their integration with conventional kinetic military operations. Sometimes that will offer nation-states a nonlethal option. But and here's their eighth prediction at other times. Cyber attacks can be expected to prompt Connecticut. Retaliation and and ninth and last next year the world will come to Tokyo for the Olympic Games. There won't be any medals in cyber but the competition can be expected to be fierce ourselves. We're pulling for team Japan on this one finally the New Yorker. This week takes a quick look at how dogs help investigate cybercrime time. No you can't learn to code obedience school but on the principle that any cyberspace. Badness has to manifest itself in some hardware sometime somewhere. Police agencies are training dogs to sniff out electronics to help them find the servers. FLASH DRIVES SD cards. GPS units. bitcoin hardware wallets. Let's and so forth on which criminal evidence can be found. These things are often hidden away like other. Contraband inside file. Cabinets walls fire extinguishers and the like the specialty is called electronic storage detection. Es D. and the dogs are trained to sniff out. Try Female phosphene oxide. Commonly used is to coat memory chips the handlers train their canine assistance with treats and says one trainer. That's why they tend to favor labs because labs have big big appetite for snacks even by dog standards. So if you're up to no good the dogs. We'll sniff you out or at least you're try female phosphene oxide. Aside and now a word from our sponsor threat connect designed by analysts but built for the entire hire team threat connects intelligence driven security operations. Platform is the only solution available today with intelligence automation analytics and workflows in a single platform platform every day organizations worldwide US threat connect as the center of their security operations to detect respond remediate and automate with all all of your knowledge in one place enhanced by intelligence enriched with analytics driven by workflows. You'll dramatically improve. The effectiveness of every member of the team. WanNa learn more. Check out their newest book sore platforms everything you need to know about security orchestration automation and response. The book talks about intelligence driven and orchestration decreasing. Time to response in remediation with sore and ends with a checklist for a complete source solution. You can download it at threat. CONNECT DOT COM uh-huh slash cyber wire. That's threat connect dot com slash cyber wire and we think threat connect for sponsoring our show.