[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:
DevOps orchestration tools represent a new risk to the enterprise
Orchestration tools help manage configuration and application deployment. They track and control code base changes and store file versions in a central configuration management database, allowing different developers to work on the same code base without worrying about version control. They also automate releases, enabling DevOps teams to achieve one of their core goals: continuous delivery.
DevOps methodologies completely disrupt traditional team setups, and implementing automated orchestration tools is sometimes seen as too far of a departure from traditional deployment techniques.
But companies that do embrace these orchestration tools often put too much trust in them. You could become a target for hackers when you rely on them as centralized tools that enforce policies across your whole enterprise. Once hackers get into your system, they hold the keys to the kingdom. They can modify any configurations they want — like altering firewalls, adding accounts, granting remote access to production systems, extracting data, changing prices, and installing known vulnerable software.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=7e67424fdb&e=20056c7556
Using Evernote as an Threat Intelligence Management Platform
[Video]
Most people are already familiar with Evernote. It?s easy to just throw all our miscellaneous data into the Elephant and effortlessly find it later with a quick search or correlate similar ideas with tags. Evernote is literally our external brain that increases our intelligence and helps us become more productive overall. This presentation discusses an experiment of using Evernote as an informal threat intelligence management platform, the specific concepts and strategies used, and its overall effectiveness. Although using Evernote in this way in large enterprises is probably not possible, the same lessons learned can be applied to implement a similarly effective system using open source or commercial software.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c7a10da833&e=20056c7556
NEW POS MALWARE DESIGNED TO STRIKE ORACLE SYSTEMS
The MalumPOS malware is a newly discovered attack tool with the ability to steal payment data from point-of-sale systems running a popular type of Oracle software, Trend Micro threat analyst Jay Yaneza said in a recent blog post.
Its prime target is Oracle’s MICROS platform, which is currently deployed on over 330,000 sites worldwide. The software is widely used in the U.S., especially within the hospitality, food and beverage, and retail industries, putting numerous high-profile companies and their customers at risk.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0055b00a84&e=20056c7556
Microsoft to introduce Antimalware Scan Interface (AMSI) in Windows 10
Here is a reason why Windows 10 users would have added security from malware. Microsoft has announced a new tool called as Antimalware Scan Interface (AMSI) for Windows 10 that allows application developers to further strengthen up the security of their application. With Antimalware Scan Interface, applications would be automatically integrated with the available antimalware program present on the PC, ensuring that no malware code escapes the check.
Intelligent Malware programs usually skip security scans and succeed in infecting PC’s, however, with AMSI coming for Windows 10 all content shall be sent for malware check to the locally installed antivirus software.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=a704f35528&e=20056c7556
Microsoft Confirms Ask Toolbar is Not Malware; Current Application is Compliant with Recently Updated Policies
“The latest Ask Toolbar is compliant with Microsoft’s objective criteria for third party software,” a Microsoft spokesperson said.
Microsoft’s Malware Protection Center previously erroneously stated the Ask Toolbar was flagged as unwanted software due to its search protection feature, which alerts toolbar users to third party application requests to change their settings (the feature does not prevent users themselves from changing their own settings). This search protection feature was removed from the current product months ago in preparation for Microsoft’s new policy roll out.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ba32883c9f&e=20056c7556
Fraudulent MERS emails from North Korea contained real computer virus
SEOUL, June 12 (UPI) — Email messages containing false updates about Middle East Respiratory Syndrome in South Korea also were found to be delivering malignant codes, possibly of North Korean origin.
The subject line of the email message read, “Guidelines on MERS Infection Prevention” in Korean and a document titled “Hospital and Patient List” was attached to the email.
The message was made to appear as if it were sent from the Korea Centers for Disease Control and Prevention, and the fake document upon opening would download a malignant code to the user’s computer, according to the Korea Internet and Security Agency.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ec3ad5e029&e=20056c7556
TEXAS OPENING NEW INTELLIGENCE CENTER TO BATTLE BORDER CRIME
With the signing of House Bill 11 on June 9 by Texas Governor Greg Abbott, a new intelligence center will be established in Hidalgo County, designed to target border crime more effectively. However, details are unclear regarding how this center’s mission will differ significantly from the multiple fusion and joint intelligence centers located across the state, calling into question whether the $2.1 million start-up cost is justified.
Officially known as the Texas Transnational Intelligence Center (TTIC), it will be operated by the Hidalgo County Sheriff’s Office and the McAllen Police Department, with assistance from the Texas Department of Public Safety, according to Action4 News.
However, Texas is already home to several fusion and joint operations centers designed to share crime information across agencies. These include the El Paso Intelligence Center (EPIC), the Texas Crime Information Center (TCIC) run by the Texas Department of Public Safety in Austin, the Austin Regional Intelligence Center, the Dallas Fusion Center, the El Paso Multi-Agency Tactical Response Information eXchange (MATRIX), the North Central Texas Fusion Center in McKinney, the Border Security Operations Center (BSOC) in Austin, and the Southwest Texas Fusion Center in San Antonio.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=eb002b1740&e=20056c7556
============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)
If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage2.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)
** Unsubscribe from this list (http://paulgdavis.us3.list-manage1.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=bc0e8745ee)
** Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)