Threat Intelligence

9/21/2018
11:30 AM
100%
0%

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

The Trump administration has authorized the use of "offensive cyber operations" against foreign enemies, officials confirmed in a news briefing this week.

Its announcement aligns with a new, broader policy to relax the rules governing US use of cyber weapons to deter adversaries. The White House is worried about foreign governments targeting US networks, specifically around the November elections. Its latest strategy includes a presidential instruction that replaced a previous order from the Obama administration.

Now, the US military and government agencies can use cyber operations to protect the nation's systems and networks. National security advisor John Bolton, who confirmed the strategy this week, did not share the specifics of these operations or the attacks they are meant to deter.

Overall, the presidential directive allows the military to use tactics that fall below the "use of force" or those that would lead to "death, destruction or significant economic impacts," according to a Washington Post report. The government's strategy is very similar to the Obama administration's national cybersecurity action plan, which was introduced in 2016.

While some officials don't believe the new strategy is forceful enough, it does follow a series of cybersecurity-related efforts from the government this week. The Pentagon released a new strategy this week highlighting Russia and China as top US adversaries.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcavery
50%
50%
jcavery,
User Rank: Moderator
9/26/2018 | 11:00:12 AM
Re: Unimpeded Attempts
As long as your attribution methods are rock-solid and you're attacking the right enemy, I agree. But I think we need better tools for attribution and identifying attackers before we get more aggressive in regard to cyber weapons.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/24/2018 | 11:02:38 AM
Unimpeded Attempts
I'm in favor of utilizing cyber weapons against nefarious actors that are threatening the facets represented in the article. I'm a firm believer in defense not being enough in these scenarios, instead if you attack your attacker it forces them to react instead of allowing them time to re-adjust their tactics when you are constantly defending from their bombardment. 
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.