SlideShare a Scribd company logo
Open Source Insight:
Securing Software Stacks, Election Security, FDA Pacemaker Recall
By Fred Bals | Senior Content Writer/Editor
Cybersecurity News This Week
News is slight as the US prepares to bore into the Labor Day
weekend and the unofficial end of Summer 2017. Yet our crack
staff of editors has scoured the Webbernets to produce the best
in cybersecurity and open source security news for your reading
pleasure. Enjoy, and if you celebrate Labor Day, have a great
holiday weekend!
• The Hidden Threat Lurking in an Otherwise Secure Software Stack
• Open Source Software Won't Ensure Election Security
• If Machine Learning is the question, open source is the answer.
Right?
• FDA Recalls 465K Pacemakers Tied to MedSec Research
• Three Reasons Why The Cybersecurity Industry May Never Catch
Up To Cybercrime
• Firmware Update to Address Cybersecurity Vulnerabilities Identified
in Abbott's (formerly St. Jude Medical's) Implantable Cardiac
Pacemakers: FDA Safety Communication
• What Software Teams Can Learn from Building Radar Detectors
Open Source News
The Hidden Threat Lurking in an
Otherwise Secure Software Stack
via The ServerSide: Summary: Is there a hidden threat buried in
your software stack? Is there a hidden threat embedded within
your Docker container? It's certainly not a prospect that lives
outside of the realm of possibility, especially if you're not 100%
sure as to exactly how the various open source components that
make up your software stack or your container image were
derived. "One of the aspects of open source is that it can be
forked," said Tim Mackey, the Technical Evangelist for Black
Duck Software.
via LawFare: The technology behind elections
is hard to get right. Elections require security.
They also require transparency: anyone should
be able to observe enough of the election
process, from distribution of ballots, to the
counting and canvassing of votes, to verify that
the reported winners really won. But if people
vote on computers or votes are tallied by
computers, key steps of the election are not
transparent and additional measures are needed
to confirm the results.
Open Source Software Won't Ensure
Election Security
If Machine Learning is the question,
open source is the answer. Right?
via Tech Republic: #7 - Not patching immediately
Companies often spend thousands of dollars on security solutions,
only to have them bypassed by something as simple as not applying a
security patch right away.
via Threatpost: The United States Federal
Drug Administration is recalling 465,000
pacemakers that attackers can gain
unauthorized access to issue commands,
change settings and maliciously disrupt.
Affected are four models manufactured by
Abbott Laboratories.
FDA Recalls 465K Pacemakers Tied to
MedSec Research
Three Reasons Why The Cybersecurity
Industry May Never Catch Up To Cybercrime
via Forbes: Is the cybersecurity industry keeping up with
cybercrime? Absolutely not. Cyberwarfare is at an all-time high,
and cybersecurity is just unable—unequipped—to keep up. We’re
seeing a convergence of three major vectors—devices, data, and
a shortage of talent—coming to a head. That’s causing an
explosion of what I’ll refer to as “cybercrime opportunity.”
via FDA: On August 23, 2017, the FDA approved a
firmware update that is now available and is intended
as a recall, specifically a corrective action, to reduce
the risk of patient harm due to potential exploitation
of cybersecurity vulnerabilities for certain Abbott
(formerly St. Jude Medical) pacemakers. "Firmware"
is a specific type of software embedded in the
hardware of a medical device (e.g. a component in
the pacemaker).
Firmware Update to Address Cybersecurity
Vulnerabilities Identified in Abbott's (formerly St. Jude
Medical's) Implantable Cardiac Pacemakers: FDA Safety
Communication
What Software Teams Can Learn from
Building Radar Detectors
via Black Duck blog (Mike Pittenger): Twenty years ago, a software
parts list would have seemed ludicrous. All software was built from
scratch, and every code base was unique. Today, however,
a software bill of materials is critical to organizations, for many of
the same reasons they are required in radar detectors.
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacemaker Recall

More Related Content

PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PPTX
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PPT
Consensus Audit Guidelines 2008
PDF
World best web apps security and Active detection of malicious link
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
PDF
The Seven Kinds of Security
PDF
Next-level mobile app security: A programmatic approach
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Threat Check for Struts Released, Equifax Breach Dominates News
Consensus Audit Guidelines 2008
World best web apps security and Active detection of malicious link
Open Source Insight: Happy Birthday Open Source and Application Security for ...
The Seven Kinds of Security
Next-level mobile app security: A programmatic approach

What's hot (20)

PPTX
2019 04-18 -DevSecOps-software supply chain
PPTX
User Behavior Analytics And The Benefits To Companies
PDF
Uncover security incidents with ESET Enterprise Inspector
PDF
Data Analytics in Cyber Security - Intellisys 2015 Keynote
PDF
5 Key Findings on Advanced Threats
PPTX
The mobile health IT security challenge: way bigger than HIPAA?
PPTX
Cognitive Computing in Security with AI
DOCX
8 threats that even antivirus cannot catch
PDF
Infographic: Mobile Security Research
PDF
Data Security in Healthcare
PDF
Penetration testing 5 reasons Why Organizations Should Adopt it
PPTX
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
DOCX
UserEntityandBehaviorAnalyticsFriedman
PPTX
Healthcare IT Security Threats & Ways to Defend Them
PDF
Medical device cybersecurity
PDF
Device discovery for vulnerability assessment: Automating the Handoff
PDF
What makes OSINT Methodologies Vital for Penetration Testing?
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PPT
Footprintig(Haching)
2019 04-18 -DevSecOps-software supply chain
User Behavior Analytics And The Benefits To Companies
Uncover security incidents with ESET Enterprise Inspector
Data Analytics in Cyber Security - Intellisys 2015 Keynote
5 Key Findings on Advanced Threats
The mobile health IT security challenge: way bigger than HIPAA?
Cognitive Computing in Security with AI
8 threats that even antivirus cannot catch
Infographic: Mobile Security Research
Data Security in Healthcare
Penetration testing 5 reasons Why Organizations Should Adopt it
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
UserEntityandBehaviorAnalyticsFriedman
Healthcare IT Security Threats & Ways to Defend Them
Medical device cybersecurity
Device discovery for vulnerability assessment: Automating the Handoff
What makes OSINT Methodologies Vital for Penetration Testing?
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Footprintig(Haching)
Ad

Similar to Open Source Insight: Securing Software Stacks, Election Security, FDA Pacemaker Recall (20)

PDF
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
PPTX
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
DOCX
The NIST Cybersecurity Framework
PDF
Cybersecurity
PPTX
The New Data Security Risk
PDF
Top Solutions and Tools to Prevent Devastating Malware White Paper
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
PPTX
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
PDF
Understanding Cybersecurity in Medical Devices and Applications
PPTX
Introduction to cyber security
PPTX
Open Source Insight: Synopsys Moves into Open Source Security with Black Duck...
PDF
Cisco 2014 Midyear Security Report
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PPTX
Cyber security with ai
PDF
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
PDF
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
The NIST Cybersecurity Framework
Cybersecurity
The New Data Security Risk
Top Solutions and Tools to Prevent Devastating Malware White Paper
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Understanding Cybersecurity in Medical Devices and Applications
Introduction to cyber security
Open Source Insight: Synopsys Moves into Open Source Security with Black Duck...
Cisco 2014 Midyear Security Report
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Cyber security with ai
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Ad

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PDF
Open Source Rookies and Community
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
PDF
20 Billion Reasons for IoT Security
PPTX
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Open-Source- Sicherheits- und Risikoanalyse 2018
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - From Protex to Hub
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Rookies and Community
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
20 Billion Reasons for IoT Security
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PPTX
Machine Learning_overview_presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
Machine Learning_overview_presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing

Open Source Insight: Securing Software Stacks, Election Security, FDA Pacemaker Recall

  • 1. Open Source Insight: Securing Software Stacks, Election Security, FDA Pacemaker Recall By Fred Bals | Senior Content Writer/Editor
  • 2. Cybersecurity News This Week News is slight as the US prepares to bore into the Labor Day weekend and the unofficial end of Summer 2017. Yet our crack staff of editors has scoured the Webbernets to produce the best in cybersecurity and open source security news for your reading pleasure. Enjoy, and if you celebrate Labor Day, have a great holiday weekend!
  • 3. • The Hidden Threat Lurking in an Otherwise Secure Software Stack • Open Source Software Won't Ensure Election Security • If Machine Learning is the question, open source is the answer. Right? • FDA Recalls 465K Pacemakers Tied to MedSec Research • Three Reasons Why The Cybersecurity Industry May Never Catch Up To Cybercrime • Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott's (formerly St. Jude Medical's) Implantable Cardiac Pacemakers: FDA Safety Communication • What Software Teams Can Learn from Building Radar Detectors Open Source News
  • 4. The Hidden Threat Lurking in an Otherwise Secure Software Stack via The ServerSide: Summary: Is there a hidden threat buried in your software stack? Is there a hidden threat embedded within your Docker container? It's certainly not a prospect that lives outside of the realm of possibility, especially if you're not 100% sure as to exactly how the various open source components that make up your software stack or your container image were derived. "One of the aspects of open source is that it can be forked," said Tim Mackey, the Technical Evangelist for Black Duck Software.
  • 5. via LawFare: The technology behind elections is hard to get right. Elections require security. They also require transparency: anyone should be able to observe enough of the election process, from distribution of ballots, to the counting and canvassing of votes, to verify that the reported winners really won. But if people vote on computers or votes are tallied by computers, key steps of the election are not transparent and additional measures are needed to confirm the results. Open Source Software Won't Ensure Election Security
  • 6. If Machine Learning is the question, open source is the answer. Right? via Tech Republic: #7 - Not patching immediately Companies often spend thousands of dollars on security solutions, only to have them bypassed by something as simple as not applying a security patch right away.
  • 7. via Threatpost: The United States Federal Drug Administration is recalling 465,000 pacemakers that attackers can gain unauthorized access to issue commands, change settings and maliciously disrupt. Affected are four models manufactured by Abbott Laboratories. FDA Recalls 465K Pacemakers Tied to MedSec Research
  • 8. Three Reasons Why The Cybersecurity Industry May Never Catch Up To Cybercrime via Forbes: Is the cybersecurity industry keeping up with cybercrime? Absolutely not. Cyberwarfare is at an all-time high, and cybersecurity is just unable—unequipped—to keep up. We’re seeing a convergence of three major vectors—devices, data, and a shortage of talent—coming to a head. That’s causing an explosion of what I’ll refer to as “cybercrime opportunity.”
  • 9. via FDA: On August 23, 2017, the FDA approved a firmware update that is now available and is intended as a recall, specifically a corrective action, to reduce the risk of patient harm due to potential exploitation of cybersecurity vulnerabilities for certain Abbott (formerly St. Jude Medical) pacemakers. "Firmware" is a specific type of software embedded in the hardware of a medical device (e.g. a component in the pacemaker). Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott's (formerly St. Jude Medical's) Implantable Cardiac Pacemakers: FDA Safety Communication
  • 10. What Software Teams Can Learn from Building Radar Detectors via Black Duck blog (Mike Pittenger): Twenty years ago, a software parts list would have seemed ludicrous. All software was built from scratch, and every code base was unique. Today, however, a software bill of materials is critical to organizations, for many of the same reasons they are required in radar detectors.
  • 11. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.