Software Integrity Blog


Ex-CIA employee insider threat, FlightTrader24 hack, and RedHat licenses

Weekly Security Mashup - June 26, 2018

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup episode.

What’s in this week’s Security Mashup episode, you ask?

Ex-CIA employee insider threat and how he was outed, insight into the FlightTrader24 hack, and what you need to know about the RedHat open source license copyright conundrum. Watch and learn more:


Ex-CIA employee charged with leak of classified CIA Vault 7 hacking tools

via Lawrence Abrams, BleepingComputer: Security evangelists are forever preaching that cyber threats don’t come just from the outside. That the “insider threat” is real. Sometimes an insider is just as malicious as an external hacker, with privileges and credentials that can do way more damage. And that is the allegation against ex-CIA agent Joshua Adam Schulte, age 29, who was indicted this past week. Watch and learn why this story is trending.

Flight tracker Flightradar24 hit by data breach

via Eduard Kovacs, SecurityWeek: Flightradar24 is very good at tracking flights, showing real-time aircraft flight information on a digital map. Security Week and others describe it as “a highly popular flight-tracking service based in Sweden.” But managing a significant data breach? Not so much. Watch this segment here.

Red Hat changes its open-source licensing rules

via Steven J. Vaughan-Nichols, ZDNet: You might think that those working with open source software wouldn’t have to worry about copyright violations. “Open,” you’d think, means open to everybody, without having to go through all the licensing and royalty requirements that govern most intellectual property. But you do need a license, and you can get in legal trouble if you don’t comply with its provisions. View this story here.

Stay up to date with the latest cybersecurity news, including insider threat risks, data breaches and more.
Subscribe to the Software Integrity blog now.


More by this author