• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Current News   »   This Week in Security News: Facebook and Faxploits

This Week in Security News: Facebook and Faxploits

  • Posted on:August 24, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created by Russian operatives.

Read on:

Back to Basics: Why We Need to Encourage More Secure IoT Development

In cybersecurity, there’s a rule: It’s more effective to fix a problem in the development phase. Nowhere is this truer than in IoT, where devices may never be secured once they leave the production line.

Microsoft’s Anti-Hacking Efforts Make it an Internet Cop

Microsoft identified and forced the removal of fake internet domains mimicking conservative U.S. political institutions, which led Russian officials to accuse the company of an anti-Russian “witch hunt.”

How Digital Extortion Impacts Today’s Enterprises

As digital extortion attacks increase, it’s imperative that IT leaders are aware of these threats and the impacts they can have on overall company reputation and it’s relationships with partners and customers.

Experts Urge Rapid Patching of ‘Struts’ Bug

In September 2017, Equifax disclosed that a failure to patch one of its Internet servers against a pervasive software flaw — in a Web component known as Apache Struts — led to a breach that exposed personal data on 147 million Americans. 

DNC Says Hack Attack Was Actually Just a Cybersecurity Test

After initially reporting a potential cyberattack, the Democratic National Committee now believes its database of voters was the target of a third-party test of its cybersecurity.

AI and Machine Learning: Boosting Compliance and Preventing Spam

Trend Micro takes a closer look at AI and machine learning and the ways these approaches can support compliance with industry requirements and prevent spam messages.

Philips Reveals Code Execution Vulnerabilities in Cardiovascular Devices

Vulnerabilities have been discovered in multiple versions of Philips cardiovascular imaging devices.

Simplifying and Prioritizing Advanced Threat Response Measures

Trend Micro’s recently introduced Deep Security™, which will help IT security professionals understand more about the attacks on their networks.

Facebook Identifies New Influence Operations Spanning Globe

Facebook found and removed 652 fake accounts, pages and groups originating from Iran and Russia that were trying to mislead people around the world.

Phishing for Payroll: Nigerian National Convicted for Attempted Stealing of $6M+ via Phishing

After using phishing scams in an attempt to steal over $6 million from employees of several US colleges and universities, a Nigerian national was convicted on several charges.

Trend Micro Takes Multi-Pronged Approach to Narrowing the Gaping Cybersecurity Skills Gap

To alleviate the skills gap, barriers between software developers and IT operations must be broken down, and cybersecurity training must be applied to DevOps and across an organization.

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks

At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in HP OfficeJet All-in-One printers.

Do you think using AI and Machine Learning to boost compliance and prevent spam will be effective? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

Related posts:

  1. This Week in Security News: Scams and Security Risks
  2. This Week in Security News: Security Vulnerabilities
  3. This Week in Security News: Facebook and Feds
  4. This Week in Security News: Fake Apps & Malicious Bots

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.