Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
For years, Apple was the gold standard when it came to cybersecurity while platforms like Microsoft were always under siege by cybercriminals. But those days are dwindling fast. Trend Micro noted that Apple is being targeted more than ever before by hackers.
Apache Struts is a free and open-source framework used to build Java web applications. We looked into past several Remote Code Execution (RCE) vulnerabilities reported in Apache Struts, and observed that in most of them, attackers have used Object Graph Navigation Language (OGNL) expressions.
Problems with hardcoded credentials are hitting consumer IoT devices, industrial SCADA devices, and even critical infrastructure. Despite the appeal on source code and firmware audition, this type of vulnerability recurs and threatens users’ privacy and data security.
Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the region’s cybercriminal ecosystem.
The attack, believed to be the first such on a state legislative party organization, was discovered on the morning of March 3. After malware infected the legislative party’s computer systems, the hackers demanded a ransom payment in bitcoin to remove the virus and unlock the files and data.
Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these threats has escalated.
Hospitals and other medical businesses have worked to adopt modern information technology, including electronic health records. But at the same time, they are falling behind in the cybersecurity needed to protect confidential patient data and networks.
Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our global threat intelligence resides and where we provide much of our protection capabilities for our customers.
In the top five major metros – New York, Los Angeles, Chicago, Houston, and Philadelphia – experienced cybersecurity engineers with more than eight years of experience are earning an average annual salary of $135,000.
This contest is about having a great message but also about being a good messenger. Let your friends, family, neighbors, classmates, and others know about your video. Share it on social media, websites, email, text, or in person!
We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release without a Beta! Why does this matter? Instead of being consulted after the fact, many lead customers were involved directly with shaping major features during development.
Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever been spilt. It has helped launch people’s careers, or at the very least, it has helped increase their notoriety. It’s been accused of crushing souls of fanbois and haters alike.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.