
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Locky Ransomware Was Pushed Alongside FakeGlobe in Upgraded Spam Campaigns
Locky is a notorious ransomware that was first detected in 2016 and has continued to evolve and spread through different methods. A thorough look at samples from recent campaigns shows that cybercriminals are using sophisticated distribution methods, affecting users in more than 70 countries.
Next Steps to Take in the Wake of the Equifax Data Breach
Unfortunately, much of the information that has been stolen from Equifax is very hard if not impossible to replace. This means you will have to keep a close eye on your accounts to see if anyone is trying to use your name and details fraudulently. Here’s what you need to know.
NotPetya Cyberattack on TNT Express Cost FedEx $300 Million
Falling victim to the Petya cyberattack cost FedEx around $300 million during the last quarter of the financial year. While no data breach or data loss occurred as a result of Petya, the company previously warned that it may not be able to recover all of the systems affected by the cyberattack.
Top Tech Vendors Were Targeted by CCleaner Malware
A sophisticated supply chain attack which inserts malware into the software of the popular performance optimization tool CCleaner, was designed to target several major technology firms. The initial attack affected 2.27 million CCleaner customers, meaning the collateral damage was huge.
U.S. SEC Says Hackers May Have Traded Using Stolen Insider Information
The top U.S. markets regulator said on Wednesday that hackers accessed its corporate disclosure database and may have illegally profited by trading on the insider information stolen. The SEC said the hack occurred in 2016 but that it had only discovered last month.
Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks
An attack scenario, codenamed HVACKer, shows how heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target’s isolated network.
Make IoT Device Security a Priority at Home
As individuals continue to increase the number of IoT devices they are bringing into their homes, it’s important to address the security risks posed by IoT devices at home and be informed on how to keep their devices secure.
Trend Micro Announced Winners of the New Brunswick Video Contest
The video contest was a special version of Trend Micro’s popular What’s Your Story competition, which asks students and schools to create original, thought-provoking videos addressing key aspects of internet safety and security.
Support Healthcare Organizations Through IT Recovery
Trend Micro is helping healthcare organizations ensure that proper controls are in place to protect all systems within hospitals. The company works closely with providers to deliver leading edge and easy to manage security systems that protect the network, servers and end points in hospitals all over the world.
Protect Against New Ransomware Threats with Best Practices
Ransomware continues to be a top cybersecurity threat, and remaining educated about the latest threats is a beneficial step toward proactive protection. This week, Trend Micro has highlighted emerging threats and provides best practices for protection against ransomware.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.