Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Blackhole Exploit Kit introduced the lucrative but hazardous exploit-kit-ransomware combo with CryptoLocker back in 2013. Soon after, other exploit kits, like Angler, Neutrino, Magnitude, and Rig, followed suit. At least 18 percent of known ransomware families now arrive via exploit kits.
Cybercriminals disrupted the functioning of a nuclear power plant two to three years ago, reports Reuters, quoting Yukiya Amano, director of the International Atomic Energy Agency (IAEA). Amano was speaking on the seriousness of cyber threats and a need to tighten security during a visit to Germany.
Welcome to the first Trend Micro Zero Day Initiative (ZDI) monthly patch review blog. This month, we put additional context around the major security patches released from Microsoft and Adobe. What’s interesting this month is that five different CVEs are listed as being under active attack.
Like most companies that invest millions of dollars in research and development, we rely on our intellectual property (IP) rights – including software patents in rare cases. Unfortunately, for every real legitimate product company that brings a patent suit, there are many more suits brought by patent speculator entities.
Smartphones and tablets were already barred in fear of foreign eavesdroppers. The UK’s Tory government cabinet ministers have reportedly been officially banned from wearing Apple Watches to crucial meetings in case they’re compromised by Russian hackers.
Vera Bradley Inc. said Wednesday that payment cards used at its retail stores were potentially hacked over a two-month period this summer. The Fort Wayne, Ind., company, said some cards used at Vera Bradley store locations between July 25 and Sept. 23 may have been affected.
Trend Micro Forward-Looking Threat Researchers (FTR) published a new report, “The Cybercriminal Roots of Selling Online Gaming Currency” that details out the abuse by cybercriminals are perpetrating against the online gaming industry.
Web shops are unknowingly harboring malicious code that is stealing the credit card details of customers, suggests research. The code has been injected into the sites by cyberthieves, said Dutch developer Willem De Groot. He found the 5,925 compromised sites by scanning for the specific signature of the data-stealing code in website software.
It’s official. Foreign spies compromised Australia’s government networks last year, and they got at us through our weather division. The Australian Cyber Security Centre has confirmed that a 2015 attack on servers at Australia’s Bureau of Meteorology was conducted by a “foreign intelligence service.”
The Group of Seven industrial powers on Tuesday said they had agreed on guidelines for protecting the global financial sector from cyberattacks following a series of cross-border bank thefts by hackers. Policymakers have grown more worried about financial cyber security in the wake of numerous hacks of SWIFT.
What does the term ‘Next-generation’ endpoint protection or next-gen AV actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.