TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 11, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 15 Jun 2018 12:39:57 +0000

As a native Texan, I’ve seen more than my fair share of bugs – actual physical bugs that love the hot, humid Texas climate and my curly hair for some reason. The Zero Day Initiative (ZDI) sees many bugs (of the software variety), including those that affect SCADA control systems. Fritz Sands recently walked through…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 11, 2018 appeared first on .

Read more

Celebrating the life of Tamir Segal

Credit to Author: Trend Micro| Date: Fri, 15 Jun 2018 13:29:39 +0000

Trend Micro may be a global organization of more than 5,000 employees, but we’re also a tight-knit family. So it was with great sadness and shock that we heard of the passing of Tamir Segal, who has served as our Israel Country Manager for the past eight years. Our thoughts and prayers are with his…

The post Celebrating the life of Tamir Segal appeared first on .

Read more

This Week in Security News: Cyber Leads and Email Frauds

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Jun 2018 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 “email fraudsters” on Monday. Read…

The post This Week in Security News: Cyber Leads and Email Frauds appeared first on .

Read more

Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

Credit to Author: Trend Micro| Date: Thu, 14 Jun 2018 13:04:32 +0000

Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network device’s credentials (e.g., your router), to make it less open…

The post Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked? appeared first on .

Read more

Security In A DevOps World

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 13 Jun 2018 16:44:37 +0000

Security-focused Definition of DevOps

[Originally presented at the Gartner Security & Risk Management Summit 2018, “Security In A DevOps World” examines the challenges and benefits of integrating security technology and thinking into the development process at the early stages. The slides are designed to assist in the presentation of the material but they also might come in handy as…

The post Security In A DevOps World appeared first on .

Read more

Extending Trend Micro’s Container Protection with Deep Security Smart Check

Credit to Author: David Clement| Date: Wed, 13 Jun 2018 13:42:51 +0000

While DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations.  DevOps teams are prime to build new applications for business growth, and help facilitate the extension of critical monolithic applications into modern architectures. A key tenant of this philosophy is microservices which is an application…

The post Extending Trend Micro’s Container Protection with Deep Security Smart Check appeared first on .

Read more

Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check

Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000

Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security throughout. To simplify this…

The post Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check appeared first on .

Read more

AWS Invites Trend Micro to Give a Sneak Peek Of Our New Stuff

Credit to Author: Trend Micro| Date: Mon, 11 Jun 2018 13:52:35 +0000

You can tell a lot by the company someone keeps. This is one of many reasons we are so proud to have been invited to present at an Amazon event today. Amazon is hosting an EKoS Day in San Francisco and will be highlighting their newly launched Amazon EKS offering. We are giving a sneak…

The post AWS Invites Trend Micro to Give a Sneak Peek Of Our New Stuff appeared first on .

Read more

Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked

Credit to Author: Trend Micro| Date: Mon, 11 Jun 2018 13:00:39 +0000

When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining zombie. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other…

The post Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked appeared first on .

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 4, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 08 Jun 2018 15:12:05 +0000

It was a busy day yesterday, with Adobe issuing four emergency patches for their Flash Player, including one for a zero-day being actively exploited in the wild. Adobe has indicated that CVE-2018-5002 was discovered being used in limited, targeted attacks on Windows users in the wild. The attacks use Microsoft Office documents embedded with malicious…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 4, 2018 appeared first on .

Read more

This Week in Security News: HR and Heritage Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 08 Jun 2018 13:47:12 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the details of 92 million accounts for MyHertitage were discovered on a private server outside of the company. Also, companies using services from PageUp are notifying employees that…

The post This Week in Security News: HR and Heritage Hacks appeared first on .

Read more