{"id":12035,"date":"2018-04-17T07:00:40","date_gmt":"2018-04-17T15:00:40","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5804\/"},"modified":"2018-04-17T07:00:40","modified_gmt":"2018-04-17T15:00:40","slug":"news-5804","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5804\/","title":{"rendered":"This Week in Security News: Corporate Vulnerability and Cyber Threats"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Apr 2018 13:00:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords.<\/p>\n<p>Read on to learn more.<\/p>\n<p><a href=\"http:\/\/money.cnn.com\/2018\/04\/05\/news\/companies\/sears-delta-data-breach\/index.html\"><strong>Sears and Delta Customer Data May Have Been Exposed in Cyberattack<\/strong><\/a><\/p>\n<p>CNNMoney exposes a customer data attack on Sears and Delta, with an unreported amount of potential victims.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-role-that-it-security-teams-need-to-play-in-connected-hospitals\/\"><strong>The Role That IT Security Teams Need to Play in Connected Hospitals<\/strong><\/a><\/p>\n<p><em>Joint research with HITRUST, Securing Connected Hospitals, highlights two aspects of the healthcare ecosystem that IT teams need to consider as part of their security strategy.<\/em><\/p>\n<p><a href=\"https:\/\/www.axios.com\/us-still-doesnt-have-cybersecurity-doctrine-6c5b4a1b-068e-49b6-a257-fe7e4f214d83.html\"><strong>The U.S. Still Doesn\u2019t Have a Cybersecurity Doctrine<\/strong><\/a><\/p>\n<p><em>Axios discusses the state of national cybersecurity and where the U.S. government needs to make progress in its plans.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-april-2-2018\/\"><strong>TippingPoint Threat Intelligence and Zero-Day Coverage<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><em>Mozilla patched a Pwn2Own vulnerability in less than 24 hours and other Zero-Day Coverage news. <\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/advancing-threat-protection-through-industry-leading-research\/\"><strong>Advancing Threat Protection Through Industry-Leading Research<\/strong><\/a><\/p>\n<p><em>At Trend Micro we\u2019ve been protecting our customers around the world for 30 years. So what\u2019s the secret to staying at the cutting edge of the industry for all this time?<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/microsofts-april-patch-tuesday-fixes-remote-code-execution-vulnerabilities-in-fonts-and-keyboard\/\"><strong>Microsoft\u2019s April Patch Tuesday Fixes Remote Code Execution Vulnerabilities in Fonts and Keyboards<\/strong><\/a><\/p>\n<p><em>Microsoft has rolled out its Patch Tuesday for April to address security issues in Internet Explorer (IE), Edge, ChakraCore, Visual Studio, Microsoft Office and Office Services and Web Apps.<\/em><\/p>\n<p><a href=\"https:\/\/www.foxbusiness.com\/markets\/cybersecurity-tips-how-companies-can-prevent-mass-data-breaches\"><strong>Cybersecurity Tips: How Companies Can Prevent Mass Data Breaches<\/strong><\/a><\/p>\n<p><em>Fox Business shares tips on how to prevent data breaches, and where the weaknesses lie in large companies.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/independent-lab-tests-again-prove-the-excellence-of-trend-micro-mobile-security-for-android\/\"><strong>Independent Lab Tests Again Prove the Excellence of Trend Micro Mobile Security for Android<\/strong><\/a><\/p>\n<p><em>For the fourth year in a row, as shown in AV Comparatives\u2019 Anti-Virus Comparative Android Test 2018, Trend Micro Mobile Security for Android shows it provides 100% protection against malware.<\/em><\/p>\n<p><a href=\"http:\/\/nationalcrimeagency.gov.uk\/news\/1325-new-cyber-threat-report-published\"><strong>New Cyber Threat Report Published<\/strong><\/a><\/p>\n<p><em>Criminals are launching more online attacks on UK businesses than ever before, it has been revealed in a report published to mark the start of the country\u2019s biggest cyber security conference.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/nist-cybersecurity-framework-series-part-5-recover\/\"><strong>NIST Cybersecurity Framework Series Part 5: Recover<\/strong><\/a><\/p>\n<p><em>A proactive approach to data security is an absolute must, but chief information security officers and their teams must also know how to respond to a threat when it is detected.<\/em><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2018\/04\/11\/detect-major-cybersecurity-incident\/\"><strong>How Many Can Detect a Major Cybersecurity Incident within an Hour?<\/strong><\/a><\/p>\n<p><em>Help Net Security shares statistics on the responsiveness of security teams across the world.<\/em><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3268227\/data-protection\/alternative-communications-planning-and-cybersecurity-incident-response.html\"><strong>Alternative Communications Planning and Cybersecurity Incident Response<\/strong><\/a><\/p>\n<p><em>CSO contributor Tara Swaminatha discusses the digital communications aspect of dealing with a cyYESbersecurity breach and the steps to take when your company is attacked.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/sharing-the-journey-to-gdpr-compliance\/\"><strong>Sharing the Journey to GDPR Compliance<\/strong><\/a><\/p>\n<p><em>Something which is rarely talked about is that the GDPR can be about the potential of being able to do more, enabling more business opportunities faster than ever before.<\/em><\/p>\n<p><a href=\"https:\/\/www.techrepublic.com\/article\/a-new-email-attack-could-infect-you-with-ransomware-and-steal-your-passwords\/\"><strong>A New Email Attack Could Infect You with Ransomware and Steal Your Passwords<\/strong><\/a><\/p>\n<p><em>A new outbreak of the Quant Loader trojan is tricking vulnerable users into opening malicious attachments that bypass browser security features.<\/em><\/p>\n<p><a href=\"https:\/\/www.businessnewsdaily.com\/8231-small-business-cybersecurity-guide.html\"><strong>Cybersecurity: A Small Business Guide<\/strong><\/a><\/p>\n<p><em>According to a\u00a0report by Verizon, 61% of data breach victims were small businesses.<\/em><em>\u00a0<\/em><\/p>\n<p>Did any of these findings surprise you? Share your thoughts below and be sure to follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-corporate-vulnerability-and-cyber-threats\/\">This Week in Security News: Corporate Vulnerability and Cyber Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-corporate-vulnerability-and-cyber-threats\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Apr 2018 13:00:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to learn&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-corporate-vulnerability-and-cyber-threats\/\">This Week in Security News: Corporate Vulnerability and Cyber Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422],"class_list":["post-12035","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12035"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12035\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12035"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}