{"id":12584,"date":"2018-06-15T07:00:01","date_gmt":"2018-06-15T15:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/15\/news-6353\/"},"modified":"2018-06-15T07:00:01","modified_gmt":"2018-06-15T15:00:01","slug":"news-6353","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/15\/news-6353\/","title":{"rendered":"This Week in Security News: Cyber Leads and Email Frauds"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Jun 2018 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 \u201cemail fraudsters\u201d on Monday.<\/p>\n<p>Read on to learn more.<strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/security-in-a-devops-world\/\"><strong>Security In A DevOps World<\/strong><\/a><\/p>\n<p><em>Originally presented at the Gartner Security &amp; Risk Management Summit 2018, \u201cSecurity In A DevOps World\u201d examines the challenges and benefits of integrating security technology.<\/em><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-containers-at-scale-amazon-eks-amazon-ecs-and-deep-security-smart-check\/\"><strong>Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check<\/strong><\/a><\/p>\n<p><em>Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"http:\/\/www.eweek.com\/development\/dockercon-2018-tech-news-roundup-for-day-1\"><strong>DockerCon 2018 Tech News Roundup for Day 1<\/strong><\/a><\/p>\n<p><em>5,000+ developers from around the globe are attending the DockerCon conference at Moscone West. Containers, Kubernetes scheduling and new-gen security to protect them are the main topics this week.<\/em><strong><em>\u00a0<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/dont-be-a-coinmining-zombie-part-1-getting-cryptojacked\/\"><strong>Don\u2019t Be a Coinmining Zombie \u2013 Part 1: Getting Cryptojacked<\/strong><\/a><\/p>\n<p><em>Trend Micro delves into cryptocurrency mining, and identifies three types of cryptojacking in use today.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/dont-be-a-coinmining-zombie-part-2-how-do-you-protect-yourself-from-being-cryptojacked\/\"><strong>Don\u2019t be a Coinmining Zombie \u2013 Part 2: How Do You Protect Yourself from being Cryptojacked?<\/strong><\/a><\/p>\n<p><em>Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/extending-trend-micros-container-protection-with-deep-security-smart-check\/\"><strong>Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check<\/strong><\/a><\/p>\n<p><em>DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations. DevOps teams build new applications for business growth, and extend critical monolithic applications into modern architectures.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-protecting-wi-fi-networks-against-hacking-and-eavesdropping\"><strong>Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping<\/strong><\/a><\/p>\n<p><em>There are existing vulnerabilities in Wi-Fi security protocols and hardware components introduced by manufacturers and widely abused by botnets. Read how to protect your company in our latest report.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2018\/06\/trump-administration-adds-top-cyber-ranks\/148974\/\"><strong>Trump Administration Adds to Top Cyber Ranks<\/strong><\/a><\/p>\n<p><em>The Senate confirmed a cyber lead at Homeland Security and Trump nominated a government veteran to lead cyber at the Energy Department.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/17-backdoored-docker-images-removed-from-docker-hub\/\"><strong>17 Backdoored Docker Images Removed From Docker Hub<\/strong><\/a><\/p>\n<p><em>The Docker team has pulled 17 Docker container images that have been backdoored and used to install reverse shells and cryptocurrency miners on users&#8217; servers for the past year.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/key-strategies-for-securing-the-hybrid-cloud\"><strong>Key Strategies for Securing the Hybrid Cloud<\/strong><\/a><\/p>\n<p><em>No matter what kind of setup they employ, organizations need to adhere to a very important principle of cloud security: shared responsibility.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.cyberscoop.com\/fbi-email-fraud-arrests-bec\/\"><strong>FBI Announces Arrest of 74 Email Fraudsters on Three Continents<\/strong><\/a><\/p>\n<p><em>The FBI on Monday, June 11<sup>th<\/sup> announced the arrest of 74 people across three continents for hijacking bank transfers using email fraud.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/online-privacy\/patients-and-privacy-gdpr-compliance-for-healthcare-organizations\"><strong>Patients and Privacy: GDPR Compliance for Healthcare Organizations<\/strong><\/a><\/p>\n<p><em>For the healthcare industry \u2014 which requires varied types of personal data \u2014 the GDPR is an opportunity to improve systems, policies, and processes to stay ahead of any potential threats.<\/em><\/p>\n<p>Are your Wi-Fi networks secured? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-cyber-leads-and-email-frauds\/\">This Week in Security News: Cyber Leads and Email Frauds<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-cyber-leads-and-email-frauds\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Jun 2018 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 \u201cemail fraudsters\u201d on Monday. Read&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-cyber-leads-and-email-frauds\/\">This Week in Security News: Cyber Leads and Email Frauds<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18726,11052,16415,10422,18728,12116,18681,18754],"class_list":["post-12584","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-containers","tag-cryptocurrency","tag-cryptojacking","tag-current-news","tag-devops","tag-gdpr","tag-kubernetes","tag-wi-fi-networks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12584"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12584\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12584"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}