{"id":12750,"date":"2018-07-09T10:10:03","date_gmt":"2018-07-09T18:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/09\/news-6518\/"},"modified":"2018-07-09T10:10:03","modified_gmt":"2018-07-09T18:10:03","slug":"news-6518","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/09\/news-6518\/","title":{"rendered":"A week in security (July 2 &#8211; July 8)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Jul 2018 17:00:00 +0000<\/strong><\/p>\n<p>Last week, we <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/obfuscated-coinhive-shortlink-reveals-larger-mining-operation\/\" target=\"_blank\" rel=\"noopener\">tracked back a large mining operation from their Coinhive shortlink<\/a>, we took a look at <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/07\/can-trust-online-project-management-tools\/\" target=\"_blank\" rel=\"noopener\">online project management tools<\/a>, we described a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/\" target=\"_blank\" rel=\"noopener\">new macro-less technique<\/a> to distribute malware, and talked about a <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/07\/mac-malware-targets-cryptomining-users\/\" target=\"_blank\" rel=\"noopener\">Mac malware that targets crypto-mining users<\/a>.<\/p>\n<h3>Other news:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2018\/07\/04\/huawei_enterprise_comms_kit_has_tls_crypto_bug\/\" target=\"_blank\" rel=\"noopener\">Huawei<\/a> enterprise comms kit has a TLS crypto bug. (Source: The Register)<\/li>\n<li>The <a href=\"https:\/\/www.wired.com\/story\/pentagon-dream-team-tech-savvy-soldiers\" target=\"_blank\" rel=\"noopener\">Pentagon<\/a> is building a dream team of tech-savvy soldiers. (Source: Wired)<\/li>\n<li>Some computer science academics ran an <a href=\"https:\/\/gizmodo.com\/these-academics-spent-the-last-year-testing-whether-you-1826961188?rev=1530032109839\" target=\"_blank\" rel=\"noopener\">experiment<\/a> to find out whether your phone is secretly listening to you. (Source: Gizmodo)<\/li>\n<li>Chrome and Firefox pull stylish add-on after a report it <a href=\"https:\/\/www.bleepingcomputer.com\/news\/software\/chrome-and-firefox-pull-stylish-add-on-after-report-it-logged-browser-history\/\" target=\"_blank\" rel=\"noopener\">logged browser history<\/a>. (Source: Bleeping Computer)<\/li>\n<li>A <a href=\"https:\/\/securelist.com\/to-crypt-or-to-mine-that-is-the-question\/86307\/\" target=\"_blank\" rel=\"noopener\">downloader that decides<\/a> how to infect the victim: with a cryptor or with a miner. (Source: SecureList)<\/li>\n<li><a href=\"https:\/\/www.scmagazine.com\/macro-based-malware-campaign-replaces-desktop-and-quick-launch-shortcuts-to-install-backdoor\/article\/778695\/\" target=\"_blank\" rel=\"noopener\">Macro-based malware<\/a> campaign replaces desktop and Quick Launch shortcuts to install backdoor. (Source: SCMagazine)<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/homeland-security-subpoenas-twitter-for-data-breach-finders-account\/\" target=\"_blank\" rel=\"noopener\">Homeland Security subpoenas Twitter<\/a> for data breach finder&#8217;s account. (Source: ZDNet)<\/li>\n<li>Ex-NSO employee caught selling stolen <a href=\"https:\/\/thehackernews.com\/2018\/07\/phone-hacking-tools-sale.html\" target=\"_blank\" rel=\"noopener\">phone hacking tool<\/a> for $50 Million. (Source: The Hacker News)<\/li>\n<li>A handful of giant companies are <a href=\"https:\/\/www.buzzfeed.com\/mattstoller2\/as-democracy-suffers-digital-dictators-are-seizing-power?utm_term=.upBgkvwEx5#.jaKDxQMqVz\" target=\"_blank\" rel=\"noopener\">centralizing control of the internet<\/a>. (Source: BuzzxFeed News)<\/li>\n<li><a href=\"https:\/\/www.databreaches.net\/eight-arrested-in-africa-based-cybercrime-and-business-email-compromise-conspiracy\/\" target=\"_blank\" rel=\"noopener\">Eight arrested<\/a> in Africa-based cybercrime and business email compromise conspiracy. (Source: DataBreaches.net)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-2-july-8\/\">A week in security (July 2 &#8211; July 8)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-2-july-8\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Jul 2018 17:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-2-july-8\/' title='A week in security (July 2 - July 8)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from July 2 &#8211; July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/crypto-mining\/\" rel=\"tag\">crypto mining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macro-less\/\" rel=\"tag\">macro-less<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/project-management\/\" rel=\"tag\">project management<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-2-july-8\/' title='A week in security (July 2 - July 8)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-2-july-8\/\">A week in security (July 2 &#8211; July 8)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15343,18893,14474,13053,10497,10498],"class_list":["post-12750","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-crypto-mining","tag-macro-less","tag-project-management","tag-roundup","tag-security-world","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12750"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12750\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12750"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}