{"id":13087,"date":"2018-08-13T09:10:15","date_gmt":"2018-08-13T17:10:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/13\/news-6854\/"},"modified":"2018-08-13T09:10:15","modified_gmt":"2018-08-13T17:10:15","slug":"news-6854","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/13\/news-6854\/","title":{"rendered":"A week in security (August 6 \u2013 12)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000<\/strong><\/p>\n<p>Last week, we published a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/08\/exploit-kits-summer-2018-review\/\" target=\"_blank\" rel=\"noopener\">review of exploit kits<\/a>, talked about everyday tech that can <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/08\/8-everyday-technologies-that-can-make-you-vulnerable-to-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">give you a headache<\/a>, and showed how to <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/08\/protect-rdp-access-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">protect RDP access<\/a> from ransomware. We also published a study on the <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/white-hat-black-hat-emergence-gray-hat-true-costs-cybercrime\/\" target=\"_blank\" rel=\"noopener\">true cost of cybercrime<\/a>.<\/p>\n<h3>Other news:<\/h3>\n<ul>\n<li>Discovered at Black Hat: WhatsApp &#8220;<a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/09\/whatsapp_message_manipulation\/\" target=\"_blank\" rel=\"noopener\">message manipulation<\/a>&#8221; (Source: The Register)<\/li>\n<li>Discovered at Black Hat: <a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/09\/neural_network_malware\/\" target=\"_blank\" rel=\"noopener\">AI attacks<\/a> (Source: The Register)<\/li>\n<li>Once again, discovered at Black Hat: <a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/09\/meltdown_spectre_cert_timing\/\" target=\"_blank\" rel=\"noopener\">Meltdown panel<\/a> (Source: The Register)<\/li>\n<li>Indeed, discovered at Black Hat: <a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/10\/mobile_pos_insecurity\/\" target=\"_blank\" rel=\"noopener\">Mobile payment bugs<\/a> (Source: The Register)<\/li>\n<li>PGA <a href=\"https:\/\/golfweek.com\/2018\/08\/08\/hackers-target-pga-servers-seek-bitcoin-ransom\/\" target=\"_blank\" rel=\"noopener\">ransomware attack<\/a> right before Ryder Cup (Source: Golf Week)<\/li>\n<li>Steer clear of <a href=\"https:\/\/blog.apnic.net\/2018\/08\/07\/discovering-evasive-code-in-malicious-websites\/\" target=\"_blank\" rel=\"noopener\">evil JavaScript<\/a> (Source: APNIC)<\/li>\n<li>Adding bugs to <a href=\"https:\/\/arxiv.org\/pdf\/1808.00659.pdf\" target=\"_blank\" rel=\"noopener\">deter attackers<\/a> [PDF] (Source: Arxiv)<\/li>\n<li>Botnets and <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/08\/09\/botnet-smart-irrigation-systems\/\" target=\"_blank\" rel=\"noopener\">irrigation systems<\/a> (Source: Help Net Security)<\/li>\n<li>Hunting <a href=\"https:\/\/duo.com\/assets\/pdf\/Duo-Labs-Dont-At-Me-Twitter-Bots.pdf\" target=\"_blank\" rel=\"noopener\">Twitter bots<\/a> at scale (Source: Duo Security)<\/li>\n<li>Google to warn of <a href=\"https:\/\/gsuiteupdates.googleblog.com\/2018\/08\/control-government-backed-attack-alerts.html\" target=\"_blank\" rel=\"noopener\">government-backed attacks<\/a> (Source: G Suite)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-august-6-12\/\">A week in security (August 6 \u2013 12)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-august-6-12\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-august-6-12\/' title='A week in security (August 6 \u2013 12)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'> A round-up of the security news from August 6 \u2013 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ctnt-report\/\" rel=\"tag\">CTNT report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime\/\" rel=\"tag\">cybercrime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/meltdown\/\" rel=\"tag\">Meltdown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rdp\/\" rel=\"tag\">rdp<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/recap\/\" rel=\"tag\">recap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/true-cost-of-cybercrime\/\" rel=\"tag\">true cost of cybercrime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter-bots\/\" rel=\"tag\">twitter bots<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whatsapp-javascript\/\" rel=\"tag\">whatsapp. javascript<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-august-6-12\/' title='A week in security (August 6 \u2013 12)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-august-6-12\/\">A week in security (August 6 \u2013 12)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,18050,4503,10528,14989,3765,18324,10503,10497,19198,14290,10498,10506,19199],"class_list":["post-13087","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-ctnt-report","tag-cybercrime","tag-exploit-kits","tag-meltdown","tag-ransomware","tag-rdp","tag-recap","tag-security-world","tag-true-cost-of-cybercrime","tag-twitter-bots","tag-week-in-security","tag-weekly-blog-roundup","tag-whatsapp-javascript"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13087"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13087\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13087"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}