{"id":13257,"date":"2018-09-03T08:10:28","date_gmt":"2018-09-03T16:10:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/03\/news-7024\/"},"modified":"2018-09-03T08:10:28","modified_gmt":"2018-09-03T16:10:28","slug":"news-7024","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/03\/news-7024\/","title":{"rendered":"A week in security (August 27 \u2013 September 2)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Sep 2018 15:00:36 +0000<\/strong><\/p>\n<p>Last week, we looked at <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/mobile-menace-monday-fakegift-is-the-gift-that-gives-frustration\/\">dubious antics in mobile land<\/a>, a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/official-cardi-b-website-plagued-by-spammers\/\">peculiar case of spam<\/a> on the official Cardi B website, and we deep dived into <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/08\/fileless-malware-getting-the-lowdown-on-this-insidious-threat\/\">fileless malware<\/a>. We also explored the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/08\/reversing-malware-in-a-custom-format-hidden-bee-elements\/\">inner workings of Hidden Bee<\/a>, and gave an explainer of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/08\/explained-regular-expression-regex\/\">Regex<\/a>.<\/p>\n<h3>Other cybersecurity news:<\/h3>\n<ul>\n<li>Huge <a href=\"http:\/\/www.xinhuanet.com\/english\/2018-08\/29\/c_137427355.htm\">data breach<\/a> affects Chinese hotel chain (Source: Xinhuanet)<\/li>\n<li>Cryptojacking doesn\u2019t bring in the <a href=\"https:\/\/arxiv.org\/pdf\/1808.09474.pdf\">big bucks<\/a> [PDF] (Source: Arxiv)<\/li>\n<li>\u201cFappening\u201d hacker <a href=\"https:\/\/www.justice.gov\/usao-ct\/pr\/north-branford-man-who-hacked-more-200-apple-icloud-accounts-sentenced-prison\">sentenced to prison<\/a> (Source: Justice.gov)<\/li>\n<li>Cobalt phishing campaign <a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/31\/cobalt_bank_hackers_phishing_campaign\/\">continues to spread<\/a> (Source: The Register)<\/li>\n<li>Sensitive <a href=\"https:\/\/wwws.nightwatchcybersecurity.com\/2018\/08\/29\/sensitive-data-exposure-via-wifi-broadcasts-in-android-os-cve-2018-9489\/\">data exposure<\/a> via wifi (Source: Nightwatch Cybersecurity)<\/li>\n<li>Poor patching practices on <a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2018\/08\/state-department-visa-analysis-system-wasnt-patched-or-scanned-viruses-audit-finds\/150917\/\">visa analysis system<\/a> (Source: Nextgov)<\/li>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/28\/west_ham_email_blunder\/\">CC email blunder<\/a> angers football fans (Source: The Register)<\/li>\n<li>Unusual login behaviour detected on <a href=\"https:\/\/www.aircanada.com\/ca\/en\/aco\/home\/book\/travel-news-and-updates\/2018\/notice-air-canada-mobile-app-users.html\">Air Canada\u2019s mobile app<\/a> (Source: Air Canada)<\/li>\n<li>The anatomy of <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/08\/31\/fake-news-bots\/\">fake news<\/a> (Source: Help Net Security)<\/li>\n<li>EU Telecoms <a href=\"https:\/\/www.enisa.europa.eu\/publications\/annual-report-telecom-security-incidents-2017\">security report<\/a> (Source: Enisa)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/week-security-august-27-september-2\/\">A week in security (August 27 \u2013 September 2)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/week-security-august-27-september-2\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Sep 2018 15:00:36 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/week-security-august-27-september-2\/' title='A week in security (August 27 \u2013 September 2)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'> A round-up of the security news from August 27 \u2013 September 2, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/email\/\" rel=\"tag\">email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eu-telecoms\/\" rel=\"tag\">eu telecoms<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-news\/\" rel=\"tag\">fake news<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacker\/\" rel=\"tag\">Hacker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/week-security-august-27-september-2\/' title='A week in security (August 27 \u2013 September 2)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/week-security-august-27-september-2\/\">A week in security (August 27 \u2013 September 2)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11222,19386,4724,11253,3764,10554,5897,10497,10498],"class_list":["post-13257","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-email","tag-eu-telecoms","tag-fake-news","tag-hacker","tag-malware","tag-mobile","tag-privacy","tag-security-world","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13257"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13257\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13257"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}