{"id":13628,"date":"2018-10-19T09:00:05","date_gmt":"2018-10-19T17:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/19\/news-7395\/"},"modified":"2018-10-19T09:00:05","modified_gmt":"2018-10-19T17:00:05","slug":"news-7395","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/19\/news-7395\/","title":{"rendered":"This Week in Security News: Apex One\u2122 Release and Java Usage Tracker Flaws"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Oct 2018 15:48:46 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> enters as the evolution of Trend Micro\u2019s endpoint security solution for enterprise. Also, learn about Java Usage Tracker\u2019s new weakness and the conditions that enabled the exploit.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trend-micro-redefines-endpoint-security-with-apex-one\/\">Trend Micro Redefines Endpoint Security with Apex One<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/a><\/strong><\/p>\n<p><em>Apex One<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> combines a breadth of threat detection &amp; response capability with investigative features, in a single agent.<\/em><strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cve-2018-3211-java-usage-tracker-local-elevation-of-privilege-on-windows\/\">CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows<\/a><\/strong><\/p>\n<p><em>Trend Micro found design flaw\/weakness in Java Usage Tracker that can enable hackers to create arbitrary files, inject attacker-specified parameters, and elevate local privileges.\u00a0<\/em><\/p>\n<p><strong><a href=\"http:\/\/www.eweek.com\/security\/trend-micro-converges-edr-endpoint-security-protection-in-apex-one\">Trend Micro Converges EDR, Endpoint Security Protection in Apex One<\/a><\/strong><\/p>\n<p><em>Trend Micro announced its Apex One endpoint security offering, which integrates malware prevention technology with endpoint detection and response (EDR) capabilities.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2018\/10\/17\/the-cybersecurity-202-the-fda-is-embracing-ethical-hackers-in-its-push-to-secure-medical-devices\/5bc6156b1b326b7c8a8d1a01\/?utm_term=.a99bfe8e4cf5\">The FDA is Embracing Ethical Hackers in its Push to Secure Medical Devices<\/a><\/strong><\/p>\n<p><em>With medical device cyberattacks on the rise, the Food and Drug Administration is turning to ethical hackers to help regulators and manufacturers root out vulnerabilities.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2018\/10\/16\/post-brexit-britain-could-be-a-cybersecurity-nightmare-with-or-without-a-deal\/#ca9b8992a343\">Post-Brexit Britain Could Be A Cybersecurity Nightmare With Or Without A Deal<\/a><\/strong><\/p>\n<p><em>Whether or not the UK leaves the EU with a Brexit deal, the impact upon cybersecurity and the skills shortage is likely to be considerable and immediate.<\/em><\/p>\n<p><strong><a href=\"https:\/\/betanews.com\/2018\/10\/17\/cybersecurity-worldwide-skills-shortage\/\">Cybersecurity Faces a Worldwide Shortage of Almost 3 Million Staff<\/a><\/strong><\/p>\n<p><em>New research reveals a worldwide cybersecurity skills gap of 2.9 million, with the Asia-Pacific region experiencing the highest shortage at 2.14 million. \u00a0\u00a0\u00a0\u00a0\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/facebook-tentatively-concludes-recent-hack-was-perpetrated-by-spammers-1539821869\">Facebook Finds Hack Was Done by Spammers, Not Foreign State<\/a><\/strong><\/p>\n<p><em>Facebook believes that the hackers who gained access to the private information of 30 million users were spammers looking to make money through deceptive advertising.<\/em><\/p>\n<p>Do you think many organizations will discontinue tackling endpoint threats with two separate tools? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <u><a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/u><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apex-one-release-and-java-usage-tracker-flaws\/\">This Week in Security News: Apex One&#x2122; Release and Java Usage Tracker Flaws<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apex-one-release-and-java-usage-tracker-flaws\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Oct 2018 15:48:46 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One&#x2122; enters as the evolution of Trend Micro\u2019s endpoint security solution for enterprise. Also, learn about Java Usage Tracker\u2019s new weakness and the conditions that enabled&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apex-one-release-and-java-usage-tracker-flaws\/\">This Week in Security News: Apex One&#x2122; Release and Java Usage Tracker Flaws<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,714],"class_list":["post-13628","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13628"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13628\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13628"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}