{"id":13682,"date":"2018-10-26T07:00:02","date_gmt":"2018-10-26T15:00:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/10\/26\/news-7449\/"},"modified":"2018-10-26T07:00:02","modified_gmt":"2018-10-26T15:00:02","slug":"news-7449","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/26\/news-7449\/","title":{"rendered":"This Week in Security News: Toll Fraud &amp; Small Business Struggles"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Oct 2018 14:00:27 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn why telecommunications fraud has turned into a multi-billion euro criminal industry. Also, understand what cybersecurity\u00a0struggles small businesses still face after the NIST Small Business Cybersecurity Act was implemented in August.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/safeguarding-the-nations-critical-infrastructure\/\"><strong>Safeguarding the Nation\u2019s Critical Infrastructure<\/strong><\/a><\/p>\n<p><em>Today\u2019s critical infrastructure vulnerability is better than it was 20 years ago, but far from adequate. There is still much that needs to be done.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/\"><strong>Small Businesses to Receive NIST Assistance: Overlooked Areas of the NIST Framework<\/strong><\/a><\/p>\n<p><em>As threat actors continue to act with rising sophistication and advanced attack techniques, it\u2019s an uphill battle for protection and prevention for small businesses with\u00a0limited resources and budgets.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/3314745\/security\/trend-micro-shines-a-light-on-its-new-cybersecurity-solutions.html\">Trend Micro\u00a0Shines a Light on Its New Cybersecurity Solutions<\/a><\/strong><\/p>\n<p><em>At its annual Trend Insights industry analyst event, Trend Micro provided an overview of its business, products and strategy.\u00a0\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/best-practices-for-endpoint-detection-and-response\/\"><strong>Best Practices for Endpoint Detection and Response<\/strong><\/a><\/p>\n<p><em>Take a closer look at detection and response, and how organizations can utilize best practices to bridge internal gaps and better ensure that key assets and the overarching network are safeguarded.\u00a0<\/em><\/p>\n<p class=\"title\"><a href=\"https:\/\/www.techrepublic.com\/article\/how-hacktivist-groups-pose-a-global-cybersecurity-threat\/#ftag=RSS-03-10aaa0b\"><strong>How hacktivist groups pose a global cybersecurity threat<\/strong><\/a><\/p>\n<div class=\"article-single\">\n<div class=\"article-single\">\n<p class=\"takeaway\"><em>Andrea Little Limbago, chief social scientist at Endgame, discusses hacktivist groups, cybersecurity trends, and how we can prepare for cyberattacks with CNET&#8217;s Dan Patterson.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><strong><a href=\"https:\/\/www.nytimes.com\/2018\/10\/23\/us\/politics\/russian-hacking-usa-cyber-command.html\">U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections<\/a><\/strong><\/p>\n<p><em>American operatives are messaging Russians working on disinformation campaigns to let them know they\u2019ve been identified.\u00a0<\/em><\/p>\n<p class=\"title\"><a href=\"https:\/\/www.techrepublic.com\/article\/82-of-security-pros-fear-hackers-using-ai-to-attack-their-company\/#ftag=RSS-03-10aaa0b\"><strong>82% of security pros fear hackers using AI to attack their company<\/strong><\/a><\/p>\n<div class=\"article-single\">\n<p><em>Artificial intelligence (AI) is poised to impact every industry in the near future\u2014including the lucrative business of malicious hacking and the cybersecurity industry working to defend against those attacks.<\/em><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malware-targeting-brazil-uses-legitimate-windows-components-wmi-and-certutil-as-part-of-its-routine\/\"><strong>Malware Targeting Brazil Uses Legitimate Windows Components WMI and CertUtil as Part of its Routine<\/strong><\/a><\/p>\n<p><em>Although the\u00a0WMIC\u00a0and\u00a0CertUtil\u00a0have been used in malware campaigns before, this attack integrates both files into its routine and adds even more anti-evasion layers.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/settingcontent-ms-can-be-abused-to-drop-complex-deeplink-and-icon-based-payload\/\"><strong>SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload<\/strong><\/a><\/p>\n<p><em>This technique shows that cybercriminals have many tools at their disposal to help them deploy an effective and complicated payload.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.engadget.com\/2018\/10\/19\/healthcare-gov-breach\/\">Healthcare.gov Security Breach Leaks Info for 75,000 People<\/a><\/strong><\/p>\n<p><em>Healthcare.gov, the federally operated health insurance marketplace, believes that files for as many as 75,000 people were breached.\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/toll-fraud-irsf-criminals-monetize-hacked-phones-iot-devices-telecom-fraud\"><strong>Toll Fraud, International Revenue Share Fraud and More: How Criminals Monetize Hacked Cellphones and IoT Devices for Telecom Fraud<\/strong><\/a><\/p>\n<p><em>Developments in technology, the industry and criminal capabilities have turned telecommunications fraud into a multi-billion euro criminal industry.<\/em><\/p>\n<p><a href=\"https:\/\/www.theverge.com\/2018\/10\/22\/18011138\/china-spy-chip-amazon-apple-super-micro-ceo-retraction\"><strong>Amazon Exec and Super Micro CEO Call for Retraction of Spy Chip Story<\/strong><\/a><\/p>\n<p><em>Apple, Amazon and Super Micro called for the retraction of a Bloomberg report that claimed Chinese spy chips were able to compromise their computer networks.<\/em><\/p>\n<p>Do you think law enforcement, the industry or regulators will begin to address solutions to telecommunications fraud in 2019? Why or why not?<\/p>\n<p>Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <u><a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/u><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-toll-fraud-small-business-struggles\/\">This Week in Security News: Toll Fraud &amp; Small Business Struggles<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-toll-fraud-small-business-struggles\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Oct 2018 14:00:27 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn why telecommunications fraud has turned into a multi-billion euro criminal industry. Also, understand what cybersecurity\u00a0struggles small businesses still face after the NIST Small Business Cybersecurity Act&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-toll-fraud-small-business-struggles\/\">This Week in Security News: Toll Fraud &amp; Small Business Struggles<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,4500,19959,714],"class_list":["post-13682","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cybersecurity","tag-nist-small-business-cybersecurity-act","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13682"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13682\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13682"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}