{"id":13964,"date":"2018-11-30T09:00:04","date_gmt":"2018-11-30T17:00:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/30\/news-7731\/"},"modified":"2018-11-30T09:00:04","modified_gmt":"2018-11-30T17:00:04","slug":"news-7731","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/30\/news-7731\/","title":{"rendered":"This Week in Security News: Ethics and Law in the Dark Web"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 30 Nov 2018 15:49:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. \u00a0This week, learn how Trend Micro software can aid in safely securing containers on the AWS Cloud<em>. <\/em>Also, how the dark web has become a new advertising medium for practitioners of law.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/securing-containers-in-the-aws-cloud-with-trend-micro\/\">Securing Containers in The AWS Cloud with Trend Micro<\/a><\/strong><\/p>\n<p><em>Dynamic environments require security that integrates with CI\/CD pipelines, provides runtime protection for Docker and Kubernetes, and protection for inter-container traffic.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/middle-east-north-africa-cybercrime-ups-its-game\/d\/d-id\/1333354\">Middle East, North Africa Cybercrime Ups Its Game<\/a><\/strong><\/p>\n<p><em>Ransomware infections increased by 233% this past year in the Middle East and North Africa as part of a shift toward more savvy and aggressive cybercrime operations in a region.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/todays-data-breach-environment-an-overview\/\">Today\u2019s Data Breach Environment: An Overview<\/a><\/strong><\/p>\n<p><em>Leveraging data from Privacy Rights Clearinghouse, Trend Micro researchers discovered that overall, there has been a 16 percent increase in mega breaches compared to 2017.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.ectnews.com\/story\/85707.html\">DoJ Takes Down Online Ad Fraud Ring, Indicts 8<\/a><\/strong><\/p>\n<p><em>The U.S. Department of Justice revealed an unsealed indictment of eight defendants for crimes related to their involvement in widespread digital advertising fraud.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/water-and-energy-sectors-through-the-lens-of-the-cybercriminal-underground\/\">Water and Energy Sectors Through the Lens of the Cybercriminal Underground<\/a><\/strong><\/p>\n<p><em>As organizations in critical sectors (CI) like water and energy continue to incorporate the industrial internet of things (IIoT) in their operations, they should start with security in mind.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/atrium-health-data-breach-exposed-2-65-million-patient-records\/\">Atrium Health Data Breach Exposed 2.65 Million Patient Records<\/a><\/strong><\/p>\n<p><em>Atrium Health has revealed a data breach which exposed information belonging to roughly 2.65 million patients.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/uncovering-the-truth-about-corporate-iot-security\">Uncovering the Truth About Corporate IoT Security<\/a><\/strong><\/p>\n<p><em>Trend Micro looks at IoT projects being driven by global organizations, their key challenges and perceived threats, and hard data outlining the frequency and type of attacks they\u2019ve experienced.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cnbc.com\/2018\/11\/27\/uber-fined-more-than-1-million-dollars-by-uk-and-dutch-authorities.html\">Uber Fined Nearly $1.2 Million by British and Dutch Authorities for 2016 Data Breach<\/a><\/strong><\/p>\n<p><em>Uber was fined a combined $1.17 million by British and Dutch authorities for a 2016 data breach and cover-up that exposed the personal details of millions of customers.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/automating-security-continuous-monitoring-and-auditing-in-devops\">Automating Security, Continuous Monitoring, and Auditing in DevOps<\/a><\/strong><\/p>\n<p><em>DevOps entails pivotal shifts, like the way monitoring and auditing are carried out. As requirements deploying applications change, the requisites for monitoring and auditing also change.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cbronline.com\/news\/aws-containers-competency\">AWS Doubles Down on Containers, Launches MicroVM Manager<\/a><\/strong><\/p>\n<p><em>At re:Invent, AWS announced its new Container Competency Program and the addition of 160+ new container-based products to its Amazon Marketplace software catalogue.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ethics-need-not-apply-the-dark-side-of-law\">Ethics Need Not Apply: The Dark Side of Law<\/a><\/strong><\/p>\n<p><em>In the course of Trend Micro\u2019s research, we saw that lawyers were offering legitimate legal advice in matters related to family law, criminal law, real estate law, and business.<\/em><\/p>\n<p>Did the findings of Privacy Rights Clearinghouse surprise you? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ethics-and-law-in-the-dark-web\/\">This Week in Security News: Ethics and Law in the Dark Web<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ethics-and-law-in-the-dark-web\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 30 Nov 2018 15:49:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. \u00a0This week, learn how Trend Micro software can aid in safely securing containers on the AWS Cloud. Also, how the dark web has become a new advertising medium for&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ethics-and-law-in-the-dark-web\/\">This Week in Security News: Ethics and Law in the Dark Web<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[20291,10422,20292,12512,714],"class_list":["post-13964","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-aws-cloud","tag-current-news","tag-darkweb","tag-iiot","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13964"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13964\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13964"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}