{"id":14414,"date":"2019-01-25T08:00:02","date_gmt":"2019-01-25T16:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8166\/"},"modified":"2019-01-25T08:00:02","modified_gmt":"2019-01-25T16:00:02","slug":"news-8166","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8166\/","title":{"rendered":"This Week in Security News: Ransomware and Cyber Threats"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Jan 2019 14:00:09 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about new routines for encryption of JobCrypter ransomware<em>. <\/em>Also, understand how Emotet has managed to evolve into one of the most notorious cyber threats in existence.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/jobcrypter-ransomware-with-new-routines-for-encryption-desktop-screenshots\">Spotted: JobCrypter Ransomware Variant With New Encryption Routines, Captures Desktop Screenshots<\/a><\/strong><\/p>\n<p><em>A variant of\u00a0JobCrypter\u00a0ransomware\u00a0was observed by Trend Micro using new routines for encryption and features the ability to send a screenshot of the victim\u2019s desktop to an email address.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/for-industrial-robots-hacking-risks-are-on-the-rise-11548070202\">For Industrial Robots, Hacking Risks Are On the Rise<\/a><\/strong><\/p>\n<p><em>In the future, industrial robots may create jobs, boost productivity and spur higher wages. But one thing seems more certain for now: They\u2019re vulnerable to hackers.<\/em><\/p>\n<p class=\"post-headline \"><a href=\"https:\/\/www.businessinsider.com\/satya-nadella-on-gdpr-2019-1\"><strong>Microsoft CEO Satya Nadella made a global call for countries to come together to create new GDPR-style data privacy laws<\/strong><\/a><\/p>\n<p class=\"\"><em>Microsoft CEO Satya Nadella is a major proponent of the the recent European data regulation GDPR, which came into force in May 2018.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/protecting-critical-infrastructure-and-roadways-how-smart-cities-create-new-risks\/\">Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks<\/a><\/strong><\/p>\n<p><em>While advanced components to support utilities, critical infrastructure, and more can bring\u00a0numerous benefits, these solutions also open both urban and rural areas to new risks and cyber threats.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cyberscoop.com\/dhs-dns-directive-government-shutdown\/\">DHS Releases Emergency Order to Prevent DNS Hijacking<\/a><\/strong><\/p>\n<p><em>The Department of Homeland Security has issued a rare \u201cemergency\u201d directive ordering federal civilian agencies to secure the login credentials for their internet domain records out of concern that they could be vulnerable to cyberattacks.<\/em><\/p>\n<p><a href=\"https:\/\/securityintelligence.com\/as-byod-adoption-and-mobile-threats-increase-can-enterprise-data-security-keep-up\/\"><strong>As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?<\/strong><\/a><\/p>\n<p><em>While most security professionals have come to embrace \u2014 or, at least, accept \u2014 bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees\u2019 personal phones, tablets and laptops.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/going-in-depth-with-emotet-multilayer-operating-mechanisms\/\">Going In-depth with Emotet: Multilayer Operating Mechanisms<\/a><\/strong><\/p>\n<p><em>Over a period of just five years, Emotet has managed to evolve into one of the most notorious cyber threats in existence \u2013 one that causes incidents that cost up to\u00a0$1 million dollars to rectify.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/online-casino-group-leaks-information-on-108-million-bets-including-user-details\/\">Online Casino Group Leaks Information on 108 Million Bets, Including User Details<\/a><\/strong><\/p>\n<p><em>An online casino group has leaked information on over 108 million bets, including details about customers&#8217; personal information, deposits and withdrawals.<\/em><strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.theverge.com\/2019\/1\/21\/18191591\/google-gdpr-fine-50-million-euros-data-consent-cnil\">Google Fined \u20ac50 Million for GDPR Violation in France<\/a><\/strong><\/p>\n<p><em>France\u2019s data protection regulator, CNIL, has issued Google a \u20ac50 million fine (around $56.8 million USD) for failing to comply with its GDPR obligations.<\/em><em>\u00a0<\/em><\/p>\n<p class=\"title\"><a href=\"https:\/\/www.techrepublic.com\/article\/security-is-the-no-1-it-barrier-to-cloud-and-saas-adoption\/#ftag=RSS-03-10aaa0b\"><strong>Security is the no. 1 IT barrier to cloud and SaaS adoption<\/strong><\/a><\/p>\n<p><em>More than 70% of tech professionals said security spending has increased in the past year, according to a Ping Identity report.<\/em><\/p>\n<p><strong><a href=\"https:\/\/gizmodo.com\/millions-of-financial-records-leaked-at-texas-based-dat-1831996146\">Millions of Financial Records Leaked at Texas-Based Data Firm<\/a><\/strong><\/p>\n<p><em>More than a decade\u2019s worth of credit and mortgage records, many linked to some of the country\u2019s largest banks and lenders, was temporarily exposed online.<\/em><\/p>\n<p>What do you think are some other risks smart cities will create within the next years? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-and-cyber-threats\/\">This Week in Security News: Ransomware and Cyber Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-and-cyber-threats\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Jan 2019 14:00:09 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about new routines for encryption of JobCrypter ransomware. Also, understand how Emotet has managed to evolve into one of the most notorious cyber threats in existence&#8230;.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-and-cyber-threats\/\">This Week in Security News: Ransomware and Cyber Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,10629,15715,12116,20777,3765,714],"class_list":["post-14414","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cyberattacks","tag-emotet","tag-gdpr","tag-jobcrypter","tag-ransomware","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14414"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14414\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14414"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}