{"id":17266,"date":"2019-12-20T08:00:07","date_gmt":"2019-12-20T16:00:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/12\/20\/news-11002\/"},"modified":"2019-12-20T08:00:07","modified_gmt":"2019-12-20T16:00:07","slug":"news-11002","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/20\/news-11002\/","title":{"rendered":"This Week in Security News: Microsoft vs. Amazon in the Cloud and Escalated Risk in the Oil and Gas Industry"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 20 Dec 2019 14:10:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity risk facing the oil and gas industry and its supply chain. Also, read about what Trend Micro\u2019s CEO, Eva Chen, has to say about Microsoft and Amazon\u2019s battle for cloud leadership.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-to-get-the-most-out-of-industry-analyst-reports\/\"><strong>How to Get the Most Out of Industry Analyst Reports<\/strong><\/a><\/p>\n<p><em>In this video blog, Trend Micro\u2019s Vice President of Cybersecurity, Greg Young, taps into his past experience at Gartner to explain how to discern the most value from industry analysts and help customers understand how to use the information.<\/em><\/p>\n<p><a href=\"https:\/\/www.channelfutures.com\/channel-programs\/top-gun-51-profile-trend-micros-jeff-van-natter-sees-distributors-as-key-to-reaching-new-partners\"><strong>Top Gun 51 Profile: Trend Micro\u2019s Jeff Van Natter Sees Distributors as Key to Reaching New Partners<\/strong><\/a><\/p>\n<p><em>In an interview with Channel Futures, Trend Micro\u2019s Jeff Van Natter explains why he believes distributors will continue to play an important role for Trend as it looks to expand its partner ecosystem.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-to-speed-up-a-slow-pc-running-windows-os\/\"><strong>How to Speed Up a Slow PC Running Windows OS<\/strong><\/a><\/p>\n<p><em>The first step to improving your Windows PC performance is to determine what\u2019s causing it to run slow. In this blog, learn about eight tips on how to fix a slow PC running Windows and how to boost your PC\u2019s performance. <\/em><\/p>\n<p><a href=\"https:\/\/www.businessinsider.com\/microsoft-amazon-aws-reinvent-execs-2019-12\"><strong>We Asked 13 Software Execs Whether Microsoft Can Topple Amazon in the Cloud, and They Say There&#8217;s a Chance but It&#8217;ll Be a Hard Battle<\/strong><\/a><\/p>\n<p><em>Business Insider talked to 13 executives at companies that partner with Microsoft and Amazon on cloud platforms for their take on the rivalry between the two, and whether Microsoft can win. In this article, read about what Trend Micro CEO Eva Chen has to say about the rivalry. <\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/ddos-attacks-and-iot-exploits-new-activity-from-momentum-botnet\/\"><strong>DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet<\/strong><\/a><\/p>\n<p><em>Trend Micro recently found notable malware activity affecting devices running Linux. Further analysis of the malware samples revealed that these actions were connected to a botnet called Momentum, which has been used to compromise devices and perform distributed denial-of-service (DDoS) attacks.<\/em><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2019\/12\/16\/oil-gas-industry-cybersecurity\/\"><strong>Oil and Gas Industry Risks Escalate, Cybersecurity Should Be Prioritized<\/strong><\/a><\/p>\n<p><em>The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected infrastructure, Trend Micro research reveals.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/christmas-themed-shopping-game-and-chat-apps-found-malicious-lure-users-with-deals\"><strong>Christmas-Themed Shopping, Game and Chat Apps Found Malicious, Lure Users with Deals<\/strong><\/a><\/p>\n<p><em>Security researchers caution Android users when downloading apps for shopping, games, and Santa video chats as they found hundreds of malicious apps likely leveraging the season to defraud unwitting <\/em><em>victims via command-and-control (C&amp;C) attacks, adware or \u201cexcessive or dangerous combinations of permissions,\u201d such as camera, microphone, contacts and text messages.<\/em><\/p>\n<p><a href=\"https:\/\/www.cnn.com\/2019\/12\/13\/us\/new-orleans-cyberattack-state-of-emergency\/index.html\"><strong>New Orleans Mayor Declares State of Emergency in Wake of City Cyberattack<\/strong><\/a><\/p>\n<p><em>New Orleans Mayor LaToya Cantrell declared a state of emergency last Friday after the city was hit by a cyberattack where phishing attempts were detected. Cantrell said the attack is similar to the July 2019 attack on the state level where <\/em>several school systems in Louisiana were attacked by malware<em>. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/credential-harvesting-campaign-targets-government-procurement-sites-worldwide\"><strong>Credential Harvesting Campaign Targets Government Procurement Sites Worldwide<\/strong><\/a><\/p>\n<p><em>Cybersecurity company Anomali uncovered a campaign that used 62 domains and around 122 phishing sites in its operations and targeted government procurement services in 12 countries, including the United States, Canada, Japan, and Poland. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/schneider-electric-patches-vulnerabilities-in-its-ecostruxure-scada-software-and-modicon-plcs\"><strong>Schneider Electric Patches Vulnerabilities in its EcoStruxure SCADA Software and Modicon PLCs<\/strong><\/a><\/p>\n<p><em>Schneider Electric released several advisories on vulnerabilities they have recently fixed in their EcoStruxure and Modicon products. Modicon M580, M340, Quantum and Premium programmable logic controllers (PLCs) were affected by three denial of service (DoS) vulnerabilities.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/fbot-aka-satori-is-back-with-new-peculiar-obfuscation-brute-force-techniques\"><strong>FBot aka Satori is Back with New Peculiar Obfuscation, Brute-force Techniques<\/strong><\/a><\/p>\n<p><em>Trend Micro recently observed that the Mirai-variant FBot, also known as Satori, has resurfaced. Analysis revealed that this malware uses a peculiar combination of XOR encryption and a simple substitution cipher, which has not been previously used by other IoT malware variants. Additionally, the credentials are not located within the executable binary \u2014 instead, they are received from a command-and-control (C&amp;C) server.<\/em><\/p>\n<p><a href=\"https:\/\/www.secureworldexpo.com\/industry-news\/15-cyber-threat-predictions-for-2020\"><strong>15 Cyber Threat Predictions for 2020<\/strong><\/a><\/p>\n<p><em>As 2020 nears, this article outlines the cyber threats that Trend Micro&#8217;s research team predicts will target organizations in the coming year, and why. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/negasteal-agent-tesla-now-gets-delivered-via-removable-drives-steals-credentials-from-becky-internet-mail\"><strong>Negasteal\/Agent Tesla Now Gets Delivered via Removable Drives, Steals Credentials from Becky! Internet Mail<\/strong><\/a><\/p>\n<p><em>Trend Micro recently spotted a Negasteal\/Agent Tesla variant that uses a new delivery vector: removable drives. The malware also now steals credentials from the applications FTPGetter and Becky! Internet Mail.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/into-the-battlefield-a-security-guide-to-iot-botnets\"><strong>Into the Battlefield: A Security Guide to IoT Botnets<\/strong><\/a><\/p>\n<p><em>The internet of things (IoT) has revolutionized familiar spaces by making them smarter. Homes, offices and cities are just some of the places where IoT devices have given better visibility, security and control. However, these conveniences have come at a cost: traditional cyberthreats also found a new arena for attacks and gave rise to realities like IoT botnets.<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p>What\u2019s your take on whether or not Microsoft can topple Amazon in the cloud? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-microsoft-vs-amazon-in-the-cloud-and-escalated-risk-in-the-oil-and-gas-industry\/\">This Week in Security News: Microsoft vs. Amazon in the Cloud and Escalated Risk in the Oil and Gas Industry<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-microsoft-vs-amazon-in-the-cloud-and-escalated-risk-in-the-oil-and-gas-industry\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 20 Dec 2019 14:10:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity risk facing the oil and gas industry and its supply chain. Also, read about what Trend Micro\u2019s CEO, Eva Chen, has to say about&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-microsoft-vs-amazon-in-the-cloud-and-escalated-risk-in-the-oil-and-gas-industry\/\">This Week in Security News: Microsoft vs. Amazon in the Cloud and Escalated Risk in the Oil and Gas Industry<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,714],"class_list":["post-17266","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17266"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17266\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17266"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}