{"id":11772,"date":"2018-03-16T06:00:17","date_gmt":"2018-03-16T14:00:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/16\/news-5542\/"},"modified":"2018-03-16T06:00:17","modified_gmt":"2018-03-16T14:00:17","slug":"news-5542","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/16\/news-5542\/","title":{"rendered":"This Week in Security News: The Cost of Being Unprepared"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Mar 2018 13:00:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a Georgia bill has the potential to threaten security researchers, and a new report says 77 percent of businesses lack a cybersecurity response plan.<\/p>\n<p>Read on to learn more.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/campaign-possibly-connected-muddywater-surfaces-middle-east-central-asia\/\"><strong>Campaign Possibly Connected to \u201cMuddyWater\u201d Surfaces in the Middle East and Central Asia<\/strong><\/a><\/p>\n<p><em>We discovered a new campaign targeting organizations in Turkey, Pakistan and Tajikistan that has some similarities with an earlier <\/em><a href=\"https:\/\/www.reuters.com\/article\/us-saudi-cyber\/saudi-agency-says-country-targeted-in-cyber-spying-campaign-idUSKBN1DK27M\"><em>campaign<\/em><\/a><em> named MuddyWater, which hit various industries in several countries, primarily in the Middle East and Central Asia.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/march-patch-tuesday-fixes-75-security-issues-drops-registry-key-requirement-in-windows-10\/\"><strong>March Patch Tuesday Fixes 75 Security Issues, Drops Registry Key Requirement in Windows 10<\/strong><\/a><\/p>\n<p><em>Microsoft\u2019s <\/em><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/6c8fa125-28f6-e711-a963-000d3a33a34d\"><em>Patch Tuesday<\/em><\/a><em> for March is an eventful one, with updates that comprise fixes for 75 security issues and a change of tack in its <\/em><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/a-rundown-of-microsoft-s-new-patch-deployment-process\"><em>patch deployment process<\/em><\/a><em> for Windows 10.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tropic-trooper-new-strategy\/\"><strong>Tropic Trooper\u2019s New Strategy<\/strong><\/a><\/p>\n<p><em>Tropic Trooper levels its campaigns against Taiwanese, Philippine, and Hong Kong targets, focusing on their government, healthcare, transportation, and high-tech industries.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/our-journey-to-gdpr-compliance-lessons-learned-on-our-way-to-may-25th\/\"><strong>Our Journey to GDPR Compliance: Lessons learned on our way to May 25th<\/strong><\/a><\/p>\n<p><em>With the European Union\u2019s GDPR date fast approaching, Trend Micro been working hard to make sure our already strong security culture and policies will align with the new regulation.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/securityintelligence.com\/privacy-laws-and-cybersecurity-sleuthing-when-worlds-collide\/\"><strong>Privacy Laws and Cybersecurity Sleuthing: When Worlds Collide<\/strong><\/a><\/p>\n<p><em>The pending GDPR and privacy laws could have a substantial impact on information regarding suspicious domains or potential cybercrime.<\/em><\/p>\n<p><a href=\"https:\/\/www.informationsecuritybuzz.com\/expert-comments\/georgia-anti-hacking-legislation-a-serious-threat-to-cyber-security-industry\/\"><strong>Georgia Anti-Hacking Legislation A Serious Threat To Cyber Security Industry<\/strong><\/a><\/p>\n<p><em>Security researchers are worried by the Senate Bill 315, created by Georgia Sen. Bruce Thompson, threatens to criminalize security researchers.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/03\/potent-malware-that-hid-for-six-years-spread-through-routers\/\"><strong>Potent Malware That Hid For Six Years Spread Through Routers<\/strong><\/a><\/p>\n<p><em>Researchers have discovered malware so stealthy it remained hidden for six years despite infecting at least 100 computers worldwide.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/detecting-attacks-that-exploit-meltdown-and-spectre-with-performance-counters\/\"><strong>Detecting Attacks that Exploit Meltdown and Spectre with Performance Counters<\/strong><\/a><\/p>\n<p><em>Exploits for the notorious <\/em><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/speculation-risky-understanding-meltdown-spectre\/\"><em>Meltdown and Spectre<\/em><\/a><em> vulnerabilities may still just be working <\/em><a href=\"https:\/\/www.techradar.com\/news\/new-meltdown-and-spectre-exploits-have-been-built-but-arent-in-the-wild-yet\"><em>proofs of concept<\/em><\/a><em> (PoC) or <\/em><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/we-may-soon-see-malware-leveraging-the-meltdown-and-spectre-vulnerabilities\/\"><em>reportedly<\/em><\/a><em> experimented on for now, but it\u2019s only a matter of time before threat actors fully weaponize them.<\/em><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2018\/03\/13\/global-business-spend-on-cybersecurity\/\"><strong>Global Business Spend On Cybersecurity To Grow 33% Over The Next 4 Years<\/strong><\/a><\/p>\n<p><em>New data has found that global business spend on cybersecurity solutions will grow by 33% over the next four years, reaching $134 billion annually by 2022.<\/em><\/p>\n<p><a href=\"https:\/\/www.washingtonpost.com\/news\/business\/wp\/2018\/03\/14\/former-equifax-executive-charged-with-insider-trading-ahead-of-data-breach\/?utm_term=.6b80d5b73491\"><strong>Former Equifax Executive Charged With Illegally Trading Before Massive Data Breach Was Made Public<\/strong><\/a><\/p>\n<p><em>Jun Ying, former CFO of a U.S. business unit of Equifax, has been charged with insider trading.<\/em><\/p>\n<p><a href=\"https:\/\/securityintelligence.com\/new-ponemon-report-too-many-organizations-dont-have-a-plan-to-respond-to-incidents\/\"><strong>New Ponemon Report: Too Many Organizations Don\u2019t Have a Plan to Respond to Incidents<\/strong><\/a><\/p>\n<p><em>A study revealed that 77 percent of respondents still lack a formal cybersecurity incident response plan.<\/em><\/p>\n<p><a href=\"https:\/\/www.popularmechanics.com\/technology\/security\/a18930168\/equifax-hack-time\/\"><strong>How Long Does It Take Hackers To Pull Off a Massive Job Like Equifax?<\/strong><\/a><\/p>\n<p><em>How to steal 143 million customer records without anybody noticing.<\/em><\/p>\n<p><a href=\"https:\/\/www.secureworldexpo.com\/industry-news\/the-story-behind-trend-micro-research-security-surprises-new-risk-trends-seen\"><strong>The Story Behind Trend Micro Research: Security Surprises, New Risk Trends Seen<\/strong><\/a><\/p>\n<p><em>The report covers ransomware&#8217;s bigger outbreaks, thriving BEC scams and crypto-related cybercrimes.<\/em><\/p>\n<p><a href=\"https:\/\/www.cbronline.com\/opinion\/breaches-costing-companies-much-money\"><strong>Breaches Are Costing Companies Much More Than Money<\/strong><\/a><\/p>\n<p><em>The GDPR is reminding business owners that they\u2019re responsible for protecting and controlling their data.<\/em><\/p>\n<p>Is your business prepared for a cybersecurity breach? Let me know your thoughts below, or follow me on Twitter: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-the-cost-of-being-unprepared\/\">This Week in Security News: The Cost of Being Unprepared<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-the-cost-of-being-unprepared\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Mar 2018 13:00:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a Georgia bill has the potential to threaten security researchers, and a new report says 77 percent of businesses lack a cybersecurity response plan. Read on to&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-the-cost-of-being-unprepared\/\">This Week in Security News: The Cost of Being Unprepared<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422],"class_list":["post-11772","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11772"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11772\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}