{"id":14730,"date":"2019-03-01T08:00:13","date_gmt":"2019-03-01T16:00:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/03\/01\/news-8479\/"},"modified":"2019-03-01T08:00:13","modified_gmt":"2019-03-01T16:00:13","slug":"news-8479","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/01\/news-8479\/","title":{"rendered":"This Week in Security News: Instagram Hackers and Enterprise Threats"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Mar 2019 14:57:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/insecure-vpns-top-risks-and-symptoms-that-stronger-security-is-needed\/\"><strong>Insecure VPNs: Top risks and symptoms that stronger security is needed<\/strong><\/a><\/p>\n<p><em>While users hope and expect that VPNs will live up to their name and truly support a virtual and private connection, research shows that this is not always the case.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-cyber-command-operation-disrupted-internet-access-of-russian-troll-factory-on-day-of-2018-midterms\/2019\/02\/26\/1827fc9e-36d6-11e9-af5b-b51b7ff322e9_story.html?noredirect=on&amp;utm_term=.910d209f6acb\"><strong>U.S. Cyber Command Operation Disrupted Internet Access of Russian Troll Factory on Day of 2018 Midterms<\/strong><\/a><\/p>\n<p><em>The U.S. military blocked Internet access to an infamous Russian entity seeking to cause discord among Americans during the 2018 midterms.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/how-a-hacking-group-is-stealing-popular-instagram-profiles\/\"><strong>How a Hacking Group is Stealing Popular Instagram Profiles<\/strong><\/a><\/p>\n<p><em>Trend Micro found that targeting popular Instagram profiles has become a modus for a certain group of Turkish-speaking hackers through phishing attacks and digital extortion.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/attackers-continue-to-focus-on-users-well-worn-techniques\/d\/d-id\/1333960\"><strong>Attackers Continue to Focus on Users, Well-Worn Techniques<\/strong><\/a><\/p>\n<p><em>According to Trend Micro\u2019s 2018 Roundup Report, traditional attacks such as phishing and credential stuffing continue to dominate the threat landscape for most industries while well-known malware remain a threat for behind-the-curve companies.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/cve-2019-5736-runc-container-escape-vulnerability-provides-root-access-to-the-target-machine\"><strong>CVE-2019-5736: RunC Container Escape Vulnerability Provides Root Access to the Target Machine<\/strong><\/a><\/p>\n<p><em>CVE-2019-5736 is a vulnerability involving the runC runtime component, which is used for container platforms such as Docker and container orchestration platforms such as Kubernetes.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/congress-considers-a-national-standard-for-data-privacy\/\"><strong>Congress Considers a National Standard for Data Privacy<\/strong><\/a><\/p>\n<p><em>The conversations on nationwide data privacy rules kicked off with a\u00a0hearing in a subpanel of the House Energy and Commerce Committee.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unraveling-the-tangle-of-old-and-new-threats\"><strong>Caught in the Net: Unraveling the Tangle of Old and New Threats<\/strong><\/a><\/p>\n<p><em>Trend Micro saw a shift in cybercriminal strategies and lingering security threats. Enterprises faced a multitude of challenges, but careful study of these issues can present opportunities for improvement.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/techcrunch.com\/2019\/02\/25\/europe-is-prepared-to-rule-over-5g-cybersecurity\/\">Europe is Prepared to Rule Over 5G Cybersecurity<\/a><\/strong><\/p>\n<p><em>At Mobile World Congress, the European Commission\u2019s digital commissioner warned the mobile industry to expect it to act over security concerns attached to Chinese network equipment makers, including Huawei.<\/em><\/p>\n<p>Do you think there will be more attacks on high-profile social media accounts or influencers this year? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-instagram-hackers-and-enterprise-threats\/\">This Week in Security News: Instagram Hackers and Enterprise Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-instagram-hackers-and-enterprise-threats\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Mar 2019 14:57:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-instagram-hackers-and-enterprise-threats\/\">This Week in Security News: Instagram Hackers and Enterprise Threats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,4500,18681,21093,21094,714],"class_list":["post-14730","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cybersecurity","tag-kubernetes","tag-roundup-report","tag-runc-runtime","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14730"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14730\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}