{"id":14844,"date":"2019-03-15T06:00:06","date_gmt":"2019-03-15T14:00:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/15\/news-8593\/"},"modified":"2019-03-15T06:00:06","modified_gmt":"2019-03-15T14:00:06","slug":"news-8593","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/15\/news-8593\/","title":{"rendered":"This Week in Security News: Security Vulnerabilities"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Mar 2019 12:13:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what critical approaches can protect your enterprise business from software vulnerabilities. Also, learn about vulnerabilities in IoT alarms that let hackers hijack cars.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-to-get-ahead-of-vulnerabilities-and-protect-your-enterprise-business\/\"><strong>How to get Ahead of Vulnerabilities and Protect your Enterprise Business<\/strong><\/a><\/p>\n<p><em>There are several critical approaches today\u2019s businesses and IT teams can take to safeguard their organization from software vulnerabilities.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/zmakk3\/researchers-find-critical-backdoor-in-swiss-online-voting-system\"><strong>Researchers Find Critical Backdoor in Swiss Online Voting System<\/strong><\/a><\/p>\n<p><em>Researchers have found a severe issue in the new Swiss internet voting system that they say would let someone alter votes undetected. They say it should put a halt to Switzerland\u2019s plan to roll out the system in real elections this year.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-slub-backdoor-uses-github-communicates-via-slack\/\"><strong>New SLUB Backdoor Uses GitHub, Communicates via Slack<\/strong><\/a><\/p>\n<p><em>Trend Micro recently came across a previously unknown malware that piqued interest in\u00a0finding how the malware was spread via water hole attacks and was connecting to the slack Platform.<\/em><\/p>\n<p><a href=\"https:\/\/www.wsj.com\/articles\/navy-industry-partners-are-under-cyber-siege-review-asserts-11552415553\"><strong>Navy, Industry Partners Are \u2018Under Cyber Siege\u2019 by Chinese Hackers, Review Asserts<\/strong><\/a><\/p>\n<p><em>The Navy and its industry partners are \u201cunder cyber siege\u201d by Chinese hackers and others who have stolen national security secrets in recent years, exploiting critical weaknesses that threaten the U.S.\u2019s standing as the world\u2019s top military power.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/a-machine-learning-model-to-detect-malware-variants\/\"><strong>A Machine Learning Model to Detect Malware Variants<\/strong><\/a><\/p>\n<p><em>When malware is difficult to discover, Trend Micro proposes a machine learning model that uses adversarial autoencoder and semantic hashing to find what bad actors try to hide.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.techradar.com\/news\/trend-micro-iot-brings-innovation-but-also-threats\"><strong>Trend Micro: IoT Brings Innovation, But Also Threats<\/strong><\/a><\/p>\n<p><em>The growth of 5G and the Internet of Things may be helping to bring smarter and more connected experiences and services around the world, but may also be exposing users to more security worries.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/vulnerabilities-in-smart-alarms-can-let-hackers-hijack-cars\"><strong>Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars<\/strong><\/a><\/p>\n<p><em>Vulnerabilities in third-party car alarms managed via their mobile applications were\u00a0uncovered\u00a0and seem to affect around 3 million cars that use these \u201csmart\u201d\u00a0internet-of-things\u00a0(IoT) devices.<\/em><\/p>\n<p><a href=\"https:\/\/www.cbsnews.com\/news\/facebook-sues-two-ukrainian-hackers-for-stealing-user-information-via-personality-quizzes\/\"><strong>Facebook Sues Ukrainian Hackers Who Stole User Info Via Personality Quizzes<\/strong><\/a><\/p>\n<p><em>Facebook filed a lawsuit against two Ukrainian nationals who allegedly used personality quizzes to steal user information from 63,000 people between 2016 and 2018, mostly in Russia.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/stackstorm-devops-software-vulnerability-cve-2019-9580-allows-remote-code-execution\"><strong>StackStorm DevOps Software Vulnerability CVE-2019-9580 Allows Remote Code Execution<\/strong><\/a><\/p>\n<p><em>Popular open-source DevOps automation software StackStorm was reported to have a critical vulnerability that could allow remote attackers to perform arbitrary commands on targeted servers.<\/em><\/p>\n<p>Do you think vulnerabilities in IoT car devices will decrease throughout the year? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-vulnerabilities\/\">This Week in Security News: Security Vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-vulnerabilities\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Mar 2019 12:13:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what critical approaches can protect your enterprise business from software vulnerabilities. Also, learn about vulnerabilities in IoT alarms that let hackers hijack cars. Read on: How&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-vulnerabilities\/\">This Week in Security News: Security Vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18063,21281,10422,18728,714,21282],"class_list":["post-14844","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-5g","tag-autoencoder","tag-current-news","tag-devops","tag-security","tag-stackstorm"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14844"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14844\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}