{"id":16321,"date":"2019-09-16T08:10:06","date_gmt":"2019-09-16T16:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/16\/news-10062\/"},"modified":"2019-09-16T08:10:06","modified_gmt":"2019-09-16T16:10:06","slug":"news-10062","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/09\/16\/news-10062\/","title":{"rendered":"A week in security (September 9 \u2013 15)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Sep 2019 15:35:21 +0000<\/strong><\/p>\n<p>Last week<span class=\"Apple-converted-space\">\u00a0 <\/span>on the Labs blog, we looked at <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/09\/300-shades-of-gray-a-look-into-free-mobile-vpn-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">free VPN offerings<\/a>, how malware can <a href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/09\/vital-infrastructure-emergency-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">hinder vital emergency services<\/a>, and explored how the Heartbleed vulnerability is <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2019\/09\/everything-you-need-to-know-about-the-heartbleed-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer\">still causing problems<\/a>. We also talked about a <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/09\/youtube-170m-settlement-over-coppa-infraction\/\" target=\"_blank\" rel=\"noopener noreferrer\">large FTC settlement<\/a> involving Google, and how to keep an eye out for <a href=\"https:\/\/blog.malwarebytes.com\/researchers-corner\/2019\/09\/hacking-with-aws-incorporating-leaky-buckets-osint-workflow\/\" target=\"_blank\" rel=\"noopener noreferrer\">leaky AWS buckets<\/a>.<\/p>\n<h3>Other cybersecurity news<\/h3>\n<ul>\n<li>The Cobalt Dickens group has returned <a href=\"https:\/\/www.secureworks.com\/blog\/cobalt-dickens-goes-back-to-school-again\" target=\"_blank\" rel=\"noopener noreferrer\">to cause trouble<\/a>. (Source: SecureWorks)<\/li>\n<li>Take a ticket\u2026for fraud: Researchers discover a huge database <a href=\"https:\/\/www.vpnmentor.com\/blog\/report-groupon-fraud\/\" target=\"_blank\" rel=\"noopener noreferrer\">tied to a ring of scammers<\/a>. (Source: VPN Mentor)<\/li>\n<li>Mo money, mo problems: A Toyota subsidiary is hit hard with a <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/toyota-subsidiary-suffers-37m-bec\/\" target=\"_blank\" rel=\"noopener noreferrer\">$37 million business email compromise loss<\/a>. (Source: Infosecurity Magazine)<\/li>\n<li>AI superbrawl on the way? One researcher suggests people may soon have to make use of AI <a href=\"https:\/\/www.theregister.co.uk\/2019\/09\/13\/ai_deepfakes_infosec\/\" target=\"_blank\" rel=\"noopener noreferrer\">to turn the tide<\/a> against those who use it maliciously. (Source: The Register) Interestingly, Labs posed this idea, too\u2014<a href=\"https:\/\/blog.malwarebytes.com\/artificial-intelligence\/2019\/06\/labs-report-malicious-ai-is-coming-is-the-security-world-ready\/\" target=\"_blank\" rel=\"noopener noreferrer\">back in June<\/a>. (Source: Malwarebytes Labs blog)<\/li>\n<li>Drone wars: After multiple incidents related to drones disrupting flights at international airports, it appears law enforcement has managed to prevent at least <a href=\"http:\/\/news.met.police.uk\/news\/arrests-in-connection-with-operations-at-heathrow-airport-381203\" target=\"_blank\" rel=\"noopener noreferrer\">once such bout of aerial hijinks<\/a>. (Source: Met Police)<\/li>\n<li>Banking on trouble: A study finds retail banks need to do more to <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/09\/16\/banks-financial-crime-compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">integrate their approach to fighting crime<\/a>. (Source: Help Net Security)<\/li>\n<li>Mac attack: Phishing scams aimed at Mac users <a href=\"https:\/\/www.techrepublic.com\/article\/phishing-scams-targeting-mac-users-on-the-rise-with-1-6-million-attacks-in-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">are on the rise<\/a>. (Source: Tech Republic)<\/li>\n<li>A familiar face returns? A <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/malware-linked-to-ryuk-targets-financial-and-military-data\/d\/d-id\/1335808\" target=\"_blank\" rel=\"noopener noreferrer\">campaign with links to Ryuk ransomware<\/a> is hunting for financial, military, and law enforcement data. (Source: Dark Reading)<\/li>\n<li>Mobile carriers battle malware: Providers identify attacks targeting <a href=\"https:\/\/www.rte.ie\/news\/2019\/0912\/1075545-three-ireland-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerabilities in certain SIM cards<\/a>. (Source: RTE)<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>Guess who: Facebook scam using <a href=\"https:\/\/www.news5cleveland.com\/news\/local-news\/investigations\/tricky-scam-using-facebook-uses-real-pictures-of-your-friends\" target=\"_blank\" rel=\"noopener noreferrer\">pictures of your friends<\/a> to appear more convincing returns. (Source: News 5 Cleveland)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-9-15\/\">A week in security (September 9 \u2013 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-9-15\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Sep 2019 15:35:21 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-9-15\/' title='A week in security (September 9 \u2013 15)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from September 9\u201315, including locking down AWS, mobile malware, phishing threats, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/a-week-in-security\/\" rel=\"tag\">a week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/infosec\/\" rel=\"tag\">infosec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-network\/\" rel=\"tag\">social network<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-roundup\/\" rel=\"tag\">weekly roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-9-15\/' title='A week in security (September 9 \u2013 15)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-9-15\/\">A week in security (September 9 \u2013 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,10573,3764,10554,3924,10509,11238],"class_list":["post-16321","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-infosec","tag-malware","tag-mobile","tag-phishing","tag-social-network","tag-weekly-roundup"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16321"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16321\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}