{"id":16623,"date":"2019-10-18T06:00:01","date_gmt":"2019-10-18T14:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/18\/news-10362\/"},"modified":"2019-10-18T06:00:01","modified_gmt":"2019-10-18T14:00:01","slug":"news-10362","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/10\/18\/news-10362\/","title":{"rendered":"This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Oct 2019 13:03:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s new XDR Center in India that will help solve data sovereignty issues. Also, read about 5G network software use being a top security issue for mobile networks and devices.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/www.fastcompany.com\/90417865\/new-botnet-nabbed-victims-by-sending-30000-sextortion-emails-per-hour\"><strong>New Botnet Nabs Victims by Sending 30,000 \u201cSextortion\u201d Emails Per Hour<\/strong><\/a><\/p>\n<p>The Phorpiex botnet is now capable of taking over unwitting email users\u2019 accounts to bombard the masses with emails that threaten to publish personal sexual content on the web, social media, and to other email contacts unless they pay extortion money in the form of bitcoin.<strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/Apple-iTunes-iCloud-Zero-Day-Exploited-to-Inject-BitPaymer-Ransomware-in-Windows-PCs\"><strong>Apple iTunes, iCloud Zero-Day Exploited to Inject BitPaymer Ransomware in Windows PCs<\/strong><\/a><\/p>\n<p>A zero-day\u00a0vulnerability\u00a0found in Apple iTunes and iCloud was exploited by cybercriminals to infect Windows computers of an automotive company with the BitPaymer ransomware. It was found in the Bonjour component that iTunes and iCloud programs for Windows use to deliver software updates. The attack was reportedly not detected by antivirus solutions.<\/p>\n<p><a href=\"https:\/\/www.cisomag.com\/trend-micro-launches-its-xdr-data-center-in-india\/\"><strong>Trend Micro Launches Its XDR Data Center in India<\/strong><\/a><\/p>\n<p>Cybersecurity and defense company Trend Micro recently launched its local managed XDR data center service in India to solve data sovereignty issue. The company announced the news at its own security event named CLOUDSEC India 2019, which gathered more than 750 business and technology leaders from the cybersecurity industry.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/eu-report-highlights-cybersecurity-risks-in-5g-networks\"><strong>EU Report Highlights Cybersecurity Risks in 5G Networks<\/strong><\/a><\/p>\n<p>The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an EU report supported by the European Commission and European Union Agency for Cybersecurity.<\/p>\n<p><a href=\"https:\/\/www.vice.com\/en_us\/article\/7x5ddg\/malware-that-spits-cash-out-of-atms-has-spread-across-the-world?utm_source=Iterable&amp;utm_medium=email&amp;utm_campaign=campaign_833474\"><strong>Malware That Spits Cash Out of ATMs Has Spread Across the World<\/strong><\/a><\/p>\n<p>A joint investigation between Motherboard and the German broadcaster Bayerischer Rundfunk (BR) has uncovered new details about a spate of so-called \u201cjackpotting\u201d attacks. Trend Micro\u2019s David Sancho, a senior threat researcher, discusses the wide accessibility of the malware.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/imperva-data-breach-caused-by-stolen-aws-api-key\"><strong>Imperva Data Breach Caused by Stolen AWS API Key<\/strong><\/a><\/p>\n<p>Imperva recently revealed the\u00a0primary cause of a breach\u00a0that accidentally exposed customer data (which included email addresses, hashed &amp; salted passwords, as well as TLS and API keys). It turned out to have been caused by a stolen Amazon Web Services (AWS) API key that was used to access a database snapshot containing the compromised data.<\/p>\n<p><a href=\"https:\/\/www.axios.com\/china-cybersecurity-law-upgrade-938714cd-de65-4a71-a7c2-03da33c51bc9.html\"><strong>China&#8217;s Upgraded Cybersecurity Law Could Take a Toll<\/strong><\/a><\/p>\n<p>China is applying tougher cybersecurity standards more widely as of Dec. 1, requiring companies to open their networks and deploy government-approved equipment. The changes worry international organizations and underscore the difference between U.S. and Chinese approaches to cybersecurity.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/winnti-group-resurfaces-with-portreuse-backdoor-now-engages-in-illicit-cryptocurrency-mining\"><strong>Winnti Group Resurfaces with PortReuse Backdoor, Now Engages in Illicit Cryptocurrency Mining<\/strong><\/a><\/p>\n<p>The Winnti group used a previously undocumented and unreported backdoor named PortReuse to compromise a high-profile, Asia-based mobile hardware and software manufacturer, presumably as a jump-off point for launching supply chain attacks. This is what researchers at ESET\u00a0found\u00a0after an in-depth analysis of the Winnti group\u2019s operations.<\/p>\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/us-claims-cyber-strike-on-iran-after-attack-on-saudi-oil-facility\/\"><strong>US Claims Cyber Strike on Iran After Attack on Saudi Oil Facility<\/strong><\/a><\/p>\n<p>Reuters reports that the United States launched a &#8220;secret cyber operation&#8221; against Iran in September, following\u00a0the alleged drone and missile attack by Iran on Saudi Arabian oil facilities. Unnamed officials\u00a0told Reuters\u00a0that the late-September cyberattack targeted Iran&#8217;s &#8220;propaganda&#8221; infrastructure. The attack, one official said, affected physical hardware. But no further details were provided.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/monero-mining-worm-infects-over-2-000-unsecure-docker-hosts\"><strong>Monero-Mining Worm Infects Over 2,000 Unsecure Docker Hosts<\/strong><\/a><\/p>\n<p>Over 2,000 Docker hosts have been infected by a worm that discreetly uses them to mine the Monero cryptocurrency. According to the researchers who discovered the malware variant, the worm searched for and infected exposed Docker Engines to spread the worm to, then queried its command-and-control (C&amp;C) server to look for more vulnerable hosts, choosing at random from among the possible targets.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/10\/17\/russian-hackers-breach-european-embassy-in-washington\/#5ee6f5f67c93\"><strong>Warning: Russian Hackers Break into European Embassy in Washington<\/strong><\/a><\/p>\n<p>The so-called\u00a0Cozy Bear hackers, who were revealed in 2016 to have infiltrated the DNC along with a group called Fancy Bear as part of a Russian-government sponsored attack on American democracy, have hacked the Washington, D.C., embassy of a European member state. The hackers also broke into computers at the ministries of foreign affairs of three European countries.<\/p>\n<p><em>\u00a0<\/em>Do you know the signs of a jackpotting ATM attack? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-trend-micro-launches-its-xdr-center-in-india-and-eu-reports-5g-cybersecurity-risks\/\">This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-trend-micro-launches-its-xdr-center-in-india-and-eu-reports-5g-cybersecurity-risks\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Oct 2019 13:03:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s new XDR Center in India that will help solve data sovereignty issues. Also, read about 5G network software use being a top security&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-trend-micro-launches-its-xdr-center-in-india-and-eu-reports-5g-cybersecurity-risks\/\">This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18063,15968,10422,714,22487],"class_list":["post-16623","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-5g","tag-cryptocurrency-miner","tag-current-news","tag-security","tag-xdr"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16623"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16623\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}