{"id":17621,"date":"2020-02-03T12:10:19","date_gmt":"2020-02-03T20:10:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/03\/news-11356\/"},"modified":"2020-02-03T12:10:19","modified_gmt":"2020-02-03T20:10:19","slug":"news-11356","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2020\/02\/03\/news-11356\/","title":{"rendered":"A week in security (January 27 \u2013 February 2)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Feb 2020 19:00:50 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we looked at the strengths and weaknesses of the <a href=\"https:\/\/blog.malwarebytes.com\/explained\/2020\/01\/explained-the-strengths-and-weaknesses-of-the-zero-trust-model\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust model<\/a>, gave you the <a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2020\/01\/spear-phishing-101-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">low-down on spear phishing<\/a>, and took a delve into the world of <a href=\"https:\/\/blog.malwarebytes.com\/opinion\/2020\/01\/securing-the-msp-their-own-worst-enemy\/\" target=\"_blank\" rel=\"noopener noreferrer\">securing the managed service provider (MSP)<\/a>.<\/p>\n<h3>Other cybersecurity news<\/h3>\n<ul>\n<li>UN compromised via Sharepoint hack: An extraordinary tale highlighting that absolutely nobody is safe when <a href=\"https:\/\/www.theregister.co.uk\/2020\/01\/29\/un_covered_up_hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">bad things happen and are then covered up<\/a>. (Source: The Register)<\/li>\n<li>TA505 returns: A well-known financial phishing attack is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-detects-new-ta505-malware-attacks-after-short-break\/\" target=\"_blank\" rel=\"noopener noreferrer\">back from hiatus<\/a> to cause chaos once again. (Source: Bleeping Computer)<\/li>\n<li>SMS phishing, aka smishing: Residents of Pitt County are warned to be wary of <a href=\"https:\/\/wcti12.com\/news\/local\/texting-scam-using-links-to-target-personal-information\" target=\"_blank\" rel=\"noopener noreferrer\">bogus FedEx notifications<\/a> sent by text. (Source: News Channel 12)<\/li>\n<li>Social media booster runs into password mayhem: Another organisation discovers too late that <a href=\"https:\/\/techcrunch.com\/2020\/01\/30\/social-captain-instagram-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">plaintext passwords aren\u2019t a great idea<\/a>. (Source: TechCrunch)<\/li>\n<li>Ashley Madison breach returns to haunt us: Five years on, it\u2019s causing problems in <a href=\"https:\/\/www.vadesecure.com\/en\/ashley-madison-data-breach-fuels-new-extortion-scam\" target=\"_blank\" rel=\"noopener noreferrer\">all new ways, fueling a new extortion scam<\/a>. (Source: VadeSecure)<\/li>\n<li>Hacking in Hong Kong: ESET looks at how the Winnti group are <a href=\"https:\/\/www.welivesecurity.com\/2020\/01\/31\/winnti-group-targeting-universities-hong-kong\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeting two Hong Kong Universities<\/a>. (Source: ESET)<\/li>\n<li>Microsoft launches new bug bounty program: If you\u2019re into gaming, this may be <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/01\/31\/xbox-bug-bounty\/\" target=\"_blank\" rel=\"noopener noreferrer\">just what you\u2019re looking for<\/a>. (Source: Help Net Security)<\/li>\n<li>Big breach, big numbers: A compromise could potentially include <a href=\"https:\/\/krebsonsecurity.com\/2020\/01\/wawa-breach-may-have-compromised-more-than-30-million-payment-cards\/\" target=\"_blank\" rel=\"noopener noreferrer\">a large tally of (more than 30 million) credit card information<\/a>. (Source: Krebs on Security)<\/li>\n<li>The real world virus scammers have arrived: Booby-trapped Word documents <a href=\"https:\/\/www.techrepublic.com\/article\/hackers-using-coronavirus-scare-to-spread-emotet-malware-in-japan\/\" target=\"_blank\" rel=\"noopener noreferrer\">pushing the Emotet Trojan<\/a> are being fired out to people\u2019s mailboxes, disguised as warnings about the coronavirus. (Source: TechRepublic)<\/li>\n<li>Tricky phishing: It may be the case that we\u2019re <a href=\"https:\/\/www.zdnet.com\/article\/phishing-is-becoming-more-sophisticated-only-5-can-spot-all-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">not as good at detecting scams<\/a> as we think we are. (Source: ZDNet)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2020\/02\/a-week-in-security-january-27-february-2\/\">A week in security (January 27 \u2013 February 2)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2020\/02\/a-week-in-security-january-27-february-2\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Feb 2020 19:00:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2020\/02\/a-week-in-security-january-27-february-2\/' title='A week in security (January 27 \u2013 February 2)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the previous week&#8217;s most interesting security news<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/a-week-in-security\/\" rel=\"tag\">a week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-news\/\" rel=\"tag\">cybersecurity news<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/infosec\/\" rel=\"tag\">infosec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sms\/\" rel=\"tag\">sms<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2020\/02\/a-week-in-security-january-27-february-2\/' title='A week in security (January 27 \u2013 February 2)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2020\/02\/a-week-in-security-january-27-february-2\/\">A week in security (January 27 \u2013 February 2)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,19871,10573,3764,3924,13053,11706,10498],"class_list":["post-17621","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-cybersecurity-news","tag-infosec","tag-malware","tag-phishing","tag-roundup","tag-sms","tag-week-in-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17621"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17621\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}