Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how Trend Micro’s partnership with Snyk will advance DevSecOps. Also, read about cyber attacks affecting hospitals in Alabama and Indiana as well as disregarded cybersecurity protocols in Mississippi.
Trend Micro announced an alliance with Snyk through which alerts about vulnerabilities in open source code will be passed on to the tools Trend Micro makes available to apply virtual patches to both monolithic and microservices-based applications.
Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices. It might leave CISOs with a lot of questions about how this newer, growing attack vector could impact their business. Ed Cabrera, Trend Micro’s chief cybersecurity officer, answers a few of those questions here.
In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. In this blog, learn about the formidable array of resources that Trend Micro has built over the past few years to help protect our global customers from BEC.
Magecart attackers have infiltrated cloud-based e-commerce provider Volusion to successfully infect at least 6,500 customer websites with malicious code designed to lift payment card information. This article also includes insights from Trend Micro researchers on Magecart actor groups.
October’s Patch Tuesday is relatively modest, with Microsoft releasing a total of 59 patches. However, this shorter list still warrants attention. Nine of the 59 were still identified as Critical, while the remaining 50 were labeled Important. Take a closer look at the notable vulnerabilities patched this month in this article.
In September, security researchers from the QAX-A-Team discovered the existence of CVE-2019-16928, a vulnerability involving the mail transfer agent Exim. Exim accounts for over 50% of publicly reachable mail servers on the internet. What makes the bug particularly noteworthy is that threat actors could exploit it to perform denial of service (DoS) or possibly even remote code execution attacks (RCE).
In a recent cybersecurity audit undertaken by the office of the state auditor of Mississippi, it was found that a sizable number of state’s agencies are regularly failing to comply with the cybersecurity protocols. These protocols, which were devised in 2018 and called the Mississippi Enterprise Security program, were aimed at building cooperation among agencies on defense and cybersecurity.
Three hospitals of the DCH Health System were hit by a ransomware attack on October 1, forcing the medical institutions to turn away noncritical patients while they work to securely restore their affected IT systems.
A new attack on healthcare data has been reported in Gary, Indiana, involving a phishing campaign that possibly exposed medical and personal information of 68,039 patients of Methodist Hospitals, Inc. An investigation determined that two of its employees had fallen victim to a phishing campaign that gave an unknown threat actor unauthorized access to their email accounts.
Targeted attacks remain a serious threat to organizations despite the emergence of advanced security technologies. A recent study shows that the average cost of cybercrime for each company — where sophisticated attacks are at play — has increased from US$11.7 million in 2017 to US$13.0 million in 2018. Read up on three security recommendations that can protect networks from targeted attacks.
Organizational silos create unnecessary security risk for global businesses. The lack of security involvement in DevOps projects was reportedly creating cyber risk for 72% of IT leaders, according to Trend Micro. The company commissioned a survey, which polled 1,310 IT decision makers in SMB and enterprise organizations across the globe about their organizational culture.
A spate of cryptocurrency-mining malware that affected Windows systems, Linux machines, and routers have been identified last August to September of this year. The malware variants employed a variety of methods – from the use of rootkit to MIMIKATZ – to hide and spread their malicious mining activities.
A RobbinHood variant was found employing a scaring tactic in its new ransom note, prodding victims to search online for news of previous RobbinHood ransomware victims and how they ended up paying a larger cost by not paying the cybercriminals up front.
The McCombs School of Business at the University of Texas at Austin has launched America’s first professional cybersecurity certificate program specifically geared toward protecting healthcare providers from cyber-attacks. The Leadership in Healthcare Privacy and Security Risk Management program has been launched by the school in a bid to help close the 1.8-million-person info security gap.
Do you know how to protect your organization from falling victim to targeted attacks? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.