This Week in Security News: Malvertising and Internet of Things Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 28 Jun 2019 14:24:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a new Internet of Things malware that’s bricked thousands of devices. Also, read about a ransomware family that’s using malvertising to direct victims to a…

The post This Week in Security News: Malvertising and Internet of Things Malware appeared first on .

Read more

AWS re:Inforce 2019 re:Cap

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 27 Jun 2019 18:31:29 +0000

A wide angle shot of the conference registration desk for AWS re:Inforce with an endcap wall in a slight teal blue saying, "Welcome to AWS re:Inforce"

The inaugural AWS Cloud security conference—AWS re:Inforce—was held in Boston this week. Well over 8,000 attendees descended on the Boston Convention and Exhibition Center for two days jammed packed with security education and cloud content. This was a very interesting conference because the dynamics of the attendees felt very different from typical AWS events. Usually…

The post AWS re:Inforce 2019 re:Cap appeared first on .

Read more

Three Network Security Questions with CEITEC’s CIO

Credit to Author: TJ Alldridge| Date: Wed, 26 Jun 2019 18:16:22 +0000

Ireneo Demanarig is the Chief Information Officer at CEITEC S.A. located in Porto Alegre, Rio Grande do Sul, Brazil. CEITEC is a microelectronics manufacturer that specializes in solutions such as automatic identification (RFID and smartcards), application-specific integrated circuits (ASICs) aimed at identifying animals, and much more. Recently, I jumped on the phone with Ireneo and…

The post Three Network Security Questions with CEITEC’s CIO appeared first on .

Read more

A new Equation Editor exploit goes commercial, as maldoc attacks using it spike

Credit to Author: Gabor Szappanos| Date: Thu, 18 Jul 2019 16:00:18 +0000

Weaponized RTF documents adopt CVE-2018-0798, another Equation Editor vulnerability<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ltjXsAajVFc” height=”1″ width=”1″ alt=””/>

Read more

‘Oto Gonderici’ Excel formula injections target Turkish victims

Credit to Author: Gabor Szappanos| Date: Thu, 11 Jul 2019 16:05:59 +0000

A criminal relentlessly attacks Turkish targets with a novel maldoc trick, mostly staying under the radar<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/FKW687qu7ac” height=”1″ width=”1″ alt=””/>

Read more

16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates

Credit to Author: Andrew Brandt| Date: Tue, 09 Jul 2019 22:15:50 +0000

Russian hackers allegedly have been exploiting two vulnerabilities in the course of attacks<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/iBWRguPLsjk” height=”1″ width=”1″ alt=””/>

Read more

CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)

Credit to Author: SophosLabs Offensive Security| Date: Tue, 09 Jul 2019 14:00:58 +0000

Details of the vulnerability we reported to Microsoft and was fixed in last month’s Patch Tuesday<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/-BE2g_tELic” height=”1″ width=”1″ alt=””/>

Read more

7 best practices for securing the public cloud

Credit to Author: Sally Adam| Date: Thu, 04 Jul 2019 15:54:15 +0000

Given the simplicity and cost-effectiveness of the public cloud, it’s no surprise that more and more organizations are turning to Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You can spin up a new instance in minutes, scale resources up and down whenever you need while only paying for what you use, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/cMnjeioMV-8″ height=”1″ width=”1″ alt=””/>

Read more

How Intercept X Advanced can help you avoid becoming a ransomware victim

Credit to Author: Sally Adam| Date: Wed, 03 Jul 2019 20:26:06 +0000

Tourists aren’t the only ones looking at Florida this summer. As the Sunshine State ramps up to greet a flock of vacationers, it’s also facing some far less welcome visitors. Over the last few weeks, cybercriminals have targeted Florida with advanced ransomware attacks requesting heavy payments in return for restoring data. In one example, the [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/aDvMvVeudaQ” height=”1″ width=”1″ alt=””/>

Read more