This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week! 


Cerber Ransomware Evolves Again and Now Steals from Bitcoin Wallets

Cerber ransomware has acquired the reputation of being one of the most rapidly evolving ransomware families to date. Just in May, we pointed out how it had gone through six separate versions with various differences in its routines. Several months later and it seems to have evolved again. 

Healthcare Organizations Are Not Immune to Large-Scale Cyberattacks

HCOs are an attractive target for hackers because of the immense amount of personally identifiable information housed in their systems. The industry is widely known for having a broad spectrum of cybersecurity maturity, from the advanced to weak or poor maturity.  

New WannaCry-Mimicking SLocker Abuses QQ Services

Trend Micro researchers detected a new SLocker variant that mimics the GUI of the WannaCry crypto-ransomware. Detected as ANDROIDOS_SLOCKER.OPSCB, this new SLocker mobile ransomware variant features new routines utilizing features of the Chinese social network QQ. 

HBO Cyberattack is “Seven Times Worse” Than the Sony Hack

 The latest HBO hacking scandal is shaping up to be much, much worse than a few leaked Game of Thrones episodes. The cyberattack that occurred earlier this week compromised around 1.5 terabytes of data, which, it turns out, is seven times the amount of data that was leaked during the 2014 Sony hack.  

Nuance Says Majority of Clients Back Online After Petya Cyberattack

Nuance Communication was one of the U.S. companies hit the hardest by the June 27 Petya/NotPetya malware attacks, which were masked as a ransomware. Last Friday, the major voice and tool provider announced it has restored functionality for 75 percent of its eScription LH platform clients. 

JS_POWMET Is a Completely Fileless Malware

Fileless malware, such as the recent SOREBRECT ransomware, is becoming a more common attack method. However, many of these malware are fileless only while entering a user’s system, as they eventually reveal themselves when they execute their payload. 

 Hackers at DefCon Conference Exploit Vulnerabilities in Voting Machines

The Voting Machine Hacking Village event at the 25th annual DefCon conference wanted to educate the computer security community about potential weaknesses of the voting systems in U.S. elections. It took less than a day for attendees to find and exploit vulnerabilities in five different voting machine types. 

British Hacker Known As ‘Spiderman’ Sentenced Over Cyberattack

A German court handed down a suspended sentence Friday, of one year and eight months, to a 29-year-old British hacker who confessed to committing a cyberattack last November that temporarily took down Internet access for nearly 1 million German consumers. 

You Are Probably Making Mistakes with Your Managed Services Business

As a managed service provider, your customers have entrusted you to manage their IT infrastructure and their security so it’s important that you are making the right choices to secure their environments and keep cyber criminals at bay. 

Trend Micro Is Launching Video Contest for Local Kids in Canada

Trend Micro’s Canada team is teaming up with local organization CyberLaunch Academy on a new video competition designed to raise awareness of online safety among school-age children. Winners will receive annual scholarships at the academy worth up to CA$500. 

Senate Panel Advances Bill to Boost Federal Cyber Scholarships

A Senate committee on Wednesday advanced legislation that would update and expand an existing federal cybersecurity scholarship program for students pursuing degrees in cyber fields. The program is run by the National Science Foundation in an effort to bolster the nation’s cybersecurity workforce. 

Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.

Leave a Reply