UA-72240440-1

Risk Radar Free Cyber Newsletter – Aug 22, 2017

Cyber Security Newsletter

Emergent threats, trends, and news annotated by some of the most well known and respected experts in the industry.

Locky Ransomware Variant Slips Past Some Defenses
Locky ransomware is back as part of a large email based campaign. A malicious zip file is included in the email. If the file is ran it will download the ransomware. Once the file is opened it uses a social engineering trick to get the user to enable macros.
DDoS Attacks on the Rise Again: Akamai
DDoS attacks are increasing according to Akamai. The DDoS attacks seem to be a mix of the old tried and true techniques with new attacks like Mirai add to the mix. Mirai has been used in DDoS service for hire attacks.
Attacks on the Cloud Increase by 300%
As cloud services are being used more it was expected that cyber-attacks would increase.  A study from Microsoft is showing a 300% increase in attacks over the last year. Limiting access to trusted devices (based on IP) can help enterprises secure their cloud services.
Industrial Cobots Might Be The Next Big IoT Security Mess
Industrial Collaborative robots work side by side with people on the manufacturing line. They are sophisticated robots that can do more than the older style pick and place robots. A researcher with IOActive has found many vulnerabilities in these collaborative robots. The potential for damage to human and product is there, the robots could also be used for spying.
Mitigating medical device risks one of biggest challenges to IT pros, study
Many very expensive pieces of medical equipment run outdated versions of Windows. Limiting network access can help with these pieces of medical equipment. This article focuses on how manufactures of these devices can improve security when the device is being made.
90% of Orgs Record Exploits for Vulnerabilities More than Three Years Old
A new report from Fortinet is showing what penetration testers have known for a while, most organizations are vulnerable to old exploits. The exploits can be three to 10 years old, a majority or organizations are still vulnerable to these old exploits.