fbpx

This Week in Security Information: Microsoft Patches 120 Vulnerabilities, Including Two Trend and Zero-Days Micro Brings DevOps Agility and Automation to Security Functions Through Integration with AWS Solutions

Home » Cloud Security » This 7 days in Security Information: Microsoft Patches 120 Vulnerabilities, Including Two Zero-Times and Craze Micro Brings DevOps Agility and Automation to Safety Functions Through Integration with AWS Options

7 days within securityWelcome to your every week roundup, where we reveal what you ought to find out about the cybersecurity information and activities that happened in the last couple of days. This week, tuesday updates ever find out about among Microsoft’s largest Patch, including fixes for 120 vulnerabilities and two zero-days. Also, find out about Trend Micro’s brand new integrations with Amazon Internet Services (AWS).

Read on:

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

week Microsoft released fixes for 120 vulnerabilities This, including two zero-days, tuesday rollout in 13 services and products within its monthly Patch. The August discharge marks its third-largest Patch Tuesday upgrade, bringing the total amount of safety fixes for 2020 to 862. “Should they maintain this speed, it’s quite easy for them to deliver a lot more than 1,this year 300 patches,” states Dustin Childs of Development Micro’s Zero-Time Initiative (ZDI).

XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Pattern Micro has discovered a unique infection linked to Xcode developer tasks. Upon more investigation, it was found that a developer’s Xcode task at large contained the foundation malware, that leads to a rabbit hole of malicious payloads. Perhaps most obviously in our investigation may be the discovery of two zero-day exploits: one can be used to steal cookies with a flaw in the habits of Information Vaults, another can be used to abuse the growth edition of Safari.

Top Tips for Home Cybersecurity and Privacy in a Coronavirus-Impacted World: Part 1

We’re all now surviving in a post-COVID-19 world seen as a uncertainty, mass home remote control and working learning. To help you adjust to these new circumstances while protecting what counts most, Trend Micro is rolling out a two-part blog collection on ‘the new regular’. Component one identifies the scope and particular cyber-threats of the brand new normal.

Trend Micro Brings DevOps Agility and Automation to Security Operations Through Integration with AWS Solutions

Tendency Micro enhances agility and automation within cloud protection through integrations with Amazon Internet Providers (AWS). Through this collaboration, Craze Micro Cloud One supplies the broadest platform assistance and API integration to safeguard AWS infrastructure whether constructing with Amazon Elastic Compute Cloud (Amazon EC2) situations, AWS Lambda, AWS Fargate, containers, Amazon Simple Storage space Services (Amazon S3), or Amazon Virtual Personal Cloud (Amazon VPC) networking.

Shedding Light on Security Considerations in Serverless Cloud Architectures

The big shift to serverless computing is imminent. In accordance with a 2019 study, 21% of enterprises have previously adopted serverless technologies, while 39% are thinking about it. Trend Micro’s brand new research on serverless processing aims to reveal the security factors in serverless conditions and help adopters keeping in mind their serverless deployments as protected as possible.

In One Click: Amazon Alexa Could be Exploited for Theft of Voice History, PII, Skill Tampering

Amazon’s Alexa tone of voice assistant could possibly be exploited at hand over user information due to safety vulnerabilities in the service’s subdomains. The smart assistant, that is found in gadgets like the Amazon Echo and Echo Dot – with over 200 million shipments worldwide – had been susceptible to attackers seeking user individually identifiable details (PII) and tone of voice recordings.

New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls

A united group of academic scientists presented a fresh attack called ‘ReVoLTE,’ which could let remote control attackers split the encryption utilized by VoLTE voice phone calls and spy on targeted calls. The strike doesn’t exploit any flaw in the Tone of voice over LTE (VoLTE) process; instead, it leverages fragile execution of the LTE cellular network by many telecommunication providers used, enabling an attacker to eavesdrop on the encrypted calls created by targeted victims.

An Advanced Group Specializing in Corporate Espionage is on a Hacking Spree

A Russian-talking hacking group focusing on corporate espionage has completed 26 campaigns since 2018 in attempts to steal vast levels of information from the private industry, according to new results. The hacking team, dubbed RedCurl, stole confidential business documents including contracts, economic documents, employee information and legal records, this week by the security firm Group-IB in accordance with research published.

Walgreens Discloses Data Breach Impacting Personal Health Information of More Than 72,000 Customers

The second-biggest pharmacy chain in the U.S. lately disclosed a information breach that could have compromised the non-public health information (PHI) greater than 72,000 people over the United States. In accordance with Walgreens spokesman Jim Cohn, prescription information of clients was stolen during Might protests, when around 180 of the company’s 9,277 places were looted.

Top Tips for Home Cybersecurity and Privacy in a Coronavirus-Impacted World: Part 2

The past couple of months have observed radical changes to your home and work lifestyle beneath the Coronavirus threat, upending norms plus confining an incredible number of American families within 4 walls just. In this context, it’s unsurprising that more folks are spending a growing part of our lives on-line. In the ultimate blog of the two-part series, Development Micro discusses you skill to protect your loved ones, your data, and usage of your business accounts.

What are your ideas on Trend Micro’s ideas to help your house be cybersecurity and personal privacy stronger within the COVID-19-impacted world? Share your ideas in the remarks below or stick to me on Twitter to keep the conversation: @JonLClay.