This Week in Security News – May 28, 2021 Director, Global Threat Communications

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn how nearly all cloud data breaches involve misconfigurations and how to prevent them. Also, read about TeamTNT’s attack on Kubernetes, which compromised nearly 50,000 IPs.

Read on:

Misconfigurations are the Biggest Threat to Cloud Security: Here’s What to DoNearly all data breaches involving cloud services have been caused by misconfigurations. For example, Trend Micro identifies an average of 230 million misconfigurations per day. The good news is that misconfigurations are easily preventable with some basic cyber hygiene and regular monitoring.
 

TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like AttackKubernetes is the most widely adopted container orchestration platform for automating the deployment, scaling, and management of containerized applications. In this blog, Trend Micro shares how TeamTNT has been scanning for and compromising Kubernetes clusters in the wild. Trend Micro confirmed nearly 50,000 IPs compromised by this attack perpetrated by TeamTNT across multiple clusters.
 

Protecting the Hybrid Cloud with Zero-TrustHybrid cloud security has a few extra challenges, such as visibility between cloud platforms and the difficulty of remaining current with compliance protocols for industry and government regulations. Is zero-trust the answer for hybrid cloud security’s unique challenges? Bill Malik, VP of infrastructure strategies at Trend Micro, addressed this issue at RSA conference 2021. He pointed out that no matter what cloud platform you use, you will always be responsible for at least part of the security.
 

Personal & Professional Challenges Facing SecOps TeamsNew research shows that security teams are struggling with overwhelming workloads, and organizations are lacking the solution. The reality is that stressed SecOps teams need better tools to correlate and prioritize alerts, so they can work more efficiently.
 

70 Percent Of SOC, IT Security Teams Emotionally Overwhelmed by Security Alert VolumeTrend Micro recently released results from a new study that reveals SOC and IT security teams are suffering from high levels of stress outside of the working day. 70% of respondents say their home lives are being emotionally impacted by their work managing IT threat alerts. This comes as the majority (51%) feel their team is being overwhelmed by the volume of alerts and 55% admit that they aren’t entirely confident in their ability to prioritize and respond to them.
 

The Transition to 5G: Security Implications of Campus Networks5G acts as a catalyst for change for industrial environments. One part of its deployment is the 4G/5G campus network for some organizations. In this research paper, Trend Micro researchers delve into the security risks and implications of 5G technology on core networks.
 

This Weird Memory Chip Vulnerability Is Even Worse Than We RealizedGoogle has detailed its work discovering a new Rowhammer vulnerability dubbed “Half-Double”, which evolves the style of attack on DRAM memory first reported in 2014 and suggests the Rowhammer problem won’t go away soon. The Rowhammer attack is unusual because it aims to cause “bit flips” by rapidly and repeatedly accessing data in one memory row on a RAM chip to create an electrical charge that changes data stored in other addresses in an adjacent “memory row” on a chip.
 

Threats from a Compromised 4G/5G Campus NetworkTrend Micro recently investigated the implications of developing a 4G/5G campus network for IT and OT experts who are tasked with running and maintaining factories, critical infrastructures, and other such environments. Researchers tested attack scenarios rooted from a compromised campus network and especially the core network within it.
 

Russian Hydra DarkNet Market Made Over $1.3 Billion in 2020Russian-language dark web marketplace Hydra has emerged as a hotspot for illicit activities, pulling in a whopping $1.37 billion worth of cryptocurrencies in 2020, up from $9.4 million in 2016. Hydra accounts for over 75% of darknet market revenue worldwide in 2020, positioning it as a major player in the crypto crime landscape in Eastern Europe.
 

What do you think about the future of 5G and its security implications? Share in the comments below or follow me on Twitter to continue the conversation: @JonLClay.
 

Read More HERE