{"id":29921,"date":"2019-10-25T13:03:43","date_gmt":"2019-10-25T13:03:43","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543324"},"modified":"2019-10-25T13:03:43","modified_gmt":"2019-10-25T13:03:43","slug":"this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/","title":{"rendered":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s recent acquisition of Cloud Conformity. Also, read about a fake photo editing app on Google Play and the 17 malicious iOS apps removed from Apple\u2019s app store.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trend-micro-acquires-cloud-conformity\/\">Trend Micro Acquires Cloud Conformity<\/a><\/strong><\/p>\n<p><em>Trend Micro recently acquired Cloud Conformity, an innovative Cloud Security Posture Management (CSPM) company. The acquisition instantly broadens the cloud services Trend Micro can secure and resolves often overlooked security issues caused by cloud infrastructure misconfiguration. Hear our VP of cybersecurity, Greg Young, explain the specific benefits of this acquisition for developers in this vlog.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/fake-photo-beautification-apps-on-google-play-can-read-sms-verification-code-to-trigger-wireless-application-protocol-wap-carrier-billing\/\"><strong>Fake Photo Beautification Apps on Google Play can Read SMS Verification Code to Trigger Wireless Application Protocol (WAP)\/Carrier Billing<\/strong><\/a><\/p>\n<p><em>Despite Google\u2019s recent updated permission requests in Android applications restricting access to SMS and CALL Log permissions, Trend Micro recently found an app on Google Play named \u201cYellow Camera\u201d that poses as a photo editing app. The app is embedded with a routine that reads SMS verification codes from the system notifications and in turn activates a Wireless Application Protocol (WAP) billing.<\/em><\/p>\n<p><a href=\"https:\/\/threatpost.com\/click-fraud-malware-apple-app-store\/149496\/\"><strong>Apple Removes 17 Malicious iOS Apps from App Store<\/strong><\/a><\/p>\n<p><em>Researchers have uncovered 17 apps on Apple\u2019s official App Store infected with malware. Apple has since removed the apps from the App Store \u2013 but a \u201csignificant\u201d number of iOS users could have installed them, researchers said.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-shared-responsibility-model\/\"><strong>The Shared Responsibility Model<\/strong><\/a><\/p>\n<p><em>Security in the cloud works using the Shared Responsibility Model. Mark Nunnikhoven, vice president of cloud research, shares how this model dictates who is responsible for any operational task in the cloud, and how the number one threat in the cloud today is service misconfigurations, which often arise when there\u2019s a misunderstanding of who is responsible for an area of responsibility.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.inforisktoday.com\/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269?rf=2019-10-23_ENEWS_ACQ_IR__Slot8_ART13269&amp;mkt_tok=eyJpIjoiTmpBNU1XVmtPVGc1WTJZeSIsInQiOiJEQUFZUmlQZzBOcjFXNmQ0TGRlcHNUU3I0V3ZPK3RIamZcL0hWNERIT1haSlkrZExLblVWMitYbU5jU2pyWlFYMWNvRlcwXC9yaFg5MHhLQlBnekpZNE9XeExWaHVBOXkydWtZZmswQldySkZRblVqekd0QXNpT0xwKyt6ckdzaFwvdCJ9\">Sodinokibi Ransomware Gang Appears to Be Making a Killing<\/a><\/strong><\/p>\n<p><em>The Sodinokibi ransomware-as-a-service operation appears to be making a killing, with proceeds flowing both to the gang behind the malware as well as dozens of affiliates.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/the-cloud-what-it-is-and-what-it-s-for\"><strong>The Cloud: What It Is and What It\u2019s For<\/strong><\/a><\/p>\n<p><em>From powering video streaming, web-based apps, customer relationship management (CRM) systems, mobile banking, inventory, and big data analyses, the cloud is helping empower businesses of all sizes to focus on innovation rather than infrastructure. This blog from Trend Micro discusses the ins and outs of cloud computing and how it\u2019s changing the way we work.<\/em><\/p>\n<p><a href=\"https:\/\/thenextweb.com\/security\/2019\/10\/23\/chrome-and-firefox-will-now-alert-you-about-data-breaches-involving-your-accounts\/\"><strong>Chrome and Firefox Will Now Alert You About Data Breaches Involving Your Accounts<\/strong><\/a><\/p>\n<p><em>Mozilla has launched Firefox 70 for Windows, Mac, and Linux with new features such as social tracking protection,&nbsp;a Privacy Protections report, and a native data breach notification service for your saved logins.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/alexa-and-google-home-devices-can-be-abused-to-phish-and-eavesdrop-on-users-research-finds\"><strong>Alexa and Google Home Devices can be Abused to Phish and Eavesdrop on Users, Research Finds<\/strong><\/a><\/p>\n<p><em>Researchers at Security Research Labs (SRL) demonstrated how applications (called Skills in Amazon Alexa and Actions on Google Home) can be used to exploit security issues in the way certain device functions are operated through the apps. To show how threat actors can eavesdrop on the device\u2019s owners, the researchers used a variation of the techniques used to steal data.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-cripples-german-automation-company-bec-operators-arrested-in-spain\"><strong>Ransomware Cripples German Automation Company, BEC Operators Arrested in Spain<\/strong><\/a><\/p>\n<p><em>Trend Micro report covers two noteworthy incidents that took place in Europe: a ransomware attack crippling a German automation company and business email compromise (BEC) operators getting arrested in Spain.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cbsnews.com\/news\/retina-x-barred-by-ftc-from-selling-stalking-apps\/\">FTC Bars Company from Selling \u201cStalking\u201d Apps<\/a><\/strong><\/p>\n<p><em>The Federal Trade Commission said it&nbsp;barred&nbsp;the developer of three \u201cstalking\u201d apps from selling the products until the company can ensure they\u2019re used legally.&nbsp;Software maker Retina-X Studio market apps used to monitor employees and children. But federal regulators&nbsp;said&nbsp;the apps, called MobileSpy, PhoneSheriff and Teen Shield, were often installed by hackers without users\u2019 knowledge or consent.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/european-international-airport-workstations-infected-with-persistent-anti-coinminer-malware\"><strong>European International Airport Workstations Infected with Persistent Anti-CoinMiner Malware<\/strong><\/a><\/p>\n<p><em>XMRig cryptocurrency miner malware has been found running in more than half of the workstations in a European international airport, despite having an industry-standard anti-virus installed. Reports said Cyberbit discovered the campaign running in the background while undergoing a standard installation of an endpoint product.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/the-banking-and-finance-industry-under-cybercriminal-siege-an-overview\"><strong>The Banking and Finance Industry Under Cybercriminal Siege: An Overview<\/strong><\/a><\/p>\n<p><em>The need for 24\/7-connected smart devices has driven the banking and finance industry to adapt, especially with the wider adoption of the internet of things (IoT) among businesses and users. In this analysis, Trend Micro discusses the evolving attacks and threats that cybercriminals use to compromise financial companies, their third-party partners and suppliers, and their customers.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/underground-intrusion-specialists-team-up-with-ransomware-groups\"><strong>Underground Intrusion Specialists Team Up with Ransomware Groups<\/strong><\/a><\/p>\n<p><em>A new report highlights how \u201caccess-as-a-service\u201d providers and ransomware groups have come together to compromise and victimize targets. Trend Micro shares best practices for organizations to implement to protect against these attacks in its recent blog.<\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/trend-micro-picks-up-cloud-conformity-for-70-million\/\"><strong>Trend Micro Picks Up Cloud Conformity for $70 Million<\/strong><\/a><\/p>\n<p><em>As part of the acquisition, all Cloud Conformity staff will join the company, Trend Micro confirmed. The company added that existing Cloud Conformity customers will further grow Trend Micro\u2019s current 16,000 hybrid cloud customer base. Trend Micro has also made Cloud Conformity immediately available to its customers.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/putting-the-eternal-in-eternalblue-mapping-the-use-of-the-infamous-exploit\"><strong>Putting the Eternal in EternalBlue: Mapping the Use of the Infamous Exploit<\/strong><\/a><\/p>\n<p><em>In 2017, EternalBlue was the driving force behind one of the nastiest ransomware outbreaks on record. And despite available fixes, it is still being used by malware today\u2014from ransomware to widespread cryptocurrency miners. Learn about EternalBlue activity over the past two years in Trend Micro\u2019s recent analysis.<\/em><\/p>\n<p><a href=\"https:\/\/searchaws.techtarget.com\/feature\/How-to-get-the-most-out-of-AWS-reInvent-2019\"><strong>How to Get the Most Out of AWS re:Invent 2019<\/strong><\/a><\/p>\n<p><em>More than 50,000 people attended&nbsp;last year\u2019s conference, and, undoubtedly, more will attend AWS re:Invent 2019. But a little preparation can go a long way to ensure you pack in as many of the sessions and meetings as possible.&nbsp;Mark Nunnikhoven, vice president of cloud research, shares his recommendation on how to make the most of time spent at the conference.<\/em><\/p>\n<p><a href=\"https:\/\/www.secureworldexpo.com\/resources\/bug-bounties-patches-zero-day\"><strong>Bug Bountie$ = Patches (How?)<\/strong><\/a><\/p>\n<p><em>In this episode of The SecureWorld Sessions, we hear from Brian Gorenc who runs the Zero Day Initiative (ZDI), which is the largest vendor agnostic bug bounty program in the world. Gorenc discusses the process of how security vulnerabilities are discovered, reported, and fixed.<\/em><\/p>\n<p>Surprised by the sudden influx of fake and malicious mobile apps posing as legit apps? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s recent acquisition of Cloud Conformity. Also, read about a fake photo editing app on Google Play and the 17 malicious iOS apps removed&#8230;<br \/>\nThe post This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29922,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[311,307],"class_list":["post-29921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-current-news","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T13:03:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store\",\"datePublished\":\"2019-10-25T13:03:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg\",\"keywords\":[\"Current News\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\",\"name\":\"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg\",\"datePublished\":\"2019-10-25T13:03:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current News\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-25T13:03:43+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store","datePublished":"2019-10-25T13:03:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/"},"wordCount":1105,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg","keywords":["Current News","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/","name":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg","datePublished":"2019-10-25T13:03:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-trend-micro-acquires-cloud-conformity-and-apple-removes-malicious-ios-apps-from-app-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Current News","item":"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29921"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29921\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29922"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}