{"id":42311,"date":"2021-08-13T00:00:00","date_gmt":"2021-08-13T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/this-week-in-security-news-august-13-2021.html"},"modified":"2021-08-13T00:00:00","modified_gmt":"2021-08-13T00:00:00","slug":"this-week-in-security-news-august-13-2021-vp-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/","title":{"rendered":"This Week in Security News &#8211; August 13, 2021 VP, Threat Intelligence"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn how Poly Network has become a victim of a cyberheist in which hackers managed to steal $611 million worth of cryptocurrencies. Also, read how cybersecurity is being called the \u201cnew great game\u201d in government.<\/p>\n<p>Read on:<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/chaos-ransomware-a-dangerous-proof-of-concept.html\">Chaos Ransomware: A Proof of Concept with Potentially Dangerous Applications<\/a><\/span><\/p>\n<p>Trend Micro has been monitoring an in-development ransomware builder called Chaos. While it\u2019s purportedly a .NET version of Ryuk, closer examination of the sample reveals that it doesn\u2019t share much with the notorious ransomware. In fact, early versions of Chaos were more akin to a destructive trojan than to traditional ransomware. This blog entry looks at some of the characteristics of the Chaos ransomware builder and how its iterations added new capabilities.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.sdxcentral.com\/articles\/news\/cybersecurity-is-the-new-great-game\/2021\/08\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Is the New \u2018Great Game\u2019<\/a><\/span><\/p>\n<p>Building a national cyber-defense plan took center stage at this year\u2019s Black Hat cybersecurity conference. \u201cThe [Great Game] is playing out in cyberspace right now,\u201d said Homeland Security Secretary Alejandro Mayorkas. Cyberattacks on companies like Colonial Pipeline, JBS foods, and Kaseya, as well as interference in the U.S. elections, have reinforced the importance of cybersecurity, how to govern the internet, and why we need free and secure cyberspace. In this article, Kevin Simzer, COO at Trend Micro, shares why he believes there is more than can be done from the government level.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/cinobi-banking-trojan-targets-users-of-cryptocurrency-exchanges-.html\">Cinobi Banking Trojan Targets Users of Cryptocurrency Exchanges with New Malvertising Campaign<\/a><\/span><\/p>\n<p>Trend Micro found a new social engineering-based malvertising campaign targeting Japan that delivered a malicious application. The malicious application abused sideloading vulnerabilities to load and start the Cinobi banking trojan. Trend Micro considers this to be a new campaign from Water Kappa that is aimed at users of web browsers other than Internet Explorer.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.govinfosecurity.com\/10-initial-access-broker-trends-cybercrime-service-evolves-a-17249#.YRO58IQTA9g.twitter\" target=\"_blank\" rel=\"noopener\">10 Initial Access Broker Trends: Cybercrime Service Evolves<\/a><\/span><\/p>\n<p>The rise of ransomware as a moneymaking powerhouse for online attackers parallels the services being offered by initial access brokers. Such brokers sell access as a service to others, saving them the time, effort and expense of gaining a toehold in an organization&#8217;s network. $5,400 is the average price for access to hacked networks.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/august_patch_tuesday.html\">August Patch Tuesday: A Quiet Month for Microsoft<\/a><\/span><\/p>\n<p>This month\u2019s Patch Tuesday updates prove to be a calmer month for Microsoft, compared to the more eventful July security bulletin. This is evident in the short list of only 44 patched vulnerabilities published this month, of which seven are noted as critical and the rest as important. Eight were also submitted via the\u202fTrend Micro Zero Day Initiative. What is notable for this month is the inclusion of three vulnerabilities in Print Spooler, given how flaws in this service have garnered much attention in the last month.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.crn.com\/news\/security\/accenture-confirms-ransomware-attack-says-no-impact-on-operations\" target=\"_blank\" rel=\"noopener\">Accenture Hit by Ransomware Attack, Latest Victim Of \u2018Cyber-Pandemic\u2019<\/a><\/span><\/p>\n<p>Accenture confirmed that it was hit by a ransomware attack, with a hacker group using the LockBit ransomware reportedly threatening to release the company\u2019s data and sell insider information. Accenture reported there was no impact on the company.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/enisa-says-system-failure-is-on-the-rise.html\">ENISA says System Failure is on the Rise<\/a><\/span><\/p>\n<p>The European Union Agency for Cybersecurity (ENISA) recently released two annual reports on telecom security incidents and trust security incidents for 2020. According to Telecom Security Incidents 2020, faulty software changes and\/or updates are a major factor in terms of impact, resulting in more than 300 million hours lost or 40% of the total number of hours lost. The report also revealed that system failures continue to be the most prominent cause of incidents, leading to severe impact.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/threatpost.com\/qr-code-scammers-bitcoin-atms\/168621\/\" target=\"_blank\" rel=\"noopener\">QR Code Scammers Get Creative with Bitcoin ATMs<\/a><\/span><\/p>\n<p>With the use of QR codes rising, so are the numbers of scams that aim to take advantage them. Researchers warned that threat actors are going so far as to send potential victims to gas stations to use Bitcoin ATMs in their endeavors to exploit the technology.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/biden-releases-memo-on-critical-cybersecurity-infrastructure-bill.html\">Biden Releases Memo on Critical Cybersecurity Infrastructure Bill<\/a><\/span><\/p>\n<p>United States President Joe Biden recently released a memorandum on improving cybersecurity for critical infrastructure control systems. The memo is a product of a 100-day cybersecurity initiative, furthering the Biden administration\u2019s move to safeguard US critical infrastructure.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.hackread.com\/hackers-steal-600-million-cryptocurrency-heist\/\" target=\"_blank\" rel=\"noopener\">Hackers Steal $600 million in Largest Ever Cryptocurrency Heist<\/a><\/span><\/p>\n<p>One of the industry\u2019s leading decentralized finance platforms (DeFi) Poly Network has become a victim of a cyberheist in which hackers managed to steal $611 million worth of cryptocurrencies. However, hackers have started returning some of the stolen funds.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/most-supply-chain-attacks-target-suppliers-code-enisa.html\">Most Supply Chain Attacks Target Supplier\u2019s Code\u2014ENISA<\/a><\/span><\/p>\n<p>Cybersecurity experts have long been concerned about supply chain attacks because a single attack can wreak havoc and compromise a network of providers. According to the European Union Agency for Cybersecurity\u2019s (ENISA) Threat Landscape for Supply Chain Attacks, 62% of supply chain attacks use malware as a technique. The report also mentioned that strong security protection is no longer adequate for enterprises when attackers have already targeted suppliers.<\/p>\n<p><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/detecting-printnightmare-exploit-attempts-with-trend-micro-vision-one-and-cloud-one.html\">Detecting PrintNightmare Exploit Attempts using Trend Micro Vision One and Cloud One<\/a><\/span><\/p>\n<p>In this analysis, Trend Micro looks into the implementations of PrintNightmare and the visibility enabled by Trend Micro Vision One\u2122 and Trend Micro Cloud One\u2122 to mitigate the risks brought on by critical gaps found in systems such as the Print Spooler service. Using the indicators and attributes of exploitation attempts logged from network and endpoints, both platforms allow security teams and analysts a wider view of attack attempts for immediate and actionable response.<\/p>\n<p>What are your thoughts on the $600 million cryptocurrency heist? Share in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/www.twitter.com\/@JonLClay\" target=\"_blank\" rel=\"noopener\">@JonLClay<\/a>.<br \/>&nbsp;<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/this-week-in-security-news-august-13-2021.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Week in Security News: Hackers Steal $600 million in Largest Ever Cryptocurrency Heist and Cybersecurity is the New \u2018Great Game\u2019 Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42312,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9521,9511,9508,9522,9523],"class_list":["post-42311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-expert-perspective","tag-trend-micro-research-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-13T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News &#8211; August 13, 2021 VP, Threat Intelligence\",\"datePublished\":\"2021-08-13T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/\"},\"wordCount\":950,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Expert Perspective\",\"Trend Micro Research : Network\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/\",\"name\":\"This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg\",\"datePublished\":\"2021-08-13T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News &#8211; August 13, 2021 VP, Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-13T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News &#8211; August 13, 2021 VP, Threat Intelligence","datePublished":"2021-08-13T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/"},"wordCount":950,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Expert Perspective","Trend Micro Research : Network"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/","name":"This Week in Security News - August 13, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg","datePublished":"2021-08-13T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-13-2021-vp-threat-intelligence.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-13-2021-vp-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News &#8211; August 13, 2021 VP, Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42311"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42312"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}