Nov 16, 2018

APT report for 2018-11-15

TRANSNATIONAL / UNKNOWN

  1. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  2. One In Five Magecart Infected Stores Gets Reinfected Within Days
  3. 20% of MageCart-compromised merchants get reinfected within days
  4. 20% of MageCart-compromised merchants get reinfected within days
  5. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  6. Skimmed BA and Newegg Customer Card Details Up for Sale
  7. InfoWars online store hit by Magecart
  8. Alex Jones's InfoWars online store hit by Magecart
  9. One in five Magecart-infected stores get reinfected within days

CHINA

  1. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs

INDIA

Nil

NORTH KOREA

Nil

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. Compromising vital infrastructure: air traffic control
  2. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  3. WannaCry Still Impacts Thousands of Systems Every Month

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-11-15

WINDOWS

  1. Should Windows Users Worry About Ransomware in 2019?
  2. 'DarkGate' miner, password-stealer could open up world of hurt for Windows users
  3. WannaCry Still Impacts Thousands of Systems Every Month
  4. 63 new vulnerabilities found in Windows

LINUX

  1. Linux Based Crypto-Mining Malware
  2. Find vulnerabilities using nikto

UNIX

Nil

ANDROID

  1. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  2. Fake cryptocurrency Wallets Apps on Google Play Steal User Credentials and Mimic as Legitimate Wallets

IOS

  1. 500 Percent Increase in macOS/iOS Ransomware Attacks During 1H 2018
  2. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities

MACOS

  1. 500 Percent Increase in macOS/iOS Ransomware Attacks During 1H 2018
  2. VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
  3. Creating and Analyzing a Malicious PDF File with PDF-Parser Tool

Threat report for 2018-11-15

DATA BREACH & DATA LOSS

  1. My Health Record extension highlights lingering security, privacy concerns
  2. Firefox Now Alerts You of Website Data Breaches While You're Browsing the Web
  3. Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
  4. Firefox warns if the website you're visiting suffered a data breach
  5. 20% of MageCart-compromised merchants get reinfected within days
  6. 20% of MageCart-compromised merchants get reinfected within days
  7. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  8. Report: Microsoft’s enterprise products covertly gather personal data on users
  9. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  10. A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
  11. Law firm uncovers exposed sensitive details about top attorney online. @mazzazone gives the details:
  12. #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
  13. Nordstrom is notifying employees of a data breach that exposed their personal information, including names, Social Security numbers, dates of
  14. Data breach at Nordstrom
  15. My Health Record remains opt-out as Senate passes privacy amendments
  16. Symantec Honored for its Collaboration With Leading Industry Group to Protect Against Business Email Compromise Scams

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. G Suite Adds Advanced Password Controls
  2. Man Sends Bomb to Cryptopay for Denying a Password Change Request
  3. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  4. 5 Ways #Cybercriminals Can Access Your Emails Without #Phishing [Infographic]:
  5. Phishing Emails with .COM Extensions Are Hitting Finance Departments
  6. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  7. A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
  8. Phishing fraudsters set their sights on online storage portals
  9. 'DarkGate' miner, password-stealer could open up world of hurt for Windows users
  10. Learn why @Google chose U2F authentication over OTP to eliminate #PhishingEmails from expert Michael Cobb of @thehairyITdog.
  11. Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs
  12. Smashing Security #104: The world’s most evil phishing test, and cyborgs in the workplace

WEB DEFACEMENT

Nil

BOTNET

  1. Deep Instinct recently blogged about a new #botnet -- dubbed #Mylobot -- that has shown new, complex tools and techniques.
  2. Bots on a plane? Bad bots cause unique cyber-security issues for airlines

RANSOMWARE

  1. Should Windows Users Worry About Ransomware in 2019?
  2. 500 Percent Increase in macOS/iOS Ransomware Attacks During 1H 2018
  3. Ransomware Continues to Be Top Threat to Small Companies
  4. Ransomware Attack Strikes Media Prima

CRYPTOMINING & CRYPTOCURRENCIES

  1. Linux Based Crypto-Mining Malware
  2. Official Google Twitter account hacked in Bitcoin scam
  3. A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
  4. How is the Trezor cryptocurrency online wallet under attack?
  5. Cryptocurrency fraud is the exception, not the rule
  6. Fake cryptocurrency Wallets Apps on Google Play Steal User Credentials and Mimic as Legitimate Wallets
  7. Access Control Acronyms: ACL, RBAC, ABAC, PBAC, RAdAC, and a Dash of CBAC
  8. Cryptowerk introduces blockchain-based technology to certify data integrity of digital assets
  9. The ABC of the Hong Kong tech scene: A - AI, B - blockchain, C - cloud

MALWARE

  1. Proofpoint: Hackers testing new reconnaissance malware on financial institutions
  2. A RAT Just Made It in the Global Threat Index’s Top 10
  3. Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers
  4. Cyber Crooks Diversify Business with Multi-Intent Malware
  5. Linux Based Crypto-Mining Malware
  6. Cloud, China, Generic Malware Top Security Concerns for 2019
  7. Brazilian Users Under Attack From Metamorfo Banking Trojan
  8. #WebCache poisoning poses a serious threat to #BrowserSecurity. Learn how #hackers can use unkeyed inputs for malicious intent from expert
  9. 14 Malware Families Targeting E-Commerce Brands Ahead of Black Friday
  10. #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
  11. Carpet (IT) to Concrete (OT) – The Evolution of Internet-Based Malware
  12. Creating and Analyzing a Malicious PDF File with PDF-Parser Tool
  13. I forgot to follow up on this… According to Apple, the process could take up to 7 days. It

EXPLOIT

  1. Fresh exploit takes the shackles off disabled PHP functions
  2. What is the impact of cyber espionage? @MikaSusiEK from Confederation of Finnish Industries EK discusses, how to tackle the growing

VULNERABILITY

  1. Vulnerability: Emojis can kill Skype for Business
  2. IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk
  3. Unpatched Microsoft Word Video Feature Vulnerability is Being Exploited In The Wild
  4. 7 New Meltdown and Spectre Level Vulnerabilities Discovered that Affected ARM, Intel & AMD CPU’s
  5. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  6. VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
  7. Cisco Stealthwatch Management Console and Unity Express Critical Vulnerabilities Threat Alert
  8. Popular AMP Plugin for WordPress Patches Critical Flaw – Update Now
  9. Is Your Vulnerability Management Program Efficient and Successful?
  10. Find vulnerabilities using nikto
  11. Facebook fixed a new security bug
  12. 63 new vulnerabilities found in Windows

Region brief for 2018-11-15

ASIA

  1. Ransomware Continues to Be Top Threat to Small Companies
  2. Cloud, China, Generic Malware Top Security Concerns for 2019
  3. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  4. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  5. VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
  6. Cisco Stealthwatch Management Console and Unity Express Critical Vulnerabilities Threat Alert
  7. Ransomware Attack Strikes Media Prima
  8. WannaCry Still Impacts Thousands of Systems Every Month
  9. The ABC of the Hong Kong tech scene: A - AI, B - blockchain, C - cloud

OCEANIA

  1. Cryptocurrency fraud is the exception, not the rule
  2. WannaCry Still Impacts Thousands of Systems Every Month
  3. My Health Record remains opt-out as Senate passes privacy amendments

NORTH AMERICA

  1. Compromising vital infrastructure: air traffic control
  2. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  3. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  4. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  5. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  6. Skimmed BA and Newegg Customer Card Details Up for Sale
  7. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  8. WannaCry Still Impacts Thousands of Systems Every Month
  9. Data breach at Nordstrom

SOUTH AMERICA

  1. Brazilian Users Under Attack From Metamorfo Banking Trojan

EUROPE

  1. Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
  2. Compromising vital infrastructure: air traffic control
  3. Man Sends Bomb to Cryptopay for Denying a Password Change Request
  4. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  5. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  6. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  7. Report: Microsoft’s enterprise products covertly gather personal data on users
  8. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  9. Skimmed BA and Newegg Customer Card Details Up for Sale
  10. InfoWars online store hit by Magecart
  11. Alex Jones's InfoWars online store hit by Magecart
  12. What is the impact of cyber espionage? @MikaSusiEK from Confederation of Finnish Industries EK discusses, how to tackle the growing
  13. WannaCry Still Impacts Thousands of Systems Every Month
  14. 63 new vulnerabilities found in Windows

AFRICA

Nil

Sector brief for 2018-11-15

HEALTHCARE

  1. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  2. WannaCry Still Impacts Thousands of Systems Every Month

TRANSPORT

  1. Compromising vital infrastructure: air traffic control
  2. Bots on a plane? Bad bots cause unique cyber-security issues for airlines

BANKING & FINANCE

  1. Proofpoint: Hackers testing new reconnaissance malware on financial institutions
  2. Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
  3. Compromising vital infrastructure: air traffic control
  4. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  5. 20% of MageCart-compromised merchants get reinfected within days
  6. 20% of MageCart-compromised merchants get reinfected within days
  7. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  8. Phishing Emails with .COM Extensions Are Hitting Finance Departments
  9. Brazilian Users Under Attack From Metamorfo Banking Trojan
  10. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  11. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  12. 14 Malware Families Targeting E-Commerce Brands Ahead of Black Friday
  13. Phishing fraudsters set their sights on online storage portals
  14. Skimmed BA and Newegg Customer Card Details Up for Sale
  15. InfoWars online store hit by Magecart
  16. Alex Jones's InfoWars online store hit by Magecart
  17. Cryptocurrency fraud is the exception, not the rule
  18. Ransomware Attack Strikes Media Prima
  19. Access Control Acronyms: ACL, RBAC, ABAC, PBAC, RAdAC, and a Dash of CBAC

INFORMATION & TELECOMMUNICATION

  1. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  2. Vulnerability: Emojis can kill Skype for Business
  3. 5 Ways #Cybercriminals Can Access Your Emails Without #Phishing [Infographic]:
  4. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  5. Official Google Twitter account hacked in Bitcoin scam
  6. Law firm uncovers exposed sensitive details about top attorney online. @mazzazone gives the details:
  7. #ThreatHuntThursday: How to hunt for lateral movement by #PSExec. Check out our new blog post by @sp1nl0ck on how remote
  8. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  9. #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
  10. Cryptocurrency fraud is the exception, not the rule
  11. Nordstrom is notifying employees of a data breach that exposed their personal information, including names, Social Security numbers, dates of
  12. Facebook fixed a new security bug
  13. I forgot to follow up on this… According to Apple, the process could take up to 7 days. It

FOOD

Nil

WATER

Nil

ENERGY

Nil

GOVERNMENT & PUBLIC SERVICE

  1. My Health Record extension highlights lingering security, privacy concerns
  2. Compromising vital infrastructure: air traffic control
  3. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  4. Report: Microsoft’s enterprise products covertly gather personal data on users
  5. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  6. Cryptocurrency fraud is the exception, not the rule
  7. My Health Record remains opt-out as Senate passes privacy amendments
  8. Symantec Honored for its Collaboration With Leading Industry Group to Protect Against Business Email Compromise Scams

Daily brief for 2018-11-15

ASIA

  1. Ransomware Continues to Be Top Threat to Small Companies
  2. Cloud, China, Generic Malware Top Security Concerns for 2019
  3. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  4. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  5. VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
  6. Cisco Stealthwatch Management Console and Unity Express Critical Vulnerabilities Threat Alert
  7. Ransomware Attack Strikes Media Prima
  8. WannaCry Still Impacts Thousands of Systems Every Month
  9. The ABC of the Hong Kong tech scene: A - AI, B - blockchain, C - cloud

WORLD

  1. Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
  2. Compromising vital infrastructure: air traffic control
  3. Man Sends Bomb to Cryptopay for Denying a Password Change Request
  4. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  5. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  6. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  7. Brazilian Users Under Attack From Metamorfo Banking Trojan
  8. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  9. Report: Microsoft’s enterprise products covertly gather personal data on users
  10. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  11. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  12. Skimmed BA and Newegg Customer Card Details Up for Sale
  13. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  14. InfoWars online store hit by Magecart
  15. Alex Jones's InfoWars online store hit by Magecart
  16. Cryptocurrency fraud is the exception, not the rule
  17. What is the impact of cyber espionage? @MikaSusiEK from Confederation of Finnish Industries EK discusses, how to tackle the growing
  18. WannaCry Still Impacts Thousands of Systems Every Month
  19. Data breach at Nordstrom
  20. 63 new vulnerabilities found in Windows
  21. My Health Record remains opt-out as Senate passes privacy amendments

ATTACKS

  1. My Health Record extension highlights lingering security, privacy concerns
  2. G Suite Adds Advanced Password Controls
  3. Firefox Now Alerts You of Website Data Breaches While You're Browsing the Web
  4. Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
  5. Man Sends Bomb to Cryptopay for Denying a Password Change Request
  6. Firefox warns if the website you're visiting suffered a data breach
  7. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  8. 20% of MageCart-compromised merchants get reinfected within days
  9. 20% of MageCart-compromised merchants get reinfected within days
  10. 5 Ways #Cybercriminals Can Access Your Emails Without #Phishing [Infographic]:
  11. Phishing Emails with .COM Extensions Are Hitting Finance Departments
  12. Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
  13. Report: Microsoft’s enterprise products covertly gather personal data on users
  14. Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
  15. A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
  16. Phishing fraudsters set their sights on online storage portals
  17. Law firm uncovers exposed sensitive details about top attorney online. @mazzazone gives the details:
  18. 'DarkGate' miner, password-stealer could open up world of hurt for Windows users
  19. #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
  20. Learn why @Google chose U2F authentication over OTP to eliminate #PhishingEmails from expert Michael Cobb of @thehairyITdog.
  21. Nordstrom is notifying employees of a data breach that exposed their personal information, including names, Social Security numbers, dates of
  22. Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs
  23. Data breach at Nordstrom
  24. My Health Record remains opt-out as Senate passes privacy amendments
  25. Symantec Honored for its Collaboration With Leading Industry Group to Protect Against Business Email Compromise Scams
  26. Smashing Security #104: The world’s most evil phishing test, and cyborgs in the workplace

THREATS

  1. Should Windows Users Worry About Ransomware in 2019?
  2. Proofpoint: Hackers testing new reconnaissance malware on financial institutions
  3. A RAT Just Made It in the Global Threat Index’s Top 10
  4. 500 Percent Increase in macOS/iOS Ransomware Attacks During 1H 2018
  5. Vulnerability: Emojis can kill Skype for Business
  6. Ransomware Continues to Be Top Threat to Small Companies
  7. Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers
  8. Cyber Crooks Diversify Business with Multi-Intent Malware
  9. Linux Based Crypto-Mining Malware
  10. Cloud, China, Generic Malware Top Security Concerns for 2019
  11. Brazilian Users Under Attack From Metamorfo Banking Trojan
  12. #WebCache poisoning poses a serious threat to #BrowserSecurity. Learn how #hackers can use unkeyed inputs for malicious intent from expert
  13. 14 Malware Families Targeting E-Commerce Brands Ahead of Black Friday
  14. Official Google Twitter account hacked in Bitcoin scam
  15. IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk
  16. A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
  17. Unpatched Microsoft Word Video Feature Vulnerability is Being Exploited In The Wild
  18. 7 New Meltdown and Spectre Level Vulnerabilities Discovered that Affected ARM, Intel & AMD CPU’s
  19. How is the Trezor cryptocurrency online wallet under attack?
  20. Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
  21. VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
  22. Cisco Stealthwatch Management Console and Unity Express Critical Vulnerabilities Threat Alert
  23. #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
  24. Popular AMP Plugin for WordPress Patches Critical Flaw – Update Now
  25. Cryptocurrency fraud is the exception, not the rule
  26. Fake cryptocurrency Wallets Apps on Google Play Steal User Credentials and Mimic as Legitimate Wallets
  27. Ransomware Attack Strikes Media Prima
  28. Access Control Acronyms: ACL, RBAC, ABAC, PBAC, RAdAC, and a Dash of CBAC
  29. Carpet (IT) to Concrete (OT) – The Evolution of Internet-Based Malware
  30. Is Your Vulnerability Management Program Efficient and Successful?
  31. Creating and Analyzing a Malicious PDF File with PDF-Parser Tool
  32. Find vulnerabilities using nikto
  33. Facebook fixed a new security bug
  34. 63 new vulnerabilities found in Windows
  35. I forgot to follow up on this… According to Apple, the process could take up to 7 days. It
  36. Cryptowerk introduces blockchain-based technology to certify data integrity of digital assets
  37. The ABC of the Hong Kong tech scene: A - AI, B - blockchain, C - cloud

CRIME

  1. My Health Record extension highlights lingering security, privacy concerns
  2. Proofpoint: Hackers testing new reconnaissance malware on financial institutions
  3. Man Sends Bomb to Cryptopay for Denying a Password Change Request
  4. Suspected Russian cybercriminal arrested in Bulgaria at U.S. request, lawyer says
  5. Ransomware Continues to Be Top Threat to Small Companies
  6. Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
  7. RiskIQ’s 2018 Black Friday E-commerce Blacklist: Key Intel for This Year’s Mega Shopping Weekend
  8. Phishing Emails with .COM Extensions Are Hitting Finance Departments
  9. Official Google Twitter account hacked in Bitcoin scam
  10. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  11. Skimmed BA and Newegg Customer Card Details Up for Sale
  12. Cryptocurrency fraud is the exception, not the rule
  13. Symantec Honored for its Collaboration With Leading Industry Group to Protect Against Business Email Compromise Scams

POLITICS

  1. Compromising vital infrastructure: air traffic control
  2. Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs
  3. What is the impact of cyber espionage? @MikaSusiEK from Confederation of Finnish Industries EK discusses, how to tackle the growing
  4. Facebook fixed a new security bug