This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One™ enters as the evolution of Trend Micro’s endpoint security solution for enterprise. Also, learn about Java Usage Tracker’s new weakness and the conditions that enabled the exploit.
Read on:
Trend Micro Redefines Endpoint Security with Apex One™
Apex One™ combines a breadth of threat detection & response capability with investigative features, in a single agent.
CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows
Trend Micro found design flaw/weakness in Java Usage Tracker that can enable hackers to create arbitrary files, inject attacker-specified parameters, and elevate local privileges.
Trend Micro Converges EDR, Endpoint Security Protection in Apex One
Trend Micro announced its Apex One endpoint security offering, which integrates malware prevention technology with endpoint detection and response (EDR) capabilities.
The FDA is Embracing Ethical Hackers in its Push to Secure Medical Devices
With medical device cyberattacks on the rise, the Food and Drug Administration is turning to ethical hackers to help regulators and manufacturers root out vulnerabilities.
Post-Brexit Britain Could Be A Cybersecurity Nightmare With Or Without A Deal
Whether or not the UK leaves the EU with a Brexit deal, the impact upon cybersecurity and the skills shortage is likely to be considerable and immediate.
Cybersecurity Faces a Worldwide Shortage of Almost 3 Million Staff
New research reveals a worldwide cybersecurity skills gap of 2.9 million, with the Asia-Pacific region experiencing the highest shortage at 2.14 million.
Facebook Finds Hack Was Done by Spammers, Not Foreign State
Facebook believes that the hackers who gained access to the private information of 30 million users were spammers looking to make money through deceptive advertising.
Do you think many organizations will discontinue tackling endpoint threats with two separate tools? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.
Read More HERE