{"id":14591,"date":"2020-11-12T09:00:41","date_gmt":"2020-11-12T08:00:41","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14591"},"modified":"2020-11-24T19:07:53","modified_gmt":"2020-11-24T18:07:53","slug":"cert-w-newsletter-october-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/","title":{"rendered":"CERT-W Newsletter October 2020"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14582\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Image-1-4.png\" alt=\"\" width=\"1263\" height=\"395\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Image-1-4.png 1263w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Image-1-4-437x137.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Image-1-4-71x22.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Image-1-4-768x240.png 768w\" sizes=\"auto, (max-width: 1263px) 100vw, 1263px\" \/><\/p>\n<table style=\"width: 0%; height: 294px;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;\" colspan=\"2\">\n<h1><strong>Monthly indicators<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP ATTACK<\/strong><\/td>\n<td style=\"width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/www.soprasteria.com\/newsroom\/press-releases\/details\/cyberattack-information-update\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 10px; border-color: #ffffff; text-align: left;\" colspan=\"2\">French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version of the Ryuk ransomware, previously unknown to antivirus software providers and security agencies. Fortunately, according to Guillaume POUPARD, ANSSI\u2019s managing director, the attack was foiled.<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP RANSOM<\/strong><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/threatpost.com\/software-ag-data-clop-ransomware\/160042\/\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #21a6a6; text-decoration: underline;\">SOFTWARE AG DATA RELEASED AFTER CLOP RANSOMWARE STRIKE<\/span><\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 10px; width: 100%; border-color: #ffffff; text-align: left;\" colspan=\"2\">The <strong>Clop<\/strong> group attacked Software AG, a German conglomerate with operations in more than <strong>70 countries<\/strong>, threatening to dump stolen data if the whopping <strong>$23 million ransom<\/strong> isn\u2019t paid.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><span style=\"color: #333333;\"><strong>TOP EXPLOIT<\/strong><\/span><\/td>\n<td style=\"width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/threatpost.com\/3-month-apple-hack-vulnerabilities-critical\/159988\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>WORMABLE APPLE ICLOUD BUG ALLOWS AUTOMATIC PHOTO THEFT<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 37px; text-align: left;\" colspan=\"2\">As part of Apple\u2019s Security Bounty, a group of ethical hackers discovered <strong>55 vulnerabilities<\/strong>, earning <strong>$300,000<\/strong>. Some of the more interesting vulnerabilities abled wormable stored <strong>Cross-Site Scripting<\/strong> and <strong>command injection<\/strong>. Here is the <a href=\"https:\/\/samcurry.net\/hacking-apple\/\"><strong>link<\/strong><\/a> to an extensive blog post detailing the team\u2019s findings.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP LEAK<\/strong><\/td>\n<td style=\"width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;\"><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/cybercriminals-extort-psychotherapy-patients-following-vastaamo-breach\/d\/d-id\/1339280?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>VASTAAMO BREACH: HACKERS BLACKMAILING PSYCHOTHERAPY PATIENTS<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 35px; text-align: left;\" colspan=\"2\">Cybercriminals have hacked the systems of psychotherapy giant <strong>Vastaamo<\/strong>, and are now reaching out to therapy patients, threatening to dump their patient files if they do not pay a ransom. They have already reportedly posted <strong>the details of 300 Vastaamo patients<\/strong>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%; height: 212px;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 0.947867%; height: 89px; border: 0px solid #21a6a6; text-align: left;\" colspan=\"2\">\n<h1><strong>Cybercrime watch<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/us-treasury-sanctions-russian-institution-linked-to-triton-malware\/d\/d-id\/1339265?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>US TREASURY SANCTIONS RUSSIAN INSTITUTION LINKED TO TRITON MALWARE<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 0.947867%; height: 23px; border-color: #ffffff; text-align: left;\" colspan=\"2\">Triton, also known as TRISIS and HatMan, was developed to target and <strong>manipulate industrial control systems<\/strong>, the US Treasury reports<strong>.<\/strong> The US Department of the Treasury&#8217;s Office of Foreign Assets Control has sanctioned a Russian government research institution connected to the Triton malware.<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/threatpost.com\/doj-charges-6-sandworm-apt-members-in-notpetya-cyberattacks\/160304\/\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #21a6a6; text-decoration: underline;\">US DOJ CHARGES 6 SANDWORM APT MEMBERS IN NOTPETYA CYBERATTACK<\/span><\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 23px; width: 0.947867%; border-color: #ffffff; text-align: left;\" colspan=\"2\">The Department of Justice (DOJ) announced charges against <strong>six Russian nationals<\/strong> who are allegedly tied to the Sandworm APT. The threat group is believed to have launched several high-profile cyberattacks over the past few years \u2013 including the destructive NotPetya cyberattack that\u00a0<a href=\"https:\/\/threatpost.com\/notpetya-linked-to-industroyer-attack-on-ukraine-energy-grid\/138287\/\">targeted hundreds of firms and hospitals worldwide in 2017.<\/a><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 0.947867%; height: 21px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/thedfirreport.com\/2020\/11\/05\/ryuk-speed-run-2-hours-to-ransom\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>RYUK RANSOMWARE GANG USES ZEROLOGON BUG FOR LIGHTNING-FAST ATTACK<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"width: 0.947867%; border-color: #ffffff; height: 10px; text-align: left;\" colspan=\"2\">The gang behind the Ryuk ransomware has added a new tool to their arsenal, which allowed them to significantly <strong>decrease the time needed to fully encrypt the target system to 2 hours<\/strong>. For more information concerning exploits of the <strong>Zerologon<\/strong> vulnerability click <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/10\/29\/attacks-exploiting-netlogon-vulnerability-cve-2020-1472\/\">here<\/a>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;\" colspan=\"2\">\n<h1><strong>Vulnerability watch<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><strong>CVE-2020-5135<\/strong><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5135\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>CRITICAL VULNERABILITY ALLOWS HACKERS TO DISRUPT SONICWALL FIREWALLS<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 23px; border-color: #ffffff; text-align: left;\" colspan=\"2\"><strong>CVSS score : 9.8 CRITICAL<\/strong><\/p>\n<p>A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall.<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><strong>CVE-2020-16898<\/strong><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5135\"><span style=\"color: #21a6a6;\"><b><u>WINDOWS TCP\/IP REMOTE CODE EXECUTION VULNERABILITY<\/u><\/b><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 23px; width: 100%; border-color: #ffffff; text-align: left;\" colspan=\"2\"><strong>CVSS score : 8.8 HIGH<\/strong><\/p>\n<p>A remote code execution vulnerability exists when the Windows TCP\/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><strong>CVE-2020-16947<\/strong><\/td>\n<td style=\"width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5135\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>MICROSOFT OUTLOOK REMOTE CODE EXECUTION VULNERABILITY<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 119px; text-align: left;\" colspan=\"2\"><strong>CVSS score : 8.8 HIGH<\/strong><\/p>\n<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka &#8216;Microsoft Outlook Remote Code Execution Vulnerability&#8217;.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Monthly indicators TOP ATTACK SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":14576,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3487,3486,3405,3479,2944,2878],"coauthors":[3488],"class_list":["post-14591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-cert-w-en","tag-cybercrime","tag-incident-response-cert-w-en","tag-indicators","tag-newsletter","tag-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CERT-W Newsletter October 2020 - Risk Insight<\/title>\n<meta name=\"description\" content=\"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CERT-W Newsletter October 2020 - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-12T08:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-24T18:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"CERT-W Newsletter October 2020\",\"datePublished\":\"2020-11-12T08:00:41+00:00\",\"dateModified\":\"2020-11-24T18:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\"},\"wordCount\":504,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT-W\",\"cybercrime\",\"incident response CERT-W\",\"indicators\",\"Newsletter\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\",\"name\":\"CERT-W Newsletter October 2020 - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-11-12T08:00:41+00:00\",\"dateModified\":\"2020-11-24T18:07:53+00:00\",\"description\":\"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CERT-W Newsletter October 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CERT-W Newsletter October 2020 - Risk Insight","description":"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/","og_locale":"en_US","og_type":"article","og_title":"CERT-W Newsletter October 2020 - Risk Insight","og_description":"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-11-12T08:00:41+00:00","article_modified_time":"2020-11-24T18:07:53+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"CERT-W Newsletter October 2020","datePublished":"2020-11-12T08:00:41+00:00","dateModified":"2020-11-24T18:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/"},"wordCount":504,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CERT-W","cybercrime","incident response CERT-W","indicators","Newsletter","Vulnerabilities"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/","name":"CERT-W Newsletter October 2020 - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2020-11-12T08:00:41+00:00","dateModified":"2020-11-24T18:07:53+00:00","description":"CERT-W October 2020 newsletter has been published to help you find the latest indicators and news on cybersecurity.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/cert-w-newsletter-october-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"CERT-W Newsletter October 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14591"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14591\/revisions"}],"predecessor-version":[{"id":14743,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14591\/revisions\/14743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14576"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14591"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}