What will it take to improve cybersecurity in the problem-plagued healthcare industry?

Infection by mouseover – what you need to know about PowerPoint spam
Malware-laced PowerPoint files are nothing new – but several recent spam campaigns have added a new twist.

FIN7 Hitting Restaurants with Fileless Malware
A campaign attributed to the FIN7 attackers targets restaurants with phishing emails and infected RTF Word documents that carry out fileless malware attacks.

Patrick Wardle on MacRansom Ransomware-as-a-Service
Patrick Wardle of Synack and the Objective-See blog talks to Mike Mimoso about the emergence of a ransomware service targeting MacOS machines. Wardle explains why he characterizes MacRansom as “lame” and whether this could kick off a wave of copycats…

Microsoft Patches Two Critical Vulnerabilities Under Attack
Microsoft patched 95 vulnerabilities today, including two under attack.

Attackers Mining Cryptocurrency Using Exploits for Samba Vulnerability
Kaspersky Lab said it has seen some of the first exploits targeting a patched Samba vulnerability, and those are being used to mine Monero cryptocurrency.

Blinking Router LEDs Leak Data From Air-Gapped Networks
Researchers say sensitive data can be extracted from air-gapped networks via a wireless router’s blinking LEDs.

Word exploits weaponised in quick time
The normal lifecycle of an Office exploit can take months – what makes this latest Word exploit different?

Threatpost News Wrap, June 9, 2017
How EternalBlue was ported to Windows 10, a Facebook phishing study, QakBot, and this week’s Apple security announcements are all discussed.

Platinum APT First to Abuse Intel Chip Management Feature
Microsoft has found a file-transfer tool used by the Platinum APT that leverages Intel Active Management Technology to stealthily load malware onto networked computers.