Category: EN

Know Before You Go: AppOmni at RSAC 2025

Check out AppOmni at RSA Conference 2025 and read up on our top picks of sessions-to-watch. There’s a lot to choose from, but don’t worry we’ve narrowed it down for you! The post Know Before You Go: AppOmni at RSAC…

GTC 2025: AI, Security & The New Blueprint

From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: GTC 2025: AI, Security & The New…

Oracle says its cloud was in fact compromised

Reliability, honesty, accuracy. And then there’s this lot Oracle has briefed some customers about a successful intrusion into its public cloud, as well as the theft of their data, after previously denying it had been compromised.… This article has been…

Salt Security and CrowdStrike Strengthen Partnership

Salt Security has announced API integrations with the CrowdStrike Falcon® platform to enhance and accelerate API discovery, posture governance and threat protection. This integration allows for rapid API discovery through a new Foundry application and provides real-time threat insights via…

AWS completes the 2025 Cyber Essentials Plus certification

Amazon Web Services (AWS) is pleased to announce the successful renewal of the United Kingdom Cyber Essentials Plus certification. The Cyber Essentials Plus certificate is valid for one year until March 21, 2026. Cyber Essentials Plus is a UK Government-backed,…

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-31161 CrushFTP Authentication Bypass Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the…

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app that employs password-protected uninstallation to prevent removal. This app, which abuses built-in Android features like overlay permissions and device admin access, exemplifies the escalating technical sophistication…

Threat Actors Weaponize Windows Screensavers Files to Deliver Malware

Malware operators continue exploiting the Windows Screensaver (.scr) file format to distribute malicious payloads, leveraging its executable nature under the guise of harmless system files. Recent campaigns observed by cybersecurity researchers reveal advanced tactics targeting global enterprises through sophisticated phishing…

Auto-Color Linux Backdoor: TTPs and Internal Architecture Exposed

A newly identified Linux backdoor named “Auto-Color,” first observed between November and December 2024, has been targeting government organizations and universities across North America and Asia. This malware, initially disguised as a benign color-enhancement tool, employs sophisticated tactics, techniques, and…