Category: Trend Micro Research, News and Perspectives

An In-Depth Look at ICS Vulnerabilities Part 3

This article has been indexed from Trend Micro Research, News and Perspectives In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common ICS-affecting vulnerabilities identified in 2021. Read the original…

An In-Depth Look at ICS Vulnerabilities Part 2

This article has been indexed from Trend Micro Research, News and Perspectives In part two of our three-part series, we continue to analyze vulnerabilities using MITRE ATT&CK. We also look into the sectors affected and their risk levels. Read the…

This Week in Security News – April 1, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Probing the activities of cloud-based cryptocurrency-mining groups, and Lapsus$ ‘back from vacation’ Read the original article: This Week in Security News – April 1, 2022

An In-Depth Look at ICS Vulnerabilities Part 1

This article has been indexed from Trend Micro Research, News and Perspectives In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS. Read the original article: An In-Depth…

An In-Depth Look at ICS Vulnerabilities Part 1

This article has been indexed from Trend Micro Research, News and Perspectives In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS. Read the original article: An In-Depth…

Terraform Tutorial: Drift Detection Strategies

This article has been indexed from Trend Micro Research, News and Perspectives A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps you can take to detect and mitigate Terraform…

This Week in Security News – March 25, 2022

This article has been indexed from Trend Micro Research, News and Perspectives An investigation of cryptocurrency scams and schemes, and Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal Read the original article: This Week in Security News – March 25,…

An Investigation of Cryptocurrency Scams and Schemes

This article has been indexed from Trend Micro Research, News and Perspectives We provide an overview of the diverse range of NFT- and cryptocurrency-related scams that malicious actors use to steal assets worldwide. Read the original article: An Investigation of…

Mitigate Top 5 Common Cybersecurity Vulnerabilities

This article has been indexed from Trend Micro Research, News and Perspectives Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five…

This Week in Security News – March 18, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Global Cyberattacks: Navigating New Frontiers: Trend Micro 2021 Annual Cybersecurity Report, and US Has ‘Significant’ Cyber Vulnerabilities, But A Sweeping Russian Cyberattack Is Unlikely Read the original article:…

Cyclops Blink Sets Sights on Asus Routers

This article has been indexed from Trend Micro Research, News and Perspectives This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control…

How to Build a Serverless API with Lambda and Node.js

This article has been indexed from Trend Micro Research, News and Perspectives Is your app server serving more stress than function? Explore this walkthrough for configuring and deploying a serverless API and discover the vast benefits of letting cloud services…

Utility Cybersecurity: Situational Awareness Cuts Risk

This article has been indexed from Trend Micro Research, News and Perspectives Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network. Read the original article: Utility Cybersecurity: Situational Awareness…

New Nokoyawa Ransomware Possibly Related to Hive

This article has been indexed from Trend Micro Research, News and Perspectives In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities…

New RURansom Wiper Targets Russia

This article has been indexed from Trend Micro Research, News and Perspectives We analyze RURansom, a malware variant discovered to be targeting Russia. Originally suspected to be a ransomware because of its name, analysis reveals RURansom to be a wiper.…

This Week in Security News March 4, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Global Cyberattacks: How to manage risk in times of chaos, and Ukraine-Russia cyber warzone splits cyber underground Read the original article: This Week in Security News March 4,…

Cyberattacks are Prominent in the Russia-Ukraine Conflict

This article has been indexed from Trend Micro Research, News and Perspectives Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified…

5 Cloud Native Security Platform Must-haves

This article has been indexed from Trend Micro Research, News and Perspectives Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend Micro) and Kelly Griffin (AWS). Read the original…

Why IaC Security Should Matter to CISOs

This article has been indexed from Trend Micro Research, News and Perspectives Explore how secure infrastructure-as-code (IaC) enables security leaders to help DevOps teams quickly deliver more business value. Read the original article: Why IaC Security Should Matter to CISOs

SMS PVA Part 2: Underground Service for Cybercriminals

This article has been indexed from Trend Micro Research, News and Perspectives In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services. Read the original article: SMS…

This Week in Security News – February 25, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions Read the original article: This…

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

This article has been indexed from Trend Micro Research, News and Perspectives As geopolitical tensions rise, so does pressure to enhance corporate cyber-resilience Read the original article: Ukraine Cyberattack 2022: Geopolitical Cybersecurity

This Week in Security News – February 18, 2022

This article has been indexed from Trend Micro Research, News and Perspectives SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors Read the original…

A Guide to the Well-Architected Framework

This article has been indexed from Trend Micro Research, News and Perspectives Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient,…

Security Automation with Vision One & Palo Alto

This article has been indexed from Trend Micro Research, News and Perspectives Trend Micro Vision One™ integrates with Palo Alto Networks Cortex™ XSOAR to drive automated response to incidents uncovered by Vision One. Read the original article: Security Automation with…

3 cybersecurity trends & mitigation strategies for CISOs

This article has been indexed from Trend Micro Research, News and Perspectives Explore 3 cyber security trends and how to strategically mitigate future risks with Trend Micro’s Jon Clay, VP of threat intelligence and Ed Cabrera, chief cybersecurity officer. Read…

A Cloud Native Application Protection Platform Guide

This article has been indexed from Trend Micro Research, News and Perspectives In this article we explore CNAPP, the latest industry acronym coined by Gartner, and why devs need to know about it. Read the original article: A Cloud Native…

Cryptojacking Attacks Target Alibaba ECS Instances

This article has been indexed from Trend Micro Research, News and Perspectives Discover how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. Read the original article: Cryptojacking Attacks Target Alibaba ECS Instances

Codex Exposed: Helping Hackers in Training?

This article has been indexed from Trend Micro Research, News and Perspectives How useful is the Codex code generator as a potential training tool? Read the original article: Codex Exposed: Helping Hackers in Training?

This Week in Security News – January 28th, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the…

Defending Users’ NAS Devices From Evolving Threats

This article has been indexed from Trend Micro Research, News and Perspectives In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices. Read the original article: Defending Users’ NAS Devices From Evolving Threats

Microservice Security: How to Proactively Protect Apps

This article has been indexed from Trend Micro Research, News and Perspectives Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you. Read…

Cybersecurity for Industrial Control Systems: Part 1

This article has been indexed from Trend Micro Research, News and Perspectives In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. Read…

Analyzing an Old Bug and Discovering CVE-2021-30995

This article has been indexed from Trend Micro Research, News and Perspectives A vulnerability found in 2021 has been patched and re-patched in the months since it was reported. We analyze the bug and outline the process that led to…

This Week in Security News – January 7th, 2022

This article has been indexed from Trend Micro Research, News and Perspectives This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read the…

Workshop: Building Modern Applications with DevOps Security

This article has been indexed from Trend Micro Research, News and Perspectives In this workshop, you’ll learn how to leverage DevOps Security with your serverless applications running on AWS Lambda or containerized applications running on AWS Fargate. Learn how to…

Top 5 DevOps Resource Center Articles of 2021

This article has been indexed from Trend Micro Research, News and Perspectives We look back on the 5 most popular DevOps Resource Center articles in 2021 to help you build at your best in 2022. Read the original article: Top…

How to detect Apache HTTP Server Exploitation

This article has been indexed from Trend Micro Research, News and Perspectives With recent news of the critical, zero-day vulnerability Apache Log4Shell, we explore how to detect and protect your Apache HTTP servers. Read the original article: How to detect…

2022 Cybersecurity Trends for DevSecOps

This article has been indexed from Trend Micro Research, News and Perspectives Trying to adopt DevSecOps culture? Or already in the thick of it? Trend Research explores the cybersecurity trends for 2022 to enhance your security strategy and get the…

Are Endpoints at Risk for Log4Shell Attacks?

This article has been indexed from Trend Micro Research, News and Perspectives We created a free assessment tool for scanning devices to know whether it is at risk for Log4Shell attacks. Read the original article: Are Endpoints at Risk for…

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

This article has been indexed from Trend Micro Research, News and Perspectives We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign. Read the original article: Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

A Look Into Purple Fox’s Server Infrastructure

This article has been indexed from Trend Micro Research, News and Perspectives By examining Purple Fox’s routines and activities, both with our initial research and the subject matter we cover in this blog post, we hope to help incident responders,…

This Week in Security News – December 10, 2021

This article has been indexed from Trend Micro Research, News and Perspectives This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.…

Cybersecurity Trends for 2022

This article has been indexed from Trend Micro Research, News and Perspectives Explore Trend Micro Research’s security insights and predictions for 2022 to enable more informed and proactive decision-making. Read the original article: Cybersecurity Trends for 2022

This Week in Security News – December 3, 2021

This article has been indexed from Trend Micro Research, News and Perspectives This week, learn about how Squirrelwaffle utilized ProxyLogon and ProxyShell to hack email chains. Also, read on a recent data breach of the Los Angeles Planned Parenthood Network.…

Analyzing How TeamTNT Used Compromised Docker Hub Accounts

This article has been indexed from Trend Micro Research, News and Perspectives Following our previous disclosure of compromised Docker hub accounts delivering cryptocurrency miners, we analyze these accounts and discover more malicious actions that you need to be aware of.…

What You Can Do to Mitigate Cloud Misconfigurations

This article has been indexed from Trend Micro Research, News and Perspectives Cloud misconfigurations can become opportunities for cyberattacks or lead to data breaches. Organizations must mitigate them before incurring significant and costly consequences. Read the original article: What You…

A Complete Guide to Cloud-Native Application Security

This article has been indexed from Trend Micro Research, News and Perspectives Explore this comprehensive guide to application security, which provides an overview of the importance of embedding runtime application security controls in the application build workflow to protect cloud-native…

A Guide to Ransomware: Prevention and Response

This article has been indexed from Trend Micro Research, News and Perspectives This article will provide guidelines aimed at helping readers understand how to detect and prevent ransomware and limit its effect. Read the original article: A Guide to Ransomware:…

Groups Target Alibaba ECS Instances for Cryptojacking

This article has been indexed from Trend Micro Research, News and Perspectives We looked at how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. Read the original article: Groups Target Alibaba ECS Instances…

QAKBOT Loader Returns With New Techniques and Tools

This article has been indexed from Trend Micro Research, News and Perspectives QAKBOT operators resumed email spam operations towards the end of September after an almost three-month hiatus. QAKBOT detection has become a precursor to many critical and widespread ransomware…

Cybersecurity Trends from the Global Pandemic

This article has been indexed from Trend Micro Research, News and Perspectives The past 18 months have presented new technology and challenges at an accelerated pace. The only way to keep up with a continuous demand for new features, running…

November Continues Streak of Quiet Patch Tuesdays

This article has been indexed from Trend Micro Research, News and Perspectives November continues a recent pattern of relatively peaceful Patch Tuesday cycles. There were only six vulnerabilities rated as Critical this month, with 49 more rated as Important for…

Void Balaur and the Rise of the Cybermercenary Industry

This article has been indexed from Trend Micro Research, News and Perspectives One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world. Read…