Category: Trend Micro Research, News and Perspectives

This Week in Security News – February 25, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions Read the original article: This…

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

This article has been indexed from Trend Micro Research, News and Perspectives As geopolitical tensions rise, so does pressure to enhance corporate cyber-resilience Read the original article: Ukraine Cyberattack 2022: Geopolitical Cybersecurity

This Week in Security News – February 18, 2022

This article has been indexed from Trend Micro Research, News and Perspectives SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors Read the original…

A Guide to the Well-Architected Framework

This article has been indexed from Trend Micro Research, News and Perspectives Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient,…

Security Automation with Vision One & Palo Alto

This article has been indexed from Trend Micro Research, News and Perspectives Trend Micro Vision One™ integrates with Palo Alto Networks Cortex™ XSOAR to drive automated response to incidents uncovered by Vision One. Read the original article: Security Automation with…

3 cybersecurity trends & mitigation strategies for CISOs

This article has been indexed from Trend Micro Research, News and Perspectives Explore 3 cyber security trends and how to strategically mitigate future risks with Trend Micro’s Jon Clay, VP of threat intelligence and Ed Cabrera, chief cybersecurity officer. Read…

A Cloud Native Application Protection Platform Guide

This article has been indexed from Trend Micro Research, News and Perspectives In this article we explore CNAPP, the latest industry acronym coined by Gartner, and why devs need to know about it. Read the original article: A Cloud Native…

Cryptojacking Attacks Target Alibaba ECS Instances

This article has been indexed from Trend Micro Research, News and Perspectives Discover how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. Read the original article: Cryptojacking Attacks Target Alibaba ECS Instances

Codex Exposed: Helping Hackers in Training?

This article has been indexed from Trend Micro Research, News and Perspectives How useful is the Codex code generator as a potential training tool? Read the original article: Codex Exposed: Helping Hackers in Training?

This Week in Security News – January 28th, 2022

This article has been indexed from Trend Micro Research, News and Perspectives Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the…

Defending Users’ NAS Devices From Evolving Threats

This article has been indexed from Trend Micro Research, News and Perspectives In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices. Read the original article: Defending Users’ NAS Devices From Evolving Threats

Microservice Security: How to Proactively Protect Apps

This article has been indexed from Trend Micro Research, News and Perspectives Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you. Read…

Cybersecurity for Industrial Control Systems: Part 1

This article has been indexed from Trend Micro Research, News and Perspectives In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. Read…

Analyzing an Old Bug and Discovering CVE-2021-30995

This article has been indexed from Trend Micro Research, News and Perspectives A vulnerability found in 2021 has been patched and re-patched in the months since it was reported. We analyze the bug and outline the process that led to…

This Week in Security News – January 7th, 2022

This article has been indexed from Trend Micro Research, News and Perspectives This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read the…

Workshop: Building Modern Applications with DevOps Security

This article has been indexed from Trend Micro Research, News and Perspectives In this workshop, you’ll learn how to leverage DevOps Security with your serverless applications running on AWS Lambda or containerized applications running on AWS Fargate. Learn how to…

Top 5 DevOps Resource Center Articles of 2021

This article has been indexed from Trend Micro Research, News and Perspectives We look back on the 5 most popular DevOps Resource Center articles in 2021 to help you build at your best in 2022. Read the original article: Top…

How to detect Apache HTTP Server Exploitation

This article has been indexed from Trend Micro Research, News and Perspectives With recent news of the critical, zero-day vulnerability Apache Log4Shell, we explore how to detect and protect your Apache HTTP servers. Read the original article: How to detect…

2022 Cybersecurity Trends for DevSecOps

This article has been indexed from Trend Micro Research, News and Perspectives Trying to adopt DevSecOps culture? Or already in the thick of it? Trend Research explores the cybersecurity trends for 2022 to enhance your security strategy and get the…

Are Endpoints at Risk for Log4Shell Attacks?

This article has been indexed from Trend Micro Research, News and Perspectives We created a free assessment tool for scanning devices to know whether it is at risk for Log4Shell attacks. Read the original article: Are Endpoints at Risk for…

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

This article has been indexed from Trend Micro Research, News and Perspectives We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign. Read the original article: Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

A Look Into Purple Fox’s Server Infrastructure

This article has been indexed from Trend Micro Research, News and Perspectives By examining Purple Fox’s routines and activities, both with our initial research and the subject matter we cover in this blog post, we hope to help incident responders,…

This Week in Security News – December 10, 2021

This article has been indexed from Trend Micro Research, News and Perspectives This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.…

Cybersecurity Trends for 2022

This article has been indexed from Trend Micro Research, News and Perspectives Explore Trend Micro Research’s security insights and predictions for 2022 to enable more informed and proactive decision-making. Read the original article: Cybersecurity Trends for 2022

This Week in Security News – December 3, 2021

This article has been indexed from Trend Micro Research, News and Perspectives This week, learn about how Squirrelwaffle utilized ProxyLogon and ProxyShell to hack email chains. Also, read on a recent data breach of the Los Angeles Planned Parenthood Network.…

Analyzing How TeamTNT Used Compromised Docker Hub Accounts

This article has been indexed from Trend Micro Research, News and Perspectives Following our previous disclosure of compromised Docker hub accounts delivering cryptocurrency miners, we analyze these accounts and discover more malicious actions that you need to be aware of.…

What You Can Do to Mitigate Cloud Misconfigurations

This article has been indexed from Trend Micro Research, News and Perspectives Cloud misconfigurations can become opportunities for cyberattacks or lead to data breaches. Organizations must mitigate them before incurring significant and costly consequences. Read the original article: What You…

A Complete Guide to Cloud-Native Application Security

This article has been indexed from Trend Micro Research, News and Perspectives Explore this comprehensive guide to application security, which provides an overview of the importance of embedding runtime application security controls in the application build workflow to protect cloud-native…

A Guide to Ransomware: Prevention and Response

This article has been indexed from Trend Micro Research, News and Perspectives This article will provide guidelines aimed at helping readers understand how to detect and prevent ransomware and limit its effect. Read the original article: A Guide to Ransomware:…

Groups Target Alibaba ECS Instances for Cryptojacking

This article has been indexed from Trend Micro Research, News and Perspectives We looked at how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. Read the original article: Groups Target Alibaba ECS Instances…

QAKBOT Loader Returns With New Techniques and Tools

This article has been indexed from Trend Micro Research, News and Perspectives QAKBOT operators resumed email spam operations towards the end of September after an almost three-month hiatus. QAKBOT detection has become a precursor to many critical and widespread ransomware…

Cybersecurity Trends from the Global Pandemic

This article has been indexed from Trend Micro Research, News and Perspectives The past 18 months have presented new technology and challenges at an accelerated pace. The only way to keep up with a continuous demand for new features, running…

November Continues Streak of Quiet Patch Tuesdays

This article has been indexed from Trend Micro Research, News and Perspectives November continues a recent pattern of relatively peaceful Patch Tuesday cycles. There were only six vulnerabilities rated as Critical this month, with 49 more rated as Important for…

Void Balaur and the Rise of the Cybermercenary Industry

This article has been indexed from Trend Micro Research, News and Perspectives One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world. Read…