Trend Micro Research : Cyber Threats

Reduce Business Email Compromise with Collaboration

Reduce Business Email Compromise with Collaboration 2024-01-18 at 22:16 By Here’s the latest Trend Vision One™ platform integration addressing the growing need for collaboration in business email security space. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Reduce Business Email Compromise with Collaboration Read More »

How the EU Cyber Resilience Act Impacts Manufacturers

How the EU Cyber Resilience Act Impacts Manufacturers 12/12/2023 at 22:01 By EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How the EU Cyber Resilience Act Impacts Manufacturers Read More »

Analyzing AsyncRAT’s Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases

Analyzing AsyncRAT’s Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases 11/12/2023 at 12:17 By This blog entry delves into MxDR’s unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications. This article is an excerpt from Trend

React to this headline:

Loading spinner

Analyzing AsyncRAT’s Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases Read More »

Web Security Expands into Secure Service Edge (SSE)

Web Security Expands into Secure Service Edge (SSE) 09/12/2023 at 03:02 By Trend has been securing web access for over a decade with forward-looking innovation and a global footprint to support our customer’s security strategy. We are committed to our customers’ journey of transforming their current security posture, aligning with Zero Trust principles, and embracing

React to this headline:

Loading spinner

Web Security Expands into Secure Service Edge (SSE) Read More »

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics 07/12/2023 at 22:16 By Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics Read More »

Opening Critical Infrastructure: The Current State of Open RAN Security

Opening Critical Infrastructure: The Current State of Open RAN Security 01/12/2023 at 11:17 By The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

React to this headline:

Loading spinner

Opening Critical Infrastructure: The Current State of Open RAN Security Read More »

ParaSiteSnatcher: How Malicious Chrome Extensions Target Brazil

ParaSiteSnatcher: How Malicious Chrome Extensions Target Brazil 23/11/2023 at 11:31 By We detail the modular framework of malicious Chrome extensions that consist of various highly obfuscated components that leverage Google Chrome API to monitor, intercept, and exfiltrate victim data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

ParaSiteSnatcher: How Malicious Chrome Extensions Target Brazil Read More »

Zero Day Threat Protection for Your Network

Zero Day Threat Protection for Your Network 06/11/2023 at 11:32 By Explore the world of zero day threats and gain valuable insight into the importance of proactive detection and remediation. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Zero Day Threat Protection for Your Network Read More »

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores 24/10/2023 at 06:43 By In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane. This article is an excerpt from Trend

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores Read More »

Electric Power System Cybersecurity Vulnerabilities

Electric Power System Cybersecurity Vulnerabilities 10/10/2023 at 05:32 By Digitalization has changed the business environment of the electric power industry, exposing it to various threats. This webinar will help you uncover previously unnoticed threats and develop countermeasures and solutions. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Electric Power System Cybersecurity Vulnerabilities Read More »

APT34 Deploys Phishing Attack With New Malware

APT34 Deploys Phishing Attack With New Malware 29/09/2023 at 12:17 By We observed and tracked the advanced persistent threat (APT) APT34 group with a new malware variant accompanying a phishing attack comparatively similar to the SideTwist backdoor malware. Following the campaign, the group abused a fake license registration form of an African government agency to

React to this headline:

Loading spinner

APT34 Deploys Phishing Attack With New Malware Read More »

Attacks on 5G Infrastructure From Users’ Devices

Attacks on 5G Infrastructure From Users’ Devices 20/09/2023 at 11:03 By Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed,

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From Users’ Devices Read More »

Unsung Hero in Cyber Risk Management

Unsung Hero in Cyber Risk Management 19/09/2023 at 20:49 By Behind the scenes of the world of vulnerability intelligence and threat hunting This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Unsung Hero in Cyber Risk Management Read More »

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 01/09/2023 at 12:04 By In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign. This article is an excerpt

React to this headline:

Loading spinner

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership Read More »

Earth Estries Targets Government, Tech for Cyberespionage

Earth Estries Targets Government, Tech for Cyberespionage 30/08/2023 at 12:46 By We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and procedures (TTPs) employed, we observed overlaps with the advanced persistent threat (APT) group FamousSparrow as Earth Estries targets governments and organizations in the

React to this headline:

Loading spinner

Earth Estries Targets Government, Tech for Cyberespionage Read More »

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO 21/08/2023 at 20:16 By Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden’s cybersecurity executive order. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO Read More »

Tech Consolidation – How and When?

Tech Consolidation – How and When? 02/08/2023 at 21:02 By Streamlining IT for business optimal business performance This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Tech Consolidation – How and When? Read More »

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Detecting BPFDoor Backdoor Variants Abusing BPF Filters 13/07/2023 at 13:02 By An analysis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Detecting BPFDoor Backdoor Variants Abusing BPF Filters Read More »

Hunting for A New Stealthy Universal Rootkit Loader

Hunting for A New Stealthy Universal Rootkit Loader 11/07/2023 at 11:18 By In this entry, we discuss the findings of our investigation into a piece of a signed rootkit, whose main binary functions as a universal loader that enables attackers to directly load a second-stage unsigned kernel module. This article is an excerpt from Trend

React to this headline:

Loading spinner

Hunting for A New Stealthy Universal Rootkit Loader Read More »

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

Tailing Big Head Ransomware’s Variants, Tactics, and Impact 07/07/2023 at 15:33 By We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware. This article is an excerpt from

React to this headline:

Loading spinner

Tailing Big Head Ransomware’s Variants, Tactics, and Impact Read More »

Scroll to Top