Trend Micro Research : ICS OT

An In-Depth Look at Crypto-Crime in 2023 Part 2

An In-Depth Look at Crypto-Crime in 2023 Part 2 2024-07-12 at 02:01 By In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. This article is an […]

React to this headline:

Loading spinner

An In-Depth Look at Crypto-Crime in 2023 Part 2 Read More »

A SANS’s 2024 Threat-Hunting Survey Review

A SANS’s 2024 Threat-Hunting Survey Review 2024-06-05 at 00:16 By In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A SANS’s 2024 Threat-Hunting Survey Review Read More »

Opening Critical Infrastructure: The Current State of Open RAN Security

Opening Critical Infrastructure: The Current State of Open RAN Security 01/12/2023 at 11:17 By The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

React to this headline:

Loading spinner

Opening Critical Infrastructure: The Current State of Open RAN Security Read More »

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores 24/10/2023 at 06:43 By In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane. This article is an excerpt from Trend

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores Read More »

Electric Power System Cybersecurity Vulnerabilities

Electric Power System Cybersecurity Vulnerabilities 10/10/2023 at 05:32 By Digitalization has changed the business environment of the electric power industry, exposing it to various threats. This webinar will help you uncover previously unnoticed threats and develop countermeasures and solutions. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Electric Power System Cybersecurity Vulnerabilities Read More »

Attacks on 5G Infrastructure From Users’ Devices

Attacks on 5G Infrastructure From Users’ Devices 20/09/2023 at 11:03 By Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed,

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From Users’ Devices Read More »

OT and IT Visibility and Efficiency Barriers

OT and IT Visibility and Efficiency Barriers 23/08/2023 at 20:48 By Learn the common OT and IT visibility and efficiency barriers, as well as how to get around them. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

OT and IT Visibility and Efficiency Barriers Read More »

Break IT/OT Silos by Expanding SOC Responsibilities

Break IT/OT Silos by Expanding SOC Responsibilities 04/08/2023 at 06:17 By The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Break IT/OT Silos by Expanding SOC Responsibilities Read More »

Human vs Machine Identity Risk Management

Human vs Machine Identity Risk Management 29/06/2023 at 10:33 By In today’s business world’s dynamic and ever-changing digital landscape, organizations encounter escalating security challenges that demand a more business-friendly and pertinent approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Human vs Machine Identity Risk Management Read More »

Scroll to Top