How the EU Cyber Resilience Act Impacts Manufacturers
Credit to Author: Jon Clay| Date: Tue, 12 Dec 2023 00:00:00 +0000
EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols.
Read moreCredit to Author: Jon Clay| Date: Tue, 12 Dec 2023 00:00:00 +0000
EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols.
Read moreCredit to Author: Buddy Tancio| Date: Mon, 11 Dec 2023 00:00:00 +0000
This blog entry delves into MxDR’s unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications.
Read moreCredit to Author: Greg Young| Date: Thu, 07 Dec 2023 00:00:00 +0000
Every year, experts weigh in with predictions of what the big cybersecurity trends will be—but how often are they right? That’s the question Trend Micro’s Greg Young and Bill Malik asked recently on their Real Cybersecurity podcast, looking at what forecasters got wrong on a wide range of topics, from AI to human factors.
Read moreCredit to Author: Joyce Huang| Date: Thu, 07 Dec 2023 00:00:00 +0000
Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool
Read moreCredit to Author: Alifiya Sadikali| Date: Wed, 06 Dec 2023 00:00:00 +0000
Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what CISOs need to look for in an ASM solution.
Read moreCredit to Author: Salim S.I.| Date: Fri, 01 Dec 2023 00:00:00 +0000
The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.
Read moreCredit to Author: Jon Clay| Date: Mon, 27 Nov 2023 00:00:00 +0000
Heading to AWS re:Invent 2023? Don’t miss out on our talk with Melinda Marks, ESG Practice Director for Cybersecurity, about cloud detection and response (CDR) and what’s trending in cloud security.
Read moreCredit to Author: Alifiya Sadikali| Date: Mon, 27 Nov 2023 00:00:00 +0000
Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution.
Read moreCredit to Author: Aliakbar Zahravi| Date: Thu, 23 Nov 2023 00:00:00 +0000
We detail the modular framework of malicious Chrome extensions that consist of various highly obfuscated components that leverage Google Chrome API to monitor, intercept, and exfiltrate victim data.
Read moreCredit to Author: Hitomi Kimura| Date: Wed, 22 Nov 2023 00:00:00 +0000
The Trend Micro Managed XDR team encountered malicious operations that used techniques similar to the ones used by Genesis Market, a website for facilitating fraud that was taken down in April 2023.
Read more