Analyzing the FUD Malware Obfuscation Engine BatCloak

Credit to Author: Peter Girnus| Date: Fri, 09 Jun 2023 00:00:00 +0000

We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.

Read more

Impulse Team’s Massive Years-Long Mostly-Undetected Cryptocurrency Scam

Credit to Author: Cedric Pernet| Date: Tue, 06 Jun 2023 00:00:00 +0000

We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team.

Read more

Xollam, the Latest Face of TargetCompany

Credit to Author: Earle Maui Earnshaw| Date: Tue, 06 Jun 2023 00:00:00 +0000

This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants’ behaviors and the ransomware family’s extortion scheme.

Read more

Trend is a Launch Partner for Amazon Security Lake

Credit to Author: Erin Sindelar| Date: Fri, 02 Jun 2023 00:00:00 +0000

Trend Micro is proud to be a launch partner for Amazon Security Lake, which puts the customer in control, making critical data available to them from third-party security and analytics solutions of their choice.

Read more

Generative AI: What Every CISO Needs to Know

Credit to Author: Greg Young| Date: Thu, 01 Jun 2023 00:00:00 +0000

New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them.

Read more

Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals

Credit to Author: Feike Hacquebord| Date: Tue, 30 May 2023 00:00:00 +0000

Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu’s motives seem to have changed since at least October 2022.

Read more

New Info Stealer Bandit Stealer Targets Browsers, Wallets

Credit to Author: Sarah Pearl Camiling| Date: Fri, 26 May 2023 00:00:00 +0000

This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets.

Read more

Health Industry Cybersecurity Best Practices 2023

Credit to Author: Kazuhisa Tagaya| Date: Thu, 25 May 2023 00:00:00 +0000

This blog explains the new resources of health industry cybersecurity practices and landscape analysis which the HHS (U.S. Department of Health and Human Services) released in Apr 2023.

Read more