Earth Zhulong: Familiar Patterns Target Southeast Asian Firms

Credit to Author: Ted Lee| Date: Wed, 08 Feb 2023 00:00:00 +0000

In 2022, we discovered Earth Zhulong, a hacking group that has been targeting Asian firms similar to another well-known threat actor. In this article, we unravel their new tactics, techniques and procedures that they apply on their misdeeds.

Read more

Lower Data Breach Insurance Costs with These Tips

Credit to Author: Vince Kearns| Date: Thu, 16 Feb 2023 00:00:00 +0000

The changing attack landscape has resulted in the hardening of the data breach insurance market. Gain insight into how implementing security controls can reduce the mean time to detect and control the costliness of an attack.

Read more

Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns

Credit to Author: Hara Hiroaki| Date: Thu, 16 Feb 2023 00:00:00 +0000

We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.

Read more

5 Cloud Security Challenges Solved by CNAPP

Credit to Author: Michael Langford| Date: Tue, 14 Feb 2023 00:00:00 +0000

Configuration errors are a major cause of cloud security challenges for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Read more

Earth Zhulong: Familiar Patterns Target Vietnam

Credit to Author: Ted Lee| Date: Wed, 08 Feb 2023 00:00:00 +0000

In 2022, we discovered Earth Zhulong, a hacking group that has been targeting Vietnam’s telecom, technology, and media sectors similar to another well-known threat actor. In this article, we unravel their new tactics, techniques and procedures that they apply on their misdeeds.

Read more

A Cybersecurity Risk Assessment Guide for Leaders

Credit to Author: Jon Clay| Date: Tue, 07 Feb 2023 00:00:00 +0000

Cybersecurity risk assessment provides the continuous asset detection, analysis, prioritization, and risk scoring needed to keep pace with a continuously growing digital attack surface.

Read more

Hijacking Your Bandwidth: How Proxyware Apps Open You Up to Risk

Credit to Author: Trend Micro Research| Date: Tue, 07 Feb 2023 00:00:00 +0000

In this investigation, we analyzed several prominent “passive income” applications and found out that there may be security risks upon participating in these programs.

Read more