A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

Credit to Author: Sunil Bharti| Date: Wed, 14 Sep 2022 00:00:00 +0000

This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and blocked the abuse of the CVE-2020-14882 WebLogic vulnerability in affected endpoints.

Read more

Pros and Cons of 5G

Credit to Author: William Malik| Date: Tue, 13 Sep 2022 00:00:00 +0000

As private 5G networks continue to roll-out, CISOs and security leaders need to fully aware of the security implications to minimize cyber risk. Explore pros and cons as well as security tips for implementing private 5G.

Read more

Security Breaks: TeamTNT’s DockerHub Credentials Leak

Credit to Author: Nitesh Surana| Date: Mon, 12 Sep 2022 00:00:00 +0000

One of our honeypots based on exposed Docker REST APIs showed cybercriminal group TeamTNT’s potential attack scenario and leak of container registry credentials for docker-abuse malware. The full version of this research will be presented at the c0c0n XV Hacking and Cyber Security Conference in September 2022.

Read more

How Malicious Actors Abuse Native Linux Tools in Attacks

Credit to Author: Nitesh Surana| Date: Thu, 08 Sep 2022 00:00:00 +0000

Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact.

Read more

CIEM vs CWPP vs CSPM

Credit to Author: Michael Langford| Date: Thu, 08 Sep 2022 00:00:00 +0000

This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Read more

Biden Cybersecurity Executive Order: Ex-USSS Reflects

Credit to Author: Ed Cabrera| Date: Thu, 08 Sep 2022 00:00:00 +0000

Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the effectiveness of Biden’s executive order and what organizations of all sizes can learn from it.

Read more

Enhancing Cloud Security by Reducing Container Images Through Distroless Techniques

Credit to Author: Alfredo Oliveira| Date: Wed, 07 Sep 2022 00:00:00 +0000

We analyzed the Distroless technique for reducing the size of container images and explored its capabilities to address security concerns. We provide an alternative approach to Distroless that reduces the attack surface for malicious actors targeting cloud-native applications while optimizing cloud resources.

Read more

Top 5 Cloud Security Trends from AWS re:Inforce 2022

Credit to Author: Caitlyn Hughes| Date: Fri, 02 Sep 2022 00:00:00 +0000

With the industry changing so rapidly, it is often hard to keep up with what is new in cloud security, so we thought we would put together a list of the top five cloud security trends we found during AWS re:Inforce 2022.

Read more

Hybrid Cloud Security Challenges & Solutions

Credit to Author: Mike Milner| Date: Tue, 06 Sep 2022 00:00:00 +0000

Explore hybrid cloud security challenges, components, and tips to minimize your cyber risk.

Read more