Play Ransomware’s Attack Playbook Similar to that of Hive, Nokoyawa

Credit to Author: Don Ovid Ladores| Date: Tue, 06 Sep 2022 00:00:00 +0000

Play is a new ransomware that takes a page out of Hive and Nokoyawa’s playbook. The many similarities among them indicate that Play, like Nokoyawa, are operated by the same people.

Read more

Play Ransomware’s Attack Playbook Unmasks it as Another Hive Affiliate like Nokoyawa

Credit to Author: Don Ovid Ladores| Date: Tue, 06 Sep 2022 00:00:00 +0000

Play is a new ransomware that takes a page out of Hive and Nokoyawa’s playbook. The many similarities among them indicate that Play, like Nokoyawa, may be a Hive affiliate.

Read more

Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm

Credit to Author: Vickie Su| Date: Fri, 02 Sep 2022 00:00:00 +0000

In March 2021, we investigated a backdoor with a unique modular architecture and called it BumbleBee due to a string embedded in the malware. However, in our recent investigations, we have discovered a controller application that expands its capabilities.

Read more

Metaverse Broadband Infrastructure Security

Credit to Author: William Malik| Date: Thu, 01 Sep 2022 00:00:00 +0000

The metaverse is coming—but what does that mean for network infrastructure? We explore expected changes, network challenges, and tips for enhancing network security to minimize cyber risk across the attack surface.

Read more

Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Wed, 31 Aug 2022 00:00:00 +0000

This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”

Read more

Cyber Security Managed Services 101

Credit to Author: William Malik| Date: Tue, 30 Aug 2022 00:00:00 +0000

MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can help your business and tips for making an informed partner decision.

Read more

New Golang Ransomware Agenda Customizes Attacks

Credit to Author: Mohamed Fahmy| Date: Thu, 25 Aug 2022 00:00:00 +0000

A new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa. This ransomware is called Agenda and is customized per victim.

Read more

Unlocking Serverless with AWS Lambda and IAM

Credit to Author: Braden Collingwood| Date: Thu, 25 Aug 2022 00:00:00 +0000

Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.

Read more

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Credit to Author: Ryan Soliven| Date: Wed, 24 Aug 2022 00:00:00 +0000

We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.

Read more

4 Cybersecurity Budget Management Tips

Credit to Author: Greg Young| Date: Tue, 23 Aug 2022 00:00:00 +0000

Learn how CISOs can use automation, strategic budgeting and internal training to run more productive cybersecurity teams amid a skills shortage.

Read more