Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Credit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000

We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.

Read more

Conti vs. LockBit: A Comparative Analysis of Ransomware Groups

Credit to Author: Shingo Matsugaya| Date: Mon, 27 Jun 2022 00:00:00 +0000

We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022.

Read more

Private Network 5G Security Risks & Vulnerabilities

Credit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000

Why cybersecurity is the first step to private network deployment

Read more

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform


In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more unified approach to managing cyber risk. Trend Micro co-founder & CEO Eva Chen discusses our vision and strategy for delivering a unified cybersecurity platform.

Read more

Examples of Cyber Warfare #TrendTalksBizSec


Cyber Warfare has been a topic of discussion for years but has reached a new level of prominence in this age of hyper-connected critical infrastructure. Our Trend Micro experts touch on this evolution, disinformation campaigns, and cyber mercenaries.

Read more

Azure vs. AWS Developer Tools

Credit to Author: Michael Langford| Date: Wed, 22 Jun 2022 00:00:00 +0000

Both AWS and Azure developer tools provide key efficiencies in your DevOps environment, learn the comparison between tools, any overlap, and use cases for both.

Read more

State of OT Security in 2022: Big Survey Key Insights

Credit to Author: Hiroyuki Ueno| Date: Wed, 15 Jun 2022 00:00:00 +0000

Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.

Read more