How to Use Zero Trust Security for the Hybrid Cloud

Credit to Author: William Malik| Date: Wed, 02 Feb 2022 00:00:00 +0000

Securing the hybrid cloud can be complex. Explore how CISOs can use the zero trust security approach for more proactive protection.

Read more

This Week in Security News – January 28th, 2022

Credit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.

Read more

3 Remote Work Security Tips for CISOs

Credit to Author: Greg Young| Date: Fri, 28 Jan 2022 00:00:00 +0000

How can CISOs manage remote work security? Explore 3 tips to secure networks, endpoints, and users.

Read more

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems


In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

TianySpy Malware Uses Smishing Disguised as Message From Telco


Trend Micro confirmed a new mobile malware infection chain targeting both Android and iPhone devices. The malware might have been designed to steal credentials associated with membership websites of major Japanese telecommunication services.

Read more

Investigating APT36 or Earth Karkaddan’s Attack Chain and Malware Arsenal


We investigated the most recent activities of APT36, also known as Earth Karkaddan, a politically motivated advanced persistent threat (APT) group, and discuss its use of CapraRAT, an Android RAT with clear similarities in design to the group’s favored Windows malware, Crimson RAT.

Read more