Analysis and Impact of LockBit Ransomware’s First Linux and VMware ESXi Variant

Credit to Author: Junestherry Dela Cruz| Date: Mon, 24 Jan 2022 00:00:00 +0000

LockBit ransomware’s operators announced the release of its first Linux and ESXi variant in October. With samples also spotted in the wild, we discuss the impact and analysis of this variant.

Read more

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Credit to Author: Ian Kenefick| Date: Fri, 21 Jan 2022 00:00:00 +0000

We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection.

Read more

Codex Exposed: Task Automation and Response Consistency

Credit to Author: Forward-Looking Threat Research Team| Date: Fri, 21 Jan 2022 00:00:00 +0000

Being able to automate tasks or programmatically execute them unsupervised is an essential part of both regular and malicious computer usage, so we wondered if a tool like Codex was reliable enough to be scripted and left to run unsupervised, generating the required code.

Read more

This Week in Security News – January 21, 2022

Credit to Author: Jon Clay| Date: Fri, 21 Jan 2022 00:00:00 +0000

 This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Cybersecurity for Industrial Control Systems: Part 2

Credit to Author: Ericka Pingol| Date: Thu, 20 Jan 2022 00:00:00 +0000

To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.

Read more

Microservice Security: How to Proactively Protect Apps

Credit to Author: Melanie Tafelski| Date: Wed, 19 Jan 2022 00:00:00 +0000

Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you.

Read more

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Credit to Author: Joseph C Chen| Date: Mon, 17 Jan 2022 00:00:00 +0000

Our technical brief provides an in-depth look at Earth Lusca’s activities, the tools it employs in attacks, and the infrastructure it uses.

Read more

Cybersecurity for Industrial Control Systems: Part 1

Credit to Author: Trend Micro Research| Date: Sat, 15 Jan 2022 00:00:00 +0000

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats.

Read more