Cyclops Blink Sets Sights on Asus Routers

Credit to Author: Feike Hacquebord| Date: Thu, 17 Mar 2022 00:00:00 +0000

This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.

Read more

Will Russian Oil Ban Spur Increased Cyber-Attacks

Credit to Author: Ed Cabrera| Date: Wed, 09 Mar 2022 00:00:00 +0000

President Biden banned the sale of Russian oil to the United States to deprive the Putin regime of the economic resources needed to wage war. But this may put US companies in the firing line of cyber-attacks from the east.

Read more

Global Cyberattacks Tied to the Russian Invasion of Ukraine


Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.

Read more

Recent Cyberattacks Target Open-source Web Servers

Credit to Author: Jon Clay| Date: Tue, 22 Feb 2022 00:00:00 +0000

Malicious actors take advantage of people’s reliance on web servers to perform attacks like remote code execution, access control bypass, denial of service, or even cyberjacking the victim servers to mine cryptocurrencies.

Read more

Security Automation with Vision One & Palo Alto


Trend Micro Vision One™ integrates with Palo Alto Networks Cortex™ XSOAR to drive automated response to incidents uncovered by Vision One.

Read more

Investigating APT36 or Earth Karkaddan’s Attack Chain and Malware Arsenal


We investigated the most recent activities of APT36, also known as Earth Karkaddan, a politically motivated advanced persistent threat (APT) group, and discuss its use of CapraRAT, an Android RAT with clear similarities in design to the group’s favored Windows malware, Crimson RAT.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Credit to Author: Joseph C Chen| Date: Mon, 17 Jan 2022 00:00:00 +0000

Our technical brief provides an in-depth look at Earth Lusca’s activities, the tools it employs in attacks, and the infrastructure it uses.

Read more

Collecting In the Dark: Tropic Trooper Targets Transportation and Government

Credit to Author: Nick Dai| Date: Tue, 14 Dec 2021 00:00:00 +0000

Our long-term monitoring of the cyberespionage group Earth Centaur (aka Tropic Trooper) shows that the threat actors are equipped with new tools and techniques. The group seems to be targeting transportation companies and government agencies related to transportation.

Read more