Zero Trust Frameworks for Industry

Credit to Author: Alifiya Sadikali| Date: Wed, 09 Aug 2023 00:00:00 +0000

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Read more

TargetCompany Ransomware Abuses FUD Obfuscator Packers

Credit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Read more

Latest Batloader Campaigns Use Pyarmor Pro for Evasion

Credit to Author: Junestherry Dela Cruz| Date: Mon, 07 Aug 2023 00:00:00 +0000

In June 2023, Trend Micro observed an upgrade to the evasion techniques used by the Batloader initial access malware, which we’ve covered in previous blog entries.

Read more

Break IT/OT Silos by Expanding SOC Responsibilities

Credit to Author: Kazuhisa Tagaya| Date: Fri, 04 Aug 2023 00:00:00 +0000

The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks.

Read more

New SEC Cybersecurity Rules: What You Need to Know

Credit to Author: Greg Young| Date: Thu, 03 Aug 2023 00:00:00 +0000

The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization.

Read more

Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns

Credit to Author: Trend Micro Research| Date: Fri, 28 Jul 2023 00:00:00 +0000

Trend Micro’s Mobile Application Reputation Service (MARS) team discovered two new related Android malware families involved in cryptocurrency-mining and financially-motivated scam campaigns targeting Android users.

Read more