Data Distribution Service: An Overview Part 1
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it.
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it.
Credit to Author: Kenneth Adrian Apostol| Date: Thu, 30 Jun 2022 00:00:00 +0000
We look into a recent attack orchestrated by the Black Basta ransomware ransomware group that used the banking trojan QakBot as a means of entry and movement and took advantage of the PrintNightmare vulnerability to perform privileged file operations.
Read moreCredit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.
Read moreCredit to Author: Shingo Matsugaya| Date: Mon, 27 Jun 2022 00:00:00 +0000
We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022.
Read moreCredit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000
Why cybersecurity is the first step to private network deployment
Read more
Cyber Warfare has been a topic of discussion for years but has reached a new level of prominence in this age of hyper-connected critical infrastructure. Our Trend Micro experts touch on this evolution, disinformation campaigns, and cyber mercenaries.
Credit to Author: Joseph C Chen| Date: Fri, 17 Jun 2022 00:00:00 +0000
We found updated samples of the CopperStealer malware infecting systems via websites hosting fake software.
Read moreCredit to Author: Hiroyuki Ueno| Date: Wed, 15 Jun 2022 00:00:00 +0000
Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.
Read moreCredit to Author: Don Ovid Ladores| Date: Wed, 08 Jun 2022 00:00:00 +0000
Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a new malware variant using different infection techniques compared to past iterations. We discuss our initial findings in this report.
Read moreCredit to Author: Bharat Mistry| Date: Mon, 06 Jun 2022 00:00:00 +0000
Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces.
Read more