Cyberattacks are Prominent in the Russia-Ukraine Conflict

Credit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Read more

Global Cyberattacks Tied to the Russian Invasion of Ukraine


Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.

Read more

This Week in Security News – February 25, 2022

Credit to Author: Jon Clay| Date: Fri, 25 Feb 2022 00:00:00 +0000

Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions

Read more

Recent Cyberattacks Target Open-source Web Servers

Credit to Author: Jon Clay| Date: Tue, 22 Feb 2022 00:00:00 +0000

Malicious actors take advantage of people’s reliance on web servers to perform attacks like remote code execution, access control bypass, denial of service, or even cyberjacking the victim servers to mine cryptocurrencies.

Read more

Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network

Credit to Author: Luis Magisa| Date: Mon, 21 Feb 2022 00:00:00 +0000

A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic. We dive into old iterations of this malware, and also analyze the newest version.

Read more

Ukraine Cyberattack 2022: Geopolitical Cybersecurity


As geopolitical tensions rise, so does pressure to enhance corporate cyber-resilience

Read more

This Week in Security News – February 18, 2022

Credit to Author: Jon Clay| Date: Fri, 18 Feb 2022 00:00:00 +0000

SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors

Read more