TIDRONE Targets Military and Satellite Industries in Taiwan

Credit to Author: Pierre Lee| Date: Fri, 06 Sep 2024 00:00:00 +0000

Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones.

Read more

Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command

Credit to Author: Mhica Romero| Date: Thu, 05 Sep 2024 00:00:00 +0000

Notorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection.

Read more

How AI Goes Rogue

Credit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000

This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool

Credit to Author: Mohamed Fahmy| Date: Thu, 29 Aug 2024 00:00:00 +0000

Threat actors are targeting users in the Middle East by distributing sophisticated malware disguised as the Palo Alto GlobalProtect tool.

Read more

AI Pulse: Sticker Shock, Rise of the Agents, Rogue AI

Credit to Author: AI Team| Date: Thu, 29 Aug 2024 00:00:00 +0000

This issue of AI Pulse is all about agentic AI: what it is, how it works, and why security needs to be baked in from the start to prevent agentic AI systems from going rogue once they’re deployed.

Read more

Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem

Credit to Author: Abdelrahman Esmail| Date: Wed, 28 Aug 2024 00:00:00 +0000

A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

Read more

Complete Guide to Protecting Seven Attack Vectors

Credit to Author: Jon Clay| Date: Tue, 27 Aug 2024 00:00:00 +0000

The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface.

Read more

Confidence in GenAI: The Zero Trust Approach

Credit to Author: Sara Atie| Date: Thu, 22 Aug 2024 00:00:00 +0000

Enterprises have gone all-in on GenAI, but the more they depend on AI models, the more risks they face. Trend Vision One™ – Zero Trust Secure Access (ZTSA) – AI Service Access bridges the gap between access control and GenAI services to protect the user journey.

Read more