Global Cyberattacks Tied to the Russian Invasion of Ukraine
Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.
Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.
In this final part, we discuss the countries most affected by SMS PVA services as well as lay out several recommendations to mitigate the risks of such threats.
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.
Credit to Author: Jon Clay| Date: Fri, 25 Feb 2022 00:00:00 +0000
Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions
Read more
In this three-part blog entry, our team explored SMS PVA, a service built on top of a global bot network that compromises smartphone cybersecurity as we know it.
Credit to Author: Zhengyu Dong| Date: Tue, 15 Feb 2022 00:00:00 +0000
Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities.
Read moreCredit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.
Read more
In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.
Credit to Author: Ian Kenefick| Date: Fri, 21 Jan 2022 00:00:00 +0000
We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection.
Read moreCredit to Author: Jon Clay| Date: Fri, 21 Jan 2022 00:00:00 +0000
This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.
Read more