Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Credit to Author: Joseph C Chen| Date: Mon, 17 Jan 2022 00:00:00 +0000

Our technical brief provides an in-depth look at Earth Lusca’s activities, the tools it employs in attacks, and the infrastructure it uses.

Read more

What to Do About Log4j

Credit to Author: William Malik| Date: Tue, 21 Dec 2021 00:00:00 +0000

Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the immediate crisis abates.

Read more

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Credit to Author: Abraham Camba| Date: Fri, 17 Dec 2021 00:00:00 +0000

We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign.

Read more

This Week in Security News – December 10, 2021

Credit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000

This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.

Read more