SMS PVA Services’ Use of Infected Android Phones Reveals Flaws in SMS Verification

Credit to Author: Zhengyu Dong| Date: Tue, 15 Feb 2022 00:00:00 +0000

Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities.

Read more

This Week in Security News – January 28th, 2022

Credit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.

Read more

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems


In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Credit to Author: Ian Kenefick| Date: Fri, 21 Jan 2022 00:00:00 +0000

We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection.

Read more

This Week in Security News – January 21, 2022

Credit to Author: Jon Clay| Date: Fri, 21 Jan 2022 00:00:00 +0000

 This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Credit to Author: Joseph C Chen| Date: Mon, 17 Jan 2022 00:00:00 +0000

Our technical brief provides an in-depth look at Earth Lusca’s activities, the tools it employs in attacks, and the infrastructure it uses.

Read more

What to Do About Log4j

Credit to Author: William Malik| Date: Tue, 21 Dec 2021 00:00:00 +0000

Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the immediate crisis abates.

Read more

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Credit to Author: Abraham Camba| Date: Fri, 17 Dec 2021 00:00:00 +0000

We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign.

Read more