Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics

Credit to Author: Joyce Huang| Date: Thu, 07 Dec 2023 00:00:00 +0000

Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool

Read more

Cloud Security Predictions at AWS re:Invent 2023

Credit to Author: Jon Clay| Date: Mon, 27 Nov 2023 00:00:00 +0000

Heading to AWS re:Invent 2023? Don’t miss out on our talk with Melinda Marks, ESG Practice Director for Cybersecurity, about cloud detection and response (CDR) and what’s trending in cloud security.

Read more

100 Quarters of Profitability: Insights from a Trender

Credit to Author: Jon Clay| Date: Tue, 14 Nov 2023 00:00:00 +0000

Learn what 100 straight quarters of profitability means to a Trender who has been here for every one of them.

Read more

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

Credit to Author: Cedric Pernet| Date: Fri, 27 Oct 2023 00:00:00 +0000

This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.

Read more

DarkGate Opens Organizations for Attack via Skype, Teams

Credit to Author: Trent Bessell| Date: Thu, 12 Oct 2023 00:00:00 +0000

We detail an ongoing campaign abusing messaging platforms Skype and Teams to distribute the DarkGate malware to targeted organizations. We also discovered that once DarkGate is installed on the victim’s system, additional payloads were introduced to the environment.

Read more

Decoding Turla: Trend Micro’s MITRE Performance

Credit to Author: Shannon Murphy| Date: Thu, 21 Sep 2023 00:00:00 +0000

This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro’s 100% successful protection performance.

Read more

Attacks on 5G Infrastructure From Users’ Devices

Credit to Author: Salim S.I.| Date: Wed, 20 Sep 2023 00:00:00 +0000

Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed, efficiency, and productivity brought by 5G. This entry describes CVE-2021-45462 as a potential use case to deploy a denial-of-service (DoS) attack to private 5G networks.

Read more

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership

Credit to Author: Paul Pajares| Date: Fri, 01 Sep 2023 00:00:00 +0000

In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign.

Read more

TargetCompany Ransomware Abuses FUD Obfuscator Packers

Credit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Read more