Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Wed, 31 Aug 2022 00:00:00 +0000

This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”

Read more

New Golang Ransomware Agenda Customizes Attacks

Credit to Author: Mohamed Fahmy| Date: Thu, 25 Aug 2022 00:00:00 +0000

A new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa. This ransomware is called Agenda and is customized per victim.

Read more

Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users

Credit to Author: Daniel Lunghi| Date: Fri, 12 Aug 2022 00:00:00 +0000

We found APT group Iron Tiger’s malware compromising chat application Mimi’s servers in a supply chain attack.

Read more

CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies

Credit to Author: Jaromir Horejsi| Date: Thu, 11 Aug 2022 00:00:00 +0000

We tracked the latest deployment of the group behind CopperStealer, this time stealing cryptocurrencies and users’ wallet account information via a malicious Chromium-based browser extension.

Read more

Forecasting Metaverse Threats: Will it Become Metaworse?

Credit to Author: Trend Micro Research| Date: Tue, 09 Aug 2022 00:00:00 +0000

This report shares threat predictions concerning a rapidly evolving area of the physical and digital word – the metaverse. We refine our definition of the metaverse, while identifying threats against it and inside it.

Read more

How Shady Code Commits Compromise the Security of the Open-Source Ecosystem

Credit to Author: Trend Micro Research| Date: Mon, 11 Jul 2022 00:00:00 +0000

In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or backers. We also provide an analysis of what these incidents could mean for the IT industry and the open source community.

Read more

Conti vs. LockBit: A Comparative Analysis of Ransomware Groups

Credit to Author: Shingo Matsugaya| Date: Mon, 27 Jun 2022 00:00:00 +0000

We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022.

Read more

Private Network 5G Security Risks & Vulnerabilities

Credit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000

Why cybersecurity is the first step to private network deployment

Read more