An In-Depth Look at ICS Vulnerabilities Part 1
In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS.
In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS.
Credit to Author: Mayra Rosario Fuentes| Date: Tue, 29 Mar 2022 00:00:00 +0000
One of the recent trends we’ve observed is the rise of cloud-based cryptocurrency-mining groups that exploit cloud resources, specifically the CPU power of deployed cloud instances, to mine cryptocurrency.
Read moreCredit to Author: Jon Clay| Date: Fri, 25 Mar 2022 00:00:00 +0000
An investigation of cryptocurrency scams and schemes, and Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal
Read moreCredit to Author: Cifer Fang| Date: Thu, 24 Mar 2022 00:00:00 +0000
We provide an overview of the diverse range of NFT- and cryptocurrency-related scams that malicious actors use to steal assets worldwide.
Read moreCredit to Author: Jon Clay| Date: Fri, 18 Mar 2022 00:00:00 +0000
Global Cyberattacks: Navigating New Frontiers: Trend Micro 2021 Annual Cybersecurity Report, and US Has ‘Significant’ Cyber Vulnerabilities, But A Sweeping Russian Cyberattack Is Unlikely
Read moreCredit to Author: Kazuhisa Tagaya| Date: Tue, 15 Mar 2022 00:00:00 +0000
Trend Micro has released a technical report on how the oil and gas industry can gain situational awareness across OT, IT and CT.
Read moreCredit to Author: Kazuhisa Tagaya| Date: Mon, 14 Mar 2022 00:00:00 +0000
Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network.
Read moreCredit to Author: Ed Cabrera| Date: Wed, 09 Mar 2022 00:00:00 +0000
President Biden banned the sale of Russian oil to the United States to deprive the Putin regime of the economic resources needed to wage war. But this may put US companies in the firing line of cyber-attacks from the east.
Read moreCredit to Author: Jaromir Horejsi| Date: Tue, 08 Mar 2022 00:00:00 +0000
We analyze RURansom, a malware variant discovered to be targeting Russia. Originally suspected to be a ransomware because of its name, analysis reveals RURansom to be a wiper.
Read moreCredit to Author: Jon Clay| Date: Fri, 04 Mar 2022 00:00:00 +0000
Global Cyberattacks: How to manage risk in times of chaos, and Ukraine-Russia cyber warzone splits cyber underground
Read more