ISPM + ITDR: Proactive Cyber Defense in the AI Era

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

ISPM & ITDR Synergize for AI-Based Identity Security

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

Deepfakes and AI-Driven Disinformation Threaten Polls

Credit to Author: Jon Clay| Date: Thu, 02 May 2024 00:00:00 +0000

Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year

Read more

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

Credit to Author: Feike Hacquebord| Date: Wed, 01 May 2024 00:00:00 +0000

This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm’s exploitation of EdgeRouters, complementing the FBI’s advisory from February 27, 2024.

Read more

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider

Credit to Author: Trend Micro Research| Date: Thu, 18 Apr 2024 00:00:00 +0000

On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost.

Read more

Cybersecurity Decluttered: A Journey to Consolidation

Credit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000

Learn how far cybersecurity has come from scattered resources to consolidation the future.

Read more

Importance of Scanning Files on Uploader Applications

Credit to Author: Fernando Cardoso| Date: Fri, 12 Apr 2024 00:00:00 +0000

Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware.

Read more

How Red Team Exercises Increases Your Cyber Health

Credit to Author: Johnny Krogsboll| Date: Thu, 11 Apr 2024 00:00:00 +0000

Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.

Read more

Fileless Attacks Prompt Intel’s Next-Gen Security

Credit to Author: Lonny Huffar| Date: Thu, 11 Apr 2024 00:00:00 +0000

Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions.

Read more