Purple Fox Uses New Arrival Vector and Improves Malware Arsenal

Credit to Author: Sherif Magdy| Date: Fri, 25 Mar 2022 00:00:00 +0000

Purple Fox is an old threat that has been making waves since 2018. This most recent investigation covers Purple Fox’s new arrival vector and early access loaders. Users’ machines seem to be targeted with malicious payloads masquerading as legitimate application installers.

Read more

This Week in Security News – March 25, 2022

Credit to Author: Jon Clay| Date: Fri, 25 Mar 2022 00:00:00 +0000

An investigation of cryptocurrency scams and schemes, and Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal

Read more

New Nokoyawa Ransomware Possibly Related to Hive

Credit to Author: Don Ovid Ladores| Date: Wed, 09 Mar 2022 00:00:00 +0000

In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps.

Read more

This Week in Security News March 4, 2022

Credit to Author: Jon Clay| Date: Fri, 04 Mar 2022 00:00:00 +0000

Global Cyberattacks: How to manage risk in times of chaos, and Ukraine-Russia cyber warzone splits cyber underground

Read more

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Credit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Read more

Global Cyberattacks Tied to the Russian Invasion of Ukraine


Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.

Read more

Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network

Credit to Author: Luis Magisa| Date: Mon, 21 Feb 2022 00:00:00 +0000

A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic. We dive into old iterations of this malware, and also analyze the newest version.

Read more

Security Automation with Vision One & Palo Alto


Trend Micro Vision One™ integrates with Palo Alto Networks Cortex™ XSOAR to drive automated response to incidents uncovered by Vision One.

Read more

Detecting PwnKit (CVE-2021-4034) Using Trend Micro™ Vision One™ and Cloud One™

Credit to Author: Sunil Bharti| Date: Fri, 11 Feb 2022 00:00:00 +0000

This blog discusses how CVE-2021-4034 can be detected and blocked using Trend Micro™ Vision One™ and Trend Micro Cloud One™.

Read more

This Week in Security News – February 11, 2022

Credit to Author: Jon Clay| Date: Fri, 11 Feb 2022 00:00:00 +0000

Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins

Read more