This Week in Security News – February 4, 2022

Credit to Author: Jon Clay| Date: Fri, 04 Feb 2022 00:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. Learn about the Samba vulnerability discovered by Trend Micro the White House’s warning of Russian hacks as tensions with Ukraine grow. 

Read more

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Credit to Author: Ian Kenefick| Date: Fri, 21 Jan 2022 00:00:00 +0000

We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection.

Read more

This Week in Security News – January 21, 2022

Credit to Author: Jon Clay| Date: Fri, 21 Jan 2022 00:00:00 +0000

 This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Analyzing an Old Bug and Discovering CVE-2021-30995

Credit to Author: Mickey Jin| Date: Fri, 14 Jan 2022 00:00:00 +0000

A vulnerability found in 2021 has been patched and re-patched in the months since it was reported. We analyze the bug and outline the process that led to the discovery of CVE-2021-30995.

Read more

This Week in Security News – January 14, 2022

Credit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000

This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.

Read more

LoRaWAN’s Protocol Stacks: The Forgotten Targets at Risk

Credit to Author: Sébastien Dudek| Date: Tue, 11 Jan 2022 00:00:00 +0000

This report is the fourth part of our LoRaWAN security series, and highlights an attack vector that, so far, has not attracted much attention: the LoRaWAN stack. The stack is the root of LoRaWAN implementation and security. We hope to help users secure it and make LoRaWAN communication resistant to critical bugs.

Read more

Uncovering and Defending Systems Against Attacks With Layers of Remote Control

Credit to Author: Abraham Camba| Date: Mon, 10 Jan 2022 00:00:00 +0000

The Trend Micro™ Managed XDR team addressed a stealthy multilayered attack that progressed from an exploited endpoint vulnerability to the use of legitimate remote access tools including Remote Desktop Protocol (RDP) as its final means of intrusion.

Read more