Cybersecurity Decluttered: A Journey to Consolidation
Credit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000
Learn how far cybersecurity has come from scattered resources to consolidation the future.
Read moreCredit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000
Learn how far cybersecurity has come from scattered resources to consolidation the future.
Read moreCredit to Author: Johnny Krogsboll| Date: Thu, 11 Apr 2024 00:00:00 +0000
Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.
Read moreCredit to Author: Christopher So| Date: Tue, 02 Apr 2024 00:00:00 +0000
This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON.
Read moreCredit to Author: Arianne Dela Cruz| Date: Tue, 26 Mar 2024 00:00:00 +0000
This blog entry discusses the Agenda ransomware group’s use of its latest Rust variant to propagate to VMWare vCenter and ESXi servers.
Read moreCredit to Author: Junestherry Dela Cruz| Date: Tue, 19 Mar 2024 00:00:00 +0000
CVE-2024-27198 and CVE-2024-27199 are vulnerabilities within the TeamCity On-Premises platform that can allow attackers to gain administrative control over affected systems.
Read moreCredit to Author: Joseph C Chen| Date: Mon, 18 Mar 2024 00:00:00 +0000
Since early 2022, we have been monitoring an APT campaign that targets several government entities worldwide, with a strong focus in Southeast Asia, but also seen targeting Europe, America, and Africa.
Read moreCredit to Author: Buddy Tancio| Date: Wed, 06 Mar 2024 00:00:00 +0000
This blog entry will examine Trend Micro MDR team’s investigation that successfully uncovered the intrusion sets employed by Earth Kapre in a recent incident, as well as how the team leveraged threat intelligence to attribute the extracted evidence to the cyberespionage threat group.
Read moreCredit to Author: Nathaniel Morales| Date: Mon, 04 Mar 2024 00:00:00 +0000
The Trend Micro threat hunting team came across an RA World attack involving multistage components designed to ensure maximum impact.
Read moreCredit to Author: Cedric Pernet| Date: Mon, 26 Feb 2024 00:00:00 +0000
During our monitoring of Earth Lusca, we noticed a new campaign that used Chinese-Taiwanese relations as a social engineering lure to infect selected targets.
Read moreCredit to Author: Trend Micro Research| Date: Thu, 22 Feb 2024 00:00:00 +0000
This research is the result of our collaboration with the National Crime Agency in the United Kingdom, who took action against LockBit as part of Operation Cronos, an international effort resulting in the undermining of its operations.
Read more