trend micro research : expert perspective
This Week in Security News – February 18, 2022
Credit to Author: Jon Clay| Date: Fri, 18 Feb 2022 00:00:00 +0000
SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors
Read moreThis Week in Security News – February 11, 2022
Credit to Author: Jon Clay| Date: Fri, 11 Feb 2022 00:00:00 +0000
Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins
Read moreThis Week in Security News – February 4, 2022
Credit to Author: Jon Clay| Date: Fri, 04 Feb 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. Learn about the Samba vulnerability discovered by Trend Micro the White House’s warning of Russian hacks as tensions with Ukraine grow.
Read moreThis Week in Security News – January 28th, 2022
Credit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.
Read moreThis Week in Security News – January 21, 2022
Credit to Author: Jon Clay| Date: Fri, 21 Jan 2022 00:00:00 +0000
This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.
Read moreThis Week in Security News – January 14, 2022
Credit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.
Read moreThis Week in Security News – January 7, 2022
Credit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Read moreWhat to Do About Log4j
Credit to Author: William Malik| Date: Tue, 21 Dec 2021 00:00:00 +0000
Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the immediate crisis abates.
Read more