Unsung Hero in Cyber Risk Management
Credit to Author: Ed Cabrera| Date: Tue, 19 Sep 2023 00:00:00 +0000
Behind the scenes of the world of vulnerability intelligence and threat hunting
Read moreCredit to Author: Ed Cabrera| Date: Tue, 19 Sep 2023 00:00:00 +0000
Behind the scenes of the world of vulnerability intelligence and threat hunting
Read moreCredit to Author: Jindrich Karasek| Date: Wed, 23 Aug 2023 00:00:00 +0000
In this entry, we discuss how a threat actor abuses paid Facebook promotions featuring LLMs to spread malicious code, with the goal of installing a malicious browser add-on and stealing victims’ credentials.
Read moreCredit to Author: Sherif Magdy| Date: Tue, 11 Jul 2023 00:00:00 +0000
In this entry, we discuss the findings of our investigation into a piece of a signed rootkit, whose main binary functions as a universal loader that enables attackers to directly load a second-stage unsigned kernel module.
Read moreCredit to Author: David Fiser| Date: Wed, 21 Jun 2023 00:00:00 +0000
In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Erin Sindelar| Date: Fri, 02 Jun 2023 00:00:00 +0000
Trend Micro is proud to be a launch partner for Amazon Security Lake, which puts the customer in control, making critical data available to them from third-party security and analytics solutions of their choice.
Read moreCredit to Author: Feike Hacquebord| Date: Tue, 30 May 2023 00:00:00 +0000
Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu’s motives seem to have changed since at least October 2022.
Read moreCredit to Author: Ashley Savoie| Date: Wed, 19 Apr 2023 00:00:00 +0000
Trend offers 24×7 fully managed security services uniquely designed in collaboration with AWS security experts to protect, monitor, and respond to security events of AWS environments.
Read moreCredit to Author: Jon Clay| Date: Thu, 30 Mar 2023 00:00:00 +0000
Trend Micro co-Authors Cyber Mercenary Principles to help guide the technology industry and others in dealing with the growing market of cyber mercenaries.
Read more