Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network

Credit to Author: Luis Magisa| Date: Mon, 21 Feb 2022 00:00:00 +0000

A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic. We dive into old iterations of this malware, and also analyze the newest version.

Read more

This Week in Security News – February 11, 2022

Credit to Author: Jon Clay| Date: Fri, 11 Feb 2022 00:00:00 +0000

Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins

Read more

This Week in Security News – February 4, 2022

Credit to Author: Jon Clay| Date: Fri, 04 Feb 2022 00:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. Learn about the Samba vulnerability discovered by Trend Micro the White House’s warning of Russian hacks as tensions with Ukraine grow. 

Read more

This Week in Security News – January 28th, 2022

Credit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.

Read more

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems


In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

TianySpy Malware Uses Smishing Disguised as Message From Telco


Trend Micro confirmed a new mobile malware infection chain targeting both Android and iPhone devices. The malware might have been designed to steal credentials associated with membership websites of major Japanese telecommunication services.

Read more

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Credit to Author: Ian Kenefick| Date: Fri, 21 Jan 2022 00:00:00 +0000

We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Cybersecurity for Industrial Control Systems: Part 2

Credit to Author: Ericka Pingol| Date: Thu, 20 Jan 2022 00:00:00 +0000

To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.

Read more