Inside the 2022 Email Cyber Threat Landscape
Credit to Author: Jon Clay| Date: Wed, 12 Apr 2023 00:00:00 +0000
Key trends and predictions you should know about
Read moreCredit to Author: Jon Clay| Date: Wed, 12 Apr 2023 00:00:00 +0000
Key trends and predictions you should know about
Read moreCredit to Author: Mohamed Fahmy| Date: Thu, 02 Feb 2023 00:00:00 +0000
We analyze an infection campaign targeting organizations in the Middle East for cyberespionage in December 2022 using a new backdoor malware. The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers.
Read moreCredit to Author: David Fiser| Date: Wed, 25 Jan 2023 00:00:00 +0000
In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.
Read moreCredit to Author: Ian Kenefick| Date: Fri, 23 Dec 2022 00:00:00 +0000
We analyze the latest changes in IcedID botnet from a campaign that abuses Google pay per click (PPC) ads to distribute IcedID via malvertising attacks.
Read moreCredit to Author: Jon Clay| Date: Thu, 15 Dec 2022 00:00:00 +0000
Trend Micro’s participation in Google’s App Defense Alliance will ensure the security of customers by preventing malicious apps from being made available on the Google Play Store.
Read moreCredit to Author: Sunil Bharti| Date: Wed, 21 Sep 2022 00:00:00 +0000
Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.
Read moreCredit to Author: Daniel Lunghi| Date: Fri, 12 Aug 2022 00:00:00 +0000
We found APT group Iron Tiger’s malware compromising chat application Mimi’s servers in a supply chain attack.
Read moreCredit to Author: Jun Morimoto| Date: Mon, 11 Jul 2022 00:00:00 +0000
How to secure your private 5G networks; The challenge of complex ecosystem in DX.
Read moreCredit to Author: Jun Morimoto| Date: Tue, 05 Jul 2022 00:00:00 +0000
The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks?
Read moreCredit to Author: Jun Morimoto| Date: Tue, 05 Jul 2022 00:00:00 +0000
Are “new” protocols and “private” networks sufficient for your cybersecurity requirements?
Read more