Your New AI Assistant: Trend Vision One™ – Companion
Credit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Sunil Bharti| Date: Tue, 16 May 2023 00:00:00 +0000
We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability.
Read moreCredit to Author: Alfredo Oliveira| Date: Wed, 26 Apr 2023 00:00:00 +0000
We found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.
Read moreCredit to Author: Qi Sun| Date: Thu, 30 Mar 2023 00:00:00 +0000
We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.
Read moreCredit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Daniel Lunghi| Date: Wed, 01 Mar 2023 00:00:00 +0000
We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.
Read moreCredit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Hara Hiroaki| Date: Thu, 16 Feb 2023 00:00:00 +0000
We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 07 Feb 2023 00:00:00 +0000
In this investigation, we analyzed several prominent “passive income” applications and found out that there may be security risks upon participating in these programs.
Read more