Cybersecurity for Industrial Control Systems: Part 1

Credit to Author: Trend Micro Research| Date: Sat, 15 Jan 2022 00:00:00 +0000

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats.

Read more

This Week in Security News – January 14, 2022

Credit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000

This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.

Read more

This Week in Security News – January 7, 2022

Credit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.

Read more

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Credit to Author: Abraham Camba| Date: Fri, 17 Dec 2021 00:00:00 +0000

We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign.

Read more

This Week in Security News – December 17, 2021

Credit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000

This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.

Read more

Volatile and Adaptable: Tracking the Movements of Modern Ransomware

Credit to Author: Trend Micro Research| Date: Wed, 15 Dec 2021 00:00:00 +0000

Trend Micro’s tracking of modern ransomware, as well as of older families, shows which attacks are gaining momentum and which families are particularly dangerous for enterprises and private users.

Read more

This Week in Security News – December 10, 2021

Credit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000

This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.

Read more

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

Credit to Author: Don Ovid Ladores| Date: Fri, 10 Dec 2021 00:00:00 +0000

We analyzed new samples of the Yanluowang ransomware. One interesting aspect of these samples is that the files are code-signed. They also terminate various processes which are related to database and backup management.

Read more