How Connected Car Cyber Risk will Evolve
Credit to Author: Trend Micro Research| Date: Tue, 23 May 2023 00:00:00 +0000
Learn how connected car cyber risk will evolve in the coming years.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 23 May 2023 00:00:00 +0000
Learn how connected car cyber risk will evolve in the coming years.
Read moreCredit to Author: Nitesh Surana| Date: Tue, 23 May 2023 00:00:00 +0000
In this entry, we detail our research findings on how an info stealer is able to achieve persistence on a victim’s machine by modifying the victim’s Discord client.
Read moreCredit to Author: Mahmoud Zohdy| Date: Mon, 22 May 2023 00:00:00 +0000
In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defense evasion phase.
Read moreCredit to Author: Jaromir Horejsi| Date: Mon, 15 May 2023 00:00:00 +0000
Water Orthrus has been active recently with two new campaigns. CopperStealth uses a rootkit to install malware on infected systems, while CopperPhish steals credit card information. This blog will provide the structure of the campaign and how they work.
Read moreCredit to Author: Junestherry Dela Cruz| Date: Fri, 12 May 2023 00:00:00 +0000
We’ve been observing malicious advertisement campaigns in Google’s search engine with themes that are related to AI tools such as Midjourney and ChatGPT.
Read moreCredit to Author: Khristian Joseph Morales| Date: Tue, 09 May 2023 00:00:00 +0000
The Trend Micro Managed XDR team investigated several Ducktail-related web browser credential dumping incidents involving different customers.
Read moreCredit to Author: Khristian Joseph Morales| Date: Tue, 09 May 2023 00:00:00 +0000
The Trend Micro Managed XDR team investigated several Ducktail-related web browser credential dumping incidents involving different customers.
Read moreCredit to Author: Jon Clay| Date: Tue, 02 May 2023 00:00:00 +0000
Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities
Read moreCredit to Author: Ted Lee| Date: Tue, 02 May 2023 00:00:00 +0000
After months of dormancy, Earth Longzhi, a subgroup of advanced persistent threat (APT) group APT41, has reemerged using new techniques in its infection routine. This blog entry forewarns readers of Earth Longzhi’s resilience as a noteworthy threat.
Read moreCredit to Author: Don Ovid Ladores| Date: Fri, 28 Apr 2023 00:00:00 +0000
In March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal footprint behind. Our findings revealed many of the preparations made by the perpetrators and how quickly they managed to carry out the ransomware attack.
Read more