QR Codes: Convenience or Cyberthreat?
Credit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Cj Arsley Mateo| Date: Fri, 19 Jul 2024 00:00:00 +0000
Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments. Read our blog entry to know more.
Read moreCredit to Author: Jagir Shastri| Date: Wed, 17 Jul 2024 00:00:00 +0000
We check the OpenSSH vulnerabilities CVE-2024–6387 and CVE-2024-6409, examining their potential real-world impact and the possibility of exploitation for CVE-2024–6387 in x64 systems.
Read moreCredit to Author: Peter Girnus| Date: Mon, 15 Jul 2024 00:00:00 +0000
Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Shubham Singh| Date: Fri, 05 Jul 2024 00:00:00 +0000
In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly.
Read moreCredit to Author: Trend Micro Research| Date: Thu, 04 Jul 2024 00:00:00 +0000
We’ve recently seen a surge in attacks involving the Mekotio banking trojan. In this blog entry, we’ll provide an overview of the trojan and what it does.
Read more