Private Network 5G Security Risks & Vulnerabilities

Credit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000

Why cybersecurity is the first step to private network deployment

Read more

Examples of Cyber Warfare #TrendTalksBizSec


Cyber Warfare has been a topic of discussion for years but has reached a new level of prominence in this age of hyper-connected critical infrastructure. Our Trend Micro experts touch on this evolution, disinformation campaigns, and cyber mercenaries.

Read more

State of OT Security in 2022: Big Survey Key Insights

Credit to Author: Hiroyuki Ueno| Date: Wed, 15 Jun 2022 00:00:00 +0000

Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.

Read more

Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques

Credit to Author: Don Ovid Ladores| Date: Wed, 08 Jun 2022 00:00:00 +0000

Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a new malware variant using different infection techniques compared to past iterations. We discuss our initial findings in this report.

Read more

Why It’s Time to Map the Digital Attack Surface

Credit to Author: Bharat Mistry| Date: Mon, 06 Jun 2022 00:00:00 +0000

Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces.

Read more

YourCyanide: A CMD-based Ransomware With Multiple Layers of Obfuscation

Credit to Author: Ieriz Nicolle Gonzalez| Date: Thu, 02 Jun 2022 00:00:00 +0000

The Trend Micro Threat Hunting team recently analyzed a series of CMD-based ransomware variants with a number capabilities such as stealing user information, bypassing remote desktop connections, and propagating through email and physical drives.

Read more