QR Codes: Convenience or Cyberthreat?
Credit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Cj Arsley Mateo| Date: Fri, 19 Jul 2024 00:00:00 +0000
Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments. Read our blog entry to know more.
Read moreCredit to Author: Jagir Shastri| Date: Wed, 17 Jul 2024 00:00:00 +0000
We check the OpenSSH vulnerabilities CVE-2024–6387 and CVE-2024-6409, examining their potential real-world impact and the possibility of exploitation for CVE-2024–6387 in x64 systems.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Shubham Singh| Date: Fri, 05 Jul 2024 00:00:00 +0000
In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly.
Read moreCredit to Author: Trend Micro Research| Date: Thu, 04 Jul 2024 00:00:00 +0000
We’ve recently seen a surge in attacks involving the Mekotio banking trojan. In this blog entry, we’ll provide an overview of the trojan and what it does.
Read moreCredit to Author: AI Team| Date: Fri, 28 Jun 2024 00:00:00 +0000
AI Pulse is a new blog series from Trend Micro on the latest cybersecurity AI news. In this edition: Siri says hi to OpenAI, fraud hogs the AI cybercrime spotlight, and why the Paris Olympics could be a hotbed of deepfakery.
Read more