Amplifying Power to Customer Through Ecosystem Integrations
Credit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Mike Milner| Date: Mon, 06 Feb 2023 00:00:00 +0000
Trend Micro named one of 2023’s coolest cloud security companies
Read moreCredit to Author: Jon Clay| Date: Wed, 01 Feb 2023 00:00:00 +0000
Stay informed and stay ahead
Read moreCredit to Author: David Fiser| Date: Wed, 25 Jan 2023 00:00:00 +0000
In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.
Read moreCredit to Author: Peter Girnus| Date: Tue, 17 Jan 2023 00:00:00 +0000
We discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to distribute NjRAT (also known as Bladabindi) to infect victims across the Middle East and North Africa.
Read moreCredit to Author: Nitesh Surana| Date: Mon, 16 Jan 2023 00:00:00 +0000
Proof of Concept (POC): We investigate one of the GitHub Codespaces’ real-time code development and collaboration features that attackers can abuse for cloud-based trusted malware delivery. Once exploited, malicious actors can abuse legitimate GitHub accounts to create a malware file server.
Read moreCredit to Author: Michael Draeger| Date: Tue, 10 Jan 2023 00:00:00 +0000
Running real-world attack simulations can help improve organizations’ cybersecurity resilience
Read more