TrendMicro
Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys
Credit to Author: Cifer Fang| Date: Mon, 16 May 2022 00:00:00 +0000
We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials and other sensitive user information, including private keys.
Read moreSandstone CTO shares how to assess cyber risk in the cloud
Chaitanya Pinnamanemi discusses how visibility and prioritization are key to securing your digital attack surface and reducing cyber risk.
The Difference Between Virtual Machines and Containers
Credit to Author: Chris Van Den Abbeele| Date: Thu, 12 May 2022 00:00:00 +0000
Discover the key differences, use cases, and benefits of virtual machines and containers.
Read moreS4x22: ICS Security Creates the Future
Credit to Author: Kazuhisa Tagaya| Date: Thu, 12 May 2022 00:00:00 +0000
The ICS Security Event S4 was held for the first time in two years, bringing together more than 800 business leaders and specialists from around the world to Miami Beach on 19-21 Feb 2022. The theme was CREATE THE FUTURE.
Read moreAdding Guardrails To A Cloud Account After The Fact
Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000
This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?
Read moreExamining the Black Basta Ransomware’s Infection Routine
Credit to Author: Ieriz Nicolle Gonzalez| Date: Mon, 09 May 2022 00:00:00 +0000
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics.
Read more