Facebook’s Metaverse is Expanding the Attack Surface
Credit to Author: William Malik| Date: Mon, 08 Aug 2022 00:00:00 +0000
Understand the cybersecurity risks in the Metaverse
Read MoreRSS Reader for Computer Security Articles
Credit to Author: William Malik| Date: Mon, 08 Aug 2022 00:00:00 +0000
Understand the cybersecurity risks in the Metaverse
Read MoreCredit to Author: Sterling Davis| Date: Fri, 5 Aug 2022 00:00:00 +0000
One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.
Read MoreCredit to Author: Vince Kearns| Date: Fri, 05 Aug 2022 00:00:00 +0000
iBynd VP of Insurance, Tim Logan, and Trend Micro’s Cyber Risk Specialist Vince Kearns provide insights on cyber insurance must-haves, pricing, services, and how the industry is changing in the face of ransomware attacks, cryptocurrency, and emerging cybersecurity technologies.
Read MoreCredit to Author: Nathaniel Morales| Date: Tue, 02 Aug 2022 00:00:00 +0000
This blog entry offers a technical analysis of a new SolidBit variant that is posing as different applications to lure gamers and social media users. The SolidBit ransomware group appears to be planning to expand its operations through these fraudulent apps and its recruitment of ransomware-as-a-service affiliates.
Read MoreCredit to Author: Duane Seon| Date: Thu, 28 Jul 2022 00:00:00 +0000
Although Transport layer security (TLS) provides enhanced security, cybercriminals have become increasingly savvy, finding ways to circumvent many of these protections. Learn how malicious actors exploit vulnerabilities within TLS to introduce new forms of malware.
Read MoreCredit to Author: William Malik| Date: Wed, 27 Jul 2022 00:00:00 +0000
Discover how to leverage the zero trust strategy to protect ICS environments, enabling a stronger security posture and reducing risk.
Read MoreCredit to Author: Buddy Tancio| Date: Wed, 27 Jul 2022 00:00:00 +0000
Gootkit has been known to use fileless techniques to drop Cobalt Strike and other malicious payloads. Insights from a recent attack reveal updates in its tactics.
Read More
This post relays the latest threat detection tool innovation of AWS – Amazon GuardDuty Malware Protection. This tool works closely with Trend Micro cloud solutions, providing another valuable layer of defense in our fight against a shared adversary.