ICS & OT Cybersecurity Attack Trends
We explore Trend Micro’s latest research into industrial cybersecurity, including the impact of attacks, maturity of security programs, and recommendations for strengthening security.
RSS Reader for Computer Security Articles
We explore Trend Micro’s latest research into industrial cybersecurity, including the impact of attacks, maturity of security programs, and recommendations for strengthening security.
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it.
Credit to Author: Jon Clay| Date: Thu, 30 Jun 2022 00:00:00 +0000
What danger lies around the corner?
Read MoreCredit to Author: Michael Langford| Date: Thu, 30 Jun 2022 00:00:00 +0000
While DevOps and site reliability engineering teams often work together and have shared goals, there are important distinctions between the two. This article explores the differences between their functions and responsibilities.
Read More
Credit to Author: Kenneth Adrian Apostol| Date: Thu, 30 Jun 2022 00:00:00 +0000
We look into a recent attack orchestrated by the Black Basta ransomware ransomware group that used the banking trojan QakBot as a means of entry and movement and took advantage of the PrintNightmare vulnerability to perform privileged file operations.
Read MoreCredit to Author: Erin Sindelar| Date: Wed, 29 Jun 2022 00:00:00 +0000
Trend Micro Security Researcher, Erin Sindelar, breaks down three popular types of cloud risk assessments to help CISOs and security leaders better explain cyber risk to the board.
Read More
Credit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.
Read More
Credit to Author: Shingo Matsugaya| Date: Mon, 27 Jun 2022 00:00:00 +0000
We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022.
Read More