Risks in Telecommunications IT

Credit to Author: Craig Gibson| Date: Thu, 29 Jul 2021 00:00:00 GMT

We summarize the characteristics, threats, and recommendations to improve the security posture of enterprises’ and telecommunications companies’ IT infrastructure.

Read more

Threat Actors Exploit Misconfigured Apache Hadoop YARN

Credit to Author: Alfredo Oliveira| Date: Tue, 27 Jul 2021 00:00:00 GMT

We look into how threat actors are exploiting Apache Hadoop YARN, a part of the Hadoop framework that is responsible for executing tasks on the cluster. This analysis covers the payloads deployed, the tactics used in the attacks, and basic recommendations for strengthening cloud security.

Read more

Updated XCSSET Malware Targets Telegram, Other Apps

Credit to Author: Mickey Jin| Date: Thu, 22 Jul 2021 00:00:00 GMT

In our last update on the XCSSET campaign, we updated some of its features targeting latest macOS 11 (Big Sur). Since then, the campaign added more features to its toolset, which we have continually monitored. We have also discovered the mechanism used to steal information from various apps, a behavior that has been present since we first discussed XCSSET.

Read more

The Underground Exploit Market and the Importance of Virtual Patching

Credit to Author: Trend Micro Research| Date: Tue, 13 Jul 2021 00:00:00 GMT

Over the past two calendar years, we conducted research on the underground exploit market to learn more about the life cycle of exploits, the kinds of buyers and sellers who transact, and the business models that are in effect in the underground.

Read more