RSS Reader for Computer Security Articles
Credit to Author: Cifer Fang| Date: Mon, 16 May 2022 00:00:00 +0000
We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials and other sensitive user information, including private keys.
Read MoreCredit to Author: Kazuhisa Tagaya| Date: Thu, 12 May 2022 00:00:00 +0000
The ICS Security Event S4 was held for the first time in two years, bringing together more than 800 business leaders and specialists from around the world to Miami Beach on 19-21 Feb 2022. The theme was CREATE THE FUTURE.
Read MoreCredit to Author: Ieriz Nicolle Gonzalez| Date: Mon, 09 May 2022 00:00:00 +0000
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics.
Read MoreCredit to Author: Aliakbar Zahravi| Date: Thu, 05 May 2022 00:00:00 +0000
This report focuses on the components and infection chain of the NetDooka framework. Its scope ranges from the release of the first payload up until the release of the final RAT that is protected by a kernel driver.
Read MoreCredit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000
We found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions.
Read More
We’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets.