An In-Depth Look at ICS Vulnerabilities Part 3
In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common ICS-affecting vulnerabilities identified in 2021.
RSS Reader for Computer Security Articles
In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common ICS-affecting vulnerabilities identified in 2021.
Credit to Author: Earle Maui Earnshaw| Date: Tue, 05 Apr 2022 00:00:00 +0000
Both BLISTER and SocGholish are loaders known for their evasion tactics. Our report details what these loaders are capable of and our investigation into a campaign that uses both to deliver the LockBit ransomware.
Read More
In part two of our three-part series, we continue to analyze vulnerabilities using MITRE ATT&CK. We also look into the sectors affected and their risk levels.
Credit to Author: Jon Clay| Date: Fri, 18 Mar 2022 00:00:00 +0000
Global Cyberattacks: Navigating New Frontiers: Trend Micro 2021 Annual Cybersecurity Report, and US Has ‘Significant’ Cyber Vulnerabilities, But A Sweeping Russian Cyberattack Is Unlikely
Read MoreCredit to Author: Kazuhisa Tagaya| Date: Tue, 15 Mar 2022 00:00:00 +0000
Trend Micro has released a technical report on how the oil and gas industry can gain situational awareness across OT, IT and CT.
Read MoreCredit to Author: Kazuhisa Tagaya| Date: Mon, 14 Mar 2022 00:00:00 +0000
Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network.
Read MoreCredit to Author: Don Ovid Ladores| Date: Wed, 09 Mar 2022 00:00:00 +0000
In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps.
Read MoreCredit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000
Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.
Read More