Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Expanding Attack Blueprints: 2022 Annual Cybersecurity Report
Cyber Threats

Expanding Attack Blueprints: 2022 Annual Cybersecurity Report

In this blog entry, we shine a spotlight on some of the most critical cybersecurity concerns of 2022, which we discuss in full in our annual cybersecurity report, “Rethinking Tactics: 2022 Annual Security Report.”

March 07, 2023
Malware

Mac Malware MacStealer Spreads as Fake P2E Apps

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

Mar 30, 2023

Save to Folio

Mar 30, 2023

Save to Folio

Cyber Crime

Fighting mercenaries with the Cybersecurity Tech Accord

Trend Micro co-Authors Cyber Mercenary Principles to help guide the technology industry and others in dealing with the growing market of cyber mercenaries.

Latest News Mar 30, 2023

Save to Folio

Latest News Mar 30, 2023

Save to Folio

Malware

New OpcJacker Malware Distributed via Fake VPN Malvertising

We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.

Research Mar 29, 2023

Save to Folio

Research Mar 29, 2023

Save to Folio

APT & Targeted Attacks

Earth Preta’s Cyberespionage Campaign Hits Over 200

We present a case study of the cyberespionage efforts by Earth Preta. This study on an active campaign delves into the structure, goals, and requirements of the organizations involved, and provides an opportunity to conduct wider intelligence analysis and insights in the development of effective countermeasures.

Mar 27, 2023

Save to Folio

Mar 27, 2023

Save to Folio

APT & Targeted Attacks

Pack it Secretly: Earth Preta’s Updated Stealthy Strategies

Earth Preta has actively been changing its tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the tools and malware used by the threat actor in its most recent campaigns.

Research Mar 23, 2023

Save to Folio

Research Mar 23, 2023

Save to Folio

Exploits & Vulnerabilities

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

We break down the basic information of CVE-2023-23397, the zero-day, zero-touch vulnerability that was rated 9.8 on the Common Vulnerability Scoring System (CVSS) scale.

Mar 21, 2023

Save to Folio

Mar 21, 2023

Save to Folio

Cyber Threats

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Security Strategies Mar 20, 2023

Save to Folio

Security Strategies Mar 20, 2023

Save to Folio