Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
"Zerologon” and the Value of Virtual Patching
Exploits & Vulnerabilities

"Zerologon” and the Value of Virtual Patching

A new CVE was released recently that has made quite a few headlines

Articles, News, Reports September 16, 2020
Cyber Threats

The Evolution of Malicious Shell Scripts

We take note of the ways shell scripts have changed in the hands of cybercriminals and how it can be employed in the development of malware payloads in malicious routines.

Research Sep 23, 2020

Save to Folio

Research Sep 23, 2020

Save to Folio

Exploits & Vulnerabilities

Exploitable Flaws Found in Facial Recognition Devices

To gain a more nuanced understanding of the security issues present in facial recognition devices, we analyzed the security of four different models. Our case studies show how these devices can be misused by malicious attackers.

Reports Sep 22, 2020

Save to Folio

Reports Sep 22, 2020

Save to Folio

Cyber Threats

Cybercriminals Distribute Backdoor With VPN Installer

In this entry, we share how threat actors are bundling legitimate Windscribe VPN installers with backdoors. Backdoors allow cybercriminals to gain access and control of computers remotely without the need for proper authentication.

Research Sep 21, 2020

Save to Folio

Research Sep 21, 2020

Save to Folio

APT & Targeted Attacks

U.S. Justice Department Charges APT41 Hackers over Global Cyberattacks

The United States Justice Department announced that it was charging five Chinese citizens with hacking crimes committed against over 100 institutions in the United States and abroad. These five individuals were reportedly connected to the hacking group known as APT41.

Latest News Sep 18, 2020

Save to Folio

Latest News Sep 18, 2020

Save to Folio

1H 2020 Cyber Security Defined by Covid-19 Pandemic

Malicious actors have always taken advantage of big news to use as lures for socially engineered threats, but these events tend to be fairly short news cycles. When Covid-19 started making headlines in early 2020, we started seeing new threats using this in the attacks.

Sep 15, 2020

Save to Folio

Sep 15, 2020

Save to Folio

Malware

Analysis of a Convoluted Attack Chain Involving Ngrok

The Trend Micro ™ Managed XDR team recently handled an incident involving one of Trend Micro’s customers. The incident revealed how a malicious actor incorporated certain techniques into an attack, making it more difficult for blue teams and security researchers alike to analyze the chain of events in a clean and easily understandable manner.

Research Sep 14, 2020

Save to Folio

Research Sep 14, 2020

Save to Folio