Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Mutated Scams: How to Protect Yourself from Pandemic-Fueled Cyberfraud
Cyber Crime

Mutated Scams: How to Protect Yourself from Pandemic-Fueled Cyberfraud

Scammers took advantage of the surge in online activity during the pandemic, targeting businesses and buyers that were settling into new ways of transacting.

May 05, 2021
Cyber Threats

This Week in Security News May 7, 2021

New Panda Stealer Targets Cryptocurrency Wallets and Apple Releases Urgent Security Patches for Zero-Day Bugs

Expert Perspective May 07, 2021

Save to Folio

Expert Perspective May 07, 2021

Save to Folio

Exploits & Vulnerabilities

Proxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party

Our telemetry showed three malware families taking advantage of the ProxyLogon vulnerability beginning in March: the coinminer LemonDuck was sighted first, quickly followed by the ransomware BlackKingdom, then the Prometei botnet.

Research May 06, 2021

Save to Folio

Research May 06, 2021

Save to Folio

Compliance & Risks

MITRE ATT&CK for Containers: Why It Matters

The complexity of containers demands something to make sense of it all. Builders, operations teams and security teams need a single language to understand the risk associated with containers.

Expert Perspective May 04, 2021

Save to Folio

Expert Perspective May 04, 2021

Save to Folio

Malware

New Panda Stealer Targets Cryptocurrency Wallets

In early April, we observed a new information stealer called Panda Stealer being delivered via spam emails. Based on Trend Micro's telemetry, United States, Australia, Japan, and Germany were among the most affected countries during a recent spam wave.

Research May 04, 2021

Save to Folio

Research May 04, 2021

Save to Folio

Cyber Threats

This Week in Security News - April 30, 2021

Hacktivism’s reemergence explained and Hello ransomware uses updated China Chopper web shell

Expert Perspective Apr 30, 2021

Save to Folio

Expert Perspective Apr 30, 2021

Save to Folio

Cyber Threats

How Trend Micro Helps Manage Exploited Vulnerabilities

As technological innovations evolve, protecting companies from cyber threats tomorrow secures their businesses today. Read how Trend Micro protects customers from vulnerability exploits by blocking them as early as possible.

Expert Perspective Apr 28, 2021

Save to Folio

Expert Perspective Apr 28, 2021

Save to Folio

APT & Targeted Attacks

Water Pamola Attacked Online Shops Via Malicious Orders

Since 2019, we have been tracking a threat campaign we dubbed as “Water Pamola.” The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.

Research Apr 28, 2021

Save to Folio

Research Apr 28, 2021

Save to Folio