Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
APT & Targeted Attacks

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm's exploitation of EdgeRouters, complementing the FBI's advisory from February 27, 2024.

May 01, 2024
APT & Targeted Attacks

Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework

We recently discovered a new threat actor group that we dubbed Void Arachne. This group targets Chinese-speaking users with malicious Windows Installer (MSI) files in a recent campaign. These MSI files contain legitimate software installer files for AI software and other popular software but are bundled with malicious Winos payloads.

Research Jun 19, 2024

Save to Folio

Research Jun 19, 2024

Save to Folio

Cyber Threats

Not Just Another 100% Score: MITRE ENGENUITY ATT&CK

The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. Trend Micro achieved 100% detection across all 15 major attack steps with an 86% actionable rate for those steps— balancing detections and business priorities including operational continuity and minimized disruption.

Jun 18, 2024

Save to Folio

Jun 18, 2024

Save to Folio

Ransomware

TargetCompany’s Linux Variant Targets ESXi Environments

In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution.

Jun 05, 2024

Save to Folio

Jun 05, 2024

Save to Folio

Compliance & Risks

SANS's 2024 Threat-Hunting Survey Review

In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year.

Reports Jun 04, 2024

Save to Folio

Reports Jun 04, 2024

Save to Folio

Endpoints

It's Time to Up-Level Your EDR Solution

You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more.

Security Strategies Jun 03, 2024

Save to Folio

Security Strategies Jun 03, 2024

Save to Folio

Artificial Intelligence (AI)

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM

Discover Trend Micro's integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance.

Latest News Jun 02, 2024

Save to Folio

Latest News Jun 02, 2024

Save to Folio

APT & Targeted Attacks

Decoding Water Sigbin's Latest Obfuscation Tricks

Water Sigbin (aka the 8220 Gang) exploited Oracle WebLogic vulnerabilities to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.

Research May 30, 2024

Save to Folio

Research May 30, 2024

Save to Folio

Artificial Intelligence (AI)

RSAC 2024 Review: AI & Data Governance Priorities

Get our take on the RSA 2024 conference where we review some of the major topics covered such as AI and data governance.

Expert Perspective May 28, 2024

Save to Folio

Expert Perspective May 28, 2024

Save to Folio