Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”

August 31, 2022
APT & Targeted Attacks

Tracking Earth Aughisky’s Malware and Changes

For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and the connections, including previously documented malware that have yet to be attributed.

Oct 04, 2022

Save to Folio

Oct 04, 2022

Save to Folio

Cyber Crime

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

The parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their malicious decentralized application websites to steal cryptocurrency.

Research Oct 03, 2022

Save to Folio

Research Oct 03, 2022

Save to Folio

Cyber Crime

Why retailers must get better at mapping and mitigating cyber risk

Earlier this year, UK retailer The Works was forced to shut some stores after a suspected ransomware breach. It’s a nightmare scenario for any CISO working in the sector—the disruption not only affected the firm’s bricks and mortar business but also online orders.

Research Sep 28, 2022

Save to Folio

Research Sep 28, 2022

Save to Folio

Thanking the Trend Micro family for its incredible support

Companies talk a lot about their culture – about how well they look after their employees. But until you’ve been forced to go through a truly life-changing experience, it’s difficult to know if they really mean what they say. Well, the past year-and-a-half has well and truly laid any doubts I may have had to rest.

Latest News Sep 28, 2022

Save to Folio

Latest News Sep 28, 2022

Save to Folio

Social Media

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

Research Sep 27, 2022

Save to Folio

Research Sep 27, 2022

Save to Folio

Compliance & Risks

Protecting healthcare customers from the threat of unpatched medical devices

Medical devices play an increasingly important role in the healthcare sector. From MRI scanners to wearable technology like blood glucose monitors, many are essential to diagnosing, monitoring and treating disease. But while they can work to improve patient health, the opposite is arguably true of IT health.

Reports Sep 26, 2022

Save to Folio

Reports Sep 26, 2022

Save to Folio

Security Risks in Logistics APIs Used by E-Commerce Platforms

Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially expose the consumers’ personal information. We discuss the security risks that such flaws present for software engineers, e-commerce platform providers, and consumers.

Research Sep 20, 2022

Save to Folio

Research Sep 20, 2022

Save to Folio

Ransomware

The Risk of Ransomware Supply Chain Attacks

Over the years, ransomware has become a major threat and it can put supply chains in deep trouble.

Research Sep 20, 2022

Save to Folio

Research Sep 20, 2022

Save to Folio