Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

In this entry, we discuss several of our predictions that security professionals and decision-makers should know about to help them make informed decisions on various security fronts in the coming year.

December 07, 2021
Ransomware

This Week in Security News - January 28th, 2022

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third instalment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.

Expert Perspective Jan 28, 2022

Save to Folio

Expert Perspective Jan 28, 2022

Save to Folio

Mobile

TianySpy Malware Uses Smishing Disguised as Message From Telco

Trend Micro confirmed a new mobile malware infection chain targeting both Android and iPhone devices. The malware might have been designed to steal credentials associated with membership websites of major Japanese telecommunication services.

Research Jan 25, 2022

Save to Folio

Research Jan 25, 2022

Save to Folio

APT & Targeted Attacks

Investigating APT36 or Earth Karkaddan’s Attack Chain and Malware Arsenal

We investigated the most recent activities of APT36, also known as Earth Karkaddan, a politically motivated advanced persistent threat (APT) group, and discuss its use of CapraRAT, an Android RAT with clear similarities in design to the group’s favoured Windows malware, Crimson RAT.

Jan 24, 2022

Save to Folio

Jan 24, 2022

Save to Folio

Cyber Crime

This Week in Security News - January 21, 2022

This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings.

Expert Perspective Jan 21, 2022

Save to Folio

Expert Perspective Jan 21, 2022

Save to Folio

Cyber Threats

Codex Exposed: Task Automation and Response Consistency

Being able to automate tasks or programmatically execute them unsupervised is an essential part of both regular and malicious computer usage, so we wondered if a tool like Codex was reliable enough to be scripted and left to run unsupervised, generating the required code.

Research Jan 21, 2022

Save to Folio

Research Jan 21, 2022

Save to Folio

Ransomware

Cybersecurity for Industrial Control Systems: Part 2

To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.

Research Jan 20, 2022

Save to Folio

Research Jan 20, 2022

Save to Folio