Research, News, and Perspective

Author: Joseph C Chen (Threat Researcher), Jaromir Horejsi (Threat Researcher)

How Water Labbu Exploits Electron-Based Applications

In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using Cobalt Strike to deploy backdoors.

Oct 05, 2022

Author: CH Lei (Threat Researcher)

Tracking Earth Aughisky’s Malware and Changes

For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and the connections, including previously documented malware that have yet to be attributed.

Oct 04, 2022

Author: Joseph C Chen (Threat Researcher), Jaromir Horejsi (Threat Researcher)

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

The parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their malicious decentralized application websites to steal cryptocurrency.

Oct 03, 2022

DevOps Resource Center

Author: Michael Langford (Product Marketing)

Common Cloud-Native Security Misconfigurations & Fixes

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Sep 30, 2022

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

CISO Resource Center

Secure Web Gateway (SWG) Security - SASE Part 3

Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack surface.

Oct 06, 2022

Author: William Malik (VP, Infrastructure Strategies)

Cyber Hygiene: 5 Tips for Company Buy-In

Good cyber hygiene starts with buy-in from across the enterprise. Discover how CISOs can establish a company-wide security culture to enhance cyber hygiene effectiveness and reduce risk.

Oct 06, 2022

Author: William Malik (VP, Infrastructure Strategies)

Cyber Security Framework: Back to Basics

Dr. Ivan Pavlov once said: “If you want new ideas, read old books.” The same applies with cybersecurity best practices. Discover how you can extend a basic cyber security framework to reduce systems and employee security risks.

Oct 04, 2022

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Grace Yu
(817) 522-7911
Lena Clefberg
Europe - Sweden
+46 (0) 70 737 96 25
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us