Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

In this entry, we discuss several of our predictions that security professionals and decision-makers should know about to help them make informed decisions on various security fronts in the coming year.

December 07, 2021
Ransomware

Cybersecurity for Industrial Control Systems: Part 2

To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.

Research Jan 20, 2022

Save to Folio

Research Jan 20, 2022

Save to Folio

Ransomware

Cybersecurity for Industrial Control Systems: Part 1

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats.

Research Jan 15, 2022

Save to Folio

Research Jan 15, 2022

Save to Folio

Malware

This Week in Security News - January 14, 2022

This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.

Expert Perspective Jan 14, 2022

Save to Folio

Expert Perspective Jan 14, 2022

Save to Folio

Exploits & Vulnerabilities

Analyzing an Old Bug and Discovering CVE-2021-30995

A vulnerability found in 2021 has been patched and re-patched in the months since it was reported. We analyze the bug and outline the process that led to the discovery of CVE-2021-30995.

Research Jan 14, 2022

Save to Folio

Research Jan 14, 2022

Save to Folio

Codex Exposed: How Low Is Too Low When We Generate Code?

In a series of blog posts, we explore different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers but also malicious users. This is the second part of the series.

Research Jan 14, 2022

Save to Folio

Research Jan 14, 2022

Save to Folio

Exploits & Vulnerabilities

LoRaWAN's Protocol Stacks: The Forgotten Targets at Risk

This report is the fourth part of our LoRaWAN security series, and highlights an attack vector that, so far, has not attracted much attention: the LoRaWAN stack. The stack is the root of LoRaWAN implementation and security. We hope to help users secure it and make LoRaWAN communication resistant to critical bugs.

Research Jan 11, 2022

Save to Folio

Research Jan 11, 2022

Save to Folio