Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Ctrl+Alt+Truth. Welcome to the future of cybercrime
Cyber Threats

Ctrl+Alt+Truth. Welcome to the future of cybercrime

Welcome to 2030, to the nation of New San Joban, where a single keystroke can alter reality. Discover what a fully converged digital world means for the future of cybersecurity, and how you can stay ahead of the bad guys.

November 04, 2021
Cloud

Analyzing How TeamTNT Used Compromised Docker Hub Accounts

Following our previous disclosure of compromised Docker hub accounts delivering cryptocurrency miners, we analyse these accounts and discover more malicious actions that you need to be aware of.

Research Dec 01, 2021

Save to Folio

Research Dec 01, 2021

Save to Folio

Cloud

What You Can Do to Mitigate Cloud Misconfigurations

Cloud misconfigurations can become opportunities for cyberattacks or lead to data breaches. Organizations must mitigate them before incurring significant and costly consequences.

Research Nov 30, 2021

Save to Folio

Research Nov 30, 2021

Save to Folio

Cyber Threats

Trend Micro Cloud One Network Security-as-a-Service

Trend Micro, alongside Amazon Web Services, provides the latest in cloud-native deployment options. We have simplified network security, protecting customers across Virtual Private Clouds (VPCs) without needing agents to be installed on instances.

Latest News Nov 29, 2021

Save to Folio

Latest News Nov 29, 2021

Save to Folio

Cyber Threats

AWS re:Invent 2021 Guide: Checklist & Key Sessions

Welcome to your complete guide to AWS re:Invent 2021, where you will find tips on how to get the most out of your conference experience both in Las Vegas and virtually.

Expert Perspective Nov 29, 2021

Save to Folio

Expert Perspective Nov 29, 2021

Save to Folio

Malware

Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websites

We have been tracking a campaign involving the SpyAgent malware that abuses well-known remote access tools (RATs) for some time now. While previous versions of the malware have been covered by other researchers, our blog entry focuses on the malicious actor’s latest attacks.

Research Nov 29, 2021

Save to Folio

Research Nov 29, 2021

Save to Folio

Compliance & Risks

COP26 Backs Electric Vehicles to Reduce Climate Change

The 26 United Nations Climate Change Conference pushes for countries of parties to adopt more widespread EV use in order to reduce the looming threats of climate change.

Latest News Nov 23, 2021

Save to Folio

Latest News Nov 23, 2021

Save to Folio

This Week in Security News - November 19, 2021

This week, learn about how the QAKBOT Loader malware has evolved its techniques and strategies over time. Also, read about the most recent initiative by the legislation to further cybersecurity protection.

Expert Perspective Nov 19, 2021

Save to Folio

Expert Perspective Nov 19, 2021

Save to Folio

Exploits & Vulnerabilities

Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains

Squirrelwaffle is known for using the tactic of sending malicious spam as replies to existing email chains. We look into how by investigating its exploit of Microsoft Exchange Server vulnerabilities, ProxyLogon and ProxyShell.

Research Nov 19, 2021

Save to Folio

Research Nov 19, 2021

Save to Folio

Cyber Threats

Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR

In this blog entry, we will take a look at the ProxyShell vulnerabilities that were being exploited in these events, and dive deeper into the notable post-exploitation routines that were used in four separate incidents involving these web shell attacks.

Research Nov 17, 2021

Save to Folio

Research Nov 17, 2021

Save to Folio