Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Attackers are using the cloud, too. Here’s what you need to know.
Cyber Threats

Attackers are using the cloud, too. Here’s what you need to know.

There’s a lot of buzz around the cloud, and the attention is deserved. Leveraging the cloud can optimize resources, save time, increase automation, and take some of the security responsibility out of your hands.

Articles, News, Reports November 16, 2020
Ransomware

The Impact of Modern Ransomware on Manufacturing Networks

Ransomware threats have disrupted the manufacturing industry significantly in 2020. In a disturbing trend during the third quarter of the year, attackers appeared to be singling out manufacturing organizations as a victim of choice in their ransomware operations.

Expert Perspective Dec 01, 2020

Save to Folio

Expert Perspective Dec 01, 2020

Save to Folio

New MacOS Backdoor Connected to OceanLotus Surfaces

We recently discovered a new backdoor we believe to be related to the OceanLotus group. Some of the updates of this new variant include new behavior and domain names.

Research Nov 27, 2020

Save to Folio

Research Nov 27, 2020

Save to Folio

Ransomware

How a ransomware attack could affect retailers

Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons.

Security Strategies Nov 25, 2020

Save to Folio

Security Strategies Nov 25, 2020

Save to Folio

Malware

Analysis of Kinsing Malware's Use of Rootkit

Several shell scripts accompany Kinsing. These shell scripts are responsible for downloading and installing, removing, and uninstalling various resource-intensive services and processes. This blog post focuses on the role of the rootkit component.

Research Nov 24, 2020

Save to Folio

Research Nov 24, 2020

Save to Folio

Cyber Threats

Weaponizing Open Source Software for Targeted Attacks

How are open-source software trojanized? How can we detect them? To answer these questions, let us walk through a recent investigation we conducted that involved this file type.

Research Nov 20, 2020

Save to Folio

Research Nov 20, 2020

Save to Folio

This Week in Security News: Cybercrime Moves to the Cloud to Accelerate Attacks Amid Data Glut and Trend Micro Announces Free Web-Based Tool

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about how cybercriminals are embracing cloud-based services and technologies in order to accelerate their attacks. Also, read about Trend Micro Check, a free online tool that warns users of online misinformation.

Expert Perspective Nov 19, 2020

Save to Folio

Expert Perspective Nov 19, 2020

Save to Folio

Cyber Threats

The Dangers of AI and ML in the Hands of Cybercriminals

We delve into the many ways that cybercriminals abuse ML and AI presently and how they could exploit these technologies for ill gain in the future.

Research Nov 19, 2020

Save to Folio

Research Nov 19, 2020

Save to Folio

How to Secure Your Mac and Make It Run Faster

There’s an old myth still in circulation that Macs are invulnerable to hackers and cybercriminals—but is it true? The short answer is no.

Consumer Focus Nov 17, 2020

Save to Folio

Consumer Focus Nov 17, 2020

Save to Folio