Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Hindsight is 2020: Looking Back on the Year From a Cybersecurity Perspective
Cyber Threats

Hindsight is 2020: Looking Back on the Year From a Cybersecurity Perspective

As we head deeper into 2021, let’s take a look back on some of the most notable security stories and trends from the past year, all of which are covered in our 2020 annual cybersecurity report.

February 23, 2021
Cyber Threats

Security Risks for Audio-centric Social Media Apps

Use of audio-only social media apps has been steadily capturing the interest of more users but just like any other technology, apps like these are not immune from security risks.

Research Feb 24, 2021

Save to Folio

Research Feb 24, 2021

Save to Folio

Cyber Threats

Here we go again with “Next-Gen”

The new center square on the XDR buzzword bingo card.

Expert Perspective Feb 24, 2021

Save to Folio

Expert Perspective Feb 24, 2021

Save to Folio

Ransomware

An Analysis of the Nefilim Ransomware

Nefilim is known for its double extortion capabilities and notable attacks in 2020. We give an overview of its techniques and tools in this entry.

Research Feb 23, 2021

Save to Folio

Research Feb 23, 2021

Save to Folio

Exploits & Vulnerabilities

Gauging LoRaWAN Communication Security with LoraPWN

This second part of our series on LoRaWAN will discuss the security of LoRaWAN communication and possible attacks on vulnerabilities. We also dive into the comprehensive testing environment used to assess this issue: specific optimization techniques with software-defined radio (SDR), and the tool we created to help decode LoRaWAN packets.

Research Feb 19, 2021

Save to Folio

Research Feb 19, 2021

Save to Folio

Cyber Threats

This Week in Security News - Feb. 19, 2021

Cybersecurity Risks of Connected Cars and SHAREit Flaw Could Lead to Remote Code Execution

Annual Predictions Feb 19, 2021

Save to Folio

Annual Predictions Feb 19, 2021

Save to Folio

Connected Car

Connected Cars, 5G, the Cloud: Opportunities and Risks

We discuss the opportunities and risks brought about by technologies that connected cars use, such as 5G connectivity and the cloud. This entry highlights the findings from our paper “Cybersecurity for Connected Cars: Exploring Risks in 5G, Cloud, and Other Connected Technologies."

Research Feb 16, 2021

Save to Folio

Research Feb 16, 2021

Save to Folio

Cyber Threats

SHAREit Flaw Could Lead to Remote Code Execution

We discovered vulnerabilities in the SHAREit application. The vulns can be abused to leak a user’s sensitive data, execute arbitrary code, and possibly lead to remote code execution. The app has over 1 billion downloads.

Research Feb 15, 2021

Save to Folio

Research Feb 15, 2021

Save to Folio

Cyber Threats

This Week in Security News - Feb. 12, 2021

Trend Micro Launches New XDR Platform and Threat Actors Now Target Docker via Container Escape Features

Expert Perspective Feb 12, 2021

Save to Folio

Expert Perspective Feb 12, 2021

Save to Folio

Exploits & Vulnerabilities

February Patch Tuesday Fixes 11 Critical Bugs

Microsoft fixed 56 vulnerabilities - 11 of them rated Critical - in the February Patch Tuesday cycle.

Research Feb 10, 2021

Save to Folio

Research Feb 10, 2021

Save to Folio