Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022

In this entry, we discuss several of our predictions that security professionals and decision-makers should know about to help them make informed decisions on various security fronts in the coming year.

December 07, 2021
Cyber Threats

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Reports Mar 03, 2022

Save to Folio

Reports Mar 03, 2022

Save to Folio

Malware

SMS PVA Part 3: Countries Most Impacted by Service

In this final part, we discuss the countries most affected by SMS PVA services as well as lay out several recommendations to mitigate the risks of such threats.

Research Mar 02, 2022

Save to Folio

Research Mar 02, 2022

Save to Folio

Malware

SMS PVA Part 2: Underground Service for Cybercriminals

In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.

Research Feb 27, 2022

Save to Folio

Research Feb 27, 2022

Save to Folio

Cyber Crime

This Week in Security News - February 25, 2022

Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions

Expert Perspective Feb 25, 2022

Save to Folio

Expert Perspective Feb 25, 2022

Save to Folio

APT & Targeted Attacks

Recent Cyberattacks Target Open-source Web Servers

Malicious actors take advantage of people’s reliance on web servers to perform attacks like remote code execution, access control bypass, denial of service, or even cyberjacking the victim servers to mine cryptocurrencies.

Security Strategies Feb 22, 2022

Save to Folio

Security Strategies Feb 22, 2022

Save to Folio

Malware

SMS PVA Part 1: Underground Service for Cybercriminals

In this three-part blog entry, our team explored SMS PVA, a service built on top of a global bot network that compromises smartphone cybersecurity as we know it.

Research Feb 22, 2022

Save to Folio

Research Feb 22, 2022

Save to Folio

Cyber Threats

This Week in Security News - February 18, 2022

SMS PVA services' use of infected Android phones reveals flaws in SMS verification, and 'Russian state-sponsored cyber actors' cited in hacks of U.S. defense contractors

Expert Perspective Feb 18, 2022

Save to Folio

Expert Perspective Feb 18, 2022

Save to Folio