Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
What We Know About Darkside Ransomware and the US Pipeline Attack
Ransomware

What We Know About Darkside Ransomware and the US Pipeline Attack

Trend Micro Research has found dozens of Darkside ransomware samples in the wild and investigated how the ransomware operates as well as the organizations that are typically targeted.

May 12, 2021
Ransomware

What We Know About Darkside Ransomware and the US Pipeline Attack

Trend Micro Research has found dozens of Darkside ransomware samples in the wild and investigated how the ransomware operates as well as the organizations that are typically targeted.

Research May 12, 2021

Save to Folio

Research May 12, 2021

Save to Folio

Exploits & Vulnerabilities

May Patch Tuesday Offers Relative Respite

Compared to the previous months of 2021, this month’s Patch Tuesday cycle is a slight lull. Only 55 vulnerabilities were fixed this month, with only four of these classified as Critical.

Latest News May 11, 2021

Save to Folio

Latest News May 11, 2021

Save to Folio

Compliance & Risks

Open source protection that security teams will love

Open source code is the gateway to quick application deployment – see how Trend Micro and Snyk have partnered up to create developer-friendly security for your open source components

Security Strategies May 10, 2021

Save to Folio

Security Strategies May 10, 2021

Save to Folio

Cyber Crime

Tips to avoid the new wave of ransomware attacks

There have been a lot of changes in ransomware over time. We want to help you protect your organization from this growing attack trend.

Expert Perspective May 10, 2021

Save to Folio

Expert Perspective May 10, 2021

Save to Folio

Cyber Threats

This Week in Security News May 7, 2021

New Panda Stealer Targets Cryptocurrency Wallets and Apple Releases Urgent Security Patches for Zero-Day Bugs

Expert Perspective May 07, 2021

Save to Folio

Expert Perspective May 07, 2021

Save to Folio

Exploits & Vulnerabilities

Proxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party

Our telemetry showed three malware families taking advantage of the ProxyLogon vulnerability beginning in March: the coinminer LemonDuck was sighted first, quickly followed by the ransomware BlackKingdom, then the Prometei botnet.

Research May 06, 2021

Save to Folio

Research May 06, 2021

Save to Folio

Compliance & Risks

MITRE ATT&CK for Containers: Why It Matters

The complexity of containers demands something to make sense of it all. Builders, operations teams and security teams need a single language to understand the risk associated with containers.

Expert Perspective May 04, 2021

Save to Folio

Expert Perspective May 04, 2021

Save to Folio

Malware

New Panda Stealer Targets Cryptocurrency Wallets

In early April, we observed a new information stealer called Panda Stealer being delivered via spam emails. Based on Trend Micro's telemetry, United States, Australia, Japan, and Germany were among the most affected countries during a recent spam wave.

Research May 04, 2021

Save to Folio

Research May 04, 2021

Save to Folio