

This Week in Security News - Feb, 26, 2021
Trend Micro 2020 Annual Cybersecurity Report and More Than 6,700 VMware Servers Exposed Online and Vulnerable to Major New Bug
As we head deeper into 2021, let’s take a look back on some of the most notable security stories and trends from the past year, all of which are covered in our 2020 annual cybersecurity report.
Trend Micro 2020 Annual Cybersecurity Report and More Than 6,700 VMware Servers Exposed Online and Vulnerable to Major New Bug
Use of audio-only social media apps has been steadily capturing the interest of more users but just like any other technology, apps like these are not immune from security risks.
The new center square on the XDR buzzword bingo card.
As we head deeper into 2021, let’s take a look back on some of the most notable security stories and trends from the past year, all of which are covered in our 2020 annual cybersecurity report.
Nefilim is known for its double extortion capabilities and notable attacks in 2020. We give an overview of its techniques and tools in this entry.
This second part of our series on LoRaWAN will discuss the security of LoRaWAN communication and possible attacks on vulnerabilities. We also dive into the comprehensive testing environment used to assess this issue: specific optimization techniques with software-defined radio (SDR), and the tool we created to help decode LoRaWAN packets.
Cybersecurity Risks of Connected Cars and SHAREit Flaw Could Lead to Remote Code Execution
We discuss the opportunities and risks brought about by technologies that connected cars use, such as 5G connectivity and the cloud. This entry highlights the findings from our paper “Cybersecurity for Connected Cars: Exploring Risks in 5G, Cloud, and Other Connected Technologies."
We discovered vulnerabilities in the SHAREit application. The vulns can be abused to leak a user’s sensitive data, execute arbitrary code, and possibly lead to remote code execution. The app has over 1 billion downloads.
Trend Micro Launches New XDR Platform and Threat Actors Now Target Docker via Container Escape Features