Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Threats From a Compromised 4G/5G Campus Network
IoT

Threats From a Compromised 4G/5G Campus Network

5G acts as a catalyst for change for industrial environments. One part of its deployment is the 4G/5G campus network for some organizations. In our research we delve into the security risks and implications of this technology.

May 27, 2021
Compliance & Risks

#LetsTalkSecurity: Transformational Security

Let's Talk Security: Season 02 // Episode 01: Host, Rik Ferguson, interviews Business Information Security Officer from S&P Global Ratings, Alyssa Miller. Together they discuss transformational security.

Expert Perspective Jun 09, 2021

Save to Folio

Expert Perspective Jun 09, 2021

Save to Folio

Ransomware

The U.S. EO on Ransomware: What Does it Mean? – Part 2

The White House is urging companies to do more to stem the tide of ransomware attacks now that they are starting to impact critical infrastructure and supply chains. It is a good start, but what will be the implication of this to U.S. businesses?

Expert Perspective Jun 08, 2021

Save to Folio

Expert Perspective Jun 08, 2021

Save to Folio

Cyber Threats

Looking Ahead: The Post-Pandemic Security Landscape

One year into the pandemic, our team at Trend Micro discussed the lasting impact that Covid-19 will have on people’s way of life and what a post-pandemic “new normal” might look like.

Expert Perspective Jun 07, 2021

Save to Folio

Expert Perspective Jun 07, 2021

Save to Folio

This Week in Security News June 4, 2021

Cyberattack hits JBS meat works in Australia, North America and DarkSide Targets Virtual Machines

Expert Perspective Jun 04, 2021

Save to Folio

Expert Perspective Jun 04, 2021

Save to Folio

Exploits & Vulnerabilities

CVE-2021-30724: CVMServer Vulnerability in macOS and iOS

We discovered a vulnerability in macOS, iOS, and iPadOS rooted in the CVMServer. The vulnerability, labeled CVE-2021-30724, can allow threat actors to escalate their privilege if exploited.

Research Jun 03, 2021

Save to Folio

Research Jun 03, 2021

Save to Folio

Cyber Threats

Proven Leadership in Multi-Layered Threat Defense

It’s 2021, and this rapidly evolving threat landscape requires partnership with a trusted cybersecurity expert, who can provide protection across distributed endpoints, networks, cloud infrastructure, and hybrid environments.

Expert Perspective Jun 02, 2021

Save to Folio

Expert Perspective Jun 02, 2021

Save to Folio

Cyber Crime

This Week in Security News - May 28, 2021

Nearly 50,000 IPs Compromised in Worm-like TeamTNT Attack and Misconfigurations are the Biggest Threat to Cloud Security

Expert Perspective May 28, 2021

Save to Folio

Expert Perspective May 28, 2021

Save to Folio

Ransomware

DarkSide on Linux: Virtual Machines Targeted

We focus on the behavior of the DarkSide variant that targets Linux. We discuss how it targets virtual machine-related files on VMware ESXI servers, parses its embedded configuration, kills virtual machines (VMs), encrypts files on the infected machine, collects system information, and sends it to the remote server.

Research May 28, 2021

Save to Folio

Research May 28, 2021

Save to Folio

IoT

Threats From a Compromised 4G/5G Campus Network

5G acts as a catalyst for change for industrial environments. One part of its deployment is the 4G/5G campus network for some organizations. In our research we delve into the security risks and implications of this technology.

Research May 27, 2021

Save to Folio

Research May 27, 2021

Save to Folio