Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
How Underground Groups Use Stolen Identities and Deepfakes
Redes sociales

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

September 27, 2022
APT y ataques dirigidos

Earth Preta Spear-Phishing Governments Worldwide

We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that began in March. We also show the infection routines of the malware families they use to infect multiple sectors worldwide: TONEINS, TONESHELL, and PUBLOAD.

Research Nov 18, 2022

Save to Folio

Research Nov 18, 2022

Save to Folio

Ciberdelincuencia

Electricity/Energy Cybersecurity: Trends & Survey Response

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry's challenges and present Trend Micro's recommendations.

Research Nov 16, 2022

Save to Folio

Research Nov 16, 2022

Save to Folio

Malware

Pilfered Keys: Free App Infected by Malware Steals Keychain Data

Open-source applications are a practical way to save money while keeping up with your productivity. However, this can be abused by threat actors to steal your data. Find out how one app was used to gather information of Apple users.

Nov 16, 2022

Save to Folio

Nov 16, 2022

Save to Folio

APT y ataques dirigidos

Hack the Real Box: APT41’s New Subgroup Earth Longzhi

We looked into the campaigns deployed by a new subgroup of advanced persistent threat (APT) group APT41, Earth Longzhi. This entry breaks down the technical details of the campaigns in full as presented at HITCON PEACE 2022 in August.

Nov 09, 2022

Save to Folio

Nov 09, 2022

Save to Folio

Privacidad y riesgos

Attack Surface Management 2022 Midyear Review Part 3

In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the first half of the year.

Research Nov 03, 2022

Save to Folio

Research Nov 03, 2022

Save to Folio

Exploits y vulnerabilidades

Latest on OpenSSL 3.0.7 Bug & Security-Fix

Potential disruptions following vulnerabilities found in OpenSSL.

Latest News Oct 31, 2022

Save to Folio

Latest News Oct 31, 2022

Save to Folio