Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Forging Ahead in 2023: Insights From Trend Micro’s 2023 Security Predictions
Cyber Threats

Forging Ahead in 2023: Insights From Trend Micro’s 2023 Security Predictions

In 2023, cybercriminals and defenders alike will have to move forward with caution in the face of a business landscape that’s fraught with security blindsides and economic ebbs and flows.

December 13, 2022
Cloud

Attacking The Supply Chain: Developer

In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.

Jan 25, 2023

Save to Folio

Jan 25, 2023

Save to Folio

Ransomware

Vice Society Ransomware Group Targets Manufacturing Companies

In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.

Research Jan 24, 2023

Save to Folio

Research Jan 24, 2023

Save to Folio

Cyber Threats

“Payzero” Scams and The Evolution of Asset Theft in Web3

In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart contracts, and then take over their digital assets, such as NFT tokens, without paying. We named this scam “Payzero”.

Research Jan 18, 2023

Save to Folio

Research Jan 18, 2023

Save to Folio

Malware

Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures

We discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to distribute NjRAT (also known as Bladabindi) to infect victims across the Middle East and North Africa.

Jan 17, 2023

Save to Folio

Jan 17, 2023

Save to Folio

Cloud

Abusing a GitHub Codespaces Feature For Malware Delivery

Proof of Concept (POC): We investigate one of the GitHub Codespaces’ real-time code development and collaboration features that attackers can abuse for cloud-based trusted malware delivery. Once exploited, malicious actors can abuse legitimate GitHub accounts to create a malware file server.

Jan 16, 2023

Save to Folio

Jan 16, 2023

Save to Folio

Exploits & Vulnerabilities

What is Red Teaming & How it Benefits Orgs

Running real-world attack simulations can help improve organizations' cybersecurity resilience

Expert Perspective Jan 10, 2023

Save to Folio

Expert Perspective Jan 10, 2023

Save to Folio

Malware

Gootkit Loader Actively Targets Australian Healthcare Industry

We analyzed the infection routine used in recent Gootkit loader attacks on the Australian healthcare industry and found that Gootkit leveraged SEO poisoning for its initial access and abused legitimate tools like VLC Media Player.

Research Jan 09, 2023

Save to Folio

Research Jan 09, 2023

Save to Folio

Compliance & Risks

CISO's Challenges Involved with Business Leader & SOC

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT.

Security Strategies Dec 26, 2022

Save to Folio

Security Strategies Dec 26, 2022

Save to Folio