Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
Attaques ciblées & APT

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm's exploitation of EdgeRouters, complementing the FBI's advisory from February 27, 2024.

May 01, 2024
Ransomware

TargetCompany’s Linux Variant Targets ESXi Environments

In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution.

Jun 05, 2024

Save to Folio

Jun 05, 2024

Save to Folio

Risques liés à la & conformité

SANS's 2024 Threat-Hunting Survey Review

In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year.

Reports Jun 04, 2024

Save to Folio

Reports Jun 04, 2024

Save to Folio

Endpoints

It's Time to Up-Level Your EDR Solution

You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more.

Security Strategies Jun 03, 2024

Save to Folio

Security Strategies Jun 03, 2024

Save to Folio

Artificial Intelligence (AI)

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM

Discover Trend Micro's integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance.

Latest News Jun 02, 2024

Save to Folio

Latest News Jun 02, 2024

Save to Folio

Attaques ciblées & APT

Decoding Water Sigbin's Latest Obfuscation Tricks

Water Sigbin (aka the 8220 Gang) exploited Oracle WebLogic vulnerabilities to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.

Research May 30, 2024

Save to Folio

Research May 30, 2024

Save to Folio

Artificial Intelligence (AI)

RSAC 2024 Review: AI & Data Governance Priorities

Get our take on the RSA 2024 conference where we review some of the major topics covered such as AI and data governance.

Expert Perspective May 28, 2024

Save to Folio

Expert Perspective May 28, 2024

Save to Folio

Risques liés à la & conformité

ISPM + ITDR: Proactive Cyber Defense in the AI Era

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Expert Perspective May 22, 2024

Save to Folio

Expert Perspective May 22, 2024

Save to Folio