US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ Cybersecurity Posture & Insurance Outlook with Advisen https://www.trendmicro.com/en_us/ciso/22/k/improve-cybersecurity-posture.html CISO Resource Center urn:uuid:b841558f-52da-66d7-ba46-ab21d00d5055 Thu, 26 Jan 2023 00:00:00 +0000 Trend Micro’s Eric Skinner, and Advisen, an insurance data and analytics company, discuss the current threat landscape, cyber risk management, and how vendors and cyber insurers can champion enhanced cybersecurity posture. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Blog Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud New Mimic Ransomware Abuses Everything APIs for its Encryption Process https://www.trendmicro.com/en_us/research/23/a/new-mimic-ransomware-abuses-everything-apis-for-its-encryption-p.html Research, News, and Perspective urn:uuid:8e86ec96-9f60-b687-dba3-db236bfa5518 Thu, 26 Jan 2023 00:00:00 +0000 Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename search engine developed by Voidtools that offers quick searching and real-time updates for minimal resource usage. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Nathaniel Morales Dependency Mapping for DevSecOps https://www.trendmicro.com/en_us/devops/23/a/dependency-mapping-plus-tools.html DevOps Resource Center urn:uuid:5a1f90d7-759a-7704-fb97-b508cf58f180 Wed, 25 Jan 2023 00:00:00 +0000 Discover the importance of dependency mapping and best practices for successful dependency management Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : Best Practices Trend Micro DevOps : Expert Perspective Trend Micro DevOps : Google Cloud Platform Trend Micro DevOps : Kubernetes Trend Micro DevOps : Docker Trend Micro DevOps : Multi Cloud Attacking The Supply Chain: Developer https://www.trendmicro.com/en_us/research/23/a/attacking-the-supply-chain-developer.html Research, News, and Perspective urn:uuid:97e65c0c-c5bd-5d34-48ab-f26f3dda1b77 Wed, 25 Jan 2023 00:00:00 +0000 In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports David Fiser Ransomware Recovery Plan for 2023 https://www.trendmicro.com/en_us/ciso/23/a/ransomware-recovery-plan.html CISO Resource Center urn:uuid:8042dfa4-a73e-82b3-30f4-a19e44aab5aa Tue, 24 Jan 2023 00:00:00 +0000 It’s important to defend against ransomware attacks, but is your organization prepared to deal with the consequences of a breach? Find out how to plan an effective ransomware recovery strategy. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Jon Clay Vice Society Ransomware Group Targets Manufacturing Companies https://www.trendmicro.com/en_us/research/23/a/vice-society-ransomware-group-targets-manufacturing-companies.html Research, News, and Perspective urn:uuid:6eefbdf5-e7fd-869d-ea9b-414d8fc331d8 Tue, 24 Jan 2023 00:00:00 +0000 In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Ieriz Nicolle Gonzalez TLS Connection Cryptographic Protocol Vulnerabilities https://www.trendmicro.com/en_us/devops/23/a/tls-connection-cryptographic-protocol-vulnerabilities.html DevOps Resource Center urn:uuid:18201a61-80f2-ebad-c6b0-c0e011c5d318 Fri, 20 Jan 2023 00:00:00 +0000 TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : Best Practices Trend Micro DevOps : Expert Perspective Trend Micro DevOps : Google Cloud Platform Trend Micro DevOps : Kubernetes Trend Micro DevOps : Docker Trend Micro DevOps : Multi Cloud What is Business Attack Surface Management? https://www.trendmicro.com/en_us/ciso/23/a/what-is-business-attack-surface-management.html CISO Resource Center urn:uuid:a0ea2725-8b2d-d4c9-573b-0e7a2959af6d Thu, 19 Jan 2023 00:00:00 +0000 Explore how businesses can make internal and external attack surface management (ASM) actionable. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Greg Young “Payzero” Scams and The Evolution of Asset Theft in Web3 https://www.trendmicro.com/en_us/research/23/a/payzero-scams-and-the-evolution-of-asset-theft-in-web3.html Research, News, and Perspective urn:uuid:1b797037-3940-d7b9-96f6-101a24b4763e Wed, 18 Jan 2023 00:00:00 +0000 In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart contracts, and then take over their digital assets, such as NFT tokens, without paying. We named this scam “Payzero”. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Fyodor Yarochkin Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures https://www.trendmicro.com/en_us/research/23/a/earth-bogle-campaigns-target-middle-east-with-geopolitical-lures.html Research, News, and Perspective urn:uuid:26ad64c7-e7f2-aaa2-5437-056644e3b237 Tue, 17 Jan 2023 00:00:00 +0000 We discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to distribute NjRAT (also known as Bladabindi) to infect victims across the Middle East and North Africa. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Social Media Trend Micro Research : Phishing Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Peter Girnus Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks https://www.trendmicro.com/en_us/research/23/a/batloader-malware-abuses-legitimate-tools-uses-obfuscated-javasc.html Research, News, and Perspective urn:uuid:1073efbe-42f1-3595-3f77-0f728faf9a7a Tue, 17 Jan 2023 00:00:00 +0000 We discuss the Batloader malware campaigns we observed in the last quarter of 2022, including our analysis of Water Minyades-related events (This is the intrusion set we track behind the creation of Batloader). Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Junestherry Dela Cruz Cyber Hygiene: How to get buy-in from employees https://www.trendmicro.com/en_us/ciso/22/j/cyber-hygiene-best-practices-assessment.html CISO Resource Center urn:uuid:941d569d-ee10-55ae-2edd-a41f46b36834 Tue, 17 Jan 2023 00:00:00 +0000 Good cyber hygiene starts with buy-in across the enterprise. Discover how CISOs can establish a company-wide security culture to reduce risk. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Cybersecurity Awareness Month Trend Micro CISO : Risk Management Abusing a GitHub Codespaces Feature For Malware Delivery https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html Research, News, and Perspective urn:uuid:6a869720-8020-ca0d-f11c-374e27427589 Mon, 16 Jan 2023 00:00:00 +0000 Proof of Concept (POC): We investigate one of the GitHub Codespaces’ real-time code development and collaboration features that attackers can abuse for cloud-based trusted malware delivery. Once exploited, malicious actors can abuse legitimate GitHub accounts to create a malware file server. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Nitesh Surana 4 Predictions for Cyber Insurance Requirements 2023 https://www.trendmicro.com/en_us/ciso/23/a/cyber-insurance-requirements-2023.html CISO Resource Center urn:uuid:799cf858-0852-9347-730d-e662fef6a190 Thu, 12 Jan 2023 00:00:00 +0000 As the threat landscape evolves and the cost of data breaches increase, so will cyber insurance requirements from carriers. Cyber Risk Specialist Vince Kearns shares his 4 predictions for 2023. Trend Micro CISO : Cyber Insurance Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Vince Kearns An in-depth HTTP Strict Transport Security Tutorial https://www.trendmicro.com/en_us/devops/23/a/http-strict-transport-security-tutorial.html DevOps Resource Center urn:uuid:f90a36d2-eb94-7aed-75c5-4c06ebd66535 Wed, 11 Jan 2023 00:00:00 +0000 HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Article Trend Micro DevOps : Multi Cloud Trend Micro DevOps : Expert Perspective Michael Langford What is Red Teaming & How it Benefits Orgs https://www.trendmicro.com/en_us/research/23/a/what-is-red-teaming.html Research, News, and Perspective urn:uuid:85f9ce60-899b-ae3b-6e3f-c116f603a16e Tue, 10 Jan 2023 00:00:00 +0000 Running real-world attack simulations can help improve organizations' cybersecurity resilience Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Michael Draeger Gootkit Loader Actively Targets Australian Healthcare Industry https://www.trendmicro.com/en_us/research/23/a/gootkit-loader-actively-targets-the-australian-healthcare-indust.html Research, News, and Perspective urn:uuid:6ea6628e-4418-718a-d6f1-cebd3283cc2f Mon, 09 Jan 2023 00:00:00 +0000 We analyzed the infection routine used in recent Gootkit loader attacks on the Australian healthcare industry and found that Gootkit leveraged SEO poisoning for its initial access and abused legitimate tools like VLC Media Player. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Hitomi Kimura Why Data Hygiene is Key to Industrial Cybersecurity https://www.trendmicro.com/en_us/ciso/23/a/industrial-cybersecurity-data-hygiene.html CISO Resource Center urn:uuid:5dd08571-785e-83e4-3fd5-f453f11f5fd4 Thu, 05 Jan 2023 00:00:00 +0000 How can highly distributed organizations with complex, integrated supply chains defend against cyber threats? By practicing good data hygiene based on zero-trust principles. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Improving Software Supply Chain Security https://www.trendmicro.com/en_us/ciso/22/l/software-supply-chain-security.html CISO Resource Center urn:uuid:47df91e5-3608-6af4-04cb-d1da53a3c006 Wed, 28 Dec 2022 00:00:00 +0000 Explore use cases and mitigation strategies to improve software supply chain security and reduce cyber risk. Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Blog CISO's Challenges Involved with Business Leader & SOC https://www.trendmicro.com/en_us/research/22/l/cisos-challenges-business-leader-soc.html Research, News, and Perspective urn:uuid:7560cbce-85d7-f09a-a181-202642bbeec5 Mon, 26 Dec 2022 00:00:00 +0000 Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. Trend Micro Research : ICS OT Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Video Trend Micro Research : Security Strategies Kazuhisa Tagaya IcedID Botnet Distributors Abuse Google PPC to Distribute Malware https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html Research, News, and Perspective urn:uuid:9c8a5c29-e0c8-b209-64b6-8dc70d6cd522 Fri, 23 Dec 2022 00:00:00 +0000 We analyze the latest changes in IcedID botnet from a campaign that abuses Google pay per click (PPC) ads to distribute IcedID via malvertising attacks. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Cyber Crime Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ian Kenefick Prevent Cryptocurrency Cyber Extortion https://www.trendmicro.com/en_us/ciso/22/i/prevent-cyber-extortion.html CISO Resource Center urn:uuid:2a0e061d-c9ee-db11-0f13-94d09620f888 Thu, 22 Dec 2022 00:00:00 +0000 Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. We review cryptocurrency trends and how enterprises can enhance their cybersecurity posture to prevent cyber extortion. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Cybersecurity Awareness Month Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Jon Clay When and How to Use AWS Graviton https://www.trendmicro.com/en_us/devops/22/l/aws-graviton-how-to-guide.html DevOps Resource Center urn:uuid:74c44be2-5610-01ff-38ee-358bd950da9f Thu, 22 Dec 2022 00:00:00 +0000 Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton. Trend Micro DevOps : Cloud Native Trend Micro DevOps : How To Trend Micro DevOps : Article Trend Micro DevOps : AWS Michael Langford A Technical Analysis of CVE-2022-22583 and CVE-2022-32800 https://www.trendmicro.com/en_us/research/22/l/a-technical-analysis-of-cve-2022-22583-and-cve-2022-32800.html Research, News, and Perspective urn:uuid:4c44f10b-04eb-3641-fa5a-1272d54cf405 Wed, 21 Dec 2022 00:00:00 +0000 This blog entry discusses the technical details of how we exploited CVE-2022-22583 using a different method. We also tackle the technical details of CVE-2022-32800, another SIP-bypass that we discovered more recently, in this report. Trend Micro Research : Endpoints Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Mickey Jin Detecting Windows AMSI Bypass Techniques https://www.trendmicro.com/en_us/research/22/l/detecting-windows-amsi-bypass-techniques.html Research, News, and Perspective urn:uuid:428d8e17-4917-393c-babe-bab969d62e3a Wed, 21 Dec 2022 00:00:00 +0000 We look into some of the implementations that cybercriminals use to bypass the Windows Antimalware Scan Interface (AMSI) and how security teams can detect threats attempting to abuse it for compromise with Trend Micro Vision One™. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jiri Sykora Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks https://www.trendmicro.com/en_us/research/22/l/conti-team-one-splinter-group-resurfaces-as-royal-ransomware-wit.html Research, News, and Perspective urn:uuid:55408c39-a3a7-1da8-f2a3-283f8aa14320 Wed, 21 Dec 2022 00:00:00 +0000 From September to December, we detected multiple attacks from the Royal ransomware group. In this blog entry, we discuss findings from our investigation of this ransomware and the tools that Royal ransomware actors used to carry out their attacks. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Web Trend Micro Research : Articles, News, Reports Ivan Nicole Chavez Diving into an Old Exploit Chain and Discovering 3 new SIP-Bypass Vulnerabilities https://www.trendmicro.com/en_us/research/22/l/diving-into-an-old-exploit-chain-and-discovering-3-new-sip-bypas.html Research, News, and Perspective urn:uuid:8bebeda3-0877-70cc-5492-ecdd109828e9 Tue, 20 Dec 2022 00:00:00 +0000 More than two years ago, a researcher, A2nkF demonstrated the exploit chain from root privilege escalation to SIP-Bypass up to arbitrary kernel extension loading. In this blog entry, we will discuss how we discovered 3 more vulnerabilities from the old exploit chain. Trend Micro Research : Endpoints Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Mickey Jin Raspberry Robin Malware Targets Telecom, Governments https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html Research, News, and Perspective urn:uuid:fa203e52-29a1-abce-5939-2055bc036344 Tue, 20 Dec 2022 00:00:00 +0000 We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools. Trend Micro Research : Malware Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Cyber Crime Trend Micro Research : Articles, News, Reports Christopher So 4 Cybersecurity Budget Management Tips https://www.trendmicro.com/en_us/ciso/22/h/cybersecurity-budget-management.html CISO Resource Center urn:uuid:e1e4f176-44bc-2eb5-34c4-2ebefbd67965 Tue, 20 Dec 2022 00:00:00 +0000 Learn how CISOs and security leaders can strategically manage their cybersecurity budget to run more productive security teams amid a recession and skills shortage. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Greg Young Web3 IPFS Currently Used For Phishing https://www.trendmicro.com/en_us/research/22/l/web3-ipfs-only-used-for-phishing---so-far.html Research, News, and Perspective urn:uuid:4b38cb89-a4ec-58fb-5a7d-f201312d7ffa Tue, 20 Dec 2022 00:00:00 +0000 We discuss the use of the InterPlanetary File System (IPFS) in phishing attacks. Trend Micro Research : Cloud Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Matsukawa Bakuei A Closer Look at Windows Kernel Threats https://www.trendmicro.com/en_us/research/22/l/a-closer-look-at-windows-kernel-threats.html Research, News, and Perspective urn:uuid:60f3eff2-6180-e1ff-c271-7b49c1b306a7 Mon, 19 Dec 2022 00:00:00 +0000 In this blog entry, we discuss the reasons why malicious actors choose to and opt not to pursue kernel-level access in their attacks. It also provides an overview of kernel-level threats that have been publicly reported from April 2015 to October 2022. Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Sherif Magdy Agenda Ransomware Uses Rust to Target More Vital Industries https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html Research, News, and Perspective urn:uuid:c747f86b-d793-f445-a0cc-cb5e6f9c4157 Fri, 16 Dec 2022 00:00:00 +0000 This year, various ransomware-as-a-service groups have developed versions of their ransomware in Rust, including Agenda. Agenda's Rust variant has targeted vital industries like its Go counterpart. In this blog, we will discuss how the Rust variant works. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Nathaniel Morales Trend Micro Joins Google’s App Defense Alliance https://www.trendmicro.com/en_us/research/22/l/google-play-malware-scanning-prevent-malicious-apps.html Research, News, and Perspective urn:uuid:b7a80f5b-56f4-7e44-b877-36fb21f6defc Fri, 16 Dec 2022 00:00:00 +0000 Trend Micro will be joining Google's App Defense Alliance (ADA) to help improve their ability to identify malicious apps before they are published to the Google Play store. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jon Clay Ransomware Business Models: Future Pivots and Trends https://www.trendmicro.com/en_us/research/22/l/ransomware-business-models-future-trends.html Research, News, and Perspective urn:uuid:997509a6-3e8f-3a53-5378-aa9b66c6b2c6 Thu, 15 Dec 2022 00:00:00 +0000 Ransomware groups and their business models are expected to change from what and how we know it to date. In this blog entry, we summarize from some of our insights the triggers that spark the small changes in the short term (“evolutions”) and the bigger deviations (“revolutions”) they can redirect their criminal enterprises to in the long run. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Cyber Threats Trend Micro Research : ICS OT Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : IoT Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Feike Hacquebord Trend Joining App Defense Alliance Announced by Google https://www.trendmicro.com/en_us/research/22/l/app-defense-alliance.html Research, News, and Perspective urn:uuid:ac6c2378-3f11-20ef-33a4-9a782932c61a Thu, 15 Dec 2022 00:00:00 +0000 Trend Micro’s participation in Google’s App Defense Alliance will ensure the security of customers by preventing malicious apps from being made available on the Google Play Store. Trend Micro Research : Malware Trend Micro Research : Web Trend Micro Research : Expert Perspective Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jon Clay Managing Cyber Risk in 2023: The People Element https://www.trendmicro.com/en_us/ciso/22/e/managing-cyber-risk.html CISO Resource Center urn:uuid:46a2d0fe-2142-eca6-653c-3304d03e1a45 Thu, 15 Dec 2022 00:00:00 +0000 Explore the latest findings from Trend Micro’s Cyber Risk Index (1H’2022) and discover how to enhance cybersecurity risk management across the digital attack surface. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Probing Weaponized Chat Applications Abused in Supply-Chain Attacks https://www.trendmicro.com/en_us/research/22/l/probing-weaponized-chat-applications-abused-in-supply-chain-atta.html Research, News, and Perspective urn:uuid:5736562b-a332-b705-87c9-b0405f73a146 Wed, 14 Dec 2022 00:00:00 +0000 This report examines the infection chain and the pieces of malware used by malicious actors in supply-chain attacks that leveraged trojanized installers of chat-based customer engagement platforms. Trend Micro Research : Endpoints Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jaromir Horejsi Forging Ahead in 2023: Insights From Trend Micro’s 2023 Security Predictions https://www.trendmicro.com/en_us/research/22/l/forging-ahead-in-2023--insights-from-trend-micro-s-2023-security.html Research, News, and Perspective urn:uuid:08ccec21-07aa-cdc0-4134-9bb797cac446 Tue, 13 Dec 2022 00:00:00 +0000 In 2023, cybercriminals and defenders alike will have to move forward with caution in the face of a business landscape that’s fraught with security blindsides and economic ebbs and flows. Trend Micro Research : Report Trend Micro Research : Reports Trend Micro Research : Cyber Threats Intrusion Detection & Prevention Systems Guide https://www.trendmicro.com/en_us/ciso/22/l/intrusion-detection-prevention-systems.html CISO Resource Center urn:uuid:774c69d0-e710-1e42-c93d-202fb81a0fa3 Tue, 13 Dec 2022 00:00:00 +0000 IDPS, IDS, IPS… what’s the difference? Discover key differences between intrusion detection and prevention systems as well as 9 technical and non-technical questions to ask when evaluating vendors. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT https://www.trendmicro.com/en_us/research/22/l/linux-cryptomining-enhanced-via-chaos-rat-.html Research, News, and Perspective urn:uuid:bf45b698-3449-c126-8db6-fdf9b3c7d48a Mon, 12 Dec 2022 00:00:00 +0000 We intercepted a cryptocurrency mining attack that incorporated an advanced remote access trojan (RAT) named the CHAOS Remote Administrative Tool. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports David Fiser Protect Your Network with Zero-Day Threat Protection https://www.trendmicro.com/en_us/devops/22/l/zero-day-threat-protection.html DevOps Resource Center urn:uuid:70ae9924-2987-a39c-cd6e-a7a9a682e6be Fri, 09 Dec 2022 00:00:00 +0000 Explore the world of zero-day threats and gain valuable insight into the importance of proactive detection and remediation. Learn how Trend Micro™ Research mitigates risk by providing global cybersecurity intelligence to continuously discover the ever-changing attack surface, understand and prioritize vulnerabilities, detect and rapidly respond to threats, and apply the right security at the right time. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Network Security Trend Micro DevOps : Article Trend Micro DevOps : Multi Cloud Trend Micro DevOps : Expert Perspective Michael Langford Cyber Insurance Policy Underwriting Explained https://www.trendmicro.com/en_us/ciso/22/l/cyber-insurance-policy-underwriting.html CISO Resource Center urn:uuid:78702333-1f66-1cfd-9e4e-649eaaa29711 Thu, 08 Dec 2022 00:00:00 +0000 Cybersecurity insurance is a must have for organizations of any size. John Hennessy, RVP at Cowbell discusses cyber insurance policy underwriting process, market trends, and the key security controls for businesses. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Vince Kearns Cybersecurity Reflections from 26 Years at Trend https://www.trendmicro.com/en_us/research/22/l/lets-protect-the-connected-world.html Research, News, and Perspective urn:uuid:42bd2a41-b75e-8bd4-f082-297c91180535 Thu, 08 Dec 2022 00:00:00 +0000 Trend Micro is one of the few cybersecurity vendors today that can protect your entire world, whether it is your home office and family, your drive to work, or your work environment. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jon Clay Cybersecurity Plan: 3 Keys for CISOs https://www.trendmicro.com/en_us/ciso/22/l/cybersecurity-plan-2023.html CISO Resource Center urn:uuid:bd18af4a-5687-b192-e34d-6250a19f76fe Tue, 06 Dec 2022 00:00:00 +0000 CISOs and security professionals need a cybersecurity plan to succeed. Explore three keys for a winning strategy. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Industry 4.0: CNC Machine Security Risks Part 3 https://www.trendmicro.com/en_us/research/22/l/cnc-machine-security-risks-part-3.html Research, News, and Perspective urn:uuid:257f04fe-72ed-684b-4443-1f5a60aea31c Tue, 06 Dec 2022 00:00:00 +0000 This three-part blog series explores the risks associated with CNC machines Trend Micro Research : ICS OT Trend Micro Research : Research Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Why Chaos Engineering is a Good Stress Test Strategy https://www.trendmicro.com/en_us/devops/22/l/chaos-engineering-test-strategy.html DevOps Resource Center urn:uuid:ce68f368-6a53-bddd-8870-dd8521ef250b Fri, 02 Dec 2022 00:00:00 +0000 Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and weaknesses that can be exploited by attackers. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Article Trend Micro DevOps : Multi Cloud Trend Micro DevOps : Expert Perspective Michael Langford Industry 4.0: CNC Machine Security Risks Part 2 https://www.trendmicro.com/en_us/research/22/l/cnc-machine-security-risks-part-2.html Research, News, and Perspective urn:uuid:775b26cc-c752-2afb-2795-93d7317d487e Thu, 01 Dec 2022 00:00:00 +0000 This three-part blog series explores the risks associated with CNC machines Trend Micro Research : ICS OT Trend Micro Research : Research Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Top 3 Non-Technical Cybersecurity Trends for 2023 https://www.trendmicro.com/en_us/ciso/22/l/cybersecurity-trends-2023.html CISO Resource Center urn:uuid:2ee72849-965f-0617-511a-dbf3cd15a8b8 Thu, 01 Dec 2022 00:00:00 +0000 A strong cybersecurity strategy isn’t just about choosing the right tools. Cybersecurity experts Greg Young and William Malik discuss three non-technical cybersecurity trends for 2023 to help security leaders reduce cyber risk across the enterprise attack surface. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Greg Young Data Exfiltration Prevention with SASE https://www.trendmicro.com/en_us/ciso/22/k/prevent-data-exfiltration.html CISO Resource Center urn:uuid:0fe5f1d6-dc60-cc47-5e57-b028497a8018 Tue, 29 Nov 2022 00:00:00 +0000 Data exposure from SaaS and cloud applications is an increasing risk factor facing businesses today. Discover how SASE capabilities can help prevent data exfiltration and reduce cyber risk across the attack surface. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Industry 4.0: CNC Machine Security Risks Part 1 https://www.trendmicro.com/en_us/research/22/k/cnc-machine-security-risks-part-1.html Research, News, and Perspective urn:uuid:6a38cea4-8bf6-4992-62ce-5b0ed172f18e Tue, 29 Nov 2022 00:00:00 +0000 This three-part blog series explores the risks associated with CNC machines Trend Micro Research : ICS OT Trend Micro Research : Research Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats