US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022 https://www.trendmicro.com/en_us/research/21/l/pushing-forward-key-takeaways-from-trend-micros-security-predict.html Research, News, and Perspective urn:uuid:a29b337e-62e0-8884-c1af-3a90ebc45bf4 Tue, 07 Dec 2021 00:00:00 +0000 In this entry, we discuss several of our predictions that security professionals and decision-makers should know about to help them make informed decisions on various security fronts in the coming year. Trend Micro Research : Cloud Trend Micro Research : IoT Trend Micro Research : Annual Predictions Trend Micro Research : Network Trend Micro Research : Cyber Threats Trend Micro Research : Report Virtual Patching 101 https://www.trendmicro.com/en_us/devops/21/l/virtual-patching-101.html DevOps Resource Center urn:uuid:d3a6d4e0-7e36-df5e-52e9-be0bcccdb58e Tue, 07 Dec 2021 00:00:00 +0000 Get the lowdown on virtual patching: a simplified, automated solution to shielding vulnerabilities from exploits. Trend Micro DevOps : Workload Security Trend Micro DevOps : Cloud Native Trend Micro DevOps : Network Security Trend Micro DevOps : Infographic Trend Micro DevOps : Multi Cloud Trend Micro DevOps : Expert Perspective This Week in Security News - December 3, 2021 https://www.trendmicro.com/en_us/research/21/l/this-week-in-security-news-dec-3-2021.html Research, News, and Perspective urn:uuid:f014e173-1ae9-cdbb-7ac9-8376c6b20d8c Fri, 03 Dec 2021 00:00:00 +0000 This week, learn about how Squirrelwaffle utilized ProxyLogon and ProxyShell to hack email chains. Also, read on a recent data breach of the Los Angeles Planned Parenthood Network. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Ransomware Trend Micro Research : Smart Factories Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Jon Clay Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify https://www.trendmicro.com/en_us/research/21/l/vulnerabilities-exploited-for-monero-mining-malware-delivered-via-gitHub-netlify.html Research, News, and Perspective urn:uuid:5ca58cd1-e3b4-64be-f85d-4390816f27e7 Fri, 03 Dec 2021 00:00:00 +0000 We looked into exploitation attempts we observed in the wild and the abuse of legitimate platforms Netlify and GitHub as repositories for malware. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Nitesh Surana Analyzing How TeamTNT Used Compromised Docker Hub Accounts https://www.trendmicro.com/en_us/research/21/l/more-tools-in-the-arsenal-how-teamtnt-used-compromised-docker-hu.html Research, News, and Perspective urn:uuid:793e0b07-8f81-8d81-fc6d-8c1059de513c Wed, 01 Dec 2021 00:00:00 +0000 Following our previous disclosure of compromised Docker hub accounts delivering cryptocurrency miners, we analyze these accounts and discover more malicious actions that you need to be aware of. Trend Micro Research : Cloud Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Nitesh Surana What to do at AWS re:Invent 2021 - Day 3 https://www.trendmicro.com/en_us/research/21/l/aws-reinvent-2021-agenda.html Research, News, and Perspective urn:uuid:cb8f25a2-2de8-c849-a01c-a2c01edc98b5 Wed, 01 Dec 2021 00:00:00 +0000 Welcome to your complete guide to AWS re:Invent 2021 Day 3, where you will find tips on how to get the most out of your conference experience both in Las Vegas and virtually. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats What You Can Do to Mitigate Cloud Misconfigurations https://www.trendmicro.com/en_us/research/21/k/what-can-you-do-to-mitigate-cloud-misconfigurations.html Research, News, and Perspective urn:uuid:80417c3e-eb3e-bb53-6906-f31038a55e14 Tue, 30 Nov 2021 00:00:00 +0000 Cloud misconfigurations can become opportunities for cyberattacks or lead to data breaches. Organizations must mitigate them before incurring significant and costly consequences. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Aaron Ansari ESG Economic Value Validation of XDR https://www.trendmicro.com/en_us/ciso/21/k/esg-values-xdr-solutions.html CISO Resource Center urn:uuid:9b3f59de-3ba7-f1ff-d25d-14f45f682a4e Tue, 30 Nov 2021 00:00:00 +0000 Hear leading analyst firm ESG and Chase Renes, system administrator at Vision Bank, discuss the operational, business, and financial value of Trend Micro’s industry-leading XDR solution. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Top 10 AWS Security Misconfiguration https://www.trendmicro.com/en_us/devops/21/k/top-10-aws-security-misconfigurations.html DevOps Resource Center urn:uuid:6598d5f9-9f86-cc8b-2b3b-408870f9c4e7 Tue, 30 Nov 2021 00:00:00 +0000 Misconfigurations pose the biggest threat to cloud security. We compiled the top 10 AWS services with the highest misconfiguration rates. Trend Micro DevOps : Article Trend Micro DevOps : Compliance Trend Micro DevOps : Conformity Trend Micro DevOps : AWS Trend Micro DevOps : Expert Perspective AWS re:Invent 2021 Guide: Checklist & Key Sessions https://www.trendmicro.com/en_us/research/21/k/aws-re-Invent-2021-guide-checklist-key-sessions.html Research, News, and Perspective urn:uuid:68796fe5-fa76-3362-c60d-79f9664a5d7d Mon, 29 Nov 2021 00:00:00 +0000 Welcome to your complete guide to AWS re:Invent 2021, where you will find tips on how to get the most out of your conference experience both in Las Vegas and virtually. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Aaron Ansari Trend Micro Cloud One Network Security-as-a-Service https://www.trendmicro.com/en_us/research/21/k/trend-micro-cloud-one-network-security-as-a-service.html Research, News, and Perspective urn:uuid:d754335a-a923-7deb-a977-36c64fac80e2 Mon, 29 Nov 2021 00:00:00 +0000 Trend Micro, alongside Amazon Web Services, provides the latest in cloud-native deployment options. We have simplified network security, protecting customers across Virtual Private Clouds (VPCs) without needing agents to be installed on instances. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Privacy & Risks Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Laura Roantree Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websites https://www.trendmicro.com/en_us/research/21/k/campaign-abusing-rats-uses-fake-websites.html Research, News, and Perspective urn:uuid:1b110ee0-0a06-4b7f-a3ae-004c7dd06cd1 Mon, 29 Nov 2021 00:00:00 +0000 We have been tracking a campaign involving the SpyAgent malware that abuses well-known remote access tools (RATs) for some time now. While previous versions of the malware have been covered by other researchers, our blog entry focuses on the malicious actor’s latest attacks. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Jaromir Horejsi Reduce Friction Between IT Leaders and C-suite https://www.trendmicro.com/en_us/ciso/21/k/reduce-friction-between-it-leaders-and-c-suite.html CISO Resource Center urn:uuid:328e24aa-9ce8-5ae9-426e-54951b078bb3 Fri, 26 Nov 2021 00:00:00 +0000 As we creep toward a post-pandemic world, organizations need to plan accordingly. Explore Trend Micro’s latest cyber risk research to enable your business to maximize its growth and potential. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Risk Management A Complete Guide to Cloud-Native Application Security https://www.trendmicro.com/en_us/devops/21/k/a-complete-guide-to-cloud-native-application-security.html DevOps Resource Center urn:uuid:568253c3-e0ad-af57-ca7f-29f044f4ecaa Tue, 23 Nov 2021 00:00:00 +0000 Explore this comprehensive guide to application security, which provides an overview of the importance of embedding runtime application security controls in the application build workflow to protect cloud-native web applications and APIs. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Serverless Security Trend Micro DevOps : Article Trend Micro DevOps : Best Practices Trend Micro DevOps : Multi Cloud Melanie Tafelski BazarLoader Adds Compromised Installers, ISO to Arrival and Delivery Vectors https://www.trendmicro.com/en_us/research/21/k/bazarloader-adds-compromised-installers-iso-to-arrival-delivery-vectors.html Research, News, and Perspective urn:uuid:b3de07b3-b8a7-ab0e-2f70-29d49ee98dd0 Tue, 23 Nov 2021 00:00:00 +0000 We observed BazarLoader adding two new arrival mechanisms to their current roster of malware delivery techniques. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Spam Trend Micro Research : Articles, News, Reports Ian Kenefick Defend Against Cyber Espionage Attacks https://www.trendmicro.com/en_us/ciso/21/k/defend-against-cybermercenary-attacks.html CISO Resource Center urn:uuid:4e69b1c2-5711-5644-3c84-34094d4fd93c Tue, 23 Nov 2021 00:00:00 +0000 Explore Trend Micro’s latest research into Void Balaur, a prolific cybermercenary group, to learn how to defend against attacks launched by this growing group of threat actors. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management COP26 Backs Electric Vehicles to Reduce Climate Change https://www.trendmicro.com/en_us/research/21/k/cop26-rallies-behind-evs-to-mitigate-climate-change.html Research, News, and Perspective urn:uuid:01a86480-2c34-5910-df5a-bf0fe41e7ac3 Tue, 23 Nov 2021 00:00:00 +0000 The 26 United Nations Climate Change Conference pushes for countries of parties to adopt more widespread EV use in order to reduce the looming threats of climate change. Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Connected Car Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains https://www.trendmicro.com/en_us/research/21/k/Squirrelwaffle-Exploits-ProxyShell-and-ProxyLogon-to-Hijack-Email-Chains.html Research, News, and Perspective urn:uuid:adf1d65e-1d83-abe8-5ae3-46c97e85e29e Fri, 19 Nov 2021 00:00:00 +0000 Squirrelwaffle is known for using the tactic of sending malicious spam as replies to existing email chains. We look into how by investigating its exploit of Microsoft Exchange Server vulnerabilities, ProxyLogon and ProxyShell. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Spam Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Mohamed Fahmy Ransomware as a Service 101 https://www.trendmicro.com/en_us/ciso/21/k/ransomware-as-a-service-101.html CISO Resource Center urn:uuid:d59f7d48-190b-30ad-0baa-c7bdda2adecd Fri, 19 Nov 2021 00:00:00 +0000 To help you enhance your defense against ransomware, Trend Micro Research shares key insights on how ransomware as a service (RaaS) operators work. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management N-Day Exploit Protection Strategies https://www.trendmicro.com/en_us/ciso/21/k/n-day-exploit-protection-strategies.html CISO Resource Center urn:uuid:66d2df4e-a1bb-4ee4-994e-1d68f90fde3c Fri, 19 Nov 2021 00:00:00 +0000 Over two years, Trend Micro Research scoured the underground forums for insight into the N-day exploit market. Discover their findings and how you can secure your organization against exploits. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management This Week in Security News - November 19, 2021 https://www.trendmicro.com/en_us/research/21/k/this-week-in-security-news-nov-19-21.html Research, News, and Perspective urn:uuid:8d85097f-a280-09cc-50e7-ca5944e685b5 Fri, 19 Nov 2021 00:00:00 +0000 This week, learn about how the QAKBOT Loader malware has evolved its techniques and strategies over time. Also, read about the most recent initiative by the legislation to further cybersecurity protection. Trend Micro Research : Cloud Trend Micro Research : Expert Perspective Trend Micro Research : Web Trend Micro Research : Social Media Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Phishing Trend Micro Research : Cyber Threats Trend Micro Research : Articles, News, Reports Jon Clay A Guide to Ransomware: Prevention and Response https://www.trendmicro.com/en_us/devops/21/k/ransomware-prevention.html DevOps Resource Center urn:uuid:e81e939e-3677-dc02-91e2-d844bf209821 Thu, 18 Nov 2021 00:00:00 +0000 This article will provide guidelines aimed at helping readers understand how to detect and prevent ransomware and limit its effect. Trend Micro DevOps : Workload Security Trend Micro DevOps : Article Trend Micro DevOps : Best Practices Trend Micro DevOps : Multi Cloud Melanie Tafelski Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR https://www.trendmicro.com/en_us/research/21/k/analyzing-proxyshell-related-incidents-via-trend-micro-managed-x.html Research, News, and Perspective urn:uuid:234a19b6-a76b-eec1-12d0-1c06d6df6cca Wed, 17 Nov 2021 00:00:00 +0000 In this blog entry, we will take a look at the ProxyShell vulnerabilities that were being exploited in these events, and dive deeper into the notable post-exploitation routines that were used in four separate incidents involving these web shell attacks. Trend Micro Research : Cyber Threats Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Mohamed Fahmy Application Security 101 https://www.trendmicro.com/en_us/devops/21/k/application-security.html DevOps Resource Center urn:uuid:5130a635-ed7d-ba7b-faac-3078841ea239 Wed, 17 Nov 2021 00:00:00 +0000 Everything DevOps teams need to know about web application security risks and best practices. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Serverless Security Trend Micro DevOps : Research Trend Micro DevOps : Infographic Trend Micro DevOps : Multi Cloud Global Operations Lead to Arrests of Alleged Members of GandCrab/REvil and Cl0p Cartels https://www.trendmicro.com/en_us/research/21/k/global-operations-lead-to-arrests-of-alleged-members-of-gandcrab.html Research, News, and Perspective urn:uuid:eac41070-f95a-b17f-0e36-045cd9641fb8 Tue, 16 Nov 2021 00:00:00 +0000 A total of 13 suspects believed to be members of two prolific cybercrime rings were arrested as a global coalition across five continents involving law enforcement and private partners, including Trend Micro, sought to crack down on big ransomware operators. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Post-pandemic growth starts with understanding risk https://www.trendmicro.com/en_us/research/21/k/post-pandemic-growth-starts-with-understanding-risk.html Research, News, and Perspective urn:uuid:aaf96e15-a9a5-54af-d76c-4c76f25cf3ae Tue, 16 Nov 2021 00:00:00 +0000 The digital transformations that accompanied the pandemic are here to stay. To succeed in the post-pandemic era, organizations must come to a shared understanding about cybersecurity as a critical element of business risk. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Bharat Mistry Groups Target Alibaba ECS Instances for Cryptojacking https://www.trendmicro.com/en_us/research/21/k/groups-target-alibaba-ecs-instances-for-cryptojacking.html Research, News, and Perspective urn:uuid:58ecee94-fb14-ebe1-ef07-02c977c99ba0 Mon, 15 Nov 2021 00:00:00 +0000 We looked at how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats David Fiser QAKBOT Loader Returns With New Techniques and Tools https://www.trendmicro.com/en_us/research/21/k/qakbot-loader-returns-with-new-techniques-and-tools.html Research, News, and Perspective urn:uuid:0d762be2-d6d8-16f1-e028-fb1415e7479c Sat, 13 Nov 2021 00:00:00 +0000 QAKBOT operators resumed email spam operations towards the end of September after an almost three-month hiatus. QAKBOT detection has become a precursor to many critical and widespread ransomware attacks. Our report shares some insight into the new techniques and tools this threat is using. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Ian Kenefick This Week in Security News - November 12, 2021 https://www.trendmicro.com/en_us/research/21/k/this-week-in-security-news-november-12-2021.html Research, News, and Perspective urn:uuid:d400ef6d-22ed-c94d-8801-ad4b4a78bac2 Fri, 12 Nov 2021 00:00:00 +0000 This week, learn about the prolific cybermercenaries, Void Balaur, and their recent attacks. Also, read on the 80-country agreement to mobilize safeguards against cyberattacks. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Jon Clay Private 5G Security Risks in Manufacturing Part 4 https://www.trendmicro.com/en_us/research/21/k/private-5g-security-risks-in-manufacturing-part-4.html Research, News, and Perspective urn:uuid:0a4e4616-b28d-caf9-8603-8d1a11b20df0 Fri, 12 Nov 2021 00:00:00 +0000 We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. Trend Micro Research : IoT Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Smart Factories Trend Micro Research : Research Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports Yohei Ishihara TeamTNT Upgrades Arsenal, Refines Focus on Kubernetes and GPU Environments https://www.trendmicro.com/en_us/research/21/k/teamtnt-upgrades-arsenal-refines-focus-on-kubernetes-and-gpu-env.html Research, News, and Perspective urn:uuid:25af24ea-5b92-c4d5-e866-33577b2ffdf9 Thu, 11 Nov 2021 00:00:00 +0000 Using a new batch of campaign samples, we take a look at its more recent cybercrime contributions and compare them with its previous deployments to demonstrate the group’s use of upgraded tools and payloads. Trend Micro Research : Cloud Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats David Fiser Void Balaur and the Rise of the Cybermercenary Industry https://www.trendmicro.com/en_us/research/21/k/void-balaur-and-the-rise-of-the-cybermercenary-industry.html Research, News, and Perspective urn:uuid:043c2bdf-bf91-5498-7dae-66c8d61ea36b Wed, 10 Nov 2021 00:00:00 +0000 One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Cyber Crime Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research November Continues Streak of Quiet Patch Tuesdays https://www.trendmicro.com/en_us/research/21/k/november-continues-streak-of-quiet-patch-tuesdays.html Research, News, and Perspective urn:uuid:e97f7d7e-cd9e-169d-ddc0-ac1d1c7c6ca6 Wed, 10 Nov 2021 00:00:00 +0000 November continues a recent pattern of relatively peaceful Patch Tuesday cycles. There were only six vulnerabilities rated as Critical this month, with 49 more rated as Important for a total of 55 for the month of November. Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Compromised Docker Hub Accounts Abused for Cryptomining Linked to TeamTNT https://www.trendmicro.com/en_us/research/21/k/compromised-docker-hub-accounts-abused-for-cryptomining-linked-t.html Research, News, and Perspective urn:uuid:ef0033ea-b3f3-7c7e-285d-365adffeaaff Tue, 09 Nov 2021 00:00:00 +0000 In October 2021, we observed threat actors targeting poorly configured servers with exposed Docker REST APIs by spinning up containers from images that execute malicious scripts. Trend Micro Research : Cloud Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research Cybersecurity Trends from the Global Pandemic https://www.trendmicro.com/en_us/devops/21/k/cybersecurity-trends-from-the-global-pandemic.html DevOps Resource Center urn:uuid:f4644767-c99b-7d2b-7052-558ca1302b0f Tue, 09 Nov 2021 00:00:00 +0000 The past 18 months have presented new technology and challenges at an accelerated pace. The only way to keep up with a continuous demand for new features, running workloads at scale, and ensuring applications are resilient is to stay one step ahead. Trend Micro DevOps : Workload Security Trend Micro DevOps : Cloud Native Trend Micro DevOps : Container Security Trend Micro DevOps : Article Trend Micro DevOps : Multi Cloud Trend Micro DevOps : Expert Perspective Melanie Tafelski Build a Modern Ransomware Protection Strategy https://www.trendmicro.com/en_us/ciso/21/k/build-a-modern-ransomware-protection-strategy.html CISO Resource Center urn:uuid:59c091f1-9e0e-be7e-d4fa-c5fe83206bc4 Mon, 08 Nov 2021 00:00:00 +0000 With ransomware heavily targeting critical industries in 2021, find out how you can establish a strong cybersecurity defense strategy against this evolving, costly threat. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Discovering the Exploitable Security Gaps in Remote Work Spaces https://www.trendmicro.com/en_us/research/21/k/discovering-the-exploitable-security-gaps-in-remote-work-spaces.html Research, News, and Perspective urn:uuid:274e105a-f031-9292-495b-89641922c0e3 Mon, 08 Nov 2021 00:00:00 +0000 Unprotected smart devices that populate home offices are seen as low-hanging fruit by cybercriminals. These machines can be compromised and used in criminal campaigns or leveraged to gain deeper access to home networks. Trend Micro Research : IoT Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Smart Home Trend Micro Research : Articles, News, Reports Trend Micro Research Make the Business Case for a Cloud Security Platform https://www.trendmicro.com/en_us/ciso/21/k/make-the-business-case-for-a-cloud-security-platform.html CISO Resource Center urn:uuid:2ccf1b17-316b-7c02-9aef-e6a8693008e1 Fri, 05 Nov 2021 00:00:00 +0000 Discover the projected ROI for our cloud security platform with the Forrester Total Economic Impact study and help win over the boardroom while enhancing your security posture. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Detection and Response This Week in Security News - November 5th, 2021 https://www.trendmicro.com/en_us/research/21/k/this-week-in-security-news-november-5th-2021.html Research, News, and Perspective urn:uuid:23ae2013-5d9b-238d-d95b-22afceb7a3a8 Fri, 05 Nov 2021 00:00:00 +0000 This week, learn about what the future of cybercrime could potentially look like by the start of the next decade, according to Trend Micro’s Project 2030. Also, read on how a hacker stole $784k in crypto through SIM swaps. Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Web Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : IoT Trend Micro Research : Articles, News, Reports Jon Clay A Review and Analysis of 2021 Buer Loader Campaigns https://www.trendmicro.com/en_us/research/21/k/a-review-and-analysis-of-2021-buer-loader-campaigns.html Research, News, and Perspective urn:uuid:59f0d578-ed63-ac1c-5fde-345b8a8ccd84 Fri, 05 Nov 2021 00:00:00 +0000 Buer Loader has established itself well in the underground market and has since seen continuous development. In this blog entry, we review its 2021 campaigns, tactics, and activity. Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Trend Micro Research : Cyber Threats Christopher Boyton Integrate Cybersecurity Incident Response in DevSecOps https://www.trendmicro.com/en_us/devops/21/k/integrate-cybersecurity-incident-response-in-devsecops.html DevOps Resource Center urn:uuid:895dbf95-de2f-8bb7-3b94-83e094eb5a74 Thu, 04 Nov 2021 00:00:00 +0000 This article examines the need for cross-functional integration and integrated communication between development and security teams to prevent communication dead zones and avoid delays in alerting and remediation. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : Best Practices Trend Micro DevOps : Multi Cloud Melanie Tafelski Ctrl+Alt+Truth. Welcome to the future of cybercrime https://www.trendmicro.com/en_us/research/21/j/cybercrime-reporting-2030.html Research, News, and Perspective urn:uuid:92feae68-76d8-3205-7d69-cc826b299630 Thu, 04 Nov 2021 00:00:00 +0000 Welcome to 2030, to the nation of New San Joban, where a single keystroke can alter reality. Discover what a fully converged digital world means for the future of cybersecurity, and how you can stay ahead of the bad guys. Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Smart Home Trend Micro Research : Cyber Threats Trend Micro Research : IoT Trend Micro Research : Ransomware Trend Micro Research : Smart Factories Trend Micro Research : Articles, News, Reports Rik Ferguson Do Home Hackers Compromise Business Security? https://www.trendmicro.com/en_us/ciso/21/k/does-home-iot-compromise-enterprise-security.html CISO Resource Center urn:uuid:3ca9fbb1-2e7c-975e-6a8f-ca8b06cfe3ea Tue, 02 Nov 2021 00:00:00 +0000 The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management William Malik Does Home IoT Compromise Enterprise Security? https://www.trendmicro.com/en_us/research/21/k/does-home-iot-compromise-enterprise-security.html Research, News, and Perspective urn:uuid:a916ccdf-9bf1-1ad1-fa86-65aaea70a335 Tue, 02 Nov 2021 00:00:00 +0000 The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office. Trend Micro Research : Malware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Smart Home Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports William Malik Deploy Layered Security with Azure GWLB & Trend Micro https://www.trendmicro.com/en_us/research/21/k/azure-network-layer-security.html Research, News, and Perspective urn:uuid:e50e739d-2943-8c00-fbe1-f74dedd93a9b Tue, 02 Nov 2021 00:00:00 +0000 Looking to deploy broad network layer protection that integrates with your Azure services? You’re in the right place. Learn more about our latest launch partnership with Azure Gateway Load Balancer. Trend Micro Research : Cloud Trend Micro Research : Expert Perspective Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Overview: OWASP Top 10 2021 https://www.trendmicro.com/en_us/devops/21/k/overview-owasp-top-10-2021.html DevOps Resource Center urn:uuid:e890ff01-a0b9-1a22-f799-e154bad6f748 Tue, 02 Nov 2021 00:00:00 +0000 The long-awaited OWASP Top 10 2021 draft edition is here. We take you through the changes, new vulnerabilities, and the triggers, enabling you to secure your apps against the latest threats. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : Expert Perspective Trend Micro DevOps : Open Source Security by Synk Trend Micro DevOps : Serverless Security Trend Micro DevOps : Google Cloud Platform Trend Micro DevOps : Multi Cloud Magno Logan Cracking the code in the boardroom https://www.trendmicro.com/en_us/ciso/21/k/boardroom-communications-strategy.html CISO Resource Center urn:uuid:9c7c4ee9-4d05-6c3a-ecda-9eaeff4bc1dc Mon, 01 Nov 2021 00:00:00 +0000 Former FBI Special Agent, Scott Augenbaum talks about how CISOs can successfully communicate with the board to implement more preventative protection. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Cybersecurity Trends & Predictions for CISOs https://www.trendmicro.com/en_us/ciso/21/j/cybersecurity-trends-predictions-for-cisos.html CISO Resource Center urn:uuid:0806a0e1-67ce-ee80-aa73-a6ee708d05f6 Fri, 29 Oct 2021 00:00:00 +0000 Jon Clay, VP of threat research at Trend Micro, predicts cybersecurity attacks CISOs need to prepare for. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Ransomware Negotiation Scenarios: What to Expect https://www.trendmicro.com/en_us/ciso/21/j/ransomware-negotiation-scenarios.html CISO Resource Center urn:uuid:ba2706c6-2cb7-d1e1-4644-6368ce73dd24 Fri, 29 Oct 2021 00:00:00 +0000 We wanted to get a better understanding of what victims go through during the aftermath and recovery process of a ransomware attack to help others in case they find themselves in a similar situation. To do this, we analyzed victim support chats for five ransomware families. Trend Micro CISO : Expert Perspective Trend Micro CISO : Article Trend Micro CISO : Detection and Response Erin Sindelar This Week in Security News - October 29, 2021 https://www.trendmicro.com/en_us/research/21/j/this-week-in-security-news-october-29-2021.html Research, News, and Perspective urn:uuid:6e5a791e-8bed-7367-0e30-1cf8f7a532cc Fri, 29 Oct 2021 00:00:00 +0000 What to Expect in a Ransomware Negotiation & Cybercriminals Claim to Have Hacked the NRA Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Expert Perspective Trend Micro Research : Connected Car Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Jon Clay