US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ Cybersecurity Awareness Month 2023: 4 Actionable Tips https://www.trendmicro.com/en_us/ciso/23/i/cybersecurity-awareness-month-4-actionable-tips.html CISO Resource Center urn:uuid:cd2811fe-6d2f-0c37-e0ec-1539c7cdbdd3 Tue, 26 Sep 2023 00:00:00 +0000 Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Cybersecurity Awareness Month Greg Young Examining the Activities of the Turla APT Group https://www.trendmicro.com/en_us/research/23/i/examining-the-activities-of-the-turla-group.html Research, News, and Perspective urn:uuid:45a2a489-0fc1-9490-9f0b-1b4c9c651f41 Fri, 22 Sep 2023 00:00:00 +0000 We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Srivathsa Sharma Cybercriminals Exploit the Moroccan Tragedy in New Scam Campaign https://www.trendmicro.com/en_us/research/23/i/cybercriminals-exploit-the-moroccan-tragedy-in-new-scam-campaign.html Research, News, and Perspective urn:uuid:459b4dd5-2053-aef2-75f0-867b8813781b Thu, 21 Sep 2023 00:00:00 +0000 This blog entry details a scheme that exploits the recent Morocco earthquake by impersonating the domain name of a well-known humanitarian organization for financial fraud. Trend Micro Research : Latest News Trend Micro Research : Endpoints Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Cedric Pernet Decoding Turla: Trend Micro's MITRE Performance https://www.trendmicro.com/en_us/research/23/i/mitre-attack-solution-tested.html Research, News, and Perspective urn:uuid:8ddbb99f-2a9a-7dcc-1f84-990236c15103 Thu, 21 Sep 2023 00:00:00 +0000 This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro's 100% successful protection performance. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Shannon Murphy Zero Trust Adoption: Tips to Win Over Leadership https://www.trendmicro.com/en_us/ciso/23/i/zero-trust-adoption.html CISO Resource Center urn:uuid:1444a44e-2fd1-d62e-72d2-2267baff2144 Thu, 21 Sep 2023 00:00:00 +0000 Implementing Zero Trust can be difficult due to outdated systems, employee resistance, and cost. Yet, the benefits outweigh the challenges. It is key to use a platform that combines multiple security technologies to simplify IT and risk assessment, proper planning, and getting security buy-in from stakeholders, including your board of directors. Trend Micro CISO : Article Trend Micro CISO : Zero Trust Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Alifiya Sadikali Attacks on 5G Infrastructure From Users’ Devices https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html Research, News, and Perspective urn:uuid:5c05d7ed-465a-912a-f558-3675295d9ef2 Wed, 20 Sep 2023 00:00:00 +0000 Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed, efficiency, and productivity brought by 5G. This entry describes CVE-2021-45462 as a potential use case to deploy a denial-of-service (DoS) attack to private 5G networks. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : ICS OT Trend Micro Research : APT & Targeted Attacks Trend Micro Research : IoT Trend Micro Research : Mobile Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Salim S.I. Protect CNC Machines in Networked IT/OT Environments https://www.trendmicro.com/en_us/ciso/23/i/cnc-machine-security.html CISO Resource Center urn:uuid:efa7f0ac-d9cf-e92f-065e-833553a94d13 Tue, 19 Sep 2023 00:00:00 +0000 Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response William Malik Unsung Hero in Cyber Risk Management https://www.trendmicro.com/en_us/research/23/i/cyber-risk-management.html Research, News, and Perspective urn:uuid:bd9ae69a-92d2-8348-e2d0-20e7484eb3dc Tue, 19 Sep 2023 00:00:00 +0000 Behind the scenes of the world of vulnerability intelligence and threat hunting Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ed Cabrera Biden National Cybersecurity Strategy Key Takeaways https://www.trendmicro.com/en_us/ciso/23/i/biden-national-cybersecurity-strategy-summary.html CISO Resource Center urn:uuid:07e7b109-f7ad-f857-ed86-c0006c772692 Fri, 15 Sep 2023 00:00:00 +0000 Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy's first two pillars: defend critical infrastructure and disrupt and dismantle threat actors. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Jon Clay 3 Strategic Insights from Cybersecurity Leader Study https://www.trendmicro.com/en_us/ciso/23/i/cybersecurity-leader-insights.html CISO Resource Center urn:uuid:a5144a4b-b57b-3852-d1e2-7b8ca2934be3 Thu, 14 Sep 2023 00:00:00 +0000 Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Compliance Trend Micro CISO : Risk Management RedLine/Vidar Abuses EV Certificates, Shifts to Ransomware https://www.trendmicro.com/en_us/research/23/i/redline-vidar-first-abuses-ev-certificates.html Research, News, and Perspective urn:uuid:2044fcf2-1308-4bf2-4da0-0886bb9dcce9 Wed, 13 Sep 2023 00:00:00 +0000 In this blog, we investigate how threat actors used information-stealing malware with EV code signing certificates and later delivered ransomware payloads to its victims via the same delivery method. Trend Micro Research : Malware Trend Micro Research : Ransomware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Hitomi Kimura Azure vs. AWS Developer Tools Guide https://www.trendmicro.com/en_us/devops/22/f/azure-vs-aws-developer-tools.html DevOps Resource Center urn:uuid:fa83d657-30a0-45e6-f6d4-e24526f10f52 Tue, 12 Sep 2023 00:00:00 +0000 Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : Compliance Trend Micro DevOps : AWS Trend Micro DevOps : Expert Perspective Michael Langford Managing Cyber Risk for CISOs Under Pressure https://www.trendmicro.com/en_us/ciso/23/i/managing-cyber-risk.html CISO Resource Center urn:uuid:408260d6-1015-3be6-fdb7-1c8b2aba3bce Tue, 12 Sep 2023 00:00:00 +0000 Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively. Trend Micro CISO : Zero Trust Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Blog TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms https://www.trendmicro.com/en_us/ciso/23/i/trickbot-conti-sanctions-cisos-board.html CISO Resource Center urn:uuid:680828ce-df50-acad-99a9-784f7d977f1d Fri, 08 Sep 2023 00:00:00 +0000 Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members. Trend Micro CISO : Article Trend Micro CISO : Expert Perspective Trend Micro CISO : Compliance Trend Micro CISO : Ransomware Trend Micro CISO : Risk Management Ed Cabrera TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms https://www.trendmicro.com/en_us/research/23/i/trickbot-conti-sanctions-cisos-board.html Research, News, and Perspective urn:uuid:a2c62ac9-4a6c-2483-77d5-7299850b683e Fri, 08 Sep 2023 00:00:00 +0000 Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members. Trend Micro Research : Malware Trend Micro Research : Web Trend Micro Research : Data center Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Ed Cabrera How Zero Trust and XDR Work Together https://www.trendmicro.com/en_us/ciso/21/l/how-zero-trust-and-xdr-work-together.html CISO Resource Center urn:uuid:c632cae7-8987-0db5-e9fa-7f097668a2f3 Thu, 07 Sep 2023 00:00:00 +0000 As the Zero Trust approach gains momentum, more organizations are looking to apply it to their security strategy. Learn how XDR and Zero Trust work together to enhance your security posture. Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Zero Trust Analyzing a Facebook Profile Stealer Written in Node.js https://www.trendmicro.com/en_us/research/23/i/analyzing-a-facebook-profile-stealer-written-in-node-js.html Research, News, and Perspective urn:uuid:2295f63d-e2ac-348d-f02c-83aa087e3b6c Tue, 05 Sep 2023 00:00:00 +0000 We analyze an information stealer written in Node.js, packaged into an executable, exfiltrated stolen data via both Telegram bot API and a C&C server, and employed GraphQL as a channel for C&C communication. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Jaromir Horejsi Revisiting 16shop Phishing Kit, Trend-Interpol Partnership https://www.trendmicro.com/en_us/research/23/i/revisiting-16shop-phishing-kit-trend-interpol-partnership.html Research, News, and Perspective urn:uuid:fd9e5191-a0bd-4bc4-0281-41f613ba9b32 Fri, 01 Sep 2023 00:00:00 +0000 In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Cyber Crime Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Paul Pajares Qakbot Takedown: The Road Ahead is Long and Winding https://www.trendmicro.com/en_us/research/23/i/fbi-qakbot-takedown.html Research, News, and Perspective urn:uuid:5bae36ca-4027-245f-0f90-78f808cfe193 Fri, 01 Sep 2023 00:00:00 +0000 A long and challenging journey against cybercrime around the world Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ed Cabrera IT & OT security: How to Bridge the Gap https://www.trendmicro.com/en_us/ciso/23/h/it-ot-security.html CISO Resource Center urn:uuid:80ce8347-14da-0a54-f680-fd848e0259f5 Thu, 31 Aug 2023 00:00:00 +0000 Connecting IT and OT environments can give industrial organizations powerful efficiencies, but it also introduces cybersecurity challenges. A new Trend Micro/SANS Institute report gets at the heart of those IT and OT security issues—and how to address them. Trend Micro CISO : Article Trend Micro CISO : Analyst Opinions Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response William Malik Earth Estries Targets Government, Tech for Cyberespionage https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html Research, News, and Perspective urn:uuid:ffbabac0-f4ec-731f-317a-170d423a3cc2 Wed, 30 Aug 2023 00:00:00 +0000 We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and procedures (TTPs) employed, we observed overlaps with the advanced persistent threat (APT) group FamousSparrow as Earth Estries targets governments and organizations in the technology sector. Trend Micro Research : Malware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Ted Lee How to Protect Your CI/CD Pipeline https://www.trendmicro.com/en_us/devops/23/h/protect-ci-cd-pipeline.html DevOps Resource Center urn:uuid:d4964e1d-650b-70ac-bd3f-b4089255c33d Tue, 29 Aug 2023 00:00:00 +0000 Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for. Trend Micro DevOps : Container Security Trend Micro DevOps : Article Trend Micro DevOps : Best Practices Trend Micro DevOps : Multi Cloud 4 Popular Cybersecurity Myths vs. Facts https://www.trendmicro.com/en_us/ciso/23/h/cybersecurity-myths-facts.html CISO Resource Center urn:uuid:4126e1cf-3fc7-72b2-ac5a-1a32b4a2066c Tue, 29 Aug 2023 00:00:00 +0000 Any cybersecurity approach is only as strong as its underlying assumptions. What happens when those assumptions are wrong? Find out where confusion about cybersecurity facts can lead organizations astray. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Stealthy Android Malware MMRat Carries Out Bank Fraud Via Fake App Stores https://www.trendmicro.com/en_us/research/23/h/mmrat-carries-out-bank-fraud-via-fake-app-stores.html Research, News, and Perspective urn:uuid:f628bc7b-4658-399e-bf0d-698d5f059b0e Tue, 29 Aug 2023 00:00:00 +0000 The Trend Micro Mobile Application Reputation Service (MARS) team discovered a new, fully undetected Android banking trojan, dubbed MMRat, that has been targeting mobile users in Southeast Asia since late June 2023. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports Trend Micro Research OT and IT Visibility and Efficiency Barriers https://www.trendmicro.com/en_us/research/23/h/ot-it-visibility-efficiency-barriers.html Research, News, and Perspective urn:uuid:075db550-e5b2-a3bb-0afb-55cacd2fe77a Thu, 24 Aug 2023 00:00:00 +0000 Learn the common OT and IT visibility and efficiency barriers, as well as how to get around them. Trend Micro Research : ICS OT Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Articles, News, Reports Trend Micro Research : Report Kazuhisa Tagaya 6 Ransomware Trends & Evolutions to Watch For https://www.trendmicro.com/en_us/ciso/23/b/ransomware-trends-evolutions-2023.html CISO Resource Center urn:uuid:89bdb736-eb2a-fdad-ac17-5e987c7f1594 Thu, 24 Aug 2023 00:00:00 +0000 In the era of digital transformation, ransomware groups are adapting to changing technology. The next evolution of ransomware could begin with these trends. Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Ransomware Profile Stealers Spread via LLM-themed Facebook Ads https://www.trendmicro.com/en_us/research/23/h/profile-stealers-spread-via-llm-themed-facebook-ads.html Research, News, and Perspective urn:uuid:67f85696-7e2b-bd23-251c-a3c0a2f47cbd Wed, 23 Aug 2023 00:00:00 +0000 In this entry, we discuss how a threat actor abuses paid Facebook promotions featuring LLMs to spread malicious code, with the goal of installing a malicious browser add-on and stealing victims’ credentials. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Jindrich Karasek What Can Generative AI do for Hybrid Cloud Security? https://www.trendmicro.com/en_us/devops/23/h/generative-ai-hybrid-cloud-security.html DevOps Resource Center urn:uuid:606b627b-1050-ed34-3178-25cfc6f488e7 Wed, 23 Aug 2023 00:00:00 +0000 As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise. Trend Micro DevOps : Workload Security Trend Micro DevOps : How To Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : File Storage Security Trend Micro DevOps : Multi Cloud Mike Milner INTERPOL + Trend to Fight African Cybercrime Networks https://www.trendmicro.com/en_us/research/23/h/african-cybercrime-networks.html Research, News, and Perspective urn:uuid:981f3330-bf7f-053d-8222-39eb5fb39dea Wed, 23 Aug 2023 00:00:00 +0000 Global threat intelligence helps to disrupt thousands of African cyber crimes networks Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Articles, News, Reports Ex-USSS CISO Explains Agencies' Struggle with Biden EO https://www.trendmicro.com/en_us/ciso/22/i/biden-cybersecurity-executive-order-14028-may-2021.html CISO Resource Center urn:uuid:2c1cca85-f027-91bd-153e-da4140e560b9 Tue, 22 Aug 2023 00:00:00 +0000 Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden's cybersecurity executive order. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Ed Cabrera Ex-USSS CISO Explains Agencies' Struggle with Biden EO https://www.trendmicro.com/en_us/research/23/h/agencies-struggle-biden-cyber-executive-order.html Research, News, and Perspective urn:uuid:61f875f4-3a30-2c37-58c6-880a3a071595 Mon, 21 Aug 2023 00:00:00 +0000 Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden's cybersecurity executive order. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ed Cabrera The Current Security State of Private 5G Networks https://www.trendmicro.com/en_us/research/23/h/private-5g-network-security.html Research, News, and Perspective urn:uuid:3ea4780e-ed74-bd0b-faca-996158325b0d Fri, 18 Aug 2023 00:00:00 +0000 Private 5G networks offer businesses enhanced security, reliability, and scalability. Learn more about why private 5G could be the future of secure networking. Trend Micro Research : Research Trend Micro Research : Privacy & Risks Trend Micro Research : Network Trend Micro Research : Articles, News, Reports 5 Types of Cyber Crime Groups https://www.trendmicro.com/en_us/ciso/23/e/cyber-crime-group-types.html CISO Resource Center urn:uuid:41e11c00-1207-05e8-e9ee-3d9f288067ec Thu, 17 Aug 2023 00:00:00 +0000 Discover the five main types of cyber crime groups: access as a service, ransomware as a service, bulletproof hosting, crowd sourcing, and phishing as a service as well as tips to strengthen your defense strategy. Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Ransomware How to Build a Simple Application Powered by ChatGPT https://www.trendmicro.com/en_us/devops/23/e/build-simple-application-with-chatgpt.html DevOps Resource Center urn:uuid:4cc47eaa-b5ca-47cb-24de-c8a2f8a76e7d Tue, 15 Aug 2023 00:00:00 +0000 OpenAI’s ChatGPT API enables applications to access and integrate ChatGPT, a large language model (LLM) that generates human-like responses to input. Learn how to build a web application that utilizes ChatGPT to generate useful output. Trend Micro DevOps : Cloud Native Trend Micro DevOps : How To Trend Micro DevOps : Azure Trend Micro DevOps : Google Cloud Platform Trend Micro DevOps : Article Trend Micro DevOps : AWS Top 10 AI Security Risks According to OWASP https://www.trendmicro.com/en_us/ciso/23/h/top-ai-risks.html CISO Resource Center urn:uuid:5485ddf0-5b43-de8a-2ef2-4cf60dd3b39d Tue, 15 Aug 2023 00:00:00 +0000 The unveiling of the first-ever Open Worldwide Application Security Project (OWASP) risk list for large language model AI chatbots was yet another sign of generative AI’s rush into the mainstream—and a crucial step toward protecting enterprises from AI-related threats. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Top 10 AI Security Risks According to OWASP https://www.trendmicro.com/en_us/research/23/h/top-ai-risks.html Research, News, and Perspective urn:uuid:533dc727-5c4a-195a-e44d-246ac040e505 Tue, 15 Aug 2023 00:00:00 +0000 The unveiling of the first-ever Open Worldwide Application Security Project (OWASP) risk list for large language model AI chatbots was yet another sign of generative AI’s rush into the mainstream—and a crucial step toward protecting enterprises from AI-related threats. Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Web Trend Micro Research : Privacy & Risks Trend Micro Research : Endpoints Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports Monti Ransomware Unleashes a New Encryptor for Linux https://www.trendmicro.com/en_us/research/23/h/monti-ransomware-unleashes-a-new-encryptor-for-linux.html Research, News, and Perspective urn:uuid:89fe5492-2b5c-5fdd-56b1-a47936b1b860 Mon, 14 Aug 2023 00:00:00 +0000 The Monti ransomware collective has restarted their operations, focusing on institutions in the legal and governmental fields. Simultaneously, a new variant of Monti, based on the Linux platform, has surfaced, demonstrating notable differences from its previous Linux-based versions. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Nathaniel Morales OT Security is Less Mature but Progressing Rapidly https://www.trendmicro.com/en_us/research/23/h/ot-security-2023.html Research, News, and Perspective urn:uuid:49e032c7-fc75-c366-4315-1bda98e16dfa Mon, 14 Aug 2023 00:00:00 +0000 The latest study said that OT security is less mature in several capabilities than IT security, but most organizations are improving it. Trend Micro Research : ICS OT Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Reports Trend Micro Research : Articles, News, Reports Kazuhisa Tagaya ChatGPT Highlights a Flaw in the Educational System https://www.trendmicro.com/en_us/research/23/h/chatgpt-flaw.html Research, News, and Perspective urn:uuid:3e8bf59c-cec0-b37a-de3b-807496e5c6dd Mon, 14 Aug 2023 00:00:00 +0000 Rethinking learning metrics and fostering critical thinking in the era of generative AI and LLMs Trend Micro Research : Cloud Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats William Malik The Journey to Zero Trust with Industry Frameworks https://www.trendmicro.com/en_us/ciso/23/h/industry-zero-trust-frameworks.html CISO Resource Center urn:uuid:df2564f3-5eed-22b0-1559-2714f80d6139 Wed, 09 Aug 2023 00:00:00 +0000 Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model. Trend Micro CISO : Article Trend Micro CISO : Cloud Trend Micro CISO : Zero Trust Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Alifiya Sadikali The Journey to Zero Trust with Industry Frameworks https://www.trendmicro.com/en_us/research/23/h/industry-zero-trust-frameworks.html Research, News, and Perspective urn:uuid:4b4a604a-c898-944e-4329-8211d1bdc41d Wed, 09 Aug 2023 00:00:00 +0000 Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model. Trend Micro Research : Cloud Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Compliance & Risks Trend Micro Research : Mobile Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Alifiya Sadikali An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html Research, News, and Perspective urn:uuid:952e7f1e-f419-c1b9-276e-87fe68d6327f Wed, 09 Aug 2023 00:00:00 +0000 In this blog entry, we will provide details on Rhysida, including its targets and what we know about its infection chain. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research Leverage the AWS Sustainability Pillar to Minimize Environmental Impact https://www.trendmicro.com/en_us/devops/23/h/aws-sustainability-pillar.html DevOps Resource Center urn:uuid:c5673c8b-a848-49ee-1e60-52478198fa23 Tue, 08 Aug 2023 00:00:00 +0000 One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability. Trend Micro DevOps : Cloud Native Trend Micro DevOps : Azure Trend Micro DevOps : Article Trend Micro DevOps : Compliance Trend Micro DevOps : AWS Trend Micro DevOps : Best Practices Trend Micro DevOps : Google Cloud Platform Trend Micro DevOps : Conformity Melissa Clow Lower Data Breach Insurance Costs with These Tips https://www.trendmicro.com/en_us/ciso/23/b/lower-data-breach-insurance-costs.html CISO Resource Center urn:uuid:5ddd8f4d-0cc0-2e6b-0c05-bce88a8f162c Tue, 08 Aug 2023 00:00:00 +0000 The changing attack landscape has resulted in the hardening of the data breach insurance market. Gain insight into how implementing security controls can reduce the mean time to detect and control the costliness of an attack. Trend Micro CISO : Cyber Insurance Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Vince Kearns Cybersecurity Threat 1H 2023 Brief with Generative AI https://www.trendmicro.com/en_us/research/23/h/cybersecurity-threat-2023-generative-ai.html Research, News, and Perspective urn:uuid:a094c31a-610d-516f-2ef7-a74cc85d4e69 Tue, 08 Aug 2023 00:00:00 +0000 How generative AI influenced threat trends in 1H 2023 Trend Micro Research : Cloud Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Cyber Threats Trend Micro Research : Report Latest Batloader Campaigns Use Pyarmor Pro for Evasion https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html Research, News, and Perspective urn:uuid:3fdb21bd-5be0-960b-da57-2269023a57a9 Mon, 07 Aug 2023 00:00:00 +0000 In June 2023, Trend Micro observed an upgrade to the evasion techniques used by the Batloader initial access malware, which we’ve covered in previous blog entries. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Junestherry Dela Cruz TargetCompany Ransomware Abuses FUD Obfuscator Packers https://www.trendmicro.com/en_us/research/23/h/targetcompany-ransomware-abuses-fud-obfuscator-packers.html Research, News, and Perspective urn:uuid:42631d5a-1939-5705-3b2b-3e69c0de9491 Mon, 07 Aug 2023 00:00:00 +0000 In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Don Ovid Ladores Break IT/OT Silos by Expanding SOC Responsibilities https://www.trendmicro.com/en_us/research/23/h/soc-responsibilities.html Research, News, and Perspective urn:uuid:0bcb784e-b732-447b-ca3b-fd0b55894b5d Fri, 04 Aug 2023 00:00:00 +0000 The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks. Trend Micro Research : ICS OT Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Reports Trend Micro Research : Articles, News, Reports Kazuhisa Tagaya 7 Container Security Best Practices For Better Apps https://www.trendmicro.com/en_us/devops/22/b/container-security-best-practices.html DevOps Resource Center urn:uuid:4ddfdc2b-8ad5-ae2d-482c-b21eebfe0758 Thu, 03 Aug 2023 00:00:00 +0000 Explore how to implement 7 container security best practices within a CI/CD pipeline built with tools from Amazon Web Services (AWS). Trend Micro DevOps : Cloud Native Trend Micro DevOps : Container Security Trend Micro DevOps : Article Trend Micro DevOps : AWS Trend Micro DevOps : Best Practices Melanie Tafelski New SEC Cybersecurity Rules: What You Need to Know https://www.trendmicro.com/en_us/ciso/23/h/sec-cybersecurity-rules-2023.html CISO Resource Center urn:uuid:728a4363-920f-0690-e0c6-5ccf62f0c596 Thu, 03 Aug 2023 00:00:00 +0000 The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization. Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Expert Perspective Trend Micro CISO : Compliance Trend Micro CISO : Detection and Response Trend Micro CISO : Risk Management Greg Young