Red Teaming to Reduce Cyber Risk
Credit to Author: Lucas van den Berg| Date: Thu, 15 Sep 2022 00:00:00 +0000
Discover how red teaming can help reduce cyber risk across your ever-expanding digital attack surface.
Read moreCredit to Author: Lucas van den Berg| Date: Thu, 15 Sep 2022 00:00:00 +0000
Discover how red teaming can help reduce cyber risk across your ever-expanding digital attack surface.
Read moreCredit to Author: Sunil Bharti| Date: Wed, 14 Sep 2022 00:00:00 +0000
This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and blocked the abuse of the CVE-2020-14882 WebLogic vulnerability in affected endpoints.
Read moreCredit to Author: William Malik| Date: Tue, 13 Sep 2022 00:00:00 +0000
As private 5G networks continue to roll-out, CISOs and security leaders need to fully aware of the security implications to minimize cyber risk. Explore pros and cons as well as security tips for implementing private 5G.
Read moreCredit to Author: William Malik| Date: Wed, 20 Jul 2022 00:00:00 +0000
Explore use cases and mitigation strategies to improve software supply chain security and reduce cyber risk.
Read moreCredit to Author: Nitesh Surana| Date: Mon, 12 Sep 2022 00:00:00 +0000
One of our honeypots based on exposed Docker REST APIs showed cybercriminal group TeamTNT’s potential attack scenario and leak of container registry credentials for docker-abuse malware. The full version of this research will be presented at the c0c0n XV Hacking and Cyber Security Conference in September 2022.
Read moreCredit to Author: Nitesh Surana| Date: Thu, 08 Sep 2022 00:00:00 +0000
Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact.
Read moreCredit to Author: Michael Langford| Date: Thu, 08 Sep 2022 00:00:00 +0000
This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.
Read moreCredit to Author: Ed Cabrera| Date: Thu, 08 Sep 2022 00:00:00 +0000
Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the effectiveness of Biden’s executive order and what organizations of all sizes can learn from it.
Read moreCredit to Author: Alfredo Oliveira| Date: Wed, 07 Sep 2022 00:00:00 +0000
We analyzed the Distroless technique for reducing the size of container images and explored its capabilities to address security concerns. We provide an alternative approach to Distroless that reduces the attack surface for malicious actors targeting cloud-native applications while optimizing cloud resources.
Read moreCredit to Author: Caitlyn Hughes| Date: Fri, 02 Sep 2022 00:00:00 +0000
With the industry changing so rapidly, it is often hard to keep up with what is new in cloud security, so we thought we would put together a list of the top five cloud security trends we found during AWS re:Inforce 2022.
Read more