Hybrid Cloud Security Challenges & Solutions
Credit to Author: Mike Milner| Date: Tue, 06 Sep 2022 00:00:00 +0000
Explore hybrid cloud security challenges, components, and tips to minimize your cyber risk.
Read moreCredit to Author: Mike Milner| Date: Tue, 06 Sep 2022 00:00:00 +0000
Explore hybrid cloud security challenges, components, and tips to minimize your cyber risk.
Read moreCredit to Author: Don Ovid Ladores| Date: Tue, 06 Sep 2022 00:00:00 +0000
Play is a new ransomware that takes a page out of Hive and Nokoyawa’s playbook. The many similarities among them indicate that Play, like Nokoyawa, are operated by the same people.
Read moreCredit to Author: Don Ovid Ladores| Date: Tue, 06 Sep 2022 00:00:00 +0000
Play is a new ransomware that takes a page out of Hive and Nokoyawa’s playbook. The many similarities among them indicate that Play, like Nokoyawa, may be a Hive affiliate.
Read moreCredit to Author: Vickie Su| Date: Fri, 02 Sep 2022 00:00:00 +0000
In March 2021, we investigated a backdoor with a unique modular architecture and called it BumbleBee due to a string embedded in the malware. However, in our recent investigations, we have discovered a controller application that expands its capabilities.
Read moreCredit to Author: William Malik| Date: Thu, 01 Sep 2022 00:00:00 +0000
The metaverse is coming—but what does that mean for network infrastructure? We explore expected changes, network challenges, and tips for enhancing network security to minimize cyber risk across the attack surface.
Read moreCredit to Author: Trend Micro Research| Date: Wed, 31 Aug 2022 00:00:00 +0000
This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”
Read moreCredit to Author: William Malik| Date: Tue, 30 Aug 2022 00:00:00 +0000
MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can help your business and tips for making an informed partner decision.
Read moreCredit to Author: Mohamed Fahmy| Date: Thu, 25 Aug 2022 00:00:00 +0000
A new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa. This ransomware is called Agenda and is customized per victim.
Read moreCredit to Author: Braden Collingwood| Date: Thu, 25 Aug 2022 00:00:00 +0000
Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.
Read moreCredit to Author: Ryan Soliven| Date: Wed, 24 Aug 2022 00:00:00 +0000
We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.
Read more