Examining the Black Basta Ransomware’s Infection Routine
Credit to Author: Ieriz Nicolle Gonzalez| Date: Mon, 09 May 2022 00:00:00 +0000
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics.
Read moreCredit to Author: Ieriz Nicolle Gonzalez| Date: Mon, 09 May 2022 00:00:00 +0000
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics.
Read moreCredit to Author: Aliakbar Zahravi| Date: Thu, 05 May 2022 00:00:00 +0000
This report focuses on the components and infection chain of the NetDooka framework. Its scope ranges from the release of the first payload up until the release of the final RAT that is protected by a kernel driver.
Read more
In this workshop, you will learn how to leverage Trend Micro Cloud One™ – Network Security to provide a powerful network security layer which can be deployed seamlessly into your existing AWS architecture.
Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000
We found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions.
Read more
We’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets.
AWS DevOps competency recently added a new category, DevSecOps to its arsenal. Explore our overview of the category and why it matters to security and development teams building in the cloud.
Credit to Author: Daniel Lunghi| Date: Wed, 27 Apr 2022 00:00:00 +0000
We recently found a new advanced persistent threat (APT) group that we have dubbed Earth Berberoka (aka GamblingPuppet). This APT group targets gambling websites on Windows, macOS, and Linux platforms using old and new malware families.
Read more
We’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets.
Explore Trend Micro Research’s security insights and predictions for 2022 to enable more informed and proactive decision-making.
Our global study polled more than 2,300 IT security decision makers to discover how to best assist and support SecOps teams with a unified cybersecurity platform so you can be more resilient with less resources.