Global Cyber Risk Lowers to Moderate Level in 2H’ 2022
Credit to Author: Jon Clay| Date: Tue, 02 May 2023 00:00:00 +0000
Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities
Read moreCredit to Author: Jon Clay| Date: Tue, 02 May 2023 00:00:00 +0000
Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities
Read moreCredit to Author: Ted Lee| Date: Tue, 02 May 2023 00:00:00 +0000
After months of dormancy, Earth Longzhi, a subgroup of advanced persistent threat (APT) group APT41, has reemerged using new techniques in its infection routine. This blog entry forewarns readers of Earth Longzhi’s resilience as a noteworthy threat.
Read moreCredit to Author: Don Ovid Ladores| Date: Fri, 28 Apr 2023 00:00:00 +0000
In March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal footprint behind. Our findings revealed many of the preparations made by the perpetrators and how quickly they managed to carry out the ransomware attack.
Read moreCredit to Author: Don Ovid Ladores| Date: Tue, 18 Apr 2023 00:00:00 +0000
This blog post analyzes a stealthy and expeditious ransomware called BabLock (aka Rorschach), which shares many characteristics with LockBit.
Read moreCredit to Author: Jon Clay| Date: Wed, 12 Apr 2023 00:00:00 +0000
Key trends and predictions you should know about
Read moreCredit to Author: David Sancho| Date: Mon, 03 Apr 2023 00:00:00 +0000
We examine three differently sized criminal groups to know how they compare to similarly sized legitimate businesses in terms of how they are organized. We also discuss how threat researchers can use their knowledge of the size and structure of a target criminal organization to aid their investigation.
Read moreCredit to Author: Trend Micro Research| Date: Thu, 30 Mar 2023 00:00:00 +0000
In late March 2023, security researchers revealed that threat actors were actively abusing a popular business communication software from 3CX.
Read moreCredit to Author: Trend Micro Research| Date: Thu, 30 Mar 2023 00:00:00 +0000
In late March 2023, security researchers revealed that threat actors were actively abusing a popular business communication software from 3CX.
Read moreCredit to Author: Jaromir Horejsi| Date: Wed, 29 Mar 2023 00:00:00 +0000
We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.
Read moreCredit to Author: Vickie Su| Date: Thu, 23 Mar 2023 00:00:00 +0000
After months of investigation, we found that several undisclosed malware and interesting tools used for exfiltration purposes were being used by Earth Preta. We also observed that the threat actors were actively changing their tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the other tools and malware used by the threat actor.
Read more