Modern Attack Surface Management (ASM) for SecOps

Credit to Author: Alifiya Sadikali| Date: Thu, 14 Dec 2023 00:00:00 +0000

Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what SecOps need to look for in an ASM solution.

Read more

How the EU Cyber Resilience Act Impacts Manufacturers

Credit to Author: Jon Clay| Date: Tue, 12 Dec 2023 00:00:00 +0000

EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols.

Read more

Analyzing AsyncRAT’s Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases

Credit to Author: Buddy Tancio| Date: Mon, 11 Dec 2023 00:00:00 +0000

This blog entry delves into MxDR’s unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications.

Read more

2023 Review: Reflecting on Cybersecurity Trends

Credit to Author: Greg Young| Date: Thu, 07 Dec 2023 00:00:00 +0000

Every year, experts weigh in with predictions of what the big cybersecurity trends will be—but how often are they right? That’s the question Trend Micro’s Greg Young and Bill Malik asked recently on their Real Cybersecurity podcast, looking at what forecasters got wrong on a wide range of topics, from AI to human factors.

Read more

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics

Credit to Author: Joyce Huang| Date: Thu, 07 Dec 2023 00:00:00 +0000

Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool

Read more

Modern Attack Surface Management for CISOs

Credit to Author: Alifiya Sadikali| Date: Wed, 06 Dec 2023 00:00:00 +0000

Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what CISOs need to look for in an ASM solution.

Read more

Opening Critical Infrastructure: The Current State of Open RAN Security

Credit to Author: Salim S.I.| Date: Fri, 01 Dec 2023 00:00:00 +0000

The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

Read more