AvosLocker Ransomware Variant Abuses Driver File to Disable Antivirus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.

Read more

Patch Your WSO2: CVE-2022-29464 Exploited to Install Linux-Compatible Cobalt Strike Beacons, Other Malware

Credit to Author: Hitomi Kimura| Date: Tue, 31 May 2022 00:00:00 +0000

Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps immediately.

Read more

Celebrating 15 Years of Pwn2Own


Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how the program will continue to serve the cybersecurity community in the future.

Read more

Uncovering a Kingminer Botnet Attack Using Trend Micro™ Managed XDR

Credit to Author: Buddy Tancio| Date: Wed, 18 May 2022 00:00:00 +0000

Trend Micro’s Managed XDR team addressed a Kingminer botnet attack conducted through an SQL exploit. We discuss our findings and analysis in this report.

Read more

S4x22: ICS Security Creates the Future

Credit to Author: Kazuhisa Tagaya| Date: Thu, 12 May 2022 00:00:00 +0000

The ICS Security Event S4 was held for the first time in two years, bringing together more than 800 business leaders and specialists from around the world to Miami Beach on 19-21 Feb 2022. The theme was CREATE THE FUTURE.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions.

Read more

Trend Micro Partnering with Bit Discovery


We’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets.

Read more