2022 Review: Trend Transforms to SaaS Cybersecurity
Credit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Lonny Huffar| Date: Fri, 24 Feb 2023 00:00:00 +0000
Transformation to a SaaS-based cybersecurity vendor
Read moreCredit to Author: Hara Hiroaki| Date: Thu, 16 Feb 2023 00:00:00 +0000
We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 07 Feb 2023 00:00:00 +0000
In this investigation, we analyzed several prominent “passive income” applications and found out that there may be security risks upon participating in these programs.
Read moreCredit to Author: Don Ovid Ladores| Date: Wed, 23 Nov 2022 00:00:00 +0000
This blog entry looks at the characteristics of a new WannaRen ransomware variant, which we named Life ransomware after its encryption extension.
Read moreCredit to Author: Feike Hacquebord| Date: Tue, 08 Nov 2022 00:00:00 +0000
This report provides defenders and security operations center teams with the technical details they need to know should they encounter the DeimosC2 C&C framework.
Read moreCredit to Author: Ian Kenefick| Date: Wed, 12 Oct 2022 00:00:00 +0000
We analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike payload that can be attributed to the threat actors behind the Black Basta ransomware.
Read moreCredit to Author: CH Lei| Date: Tue, 04 Oct 2022 00:00:00 +0000
For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and the connections, including previously documented malware that have yet to be attributed.
Read moreCredit to Author: Joelson Soares| Date: Wed, 20 Jul 2022 00:00:00 +0000
We discovered the use of two Python penetration-testing tools, Impacket and Responder, that malicious actors used to compromise systems and exfiltrate data. We share our key findings in this report.
Read more