New OpcJacker Malware Distributed via Fake VPN Malvertising

Credit to Author: Jaromir Horejsi| Date: Wed, 29 Mar 2023 00:00:00 +0000

We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.

Read more

Prevent Ransomware with Cybersecurity Monitoring

Credit to Author: Jon Clay| Date: Thu, 23 Mar 2023 00:00:00 +0000

Misconfigured cloud and IT assets open the door to a wide range of cyber risks. Automated, continuous cybersecurity monitoring lets organizations watch accounts and systems for exposures in real time and maintain strong attack surface risk management.

Read more

Pack it Secretly: Earth Preta’s Updated Stealthy Strategies

Credit to Author: Vickie Su| Date: Thu, 23 Mar 2023 00:00:00 +0000

After months of investigation, we found that several undisclosed malware and interesting tools used for exfiltration purposes were being used by Earth Preta. We also observed that the threat actors were actively changing their tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the other tools and malware used by the threat actor.

Read more

How Your Cybersecurity Strategy Enables Better Business

Credit to Author: Greg Young| Date: Tue, 21 Mar 2023 00:00:00 +0000

84% of respondents in a Trend Micro global survey said cyber policies negatively impact employees’ abilities to do jobs in the office. Discover how an effective cybersecurity strategy can enable better business, instead of slowing it down.

Read more

AWS Graviton Use Cases

Credit to Author: Michael Langford| Date: Tue, 21 Mar 2023 00:00:00 +0000

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Read more