TeamTNT Returns – or Does It?

Credit to Author: Sunil Bharti| Date: Wed, 19 Oct 2022 00:00:00 +0000

Our honeypots caught malicious cryptocurrency miner samples targeting the cloud and containers, and its routines are reminiscent of the routines employed by cybercriminal group TeamTNT, which was said to have quit in November 2021. Our investigation shows that another threat actor group, WatchDog, might be mimicking TeamTNT’s arsenal.

Read more

Software Patch Management Policy Best Practices

Credit to Author: Jon Clay| Date: Tue, 18 Oct 2022 00:00:00 +0000

Explore the top risk-based patch management policy best practices to mitigate the growing threat of vulnerability exploits in your organization.

Read more

Oil and Gas Cybersecurity: Trends & Response to Survey

Credit to Author: Mayumi Nishimura| Date: Thu, 13 Oct 2022 00:00:00 +0000

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry’s challenges and present Trend Micro’s recommendations.

Read more

Prevent Ransomware Attacks on Critical Infrastructure

Credit to Author: William Malik| Date: Thu, 13 Oct 2022 00:00:00 +0000

Cyberattacks against critical infrastructure can cause massive societal disruption and take an enormous financial toll. Discover how to protect six key OT domains to help prevent ransomware and other threats to essential operations.

Read more

Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike

Credit to Author: Ian Kenefick| Date: Wed, 12 Oct 2022 00:00:00 +0000

We analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike payload that can be attributed to the threat actors behind the Black Basta ransomware.

Read more

Enhance Cyber Defense with 2022 Cybersecurity Trends

Credit to Author: Jon Clay| Date: Tue, 11 Oct 2022 00:00:00 +0000

Jon Clay, VP of Threat Intelligence, reviews cybersecurity trends from the first half of 2022 to help CISOs and security leaders enhance their cyber defense strategy and lower cyber risk.

Read more

How Will the Metaverse Affect Cloud Security?

Credit to Author: Michael Langford| Date: Fri, 07 Oct 2022 00:00:00 +0000

The metaverse is an immersive digital world of augmented reality. While supporting a virtual universe relies on cloud storage, questions arise on how this will affect cloud security. Gain valuable insight on security concerns surrounding the metaverse now and in the near future.

Read more

Cyber Hygiene: 5 Tips for Company Buy-In

Credit to Author: William Malik| Date: Thu, 06 Oct 2022 00:00:00 +0000

Good cyber hygiene starts with buy-in from across the enterprise. Discover how CISOs can establish a company-wide security culture to enhance cyber hygiene effectiveness and reduce risk.

Read more