Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Wed, 31 Aug 2022 00:00:00 +0000

This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”

Read more

Cyber Security Managed Services 101

Credit to Author: William Malik| Date: Tue, 30 Aug 2022 00:00:00 +0000

MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can help your business and tips for making an informed partner decision.

Read more

New Golang Ransomware Agenda Customizes Attacks

Credit to Author: Mohamed Fahmy| Date: Thu, 25 Aug 2022 00:00:00 +0000

A new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa. This ransomware is called Agenda and is customized per victim.

Read more

Unlocking Serverless with AWS Lambda and IAM

Credit to Author: Braden Collingwood| Date: Thu, 25 Aug 2022 00:00:00 +0000

Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.

Read more

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Credit to Author: Ryan Soliven| Date: Wed, 24 Aug 2022 00:00:00 +0000

We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.

Read more

4 Cybersecurity Budget Management Tips

Credit to Author: Greg Young| Date: Tue, 23 Aug 2022 00:00:00 +0000

Learn how CISOs can use automation, strategic budgeting and internal training to run more productive cybersecurity teams amid a skills shortage.

Read more

Detect Threats with Runtime Security

Credit to Author: Jiri Sykora| Date: Tue, 16 Aug 2022 00:00:00 +0000

With the increasing use of multi-cloud infrastructure services security has become more complex. You need simplified security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection.

Read more

Business Email Compromise Attack Tactics

Credit to Author: Jon Clay| Date: Thu, 18 Aug 2022 00:00:00 +0000

Is BEC more damaging than ransomware? What tactics are BEC actors using? How can organizations bolster their defenses? Jon Clay, VP of threat intelligence, tackles these pertinent questions and more to help reduce cyber risk.

Read more