Forecasting Metaverse Threats: Will it Become Metaworse?

Credit to Author: Trend Micro Research| Date: Tue, 09 Aug 2022 00:00:00 +0000

This report shares threat predictions concerning a rapidly evolving area of the physical and digital word – the metaverse. We refine our definition of the metaverse, while identifying threats against it and inside it.

Read more

Facebook’s Metaverse is Expanding the Attack Surface

Credit to Author: William Malik| Date: Mon, 08 Aug 2022 00:00:00 +0000

Understand the cybersecurity risks in the Metaverse

Read more

Well-Architected Framework: Sustainability

Credit to Author: Sterling Davis| Date: Fri, 5 Aug 2022 00:00:00 +0000

One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.

Read more

Cyber Insurance Market 2022: FAQs & Updates with iBynd

Credit to Author: Vince Kearns| Date: Fri, 05 Aug 2022 00:00:00 +0000

iBynd VP of Insurance, Tim Logan, and Trend Micro’s Cyber Risk Specialist Vince Kearns provide insights on cyber insurance must-haves, pricing, services, and how the industry is changing in the face of ransomware attacks, cryptocurrency, and emerging cybersecurity technologies.

Read more

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant

Credit to Author: Nathaniel Morales| Date: Tue, 02 Aug 2022 00:00:00 +0000

This blog entry offers a technical analysis of a new SolidBit variant that is posing as different applications to lure gamers and social media users. The SolidBit ransomware group appears to be planning to expand its operations through these fraudulent apps and its recruitment of ransomware-as-a-service affiliates.

Read more

Transport Layer Security (TLS): Issues & Protocol

Credit to Author: Duane Seon| Date: Thu, 28 Jul 2022 00:00:00 +0000

Although Transport layer security (TLS) provides enhanced security, cybercriminals have become increasingly savvy, finding ways to circumvent many of these protections. Learn how malicious actors exploit vulnerabilities within TLS to introduce new forms of malware.

Read more