INTERPOL & Trend’s Fight Against Cybercrime
Credit to Author: Jon Clay| Date: Thu, 12 Dec 2024 00:00:00 +0000
Trend threat intelligence and training were crucial to the success of two major policing operations in 2024
Read moreCredit to Author: Jon Clay| Date: Thu, 12 Dec 2024 00:00:00 +0000
Trend threat intelligence and training were crucial to the success of two major policing operations in 2024
Read moreCredit to Author: Mike Grodzki| Date: Mon, 09 Dec 2024 00:00:00 +0000
Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People’s Republic of Korea’s targeting macOS.
Read moreCredit to Author: Joy Ngaruro| Date: Mon, 02 Dec 2024 00:00:00 +0000
AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers.
Read moreCredit to Author: Morton Swimmer| Date: Wed, 04 Dec 2024 00:00:00 +0000
Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.
Read moreCredit to Author: Sunil Bharti| Date: Tue, 03 Dec 2024 00:00:00 +0000
Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.
Read moreCredit to Author: Sunil Bharti| Date: Tue, 03 Dec 2024 00:00:00 +0000
Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.
Read moreCredit to Author: Jaromir Horejsi| Date: Wed, 16 Oct 2024 00:00:00 +0000
This article uncovers a Golang ransomware abusing Amazon S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.
Read moreCredit to Author: Sunil Bharti| Date: Mon, 21 Oct 2024 00:00:00 +0000
We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware.
Read more