Defending Users’ NAS Devices From Evolving Threats
Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000
In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000
In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.
Read MoreCredit to Author: Arianne Dela Cruz| Date: Tue, 18 Jan 2022 00:00:00 +0000
We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer.
Read MoreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 14 Jan 2022 00:00:00 +0000
In a series of blog posts, we explore different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers but also malicious users. This is the second part of the series.
Read MoreCredit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.
Read MoreCredit to Author: Abraham Camba| Date: Mon, 10 Jan 2022 00:00:00 +0000
The Trend Micro™ Managed XDR team addressed a stealthy multilayered attack that progressed from an exploited endpoint vulnerability to the use of legitimate remote access tools including Remote Desktop Protocol (RDP) as its final means of intrusion.
Read MoreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 07 Jan 2022 00:00:00 +0000
The first of a series of blog posts examines the security risks of Codex, a code generator powered by the GPT-3 engine.
Read MoreCredit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Read More