What to Do About Log4j
Credit to Author: William Malik| Date: Tue, 21 Dec 2021 00:00:00 +0000
Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the immediate crisis abates.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: William Malik| Date: Tue, 21 Dec 2021 00:00:00 +0000
Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the immediate crisis abates.
Read MoreCredit to Author: Abraham Camba| Date: Fri, 17 Dec 2021 00:00:00 +0000
We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign.
Read MoreCredit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000
This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.
Read MoreCredit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000
This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.
Read MoreCredit to Author: Veronica Chierzi| Date: Thu, 09 Dec 2021 00:00:00 +0000
In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.
Read More