Decoding Turla: Trend Micro’s MITRE Performance

Credit to Author: Shannon Murphy| Date: Thu, 21 Sep 2023 00:00:00 +0000

This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro’s 100% successful protection performance.

Read more

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms

Credit to Author: Ed Cabrera| Date: Fri, 08 Sep 2023 00:00:00 +0000

Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members.

Read more

TargetCompany Ransomware Abuses FUD Obfuscator Packers

Credit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Read more

Four Must-haves to Strengthen Your Endpoint Security

Credit to Author: Joyce Huang| Date: Thu, 06 Jul 2023 00:00:00 +0000

To combat complexity and achieve optimal security outcomes, there are four key factors an organization should consider when evaluating their endpoint security.

Read more

Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Wed, 31 Aug 2022 00:00:00 +0000

This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”

Read more