Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more

Cybersecurity for Industrial Control Systems: Part 2

Credit to Author: Ericka Pingol| Date: Thu, 20 Jan 2022 00:00:00 +0000

To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.

Read more

Cybersecurity for Industrial Control Systems: Part 1

Credit to Author: Trend Micro Research| Date: Sat, 15 Jan 2022 00:00:00 +0000

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats.

Read more

This Week in Security News – December 17, 2021

Credit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000

This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.

Read more

The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

Credit to Author: Veronica Chierzi| Date: Thu, 09 Dec 2021 00:00:00 +0000

In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.

Read more