This Week in Security News – July 23, 2021 VP, Threat Intelligence
StrongPity APT Group Deploys Android Malware for the First Time and STIX Cyberthreat Sharing Standards Approved Read More HERE…
StrongPity APT Group Deploys Android Malware for the First Time and STIX Cyberthreat Sharing Standards Approved Read More HERE…
The Covid-19 pandemic has created an unlimited supply of news and topics for cybercriminals to utilize in their attacks, as well as major organizations to spoof. Learn what your organization can do to combat these timely threats. Read More HERE…
MSPs – Say no to the next Ransomware! Protect your Business 24×7 with Trend Micro’s security analysts Read More HERE…
Trends and Shifts in the Underground N-Day Exploit Market and Scams Make Getting Verified on Social Media a Minefield. Read More HERE…
Ransomware and phishing attacks will continue to be utilized and will likely see increases in their usage by malicious actors in targeting their victims. Learnings and recommendations from report to improve your prevention and response to these threats. Read More HERE…
Kaseya hit with ransomware attack and top 3 mobile threat takeaways from MWC Read More HERE…
We recently coined this as the Summer of Cybercrime. Major ransomware attacks continue to hit companies globally. The attacks can cause significant damage, from a financial, reputation and productivity standpoint. Read More HERE…
Kaseya has been hit with a REvil (aka Sodinokibi) ransomware attack at the dawn of the Fourth of July weekend. The attack was geared toward their on-premises VSA product. Read More HERE…
Nefilim ransomware attack through a MITRE Att&ck lens and PoC exploit circulating for critical Windows Print Spooler bug, and more. Read More HERE…
Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…
The post The Life Cycle of a Compromised (Cloud) Server appeared first on . Read More HERE…