Tokyo Olympics Leveraged in Cybercrime Attack

Just before the opening of the Tokyo Olympics, we confirmed an attack that directed users from a fake TV broadcast schedule page to browser notification spam. Read More HERE…

Read more

This Week in Security News – August 13, 2021 VP, Threat Intelligence

This Week in Security News: Hackers Steal $600 million in Largest Ever Cryptocurrency Heist and Cybersecurity is the New ‘Great Game’ Read More HERE…

Read more

#LetsTalkSecurity – Security at the Speed of Change VP, Security Research

Let’s Talk Security: Season 02 // Episode 05: Host, Rik Ferguson, interviews Vice President and Chief Information Security Officer for Carrier, Nicole Darden Ford. Together they discuss the changing cybersecurity landscape. Read More HERE…

Read more

Detecting PrintNightmare Exploit Attempts using Trend Micro Vision One and Cloud One Threat Research Engineer

We look into the different implementations of PrintNightmare and include recommendations on how security teams can safeguard their workloads. Read More HERE…

Read more

Most supply chain attacks target supplier’s code—ENISA

The agency also reported that attacks on the supply chain have grown in number and become more sophisticated. Sixty-two percent of the attacks were also done using malware, requiring enterprises to future-proof their security. Read More HERE…

Read more

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising Threat Researcher Threat Researcher

We found a new social engineering-based malvertising campaign targeting Japan that delivered a malicious application. The malicious application abused sideloading vulnerabilities to load and start the Cinobi banking trojan. Read More HERE…

Read more

This Week in Security News – August 6, 2021 VP, Threat Intelligence

This week, learn how false advertisers use spam browser notifications to gain ad revenue. Also, read about the results from Trend Micro’s first half 2021 biannual Cyber Risk Index report. Read More HERE…

Read more

Homeland Security Releases New Cybersecurity Rules

DHS’s second issue requires pipeline operators to implement various cybersecurity measures to protect their operations from cyber attacks. This directive also builds upon the department’s May directive following the Colonial Pipeline attack. Read More HERE…

Read more