How the EU Cyber Resilience Act Impacts Manufacturers
EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. Read More HERE…
EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. Read More HERE…
This blog entry delves into MxDR’s unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications. Read More HERE…
Trend has been securing web access for over a decade with forward-looking innovation and a global footprint to support our customer’s security strategy. We are committed to our customers’ journey of transforming their current security posture, aligning with Zero Trust principles, and embracing a modern, fully integrated security architecture. Read More HERE…
Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool Read More HERE…
The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem. Read More HERE…
We detail the modular framework of malicious Chrome extensions that consist of various highly obfuscated components that leverage Google Chrome API to monitor, intercept, and exfiltrate victim data. Read More HERE…
Dive into the world of private 5G networks and learn about a critical security vulnerability that could expose IoT devices to attacks from external networks. Read More HERE…
Learn what 100 straight quarters of profitability means to a Trender who has been here for every one of them. Read More HERE…
In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane. Read More HERE…
We detail an ongoing campaign abusing messaging platforms Skype and Teams to distribute the DarkGate malware to targeted organizations. We also discovered that once DarkGate is installed on the victim’s system, additional payloads were introduced to the environment. Read More HERE…