Examining the Black Basta Ransomware’s Infection Routine
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics. Read More HERE…
Read moreWe analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics. Read More HERE…
Read moreThis report focuses on the components and infection chain of the NetDooka framework. Its scope ranges from the release of the first payload up until the release of the final RAT that is protected by a kernel driver. Read More HERE…
Read moreWe found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions. Read More HERE…
Read moreWe found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions. Read More HERE…
Read moreWe recently found a new advanced persistent threat (APT) group that we have dubbed Earth Berberoka (aka GamblingPuppet). This APT group targets gambling websites on Windows, macOS, and Linux platforms using old and new malware families. Read More HERE…
Read moreAs organizations shift to the cloud in droves, their digital attack surface continues to rapidly expand. And with the number of threats rapidly increasing, security leaders need to enhance their attack surface risk management. We explore how a unified cybersecurity platform can help improve your defenses against cyber risk in comparison to point products. Read More HERE…
Read moreWe’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets. Read More HERE…
Read moreWe’re excited to partner with Bit Discovery, bringing attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, internet-facing assets. Read More HERE…
Read moreRecently, we observed the Spring4Shell vulnerability — a remote code execution bug, assigned as CVE-2022-22965 — being actively exploited by malicious actors to deploy cryptocurrency miners. Read More HERE…
Read moreRecently, we observed attempts to exploit the Spring4Shell vulnerability — a remote code execution bug, assigned as CVE-2022-22965 — by malicious actors to deploy cryptocurrency miners. Read More HERE…
Read more