PurpleFox Using WPAD to Target Indonesian Users Sr. Threat Researcher
The PurpleFox Exploit Kit is now being distributed via WPAD attacks targeting Indonesian users. Read More HERE…
The PurpleFox Exploit Kit is now being distributed via WPAD attacks targeting Indonesian users. Read More HERE…
The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints,” presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. Read More HERE…
Secret management plays an important role in keeping essential information secure and out of threat actors’ reach. We discuss what secrets are and how to store them securely. Read More HERE…
Cloud workload security and endpoint protection are key to managing security risk. Two new independent IDC reports help CISOs consider their strategic partner options. Read More HERE…
Social media is a double-edged sword, and as we celebrate #SocialMediaDay, let’s remember to use best security practices to keep us safe from malicious actors who abuse the platforms. Read More HERE…
Follow the story of Company X as they suffer an attack from the notorious modern ransomware family, Nefilim, and their affiliates, to learn how you can better mitigate against the common tactic and techniques used in these attacks. Read More HERE…
Fake DarkSide campaign targets energy and food sectors and Tulsa police-citation data leaked by Conti Gang Read More HERE…
Trend Micro Cloud One + New Relic come together to offer complete cloud visibility Read More HERE…
Why tax deductions for ransom payments send the wrong signals to threat actors and their victims Read More HERE…
The expedited move to digital transformation has been a lifeline for organizations during the pandemic. Now that these investments have been made, what’s next to continue to drive operational improvements? Read More HERE…