Oil and Gas Cybersecurity: Threats Part 2
In part two of our oil and gas series, we look at more threats that can expose the industry to cyberattacks. Read More HERE…
In part two of our oil and gas series, we look at more threats that can expose the industry to cyberattacks. Read More HERE…
With geopolitical tensions running high, oil and gas companies may be more susceptible to cyberattacks. Read More HERE…
In this blog post, we discuss the technical details of a new banking dropper that we have dubbed DawDropper, give a brief history of banking trojans released in early 2022 that use malicious droppers, and elaborate on cybercriminal activities related to DaaS in the deep web. Read More HERE…
This post relays the latest threat detection tool innovation of AWS – Amazon GuardDuty Malware Protection. This tool works closely with Trend Micro cloud solutions, providing another valuable layer of defense in our fight against a shared adversary. Read More HERE…
In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking. Read More HERE…
In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking. Read More HERE…
We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022. Read More HERE…
We found updated samples of the CopperStealer malware infecting systems via websites hosting fake software. Read More HERE…
Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps immediately. Read More HERE…
We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials and other sensitive user information, including private keys. Read More HERE…