Fake Installers Drop Malware and Open Doors for Opportunistic Attackers Threats Analyst

We recently spotted fake installers of popular software being used to deliver bundles of malware onto victims’ devices. These installers are widely used lures that trick users into opening malicious documents or installing unwanted applications. Read More HERE…

Read more

Water Basilisk Uses New HCrypt Variant to Flood Victims with RAT Payloads Threat Researcher Sr. Threat Researcher

In this blog entry we look into a fileless campaign that used a new HCrypt variant to distribute numerous remote access trojans (RATs) in victim systems. This new variant also uses an updated obfuscation mechanism which we detail. Read More HERE…

Read more

This Week in Security News – September 3, 2021 VP, Threat Intelligence

Proxytoken vulnerability can modify Exchange server configs and Lockbit jumps its own countdown, publishes Bangkok Air files Read More HERE…

Read more

Key Takeaways from the Linux Threat Report VP, Cloud Security

As the popularity of Linux continues to increase, so does its attack surface. This brings to light a pressing question for organizations: who is responsible for the security of all the Linux instances running your cloud environment? Read More HERE…

Read more

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising Threat Researcher Threat Researcher

We found a new social engineering-based malvertising campaign targeting Japan that delivered a malicious application. The malicious application abused sideloading vulnerabilities to load and start the Cinobi banking trojan. Read More HERE…

Read more

Supply Chain Attacks from a Managed Detection and Response Perspective Threats Analyst Threats Analyst Threats Analyst Threats Analyst

In this blog entry, we will take a look at two examples of supply chain attacks that our Managed Detection and Response (MDR) team encountered in the past couple of months. Read More HERE…

Read more

Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher

The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints,” presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. Read More HERE…

Read more