Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Preventing and Detecting Attacks Involving 3CX Desktop App
Malware

Preventing and Detecting Attacks Involving 3CX Desktop App

In this blog entry, we provide technical details and analysis on the 3CX attacks as they happen. We also discuss available solutions which security teams can maximize for early detection and mitigate the impact of 3CX attacks.

March 30, 2023
Compliance & Risks

Trend Achieves AWS Level 1 MSSP Competency Status

Trend offers 24x7 fully managed security services uniquely designed in collaboration with AWS security experts to protect, monitor, and respond to security events of AWS environments.

Latest News Apr 19, 2023

Save to Folio

Latest News Apr 19, 2023

Save to Folio

Ransomware

An Analysis of the BabLock (aka Rorschach) Ransomware

This blog post analyzes a stealthy and expeditious ransomware called BabLock (aka Rorschach), which shares many characteristics with LockBit.

Research Apr 18, 2023

Save to Folio

Research Apr 18, 2023

Save to Folio

Compliance & Risks

Stay Ahead of Cyber Threats

Going further and faster with high-performance network security

Latest News Apr 03, 2023

Save to Folio

Latest News Apr 03, 2023

Save to Folio

Cyber Threats

Unpacking the Structure of Modern Cybercrime Organizations

We examine three differently sized criminal groups to know how they compare to similarly sized legitimate businesses in terms of how they are organized. We also discuss how threat researchers can use their knowledge of the size and structure of a target criminal organization to aid their investigation.

Research Apr 03, 2023

Save to Folio

Research Apr 03, 2023

Save to Folio

Cyber Threats

S4x23 Review Part 4: Cybersecurity for Industrial IoT

In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment.

Security Strategies Mar 31, 2023

Save to Folio

Security Strategies Mar 31, 2023

Save to Folio

Malware

Mac Malware MacStealer Spreads as Fake P2E Apps

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

Mar 30, 2023

Save to Folio

Mar 30, 2023

Save to Folio

Cyber Crime

Fighting mercenaries with the Cybersecurity Tech Accord

Trend Micro co-Authors Cyber Mercenary Principles to help guide the technology industry and others in dealing with the growing market of cyber mercenaries.

Latest News Mar 30, 2023

Save to Folio

Latest News Mar 30, 2023

Save to Folio

Malware

Preventing and Detecting Attacks Involving 3CX Desktop App

In this blog entry, we provide technical details and analysis on the 3CX attacks as they happen. We also discuss available solutions which security teams can maximize for early detection and mitigate the impact of 3CX attacks.

Research Mar 30, 2023

Save to Folio

Research Mar 30, 2023

Save to Folio