How to detect Apache HTTP Server Exploitation

How to detect Apache HTTP Server Exploitation

In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts which led to cryptominers raking up compute on the vulnerable hosts. CVE-2021-40438:This CVE tracks the vulnerability posed by the ‘mod_proxy’ module in Apache HTTP Server (versions before 2.4.49). In CWE-918 Server-Side Request Forgery (SSRF) attack, a malicious actor can forward the request to an origin server of their choice In this…

Read More

2022 Cybersecurity Trends for DevSecOps

2022 Cybersecurity Trends for DevSecOps

How many articles have you read that started with some variation of “the COVID-19 pandemic accelerated digital transformation?” This concept isn’t new, but you may be wondering how these sudden changes will impact security. We’ll explore Trend Micro Research’s predictions for 2022 and the impact on DevSecOps—the cultural approach that helps you build secure apps as quick as you can say “the COVID-19 pandemic accelerated digital transformation.” Cybercrime in the cloud Due to the sudden…

Read More

Oracle WebLogic Detection and Mitigation

Oracle WebLogic Detection and Mitigation

Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS platform. Trend Micro Cloud One™ includes seven security services that help developers build securely and quickly from the moment code is committed into their repository. It’s integrated with Trend Micro Vision One™, which uses its industry-leading XDR capabilities to collect and correlate data across multiple security layers. Both products leverage automation,…

Read More

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape Detection and Response Trend Micro’s VP of Threat Intelligence, Jon Clay, explores the latest trends in today’s threat landscape and why XDR is key to enabling more resilience. By: Jon Clay December 13, 2021 Read time:  ( words) I’m proud to share the Forrester New Wave™: for Extended Detection and Response (XDR) that named Trend Micro a Leader in both current offerings and strength of strategy. I’d…

Read More

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together

XDR alone is an effective security capability. However, when used in tandem with the Zero Trust approach, organizations can further enhance their security. XDR has two significant assets that can support a Zero Trust strategy: strong endpoint (user, cloud workload, device, etc) controls and organization-wide data collection and correlation from across the IT infrastructure. Here’s how it works: Strong endpoint controls deliver a solid foundation for verifying and establishing trust by providing security teams with…

Read More

Top 10 Azure Cloud Configuration Mistakes

Top 10 Azure Cloud Configuration Mistakes

Top misconfigured rules for Azure services Let’s look at three top misconfigured services for Azure and the Conformity rule for that service with the highest misconfiguration rate. Service: Azure Activity LogRule(s): “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update PostgreSQL database’ events” The top misconfigured rules for Azure Activity Log are related to PostgreSQL, a fully managed database-as-a-service platform. “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update…

Read More

Top 10 AWS Security Misconfiguration

Top 10 AWS Security Misconfiguration

Swift cloud adoptions spurred on by the global pandemic has led to oversights, errors, or ill-informed cloud service configuration choices (commonly referred to misconfigurations). You may have heard that securing the cloud can be complex, but something as “simple” to stop as a misconfiguration can ultimately lead to the unintended exposure of mission-critical information and assets. Major cosmetic retailer, Estee Lauder, experienced a major breach due to a misconfiguration, resulting in more than 440 million…

Read More

Enterprise Strategy Group Verifies Valuation of XDR Solutions

Enterprise Strategy Group Verifies Valuation of XDR Solutions

  Why XDR It’s been established that EDR doesn’t do enough to detect threats—it is, after all only on the endpoint and over 90% of threats enter the enterprise through email and other avenues. And while many respondents considered SIEM their most valuable tool for threat detection and response, they also faced many challenges with it. Namely, 57% said they had operation and resource issues, 58% noted there was room for improvement with upfront correlation…

Read More

Reduce Friction Between IT Leaders and C-suite

Reduce Friction Between IT Leaders and C-suite

In addition, more than 80% of IT managers surveyed felt pressured to downplay the severity of cyber risks to their board in fear of sounding too negative or repetitive. While an understandable concern, IT leaders play a critical role in helping the boardroom clearly understand the cyber risk landscape in order to boost cybersecurity investments and enable the organization to grow. Disagreements aren’t only between IT leaders and the C-suite, friction between IT and business…

Read More

Defend Against Cyber Espionage Attacks

Defend Against Cyber Espionage Attacks

Defend Against Cyber Espionage Attacks Risk Management Explore Trend Micro’s latest research into Void Balaur, a prolific cybermercenary group, to learn how to defend against attacks launched by this growing group of threat actors. By: Trend Micro November 23, 2021 Read time:  ( words) We recently discussed the rise of cybercriminal groups such as ransomware-as-a-service. While these cybercrime syndicates are based on specific motivations, another group, dubbed “cybermercenaries”, has developed to provide cyberattack services, tools,…

Read More
1 14 15 16 17