Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Let’s dig into the results a bit further to identify areas of greatest concern across regions. 1. Top five security risksWith the global Covid-19 pandemic continuing as well as many successful ransomware attacks and breaches occurring, it does appear that many organizations felt some areas of their preparedness may be more of a concern now than in the past. Below are the top five security risks around their infrastructure: Mobile/remote employees Cloud computing infrastructure and providers…

Read More

Research Firm: TM

Research Firm: TM

If organizations weren’t committed to the cloud before the pandemic, they certainly are now. Two years of sometimes gale-force business headwinds, market uncertainty and operational adversity have confirmed the criticality of cloud to boardroom leaders. By April 2021, a third of global organizations said they were running more than 50% of their workloads in the cloud. By this fall, it’s estimated that over half (56%) of enterprises worldwide will be. That’s why Trend Micro has…

Read More

An In-Depth Look at ICS Vulnerabilities Part 3

An In-Depth Look at ICS Vulnerabilities Part 3

The items on this chart are showing what percentages of ICS-affecting vulnerabilities identified by 2021 advisories are caused by what kind of weaknesses – “flaws, faults, bugs, or other errors” – in coding. Nine percent was caused by CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, while CWE-787 Out-of-Bounds Write affected 8.3%. Additionally, 6.7% was caused by CWE-20 Improper Input Validation and 4.8% was due to CWE-79 Improper Neutralization of Input…

Read More

Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One and Cloud One

Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One and Cloud One

Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One and Cloud One Exploits & Vulnerabilities We provide a guide to detecting Dirty Pipe, a Linux kernel vulnerability tracked as CVE-2022-0847.  By: Sunil Bharti April 06, 2022 Read time:  ( words) This blog provides threat analysts a guide to detecting an arbitrary file overwrite vulnerability in Linux Kernel, also known as Dirty Pipe. Dirty Pipe is a local privilege escalation vulnerability that is tracked as CVE-2022-0847….

Read More

Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload

Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload

Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload Cyber Threats Both BLISTER and SocGholish are loaders known for their evasion tactics. Our report details what these loaders are capable of and our investigation into a campaign that uses both to deliver the LockBit ransomware. By: Earle Maui Earnshaw, Mohamed Fahmy, Ian Kenefick, Ryan Maglaque, Abdelrhman Sharshar, Lucas Silva April 05, 2022 Read time:  ( words) The Trend MicroTM Managed XDR team has made a series…

Read More

An In-Depth Look at ICS Vulnerabilities Part 2

An In-Depth Look at ICS Vulnerabilities Part 2

This chart shows CVEs affecting Critical Manufacturing that was identified in 2021 advisories which might be used to accomplish tactics from the MITRE ATT&CK framework ease of reading. Names and definitions of tactics are directly referenced from the MITRE ATT&CK framework. Six hundred and thirteen CVEs identified in advisories in 2021 are likely to affect Critical Manufacturing environments, 88.8% of them might be leveraged by attackers to create an Impact (to directly or indirectly cause…

Read More

MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639

MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639

MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639 We discovered a now-patched vulnerability in macOS SUHelper, designated as CVE-2022-22639. If exploited, the vulnerability could allow malicious actors to gain root privilege escalation. By: Mickey Jin April 04, 2022 Read time:  ( words) We discovered a vulnerability in suhelperd, a helper daemon process for Software Update in macOS. A class inside suhelperd, SUHelper, provides an essential system service through the inter-process communication (IPC)…

Read More

MITRE Engenuity ATT&CK Tests

MITRE Engenuity ATT&CK Tests

By developing a common language to arm analysts with a standard to describe attacks, MITRE ATT&CK has become a critical knowledgebase for cyber defenders, ultimately improving security efficiency and response time. The annual MITRE Evaluation compares industry-wide innovation to deliver the solutions necessary to detect and respond to the evolving threat landscape. The evaluation offers cybersecurity solution buyers and customers with an unbiased option to evaluate security products to arm themselves against the latest advances from attackers…

Read More

This Week in Security News – April 1, 2022

This Week in Security News – April 1, 2022

Read on:  Probing the Activities of Cloud-Based Cryptocurrency-Mining Groups Trend Micro‘s research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks. Lapsus$ ‘Back from Vacation’ Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads of customers’ DevOps platforms – to its hit list. The Lapsus$ data…

Read More
1 16 17 18 19 20 27