Lessons from the Russian Cyber Warfare Attacks

Lessons from the Russian Cyber Warfare Attacks

Cyberwarfare tactics may not involve tanks and bombs, but they often go hand-in-hand with real combat. The Russian invasion of Ukraine is a prime example. Before Russian troops crossed the border, Russian hackers had already taken down Ukrainian government websites. And after the conflict started, the hacktivist group Anonymous turned the tables by hacking Russian media to shut down propaganda about the war. In these unprecedented times of targeted attacks against governments and financial institutions,…

Read More

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Challenges with applying zero trust Applying zero trust principles comes down to segmenting the network, using authentication technology to verify the requestor before making any service available, enabling secure point-to-point networking, and monitoring device and entity behavior. This breaks down where technological limitations prohibit these capabilities. Sensor ship with a built-in back door. These devices must be calibrated in the field. The engineer installing them sets the operating level when the device is installed. Many…

Read More

Trend Micro Joins AWS Marketplace Vendor Insights

Trend Micro Joins AWS Marketplace Vendor Insights

Cloud computing is on a roll. Gartner predicts that spending on public cloud services including IaaS, SaaS and PaaS will reach nearly $500bn this year and grow by over 21% to hit $600bn by 2023. But security concerns persist. Marketplaces like the one offered by AWS make it a lot easier to get the right security tools in the hands of those that need them most. But finding the right cybersecurity partners can still be…

Read More

Better Together: AWS and Trend Micro

Better Together: AWS and Trend Micro

There’s a very good reason why AWS remains a leader in cloud computing. While many providers describe themselves as “customer obsessed,” few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers. AWS starts with the customer and works backwards. That means the vast majority of its feature enhancements and new services are directly driven from their input. The latest is Amazon GuardDuty Malware Protection….

Read More

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography Cloud In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking. By: Alfredo Oliveira, David Fiser July 21, 2022 Read time:  ( words) Previously, we reported on how threat actors are targeting multiple cloud environments such as Huawei Cloud to host cryptocurrency-mining malware by abusing misconfiguration issues and weak or stolen…

Read More

Over 50% of enterprises worry about supply chain risks

Over 50% of enterprises worry about supply chain risks

Over 50% of enterprises worry about supply chain risks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

In this section, we cover how malicious actors are leveraging Windows runners in their attempts to mine cryptocurrency, as well as the persistence techniques they use to dodge detection by GitHub to prevent their Actions from being disabled. GitHub provides the runner, a server designed to run workflows (aka Actions). Workflows are deployed on Azure and terminated after an enterprise’s automation is completed. While this service has its limits, users do not pay anything to…

Read More

Share Your Cloud Risk Management Assessment Plan with the Board

Share Your Cloud Risk Management Assessment Plan with the Board

Quantifying and qualifying cyber risk is a longstanding challenge for CISOs. It was already a challenge for on-premise infrastructure when you knew what assets you had and where all the data lived. Cloud migration raises the bar, making it even more challenging to pinpoint cyber risk with a growing digital attack surface composed of distributed infrastructure and independently managed cloud resources used across the company. To help empower CISOs to more succinctly present their cloud…

Read More

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Lateral movement to machines in the network After the initial infection with Cobalt Strike, we observed that the threat actor dropped node.exe, which is a stowaway proxy tool that is publicly available on Github. The tool is written in the GO language and can provide many capabilities to threat actors: remote shell execution, upload/downloading files, and more. In this case, the tool is used to provide a reverse shell to threat actors on IP: 45[.]32.108.54…

Read More

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform Risk Management In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more unified approach to managing cyber risk. Trend Micro co-founder & CEO Eva Chen discusses our vision and strategy for delivering a unified cybersecurity platform. By: Trend Micro June 23, 2022 Read time:  ( words) Undoubtedly, COVID-19 has been a big accelerant for digital…

Read More
1 9 10 11 12 13 18