Facebook’s Metaverse is Expanding the Attack Surface

Facebook’s Metaverse is Expanding the Attack Surface

Thirty years ago, Paramount trademarked the name “Holodeck.” An artifact of Star Trek: The Next Generation, the holodeck was a magical, computer-generated world where characters lived in another realm – either a historical place or an entirely fictious domain, based on old movies, books, or a character’s imagination. As in much science fiction, the holodeck’s inner workings were never explained, except when dealing with a malfunction: the safety protocols stopped working, an alien took over the…

Read More

Oil and Gas Cybersecurity: Industry Overview Part 1

Oil and Gas Cybersecurity: Industry Overview Part 1

The oil and gas industry is no stranger to major cybersecurity attacks, attempting to disrupt operations and services. Most of the best understood attacks against the oil industry are initial attempts to break into the corporate networks of oil companies. Geopolitical tensions can cause major changes not only in physical space, but also in cyberspace. In March 2022, our researchers observed several alleged cyberattacks perpetrated by different groups. It has now become important more than…

Read More

Private 5G Network Security Expectations Part 3

Private 5G Network Security Expectations Part 3

Q: Are you or do you expect to use cloud-based capabilities in your private network? Network cloudification?Base: n = 408 Source: 451 Research custom study Coexistence of technology evolution and cybersecurity Openness expands business opportunities, but there are always major security challenges. Many of us will remember the Apache Log4j vulnerability that occurred at the end of 2021. The use of open source is also promoted in O-RAN ALLIANCE mentioned above, but the biggest security…

Read More

Private 5G Network Security Expectations Part 1

Private 5G Network Security Expectations Part 1

Private 5G Network Security Expectations Part 1 Privacy & Risks Are “new” protocols and “private” networks sufficient for your cybersecurity requirements? By: Jun Morimoto July 05, 2022 Read time:  ( words) Corporate security teams are now facing multiple cybersecurity issues, including complex data privacy and compliance requirements, in addition to the rapidly advancing Digital Transformation. Trend Micro, in collaboration with 451 Research, a part of S&P Global Market Intelligence, conducted a survey on the private…

Read More

Private 5G Network Security Expectations Part 2

Private 5G Network Security Expectations Part 2

Private 5G Network Security Expectations Part 2 Privacy & Risks The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks? By: Jun Morimoto July 05, 2022 Read time:  ( words) The implementation of private 5G is already real, according to a survey conducted by Trend Micro in collaboration with 451 Research, part of S&P Global Market…

Read More

Hacking the Crypto-monetized Web

Hacking the Crypto-monetized Web

Hacking the Crypto-monetized Web Cyber Threats What danger lies around the corner? By: Jon Clay June 30, 2022 Read time:  ( words) The web is several decades old. But it largely still relies on the same method of monetization as it always has: advertising. However, things are changing thanks to the power of cryptocurrency and blockchain. It’s what Trend Micro has coined the “crypto-monetized web” (CMW). But where there’s money to be made and users…

Read More

Why It’s Time to Map the Digital Attack Surface

Why It’s Time to Map the Digital Attack Surface

Around a year ago a cyberattack on a little-known US oil pipeline thrust ransomware into the media spotlight and grabbed the attention of the White House. The ensuing months saw a flurry of government efforts designed to improve the security posture of global organizations, with cyber risk management planted firmly front-and-center of recommended best practices. The cybercriminals responsible for breaching Colonial Pipeline may have unintentionally done a great deal of good for the security community….

Read More

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters Cloud While researching cloud-native tools, our Shodan scan revealed over 200,000 publicly exposed Kubernetes clusters and kubelet ports that can be abused by criminals. By: Magno Logan May 24, 2022 Read time:  ( words) While researching cloud-native tools and how they can reveal information about a system or an organization, we came across some data sets from Shodan concerning Kubernetes clusters (aka…

Read More

Trend Micro Cloud One Network Security-as-a-Service

Trend Micro Cloud One Network Security-as-a-Service

Simplifying network security in the cloud has been the primary objective of Trend Micro Cloud One – Network Security. At Trend Micro, we focus on making deployment as easy as possible for our customers. We help customers avoid re-architecture, and we don’t interfere with network traffic, so we’ve enabled customers to achieve broad and deep network layer security across entire VPCs within minutes. Trend Micro, alongside Amazon Web Services (AWS), has worked to provide the…

Read More

Groups Target Alibaba ECS Instances for Cryptojacking

Groups Target Alibaba ECS Instances for Cryptojacking

Groups Target Alibaba ECS Instances for Cryptojacking Cloud We looked at how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. By: David Fiser, Alfredo Oliveira November 15, 2021 Read time:  ( words) It’s been known that threat actors are actively exploiting misconfigured Linux-powered servers, regardless of whether they run on-premises or in the cloud. The compromised devices are mostly used for cryptojacking purposes with the dominance of mining…

Read More
1 2 3