Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Exploits & Vulnerabilities

CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks

Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched.

July 15, 2024
Phishing

QR Codes: Convenience or Cyberthreat?

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

Security Strategies Jul 23, 2024

Save to Folio

Security Strategies Jul 23, 2024

Save to Folio

Cyber Threats

Why NDR is Key to Cyber 'Pest Control'

Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where they’re coming in—and seal the gaps.

Security Strategies Jul 22, 2024

Save to Folio

Security Strategies Jul 22, 2024

Save to Folio

Compliance & Risks

Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike

On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike.

Expert Perspective Jul 19, 2024

Save to Folio

Expert Perspective Jul 19, 2024

Save to Folio

Data center

Teaming up with IBM to secure critical SAP workloads

Trend Micro partners with IBM to offer advanced threat detection and response for protecting critical infrastructures running on IBM Power servers

Latest News Jul 16, 2024

Save to Folio

Latest News Jul 16, 2024

Save to Folio

Cyber Crime

An In-Depth Look at Crypto-Crime in 2023 Part 2

In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise.

Reports Jul 11, 2024

Save to Folio

Reports Jul 11, 2024

Save to Folio

Exploits & Vulnerabilities

Network detection & response: the SOC stress reliever

Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.

Security Strategies Jul 09, 2024

Save to Folio

Security Strategies Jul 09, 2024

Save to Folio

Cyber Crime

An In-Depth Look at Crypto-Crime in 2023 Part 1

Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses.

Reports Jul 08, 2024

Save to Folio

Reports Jul 08, 2024

Save to Folio