We have come across a PowerShell script (mailer script) that distributes the Lemon Duck cryptominer through a new propagation method: Covid-19-themed emails with weaponized attachments.
Access control devices that use facial recognition manage entry and exit into an enterprise’s premises. They are essentially the first line of defense for many businesses, but are they secure?
Cloud-native security adopts the defense-in-depth approach and divides the security strategies utilized in cloud-native systems into four different layers: cloud, container, cluster, code.
Ian Keller, Chief Security Officer of SBV Services in South Africa, recently sat down with Trend Micro and shared his thoughts on how his organization is coping with the current pandemic.