Conti vs. LockBit: A Comparative Analysis of Ransomware Groups

Trend Micro – Trend Micro – Conti vs. LockBit: A Comparative Analysis of Ransomware Groups Ransomware We compare the targeting and business models of the Conti and LockBit ransomware groups…

Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques

Trend Micro – Trend Micro – Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a…

New Linux-Based Ransomware 'Cheerscrypt' Targets EXSi Devices

Trend Micro – Trend Micro – New Linux-Based Ransomware Cheerscrypt Targets EXSi Devices Ransomware Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises EXSi servers. We discuss…

Celebrating 15 Years of Pwn2Own

Trend Micro – Trend Micro – Exploits & Vulnerabilities Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how…

AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell

Trend Micro – Trend Micro – Conclusion While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access…

How to better manage your digital attack surface risk

Trend Micro – Trend Micro – So, how can security leaders stay on top of their attack surface and ahead of the bad guys? By leveraging a unified cybersecurity platform…

Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners

Trend Micro – Trend Micro – Among the exploitation attempts were ones aimed at deploying cryptocurrency miners. In this section, we look at how the malicious actors behind these exploitation…

An Investigation of the BlackCat Ransomware via Trend Micro Vision One

Trend Micro – Trend Micro – An Investigation of the BlackCat Ransomware via Trend Micro Vision One Ransomware We recently investigated a case related to the BlackCat ransomware group using…

An In-Depth Look at ICS Vulnerabilities Part 3

Trend Micro – Trend Micro – The items on this chart are showing what percentages of ICS-affecting vulnerabilities identified by 2021 advisories are caused by what kind of weaknesses –…

An In-Depth Look at ICS Vulnerabilities Part 2

Trend Micro – Trend Micro – This chart shows CVEs affecting Critical Manufacturing that was identified in 2021 advisories which might be used to accomplish tactics from the MITRE ATT&CK…