A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Trend Micro – Trend Micro – Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of…

Integrate Cybersecurity Incident Response in DevSecOps

Trend Micro – Trend Micro – In today’s age of fast-moving people, processes, and teams, businesses need to stay one step ahead of the curve. This means balancing a system…

AtomSilo and LockFile Ransomware Decryptor Now Available for Free

Another good news in the world of ransomware attacks! Czech multinational cybersecurity software organization Avast has recently developed and published a decryptor that will help those affected by AtomSilo and…

Tracking CVE-2021-26084 and Other Server-Based Vulnerability Exploits via Trend Micro Cloud One and Trend Micro Vision One

Trend Micro – Trend Micro – A more detailed explanation of this chain and the specific techniques observed in this campaign can be found in our tech brief. We used…

Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

New Ransomware Dubbed Atom Silo Targets Confluence Servers

Atlassian Confluence is a highly popular web-based team workspace meant to help employees collaborate. Back in August, Atlassian issued security updates meant to patch a Confluence remote code execution (RCE) vulnerability tracked…