US warns that Chinese government is using 'wide variety' of methods, some illegal, to steal trade secrets

Written by AJ Vicens Oct 22, 2021 | CYBERSCOOP The Chinese government’s aggressive push to dominate emerging technology such as artificial intelligence, quantum computing, and biotechnology make Beijing the “primary…

Webhards and Torrents: the New Channels for RAT Malware Propagation in Korea

South Korea seems to be a target of a new malicious campaign that propagates RAT malware camouflaged into a game for adults. The way it is distributed happens via torrents…

What Is Extended Detection and Response (XDR)? Features, Benefits, and Beyond

Overloaded security teams, poor visibility, and threat alert overload have quite an impact when it comes to detecting and effectively responding to cyber threats. Since today’s cyberattacks are extremely tricky…

YouTube Used to Push Password-Stealing Malware

A Trojan is a type of malware that acts according to the Greek legend, as it camouflages itself as a legitimate file or program to trick unsuspecting users into installing…

Network Computing Awards 2021: Heimdal™ Wins Best Cloud-Delivered Security Solution

Great efforts pay off! We are very proud and thrilled to announce that Heimdal™ won first place in the Cloud-Delivered Security Solution of the Year category at the Network Computing…

Enhancing Cyber Resilience through Extended Detection and Response (XDR)

Summary Advanced attacks represent a challenge for organizations that are getting breached due to architectural misfits and resource challenges Enlarging the width and depth of threat detection and response helps…

All You Need to Know About DNS Spoofing to Keep Your Organization Safe

This post is also available in: Danish The DNS in and of itself has never been secure. Being created in the 1980s when the Internet was a complete novelty, protection…

India Releases Cybersecurity Guidelines for Power Sector

Trend Micro – Trend Micro – The Indian Government’s Power Ministry and the Central Electricity Authority (CEA) recently released cybersecurity guidelines to enhance the power sector’s cybersecurity readiness. It is…

Republican Senate leaders slam new TSA cybersecurity regulations for rail, aviation industry

Republican leaders in the US Senate have come out harshly against new cybersecurity regulations designed to protect US railroad and airport systems.  The new rules were handed down earlier this…

TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment. The criminal threat group known as TA551 has added the Sliver…