Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Cyber Threats

The Journey to Zero Trust with Industry Frameworks

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Security Strategies Aug 09, 2023

Save to Folio

Security Strategies Aug 09, 2023

Save to Folio

Ransomware

TargetCompany Ransomware Abuses FUD Obfuscator Packers

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Aug 07, 2023

Save to Folio

Aug 07, 2023

Save to Folio

Malware

Latest Batloader Campaigns Use Pyarmor Pro for Evasion

In June 2023, Trend Micro observed an upgrade to the evasion techniques used by the Batloader initial access malware, which we’ve covered in previous blog entries.

Research Aug 07, 2023

Save to Folio

Research Aug 07, 2023

Save to Folio

Compliance & Risks

Break IT/OT Silos by Expanding SOC Responsibilities

The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks.

Reports Aug 04, 2023

Save to Folio

Reports Aug 04, 2023

Save to Folio

Privacy & Risks

New SEC Cybersecurity Rules: What You Need to Know

The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization.

Foresight Aug 03, 2023

Save to Folio

Foresight Aug 03, 2023

Save to Folio

Compliance & Risks

Tech Consolidation – How and When?

Streamlining IT for business optimal business performance

Expert Perspective Aug 02, 2023

Save to Folio

Expert Perspective Aug 02, 2023

Save to Folio