![]() |
Brian Gorenc, senior director of vulnerability research and director of Trend Micro’s ZDI program, says he’s been observing increased bug bounty activity in 2020.
![]() |
Nefilim is known for its double extortion capabilities and notable attacks in 2020. We give an overview of its techniques and tools in this entry.
Feb. 23, 2021
![]() |
This second part of our series on LoRaWAN will discuss the security of LoRaWAN communication and possible attacks on vulnerabilities. We also dive into the comprehensive testing environment used to assess this issue: specific optimization techniques with software-defined radio (SDR), and the tool we created to help decode LoRaWAN packets.
Feb. 19, 2021
![]() |
Cybersecurity Risks of Connected Cars and SHAREit Flaw Could Lead to Remote Code Execution.
Feb. 19, 2021
Funda Cizgenakad
Europe
Tel: +44 7876 616246
funda_cizgenakad@trendmicro.co.uk
Lorena Rodriguez
Latin America
Tel: +52 55 3067-6000
lorena_rodriguez@trendmicro.com
Get our news RSS.