Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • Defending Critical Systems: Does It Have To Be “Smart”?

    TrendLabs - Malware Blog
    Everywhere I go it seems to be that “critical” systems are being attacked. Earlier this year people were talking about whether planes could be hacked. We’ve talked about whether smart grids can be hacked, too. Just a week or so ago, LOT Polish Airlines was almost completely grounded by a distributed denial-of-service (DDoS) attack. In […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDefending Critical Systems: Does It Have To Be “Smart”?
  • TorrentLocker Surges in the UK, More Social Engineering Lures Seen

    TrendLabs - Malware Blog
    Analysis and data by Paul Pajares (Fraud Analyst) and Jon Oliver (Senior Architect) We’ve noticed a recent increase in TorrentLocker-related emails being sent to users in several countries, particularly the United Kingdom and Turkey. From the latter half of May until June 10, there was a relative lull in TorrentLocker-related emails. However, over a period of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Surges in the UK, More Social Engineering Lures Seen
  • Lordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware

    TrendLabs - Malware Blog
    A 20-year-old college student whose underground username is Lordfenix has become one of Brazil’s top banking malware creators. Lordfenix developed his underground reputation by creating more than a hundred online banking Trojans, each valued at over US$300. Lordfenix is the latest in a string of young and notorious solo cybercriminals we’re seeing today. Who is […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroLordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware
  • MERS News Used in Targeted Attack against Japanese Media Company

    TrendLabs - Malware Blog
    Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMERS News Used in Targeted Attack against Japanese Media Company
  • The State of the ESILE/Lotus Blossom Campaign

    TrendLabs - Malware Blog
    The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign – which was referred to by other researchers as Lotus Blossom – is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe State of the ESILE/Lotus Blossom Campaign
  • Trend Micro Discovers Android Vulnerability that Can Lead to Exposure of Device Memory Content

    TrendLabs - Malware Blog
    We have discovered a vulnerability in the integrated Android debugger Debuggerd that can be used to expose the contents of the device’s memory in devices running Ice Cream Sandwich to Lollipop. A specially crafted ELF (Executable and Linkable Format) file can crash the debugger and expose the memory content via tombstone files and corresponding logd log files. This […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTrend Micro Discovers Android Vulnerability that Can Lead to Exposure of Device Memory Content
  • Change of Supplier Fraud: How Cybercriminals Earned Millions Using a $35 Malware

    TrendLabs - Malware Blog
    In our recent research, Piercing the HawkEye, we uncovered various ways cybercriminals were able to exploit information they gathered from monitoring victims’ mailboxes in order to steal money from businesses. One of the examples we shared, the “change of supplier” fraud, was one of the most notable, as this type of scheme has been known […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroChange of Supplier Fraud: How Cybercriminals Earned Millions Using a $35 Malware
  • US Healthcare Organizations Most Affected by Stegoloader Trojan

    TrendLabs - Malware Blog
    Most victims of the Stegoloader Trojan, which has recently been making its rounds in the news, are observed to come from healthcare organizations in North America.  The malware known as TROJ_GATAK has been active since 2012 and uses steganography techniques to hide components in .PNG files. Looking at recent victims of the Stegoloader malware, we […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroUS Healthcare Organizations Most Affected by Stegoloader Trojan
  • New Adobe Zero-Day Shares Same Root Cause as Older Flaws

    TrendLabs - Malware Blog
    Earlier we talked about the out-of-band update for Flash Player that was released by Adobe (identified as APSB15-14) that was released to fix CVE-2015-3113. This update raised the Flash Player version to 18.0.0.194. Our analysis of the current flaw reveals that the root cause of CVE-2015-3113 is similar to CVE-2015-3043. Both cause a buffer overflow within the Flash Player code. […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Adobe Zero-Day Shares Same Root Cause as Older Flaws
  • Adobe Issues Emergency Patch for Flash Zero-Day

    TrendLabs - Malware Blog
    Adobe has just released an update to address a vulnerability found in its Flash Player browser plug-in. In its security advisory (APSB15-14), Adobe notes that this vulnerability “is being actively exploited in the wild via limited, targeted attacks. Systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP, are […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAdobe Issues Emergency Patch for Flash Zero-Day

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place