Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • Exploring Control Flow Guard in Windows 10

    TrendLabs - Malware Blog
    As operating system developers are always keen on improving exploit mitigation technology, Microsoft has enabled a new mechanism in Windows 10 and in Windows 8.1 Update 3 (released last November) by fault. This technology is called Control Flow Guard (CFG). Previous mitigation techniques like address space layout randomization (ASLR) and Data Execution Prevention (DEP) have […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroExploring Control Flow Guard in Windows 10
  • New DYRE Variant Hijacks Microsoft Outlook, Expands Targeted Banks

    TrendLabs - Malware Blog
    The DYRE/Dyreza banking malware is back with a new infection technique: we observed that it now hijacks Microsoft Outlook to spread the notorious UPATRE malware to target an expanded list of targeted banks. Last October 2014 we observed a hike in UPATRE-DYRE malware infections brought by the CUTWAIL spambot, a pattern we observed was similar […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew DYRE Variant Hijacks Microsoft Outlook, Expands Targeted Banks
  • Security of Home Surveillance Cameras

    TrendLabs - Malware Blog
    Home surveillance/security cameras have been available for quite some time, and can be used to keep track of one’s home, children, pets, or business.  These devices are, in some ways, the first exposure of people to the Internet of Things. For most people, home surveillance means setting up a camera and using the Internet to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSecurity of Home Surveillance Cameras
  • Not So Spooky: Linux “Ghost” Vulnerability

    TrendLabs - Malware Blog
    Researchers at Qualys have found a vulnerability in the GNU C Library (alternately known as glibc), which can be used to run arbitrary code on systems running various Linux operating systems. The vulnerability (assigned as CVE-2015-0235) has been dubbed GHOST and is the latest vulnerability to receive a “friendly” name, joining others like Heartbleed, Shellshock, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNot So Spooky: Linux “Ghost” Vulnerability
  • CVE-2015-0016: Escaping the Internet Explorer Sandbox

    TrendLabs - Malware Blog
    Part of this January’s Patch Tuesday releases was MS15-004, which fixed a vulnerability that could be used in escalation of privilege attacks. I analyzed this vulnerability (designated as CVE-2015-0016) because it may be the first vulnerability in the wild that showed the capability to escape the Internet Explorer sandbox. As sandboxing represents a key part […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCVE-2015-0016: Escaping the Internet Explorer Sandbox
  • Over a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks

    TrendLabs - Malware Blog
    Our engineers were investigating a case involving a targeted attack when they came across a custom tool called vtask.exe. Once executed, vtask.exe hides Windows tasks in the current session. What’s curious about this attacker-created tool is that it appears to have been compiled in 2002—twelve years ago. A Look at Vtask The compiler time shows […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOver a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks
  • Analyzing CVE-2015-0311: Flash Zero Day Vulnerability

    TrendLabs - Malware Blog
    Last week a major zero-day vulnerability was found in Adobe Flash Player. Over the weekend, Adobe released an update to fix the vulnerability: users who have enabled auto-update already received the newest version (16.0.0.296). Our analysis has confirmed that the vulnerable code has been modified. The update will be available for manual download later this week. Users of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAnalyzing CVE-2015-0311: Flash Zero Day Vulnerability
  • New RATs Emerge from Leaked Njw0rm Source Code

    TrendLabs - Malware Blog
    In the middle of my research on the remote access Trojan (RAT) known as “njrat” or “Njw0rm”, I stumbled upon dev-point.com, a site that disguises itself as a site for “IT enthusiasts” but actually hosts various downloaders, different types of spyware, and RATs. I explored the site and found that they host malware under the […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew RATs Emerge from Leaked Njw0rm Source Code
  • Flash Greets 2015 With New Zero-Day

    TrendLabs - Malware Blog
    Since January 20, we have obtained copies of malicious SWF files used by the Angler exploit kit via feedback provided by the Smart Protection Network. These samples were obtained from users in the United States; we believe that one of the samples we obtained is the same zero-day Flash exploit reported by the security researcher […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFlash Greets 2015 With New Zero-Day
  • CTB-Locker Ransomware Includes Freemium Feature, Extends Deadline

    TrendLabs - Malware Blog
    Last July we came across a crypto-ransomware variant known as Critroni or Curve-Tor-Bitcoin (CTB) Locker. We observed recent improvements to the CTB malware, which now offer a “free decryption” service, extended deadline to decrypt the files, and an option to change the language of the ransom message. These new variants also demand payment of 3 […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCTB-Locker Ransomware Includes Freemium Feature, Extends Deadline

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place